Advanced Offensive Computer Security Training
This advanced hacking course is designed for the pentester, security professional, or hacker who is looking for an advanced course in system/network penetration. It is designed to be a hands-on, lab-oriented course using Kali Linux as a base operating system, but also using additional tools that we will add as needed. What makes this especially compelling is the section on mobile hacking, rootkits and exploit development, seldom found in basic to mid-level courses.
Offensive Security’s Advanced Hacking Course
Duration: 10 Monthly Parts
Keith DeBus is a former professor of computer science with over 20 years of IT experience. He is now the President of IT Securitas(www.itsecuritas.net), a leading IT security and pentesting firm. He has published numerous articles on cyber security, penetration testing, digital forensics and cyber warfare. DeBus has trained personnel from every branch of the U.S. military (Army, Air Force, Navy) and personnel from the NSA, CIA, FBI and NCIS in cyber warfare tactics. DeBus is a internationally recognized expert on cyber warfare, network “hacking” and network intrusion detection systems (NIDS). Mr. DeBus holds or has held the following IT certifications; Sec+, CEH, CPT, ECSA/LPT, CHFI, CISA, CISM and CISSP
I. Getting Started with Kali
II. Information Gathering Techniques
III. Port Scanning
IV. ARP Spoofing and MitM
V. Buffer Overflow Exploitation
VI. Working with Exploits
VII. Transferring Files
IX. Client Side Attacks
X. Exfiltrating Data
XI. Password Attacks
XII. Web Application Attacks
XIII. Trojan Horses
XV. Wireless Attacks
XVI. Scripting for Vulnerabilities and Exploits
XVII. Exploit Development
XVIII. Mobile Exploit
Participants in the following industries will benefit mostly:
• Information security engineers
• Penetration Testers
• Those engaged in cyber warfare or espionage activities
Students are required to know:
Understanding of Microsoft Windows
Information Security Concepts
WHAT YOU SHOULD BRING
An Open mind
A computer with Kali Linux installed (VM is acceptable)
Enthusiasm for Information Security
Snort IDS Blast Course (W26)
In this course, we will use the Security Onion operating system. Security Onion is based on Ubuntu Linux distro. It contains the Snort IDS, Suricata, Bro, OSSEC, Sguil, Squert, ELSA, Xplico, NetworkMiner, and many other security tools. We will use the Snort IDS application for the majority of this blast course. The target learning objective for this course is to introduce the student with to the Snort IDS. We will learn how to setup IP and Port variables for ease of management followed by being acquainted with basic Snort rules. We will then move to define our own custom rules. Finally, we will advance our learning by crafting complex Snort rules to enhance our network IDS capabilities and streamline process powers. This course is streamlined for advanced users who wish to add to their knowledge about IDS capabilities using Snort.
The course session will last for three weeks, but the course is self-paced – you can learn when you want!
Course Starting Date: November 18th 2015
Ray holds a bachelor’s degree in computer information systems and a master’s degree in organizational leadership. His current certifications are CISSP, CEH, CCNA, N+ and the PMP. Ray freelances as an online IT instructor that includes CISSP, CEH and CCNA courses. He has also taught for various organizations on hacking with the Metasploit framework, scripting with Python and Ruby as well as other tools used for hacking. He occasionally provides IT security consultancy for various organizations. Ray resides in Augusta, Georgia USA. He has over 15 years of military and civilian IT security and project management experience.
Module 1: Getting acquainted with Snort IDS
Module 2: Setting up basic Snort rules
Module 3: Configure Detect Offset (DOE) End Pointer (EP) and Byte Offset
What should you know before you join?
What will you need:
Why choose us?
Flexitime & Flexplace Studies
Hakin9 comes with yearly unlimited access to all online materials. Hakin9 offers the online IT security courses and provides you the skills needed to learn how to become the Ethical Hacker. All courses are available online and in PDF version. You decide when you will work and where you will work.
Hakin9 Online Course is for ...
Cyber Fraud Investigator, Security Consultant, IT Security Manager, Systems Engineer, Network Engineer, Security Engineer, Security Professional, Security Architecture and Threat and Security Incident Manager, Network Admin, System Admin, System Architect for Gov't systems, CISSP and QEH Professional, Information Assurance/Network Defense Expert, Malware Researcher ... .
Variety of Courses
No matter what age you are and where you are. If you wish to become an IT security expert, you will join our online courses when you are ready and you need to expand your skill set. Hakin9 offers the new online courses every month so that you will have the opportunity to explore areas of hacking by attending various courses designed for this purpose.
Comfortable Learning Environment
All courses and other materials are available online via private, secure account created by you. The materials can be read online or can be downloaded by you in user-friendly PDF versions. There is no need to fight traffic, find parking spaces, leave work early to go to class, or miss important family time.
WANTED: Talented Instructors/Trainers
Hakin9 Magazine is constantly seeking for excellent instructors to develop new courses and explore new possibilities. Our courses need to be practical and real-life oriented, we want them challenging, instructive, engaging, and fun.
If you think you've got what it takes, let us know - contact our training coordinator Marta at [email protected] and tell us all about your ideas for a course!
- November 25,2015 / Blog / 0 Comments
eForensics and Hakin9 Magazines are preparing a brand new project:Predictions for cyber security in...
- November 23,2015 / Blog / 0 Comments
- November 17,2015 / Blog / 0 Comments
Many applications, operating systems, and other authentication mechanisms that take in...
- November 13,2015 / Blog / 0 Comments