HABEMUS CURSO.. A Practical Security For Fun, Profit and Work with Quality of Service
INTRODUCTION
-The Real Spanish Hackers History X
-Kali Linux Quick Introduction
-Penetration Testing: White, Black, Grey and Double Grey Box
-Sec List, Standards, ISO/IEC 27000
-The CIA Triad (Confidenciality, Integrity and Aviability)
-Minimun Privilege Principle
-Microsoft Threat Modeling, Stride, Dread, OSTMM Model, OWASP
WEB APPLICATION PENETRATION TESTING
-Agressive FingerPrinting
-Tactical FootPrinting
-Google Hacking: Building Your Own Dorks
-Shodan and Bing
-Stealing Cookies and Credentials using Cross Site Scripting
-From SQL Injection to Shell
-Cross Site Request Forgery
-Xpath INjection
-LDAP Injection
-ClickJacking
-Remote File Inclusion / Local File Inclusion
-OSINT
-Mitigation
ADAPTIVE PENETRATION TESTING: RED TEAM TACTICS (& DIRTY TRICKS :-) )
DAY 1
-Red Teaming Fundamentals
-Knowing the enemy
-Adversarial Mindset
-The Three Aspects of Red Teaming : Digital, Physical, Social
-Physical, mental and technical adaptation
-Enemies and friends.Who are they?
DAY 2
-Motivation: The key to the elite hacker, the key of the world
-IDART Metodhology Fundamentals
-OSINT Fundamentals
-Use and abuse of the human factor.
-Physical & Social Red Teaming
-We sent. Your obey. The Brain Power
DAY 3
-Red Team Tactics
-Dirty Tricks :-)
-Deepening OSINT
-Observe and Learn :REd Team Laws
-Tree Analisys Tools.
-Real Time Monitoring
-The Players
-Cobal Strike and Metasploit
-Advanced Social Engineering
-Using and abusing the human factor to extreme
-Tactical Stress Testing
-Knowing when you are attacking. Your defenses in the game, your defenses in real life
-Winning the game. Winner Never Quit, Quitters Never Win
-War Games: Doctor Falken,
shall we play a game?
WINDOWS HACKING
-From Desktop Hacking to SAM Cracking
-Tools
-Evil Power Shell
-DEP,ASLR,UAC,BitLocker
LINUX HACKING
-LOcal and Remote Hacking
-From Elevation Of Privilege to Upload WebShell
-Booting Linux
-Tools
REVERSE ENGINNERING
-Crack.Me and Tools Step By Step
MALWARE
-Trojans
-Worm
-Reverse Polimorfic Malware ( Flu, Poisong Ivi and More..)
-Building "a Little" Undetectable Trojan
-KeyLoggers
-RootKits
WIRELESS
-Standards
-Ad Hoc
-WarDriving
-WEP Attacks
-WPA-WPA2-PSK
-Chop-Chop Attack
VOIP
-Introduction
-SIP
-RTP
-Asterisk, OpenSer, HearBeat
-Attacking From The Virtual Ip
HOW TO BECOME A PCI/DSS AUDITOR
-QSA
-PCI Security Standard Council
-Tools
-PCI/DSS Reality
LOOKPICKING FUNDAMENTALS
-Opening Padlocks ( and some strong boxes)
INTEL SERIES
-Spionage
ANTI-FORENSIC
-OverWriting Data and Metadata
-Program Packers
-Generic Data Hiding
-Data Encription
-Targeting Forensic Tools (& Vulnerabilities)
Course Fee :800 Euros
Reservation: 150 Euros
Limited Place
First Day : 21 February 2015
For More Information : via Contact Formulary
All The Sec Trainner are Working Actually and They are Recognized Professionals In The World of Computer Security
Thans You Very Much
-The Real Spanish Hackers History X
-Kali Linux Quick Introduction
-Penetration Testing: White, Black, Grey and Double Grey Box
-Sec List, Standards, ISO/IEC 27000
-The CIA Triad (Confidenciality, Integrity and Aviability)
-Minimun Privilege Principle
-Microsoft Threat Modeling, Stride, Dread, OSTMM Model, OWASP
WEB APPLICATION PENETRATION TESTING
-Agressive FingerPrinting
-Tactical FootPrinting
-Google Hacking: Building Your Own Dorks
-Shodan and Bing
-Stealing Cookies and Credentials using Cross Site Scripting
-From SQL Injection to Shell
-Cross Site Request Forgery
-Xpath INjection
-LDAP Injection
-ClickJacking
-Remote File Inclusion / Local File Inclusion
-OSINT
-Mitigation
ADAPTIVE PENETRATION TESTING: RED TEAM TACTICS (& DIRTY TRICKS :-) )
DAY 1
-Red Teaming Fundamentals
-Knowing the enemy
-Adversarial Mindset
-The Three Aspects of Red Teaming : Digital, Physical, Social
-Physical, mental and technical adaptation
-Enemies and friends.Who are they?
DAY 2
-Motivation: The key to the elite hacker, the key of the world
-IDART Metodhology Fundamentals
-OSINT Fundamentals
-Use and abuse of the human factor.
-Physical & Social Red Teaming
-We sent. Your obey. The Brain Power
DAY 3
-Red Team Tactics
-Dirty Tricks :-)
-Deepening OSINT
-Observe and Learn :REd Team Laws
-Tree Analisys Tools.
-Real Time Monitoring
-The Players
-Cobal Strike and Metasploit
-Advanced Social Engineering
-Using and abusing the human factor to extreme
-Tactical Stress Testing
-Knowing when you are attacking. Your defenses in the game, your defenses in real life
-Winning the game. Winner Never Quit, Quitters Never Win
-War Games: Doctor Falken,
shall we play a game?
WINDOWS HACKING
-From Desktop Hacking to SAM Cracking
-Tools
-Evil Power Shell
-DEP,ASLR,UAC,BitLocker
LINUX HACKING
-LOcal and Remote Hacking
-From Elevation Of Privilege to Upload WebShell
-Booting Linux
-Tools
REVERSE ENGINNERING
-Crack.Me and Tools Step By Step
MALWARE
-Trojans
-Worm
-Reverse Polimorfic Malware ( Flu, Poisong Ivi and More..)
-Building "a Little" Undetectable Trojan
-KeyLoggers
-RootKits
WIRELESS
-Standards
-Ad Hoc
-WarDriving
-WEP Attacks
-WPA-WPA2-PSK
-Chop-Chop Attack
VOIP
-Introduction
-SIP
-RTP
-Asterisk, OpenSer, HearBeat
-Attacking From The Virtual Ip
HOW TO BECOME A PCI/DSS AUDITOR
-QSA
-PCI Security Standard Council
-Tools
-PCI/DSS Reality
LOOKPICKING FUNDAMENTALS
-Opening Padlocks ( and some strong boxes)
INTEL SERIES
-Spionage
ANTI-FORENSIC
-OverWriting Data and Metadata
-Program Packers
-Generic Data Hiding
-Data Encription
-Targeting Forensic Tools (& Vulnerabilities)
Course Fee :800 Euros
Reservation: 150 Euros
Limited Place
First Day : 21 February 2015
For More Information : via Contact Formulary
All The Sec Trainner are Working Actually and They are Recognized Professionals In The World of Computer Security
Thans You Very Much