37 CPE CREDITS Professional Ethical Hacking 1 5 May 2010 InterContinental Hotel Muscat Hands On Course Director Kevin Cardwell Course Objectives This pract

Document Sample
37 CPE CREDITS Professional Ethical Hacking 1 5 May 2010 InterContinental Hotel Muscat Hands On Course Director Kevin Cardwell Course Objectives This pract Powered By Docstoc

  Professional Ethical Hacking
1-5 May 2010
InterContinental Hotel, Muscat                           Hands-On

Course Director
Kevin Cardwell

Course Objectives:
This practical course will help you to:
  Gain in-depth knowledge and practical
  experience of perimeter defenses, scanning
  and attacking networks, escalating privileges,
  hacking and security your own system.
  Examine useful methods for uncovering
  network associated with both wired and
  wireless network connections.
Course Outline
  Introduction to Hacking Technique
  Discovery Methods
  System Hacking and Enumeration
  Exploits and Advance Topics
  Covering Tracks and Anti Forensic
  Defending Systems

                                  www.information-shield.com   Tel. Off: 24582622

DAY ONE                              DAY THREE
Introduction to Hacking Technique    Exploits and Advance Topics
  Process                              Viruses Trojans and Backdoors
  Threats and Vulnerabilities          MalWare Analysis
  Hacking Tools                        Writing Virus
  Types of Attack                      VoIP Hacking
Discovery Methods                      Wireless Hacking
  Probing and Scanning                 Bluetooth Hacking
  Foot Printing
  Search Engine                      DAY FOUR
  Social Engineering                 Covering Tracks and Anti Forensic
  Phishing                             Remove Your Digital Foot Prints
                                       Modifying the Logs
DAY TWO                                Installing Backdoors
System Hacking and Enumeration         Basic Forensic
  Hacking Routers
  Bypassing Firewalls, IPS and IDS
  Window Operating System Hacking    DAY FIVE
  Access Control Hacking             Defending Systems
  Buffer Overflows
                                       Securing Network and Security Devices
  Viruses and Worms
                                       Securing Operating System
  Email Hacking Accounts
                                       Securing WebServers
  Webservers Hacking
                                       Securing Applications
  SQL Injection Hacks
                                       Securing Wireless Network
  Linux Hacking
  MAC OS X Hacking
                                                          Course Director Profile
                                        Kevin Cardwell spent 22 years in the U.S. Navy, during this
                                        time he tested and evaluated Surveillance and Weapon system
                                        software, some of this work wason projects like the Multi-Sensor
                                        Torpedo Alertment Pressor (MSTRAP), Tactical Decision Sup-
                                        port System (TDSS), Computer Aided Dead Reckoning Tracer
                                        (CADRT), and the Remote Mine Hunting System (RMHS).
 Kevin has worked as both software and systems engineer on a variety of Department of Defense
projects and early on was chosen as a member of the project to bring Internet access to ships at sea.
Following this highly successful project he was selected to head the team that built a Network Opera-
tions Center (NOC) that provided services to the commands ashore and ships at sea in the Norwegian
Sea and Atlantic Ocean . He served as the Leading Chief of Information Security at the NOC for (six) 6
years prior to retiring from the U.S. Navy.

 Mr. Cardwell currently works as a free-lance consultant and provides consulting services for companies
throughout the US , UK and Europe, and as an advisor to numerous government entities within the US and UK.
He is an Instructor, Technical Editor and Author for Computer Forensics, and Hacking courses. He is tech-
nical editor of the Learning Tree Course Ethical Hacking and Counter measures and Computer Forensics.
He is author of the Controlling Network Access course. He has presented at the Blackhat USA Conferences.

He is a contributing author to the Computer Hacking Forensics Investigator V3 Study Guide and The Best
Damn Cybercrime and Digital Forensics Book Period.
-He is a Certified Ethical Hacker (CEH).
-Certified Security Analyst (E|CSA).
-Qualified Penetration Tester (QPT).
- Certified in Handheld Forensics, and Advanced Mobile Phone Forensics.
-Computer Hacking Forensic Investigator (CHFI) and Live Computer Forensics Expert (LCFE), and holds
a BS in Computer Science from National University in California and a MS in Software Engineering
from the Southern Methodist University (SMU) in Texas.

About InfoShield
InfoShield was founded in 2005 specialising exclusively on providing comprehensive Information Secu-
rity solutions to the Omani and the GCC marketplaces. Since then, InfoShield has evolved into a robust
firm, offering a full line of information security solutions and professional services. InfoShield is a truly
information security focused service provider with a deep understanding of the local market needs and
requirements. InfoShield has performed work with some of the most highly recognized organizations in
Oman. While InfoShield is focused on the regional GCC market, it is at theforefront of current develop-
ments in information security.
  4 easy ways to register                                          Cancellation Policy
  Contact Joy on:                                                  Should a delegate be unable to attend, a substi-
  1.   Tel: +968 – 24590552                                        tute may attend in his or her place. Cancellations
  2.   Fax completed form to: + 968 – 24590552                     received within 14 working days of the event are
  3.   Email: joy@information-shield.com                           liable for the full seminar fee. If full payment has
  4.   Post completed from to:                                     been received you are eligible for a 75% reduction
       Information Shield                                          on the next run of the seminar. This discount will be
       P.O Box219                                                  valid for one year only. Information Shield LLC re-
       P.C 130, Muscat                                             serves the right to change or cancel programmers
       Oman                                                        due to unforeseen circumstances.
  Registration will only be confirmed
  On receiving a fax from your organization with
  a letterhead stating the number and names of
  the delegates.

           Fees : Delegate                                  OMR                                      US$
                 1                                           970                                    2,519

When organization register four delegates there will be a 10% discount on regular fees
Discounts can not be used in conjunction with each other

A confirmation letter and invoice will be sent upon receipt of your registration. Please note that full payment
must be received prior to the event. Only those delegates whose fees have been paid in full will be admitted to
the event.You can pay by company cheques or bank transfer.
All payments should be in favor of Information Shield LLC

  Delegate                Title    First name            Surname             Job title                  Email
 1st Delegate
 2nd Delegate
 3rd Delegate

Please note that in completing this booking you undertake to adhere to the cancellation and payment terms
listed above.

Signature Date:                                                 Approving Manager Position