training

TakeDownCon 2011

Event: Takedowncon 2 Date: December 2-7 Venue: Las Vegas www.takedowncon.com TakeDownCon will focus on mobile & wireless security. Takedowncon is organized by EC-Council and is a new series of topic-specific IT security events that takes deep technical dives into the…

Forensic Improvisation

Forensic Improvisation is the concept to capture important intelligence using the available tools at hand and not necessarily the desired toolset. Think of it as guerrilla forensics without the idea of warfare. There is a myriad of ready to burn…

Hakin9 Extra 3/2011 - Forensics

Hakin9 Extra 3/2011 – Forensics

Basic Forensics Analysis by Marc-Andre Meloche Digital Forensics is mostly like the movies, the main aspect is to gather evidence or digital footprints which will help you understand any digital crimes that might have occurred inside your organization. This is…

CyberLympics 2011-2012

U.N. Cybersecurity Arm Endorses EC-Council’s Global CyberLympics Global CyberLympics, a new initiative by the EC-Council to foster stronger international cooperation on information security issues and to improve cybersecurity training and awareness in developing nations and third world countries. Created by…

9781597496117

Review of Practical Lock Picking

Review of Practical Lock Picking A Physical Penetration Tester’s Training Guide By Michael Munty www.syngress.com   Some of you are likely to be thinking what does Lock Picking have to do with IT Security but you need to think from…

Cloud Security 05/2011

Cloud Security 05/2011

In brief Armando Romeo and ID Theft Protect A Beginners Guide to Ethical Hacking – review SHYAAM SUNDHAR Coranti – review MICHAEL MUNT IPv6 Secure Transition Network Architecture MICHEL BARBEAU IPv6 has the capability to handle an astronomically large address…

Mobile Security - Hakin9 04/2011

Mobile Security – Hakin9 04/2011

Passware Forensic Kit 10.3 – reviewMICHAEL MUNT SpyShelter Application – reviewDAVID KNIFE How to use NetcatMOHSEN MOSTAFA JOKARNetcat is a network utillity for reading and writing network connections that support TCP and UDP protocol. Netcat is a Trojan that opens…

Class on Demand Review

Traditional IT training has always been in the classroom where you spend a week or two with strangers and just follow the instructor through the coursebook, but in recent years more and more courses are becoming available via online learning…

Pentest Labs Using Live CDs

For those individuals interested in learning how to perform penetration testing, they quickly realize there are many tools to learn, but almost no legal targets to practice against – until now. De-ICE.net has developed LiveCDs that simulate fully-functional servers that…