HABEMUS CURSO.. A Practical Security For Fun, Profit and Work with Quality of Service

INTRODUCTION


-The Real Spanish Hackers History X

-Kali Linux Quick Introduction

-Penetration Testing: White, Black, Grey and Double Grey Box

-Sec List, Standards, ISO/IEC 27000

-The CIA Triad  (Confidenciality, Integrity and Aviability)

-Minimun Privilege Principle

-Microsoft Threat Modeling, Stride, Dread, OSTMM Model, OWASP



WEB APPLICATION PENETRATION TESTING

-Agressive FingerPrinting

-Tactical FootPrinting

-Google Hacking: Building Your Own Dorks

-Shodan and Bing

-Stealing Cookies and Credentials using Cross Site Scripting

-From SQL Injection to Shell

-Cross Site Request Forgery

-Xpath INjection

-LDAP Injection

-ClickJacking

-Remote File Inclusion / Local File Inclusion

-OSINT

-Mitigation




ADAPTIVE PENETRATION TESTING: RED TEAM TACTICS (& DIRTY TRICKS :-) )


DAY 1


-Red Teaming Fundamentals

-Knowing the enemy

-Adversarial Mindset

-The Three Aspects of Red Teaming : Digital, Physical, Social

-Physical, mental and technical adaptation

-Enemies and friends.Who are they?



DAY 2

-Motivation: The key to the elite hacker, the key of the world

-IDART Metodhology Fundamentals

-OSINT Fundamentals

-Use and abuse of the human factor.

-Physical & Social Red Teaming

-We sent. Your obey. The Brain Power



DAY 3

-Red Team Tactics

-Dirty Tricks :-)

-Deepening OSINT

-Observe and Learn :REd Team Laws

-Tree Analisys Tools.

-Real Time Monitoring

-The Players

-Cobal Strike and Metasploit

-Advanced Social Engineering

-Using and abusing the human factor to extreme

-Tactical Stress Testing

-Knowing when you are attacking. Your defenses in the game, your defenses in real life

-Winning the game. Winner Never Quit, Quitters Never Win

-War Games: Doctor Falken,
shall we play a game?




WINDOWS HACKING

-From Desktop Hacking to SAM Cracking

-Tools

-Evil Power Shell

-DEP,ASLR,UAC,BitLocker


LINUX HACKING

-LOcal and Remote Hacking

-From Elevation Of Privilege to Upload WebShell

-Booting Linux

-Tools




REVERSE ENGINNERING


-Crack.Me and Tools Step By Step




MALWARE


-Trojans

-Worm

-Reverse Polimorfic Malware ( Flu, Poisong Ivi and More..)

-Building "a Little" Undetectable Trojan

-KeyLoggers

-RootKits



WIRELESS

-Standards

-Ad Hoc

-WarDriving

-WEP Attacks

-WPA-WPA2-PSK

-Chop-Chop Attack



VOIP

-Introduction

-SIP

-RTP

-Asterisk, OpenSer, HearBeat

-Attacking From The Virtual Ip





HOW TO BECOME A PCI/DSS AUDITOR


-QSA

-PCI Security Standard Council

-Tools

-PCI/DSS Reality




LOOKPICKING FUNDAMENTALS


-Opening Padlocks ( and some strong boxes)



INTEL SERIES

-Spionage



ANTI-FORENSIC

-OverWriting Data and Metadata

-Program Packers

-Generic Data Hiding

-Data Encription

-Targeting Forensic Tools (& Vulnerabilities)



Course Fee :800 Euros

Reservation: 150 Euros

Limited Place

First Day : 21 February 2015

For More Information : via Contact Formulary

All The Sec Trainner are Working Actually and They are Recognized Professionals In The World of Computer Security


Thans You Very Much

Entradas populares de este blog

SHELLCODES por un tubo ....

Proteger ASP.NET de inyecciones SQL How T0? BEST PRACTICES

CERTIFICACIONES DE SEGURIDAD