4
www.infoshield.com.om Gain in-depth knowledge and practical experience of perimeter defenses, scanning and attacking networks, escalating privileges, hacking and secu- rity your own system. Examine useful methods for uncovering network associated with both wired and wireless network connections. Introduction to Hacking Technique Discovery Methods System Hacking and Enumeration Exploits and Advance Topics Covering Tracks and Anti Forensic Defending Systems Date: 24 to 28 December 2011 Location: Infoshield Training Center Instructor: Kevin Cardwell Length: 5 days Fees: 970 This practical course will help you to: Course Description Course Outline Course Details CEH Resereve your place by 15 Sep 2011 and receive BlackBerry

CEH - infoshield.com.om 2011.pdf · networks, escalating privileges, hacking and secu-rity your own system. Examine useful methods for uncovering network associated with both wired

  • Upload
    hadiep

  • View
    232

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CEH - infoshield.com.om 2011.pdf · networks, escalating privileges, hacking and secu-rity your own system. Examine useful methods for uncovering network associated with both wired

www.infoshield.com.om

Gain in-depth knowledge and practical experience of perimeter defenses, scanning and attacking networks, escalating privileges, hacking and secu-rity your own system.

Examine useful methods for uncovering network associated with both wired and wireless network connections.

Introduction to Hacking TechniqueDiscovery MethodsSystem Hacking and Enumeration Exploits and Advance Topics Covering Tracks and Anti ForensicDefending Systems

Date: 24 to 28 December 2011

Location: Infoshield Training Center

Instructor: Kevin Cardwell

Length: 5 days

Fees: 970

This practical course will help you to:

Course Description

Course Outline

Course Details

CEH

Resereve yourplace by 15

Sep 2011 and receive

BlackBerry

Page 2: CEH - infoshield.com.om 2011.pdf · networks, escalating privileges, hacking and secu-rity your own system. Examine useful methods for uncovering network associated with both wired

Kevin Cardwell spent 22 years in the U.S. Navy, during this time he tested and evaluated Surveillance and Weapon system software, some of this work wason projects like the Multi-Sensor Torpedo Alertment Pressor (MSTRAP), Tactical Decision Support System (TDSS), Computer Aided Dead Reckoning Tracer (CADRT), and the Remote Mine Hunting System (RMHS).He is technical editor of the Learning Tree Course Ethical Hacking and Counter measures and Computer Forensics.

Has worked as both software and systems engineer on a variety of Department of Defense projects and early on was chosen as a member of the project to bring Internet access to ships at sea. Following this highly successful project he was selected to head the team that built a Network Operations Center (NOC) that provided services to the commands ashore and ships at sea in the Norwegian Sea and Atlantic Ocean. He served as the Leading Chief of Information Se-curity at the NOC for (six) 6 years prior to retiring from the U.S. Navy. Mr. Cardwell currently works as a free-lance con-sultant and provides consulting services for com-panies throughout the US , UK and Europe, and as an advisor to numerous government entities within the US and UK.Kevin is an Instructor, Technical Editor and Author for Computer Forensics, and Hacking courses.

He is author of the Controlling Network Access course. He has presented at the Blackhat USA Conferences. He is a contributing author to the Computer Hack-ing Forensics Investigator V3 Study Guide and The Best Damn Cybercrime and Digital Forensics Book Period. - He is a Certified Ethical Hacker (CEH). - Certified Security Analyst (E|CSA).- Qualified Penetration Tester (QPT).- Certified in Handheld Forensics, and Advanced Mobile Phone Forensics. - Computer Hacking Forensic Investigator (CHFI). - Live Computer Forensics Expert (LCFE). - Holds a BS in Computer Science from National University in California and a MS in Software Engineering from the Southern Methodist University (SMU) in Texas.

InfoShield was founded in 2005 specialising exclusively on providing comprehensive Information Security solutions to the Omani and the GCC marketplaces. Since then, InfoShield has evolved into a robust firm, offering a full line of infor-mation security solutions and professional services. InfoShield is a truly information security focused service provider with a deep understanding of the local market needs and requirements. InfoShield has performed work with some of the most highly recognized organizations in Oman. While InfoShield is focused on the regional GCC market, it is at theforefront of current developments in information security.

About InfoShield

COURSE DIRECTOR PROFILE

Page 3: CEH - infoshield.com.om 2011.pdf · networks, escalating privileges, hacking and secu-rity your own system. Examine useful methods for uncovering network associated with both wired

Outline Course

Process Threats and VulnerabilitiesHacking ToolsTypes of Attack

Probing and ScanningSniffing Foot PrintingSearch Engine Social Engineering Phishing

Viruses Trojans and BackdoorsMalWare Analysis Writing VirusVoIP Hacking Wireless Hacking Bluetooth Hacking

Remove Your Digital Foot Prints Modifying the Logs Installing Backdoors Basic Forensic

Securing Network and Security DevicesSecuring Operating System Securing WebServers Securing Applications Securing Wireless Network

Introduction to Hacking Technique

DAY ONE DAY TWO System Hacking and Enumeration

Hacking RoutersBypassing Firewalls, IPS and IDS Window Operating System HackingAccess Control Hacking Buffer Overflows Viruses and Worms Email Hacking Accounts Webservers HackingSQL Injection Hacks Linux Hacking MAC OS X Hacking

Exploits and Advance Topics

DAY THREE DAY FOUR Covering Tracks and Anti Forensic

DAY FIVEDefending Systems

Discovery Methods

Page 4: CEH - infoshield.com.om 2011.pdf · networks, escalating privileges, hacking and secu-rity your own system. Examine useful methods for uncovering network associated with both wired

Cancellation Policy4 easy ways to register

1. Tel: +968 – 245111332. Fax completed form to: + 968 – 245111553. Email:[email protected]. Post completed form to: Information Shield P.O Box189 P.C 101, Muscat Oman

Contact Badriya on: Should a delegate be unable to attend, a substitute may attend in his or her place. Cancellations received within 14 working days of the event are liable for the full semi-nar fee. If full payment has been received you are eligible for a 75% reduction on the next run of the seminar. This discount will be valid for one year only. Information Shield LLC reserves the right to change or cancel pro-grammers due to unforeseen circumstances.

On receiving a fax from your organization with a letterhead stating the number and names of the delegates.

Fees : Delegate US$OMR

1 970 2,519

Payments

When organization register four delegates there will be a 10% discount on regular fees Discounts can not beused in conjunction with each other A confirmation letter and invoice will be sent upon receipt of your registration. Please note that full payment must be received prior to the event.

Only those delegates whose fees have been paid in full will be admitted to the event.You can pay by company cheques or bank transfer.

All payments should be in favor of Information Shield LLC

Company:..........................................................................................................................................................................................................Address:............................................................................................................................................................................................................Postcode.........................................Country:..........................................Tel:.......................................Fax:................................................Please note that in completing this booking you undertake to adhere to the cancellation and payment terms listed above.

Signature Date: Approving Manager Position

Registration will only be confirmed

EmailJob titleFirst name SurnameTitleDelegate

2 Delegate

1 Delegate

3 Delegate