ETHICAL HACKER AND PENETRATION TESTER TACTICAL BOOTCAMP...

8
ETHICAL HACKER AND PENETRATION TESTER TACTICAL BOOTCAMP Vertical Technology Type Professional development Sub-Category Security

Transcript of ETHICAL HACKER AND PENETRATION TESTER TACTICAL BOOTCAMP...

Page 1: ETHICAL HACKER AND PENETRATION TESTER TACTICAL BOOTCAMP ...verticaldistinct.com/wp-content/uploads/2015/04/ethicalhackerand... · ETHICAL HACKER AND PENETRATION TESTER TACTICAL BOOTCAMP

ETHICAL HACKER AND

PENETRATION TESTER

TACTICAL BOOTCAMP

TESTEMANAGEMENT Vertical Technology

Type Professional development

Sub-Category Security

Page 2: ETHICAL HACKER AND PENETRATION TESTER TACTICAL BOOTCAMP ...verticaldistinct.com/wp-content/uploads/2015/04/ethicalhackerand... · ETHICAL HACKER AND PENETRATION TESTER TACTICAL BOOTCAMP

3

Hello there

You've considered embarking on an exciting journey to

strengthen your professional status and career trajectory. The

choice to obtain professional certification and/or further

credentials in the subject matter area that you choose to

specialise in, puts a powerful tool, right in your hands.

It will bring you competitive edge, career progression and

market opportunity.

This brochure will provide further information about the

course of your choice. There is a wide selection of other

courses on our website, a selection that is constantly added

and improved upon. Feel free to email or call us if you need

help with anything.

We welcome the chance to be part of your journey.

Sincerely

Rowena Morais

Programme Director

[email protected]

Welcome Note

Rowena Morais

Programme Director

[email protected]

2

Page 3: ETHICAL HACKER AND PENETRATION TESTER TACTICAL BOOTCAMP ...verticaldistinct.com/wp-content/uploads/2015/04/ethicalhackerand... · ETHICAL HACKER AND PENETRATION TESTER TACTICAL BOOTCAMP

3

Course Information

Rowena Morais

Programme Director

[email protected]

Course Overview

Rowena Morais

Programme Director

[email protected]

Five day course. This is how you Push Back! Shore up your defence … and get on the offensive and win the fight against cyber attacks. Drills run by the EC Council Instructor Of The Year and a member of its Circle Of Excellence. A hugely hands on experience, you will get an overview of IT security from a penetration tester’s perspective. You will review different techniques and proof of concept of attacks. You will get the low-down on all the fundamentals required such as collecting information on the target, the attack itself, post-attack and how to cover your tracks.

Curriculum

Rowena Morais

Programme Director

[email protected]

Module 01 Fundamentals of IT Security and Penetration Testing (Pentesting) (Allowing for the fact that you may come from different backgrounds and skill levels, this module presents the baseline knowledge needed. You will learn the fundamentals of IT security; the IT Security element (Confidentially, Integrity and Availability - CIA); the need for penetration testing; documentation; reporting; and presentation. Topics include IT Security Fundamentals; Pentesting types; Pentesting steps; and the first step in the Pentesting steps ie Footprinting/Information Gathering). Module 02 Scanning, Attacks and Post Attacks (This module covers technique as well as proof of concept in attacking. After collecting the information of the target, we learn how to attack and post-attack behaviour. You will be given 80 percent hands on/practical to carry out various attacks/pentests and post attacks, including remotely installing a backdoor, spyware and keylogger. You will learn how to see what others cannot see. Topics include Network Scanning; Port Scanning Types; Vulnerability Scanning; Password Cracking; Server side Attacks; Client side Attacks, Evading or bypassing the firewall; and Covering your tracks).

2015 Courses

Rowena Morais

Programme Director

[email protected]

INFORMATION TECHNOLOGY

HUMAN RESOURCE

Certificate of Cloud Security Knowledge

CompTIA Cloud Essentials

CompTIA Virtualization Essentials

TOGAF® 9

Professional Scrum Master

Professional Scrum Developer

Professional Scrum Product Owner

Certified Lean Kanban Foundation

Certified in the Governance of Enterprise IT

COBIT 5 Foundation

Certified in Risk and Information Systems

Control

Certified Professional in Health IT

ISTQB® Advanced Test Manager

ISTQB®Advanced Test Analyst

ISTQB® Advanced Technical Test Analyst

iSQI® Certified Agile Tester

ITIL® Lifecycle- Service Strategy

ITIL® Lifecycle- Service Operation

ITIL® Lifecycle - Service Transition

ITIL® Lifecycle - Service Design

ISTQB® Foundation

Certified Wireless Network Administrator

Certified Wireless Analysis Professional

Certified Wireless Design Professional

Certified Wireless Security Professional

Transitioning to Agile

How to Implement Practical Data Quality

Management

more

Change Management Foundation

Certified Mentor Practitioner (Level 1)

The Language of Effective

Presentations.

3

Page 4: ETHICAL HACKER AND PENETRATION TESTER TACTICAL BOOTCAMP ...verticaldistinct.com/wp-content/uploads/2015/04/ethicalhackerand... · ETHICAL HACKER AND PENETRATION TESTER TACTICAL BOOTCAMP

Course Information

Rowena Morais

Programme Director

[email protected]

Module 03 Application and Web Application Attacks (This session covers application attacks including how to debug a custom application, how to locate holes in applications and how to write the exploit code or script as well as attacking the most popular type of application nowadays, web applications. You will learn hands-on how to deal with web application vulnerabilities based on OWASP ( Open Source Web Application Security Project) Top 10 attacks. Topics include Buffer Overflow; Application Debugging; Writing your Own Exploit Code; Web Application Attack; SQL Injection and Simple and Blind SQL Injection; Cross Site Scripting and Local and Remote File Inclusion; Cookie Stealing; Parameter Manipulation; Directory Traversal; With or without Automatic Web Application Scanner.

Module 04 Other Attacks/PenTesting Vectors (You will discover that attacks and pentesting do not only concern application or system attacks but can also result from other IT infrastructure such as wireless attacks. You will conduct hands-on attacks at the network layer (which is now also the most dangerous type of attack), such as DHCP Attack, ARP and DNS Poisining, Sniffing or data interception, and Distributed Denial of Service (DDOS) attack.

Locations

Rowena Morais

Programme Director

rmorais@verticaldistinct.

com

Geographies covered :

Middle East | Asia Pacific |

Africa

Complete and updated list of

all cities and dates are

available on

www.verticaldistinct.com

4

Module 05 PenTesting Challenge/Simulation (Optional) (You will be given the task of doing a simulation exercise on a few vulnerable servers and will need to create a report and relevant documentation, which will be subject to review later).

Page 5: ETHICAL HACKER AND PENETRATION TESTER TACTICAL BOOTCAMP ...verticaldistinct.com/wp-content/uploads/2015/04/ethicalhackerand... · ETHICAL HACKER AND PENETRATION TESTER TACTICAL BOOTCAMP

Belly Rachdianto

Belly Rachdianto has been delivering IT security courses in Indonesia, Malaysia, Singapore, Hong Kong, Myanmar and Sri Lanka for both local and multinational companies including Dell, Microsoft, IBM, Intel, Maybank, CIMB Bank, Shell, Macao Police Department, Singtel and more.

Faculty

Having worked on an extensive array of large-scale, mission-critical projects, systems integration, network design and implementation as well as security assessment, Belly has deep skill and experience in all aspects of network operating systems platforms, internetworking devices, security and multi-service network convergence. He has won the Instructor of the Year award in 2014 as well as the "Circle of Excellence" Instructor award from 2010 - 2012 from EC Council USA.

5

Page 6: ETHICAL HACKER AND PENETRATION TESTER TACTICAL BOOTCAMP ...verticaldistinct.com/wp-content/uploads/2015/04/ethicalhackerand... · ETHICAL HACKER AND PENETRATION TESTER TACTICAL BOOTCAMP

engineer at Concentra.

As a consultant, he was a project lead on over a dozen projects spanning the manufacturing, healthcare, oil & gas, internet, banking & finance, and education verticals. His experience included projects at Fortune 500 and Global 1000 companies such as GE Medical Systems, BP Amoco, and William Blair. In addition to consulting, he has worked part-time as a corporate trainer and obtained certifications in Java (SCJP, SCJD) and Microsoft technologies (MCP+SiteBuilding). He has certifications in CIO, eCommerce, Data Warehousing and Business Intelligence.

6

Additional Information

Prerequisites

None applicable.

Target

audience

General security

practitioners, penetration

testers, ethical hackers, web

application developers and

website designers and

architects.

Important

Note

1. Laptop required (Either a

Windows, Linux or Mac

computer with the following

minimum hardware

requirements : CPU 2.0+

processor, 8GB RAM or

higher, 125GB free hard disk

space, USB port, DVD rom

drive and wired LAN and high

speed internet connection ).

2. Terms and conditions

apply. Please visit Vertical

Distinct for the full terms.

Learning

Aims

You will learn all the main concepts and techniques to become a Penetration Tester. This includes understanding the ethics, theory and practical aspects involved, understanding what happens

in ‘real world’ cases and undergoing a simulation exercise using the latest techniques and types of attack in IT Security in an offensive way.

Page 7: ETHICAL HACKER AND PENETRATION TESTER TACTICAL BOOTCAMP ...verticaldistinct.com/wp-content/uploads/2015/04/ethicalhackerand... · ETHICAL HACKER AND PENETRATION TESTER TACTICAL BOOTCAMP

7

Testimonials

Rowena Morais

Programme Director

[email protected]

Belly has completed some of the hardest computer security exams on the planet. This simply is not possible unless you have an amazing amount of discipline, passion, persistence and love for what you do. There is no question in my mind that Belly cannot achieve what he sets out to accomplish. Leo Dregier (CISSP, CEH, CHRI, CISO+), CEO/Problem Solver/PMP/Trainer at TheCodeOfLearning.com

I had the opportunity to acquire my Certified Ethical Hacker training from Belly and it was an experience I cherish forever. I was completely overwhelmed by the command he had over the latest tools and techniques in the security domain. His elevated knowledge and versatility in all aspects of info security gave me an insight as to how learned, professional and enriched his experience was. Khurram Javed, Assistant Director, Riphah Institute of Systems Engineering (RISE)

Belly is a great and knowledgeable trainer. I was pleased to be part of his class for Certified Ethical Hacker v8 and I strongly recommend Belly if you would like to proceed for your next certification. He is a proactive and tireless guy who doesn’t hesitate to share new ideas for network exploitation. Ehsan Hashemi (CEH), IT Security and Compliance Specialist at Aegis Malaysia

Page 8: ETHICAL HACKER AND PENETRATION TESTER TACTICAL BOOTCAMP ...verticaldistinct.com/wp-content/uploads/2015/04/ethicalhackerand... · ETHICAL HACKER AND PENETRATION TESTER TACTICAL BOOTCAMP

Visit our website

Check out Vertical Distinct' Profile

Preview Accelerate Magazine, a publication of Vertical Distinct.

VERTICAL DISTINCT SDN BHD Suite 1208 Level 12 Amcorp Tower, Amcorp Trade Centre

No. 18 Persiaran Barat, 46050 Petaling Jaya, Selangor Darul Ehsan, Malaysia.

+603 7948 5241 +603 7955 6363 [email protected]

www.verticaldistinct.com