Free Penetration Testing Workshop in Bristol, UK

Discussion in 'MCSE' started by =?Utf-8?B?RXhlY3VUcmFpbg==?=, Oct 21, 2004.

  1. This three-hour Penetration Testing workshop will introduce attendees to
    hacking techniques and methods used to break into networks. Attendees will
    learn how the focus of security has changed in recent years and will see how
    penetration testing can make a huge difference in your security program.
    Attendees will see live or simulated demonstrations of attacks on computer
    systems. There will also be a Metasploit demonstration with directions and
    the tools given to attendees to practice at home. Seeing the ease with which
    these attacks are carried out will demonstrate the problems faced by
    information security personnel every day.

    Knowing how attacks are carried out is the first step to defending against
    them. Penetration Testers provide an invaluable service to those defending
    networks worldwide. This seminar is not a sales event—it is a presentation by
    an experienced security professional with years of network attack and defense
    experience. Attendees will LEARN about penetration testing and hacking. They
    will not just see a demonstration of the frightening tools and attacks.

    Outline:
    1. Who are the Hackers?
    o Introduction
    o Attackers; Hackers; Crackers
    o How do they work?
    o Statistics
    2. Hacker’s Methodology
    o The process
    3. Penetration Testing
    o What is Penetration Testing – An Introduction
    o Why do you need a Penetration Test?
    o Tools used in this process
    4. Types of Attacks
    o Eavesdropping
    o Data Modification
    o Identity Spoofing
    o Password Based Attacks
    o Denial of Service Attack
    o Man in the Middle Attack
    o Malicious Applets
    5. Email Hacking - Demonstration
    o Overview
    o How it actually happens
    6. Metasploit Demonstration
    7. Security Objectives
    o The CIA Triad ; Data Confidentiality; Data Integrity;Data Availability
    o Security Guidelines

    8. Intrusion Analysis
    o Prevention
    o Detection
    o Response and Recovery
    9. Incident Preparation
    o Risk Management
    o Host Preparation
    o Network Preparation
    o Network Policies and Procedures
    o A response toolkit
    o The Incident Response Team
    10. Risk Management
    o Asset Identification
    o Threat Identification
    o Vulnerability Analysis
    o Risk Analysis
    o Safeguard Selection
    o Security Monitoring
    11. Why Do We Need Penetration Testers?
    o The problem
    o Some Statistics
    12. Case Study: Putting it all together
    13. The Million Dollar Question: Are you Secure?
    =?Utf-8?B?RXhlY3VUcmFpbg==?=, Oct 21, 2004
    #1
    1. Advertising

  2. =?Utf-8?B?RXhlY3VUcmFpbg==?=

    P-Touch Guest

    Well I like short shorts,
    >-----Original Message-----
    >This three-hour Penetration Testing workshop will

    introduce attendees to
    >hacking techniques and methods used to break into

    networks. Attendees will
    >learn how the focus of security has changed in recent

    years and will see how
    >penetration testing can make a huge difference in your

    security program.
    >Attendees will see live or simulated demonstrations of

    attacks on computer
    >systems. There will also be a Metasploit demonstration

    with directions and
    >the tools given to attendees to practice at home. Seeing

    the ease with which
    >these attacks are carried out will demonstrate the

    problems faced by
    >information security personnel every day.
    >
    >Knowing how attacks are carried out is the first step to

    defending against
    >them. Penetration Testers provide an invaluable service

    to those defending
    >networks worldwide. This seminar is not a sales

    eventâ?"it is a presentation by
    >an experienced security professional with years of

    network attack and defense
    >experience. Attendees will LEARN about penetration

    testing and hacking. They
    >will not just see a demonstration of the frightening

    tools and attacks.
    >
    >Outline:
    >1. Who are the Hackers?
    >o Introduction
    >o Attackers; Hackers; Crackers
    >o How do they work?
    >o Statistics
    >2. Hackerâ?Ts Methodology
    >o The process
    >3. Penetration Testing
    >o What is Penetration Testing â?" An Introduction
    >o Why do you need a Penetration Test?
    >o Tools used in this process
    >4. Types of Attacks
    >o Eavesdropping
    >o Data Modification
    >o Identity Spoofing
    >o Password Based Attacks
    >o Denial of Service Attack
    >o Man in the Middle Attack
    >o Malicious Applets
    >5. Email Hacking - Demonstration
    >o Overview
    >o How it actually happens
    >6. Metasploit Demonstration
    >7. Security Objectives
    >o The CIA Triad ; Data Confidentiality; Data

    Integrity;Data Availability
    >o Security Guidelines
    >
    >8. Intrusion Analysis
    >o Prevention
    >o Detection
    >o Response and Recovery
    >9. Incident Preparation
    >o Risk Management
    >o Host Preparation
    >o Network Preparation
    >o Network Policies and Procedures
    >o A response toolkit
    >o The Incident Response Team
    >10. Risk Management
    >o Asset Identification
    >o Threat Identification
    >o Vulnerability Analysis
    >o Risk Analysis
    >o Safeguard Selection
    >o Security Monitoring
    >11. Why Do We Need Penetration Testers?
    >o The problem
    >o Some Statistics
    >12. Case Study: Putting it all together
    >13. The Million Dollar Question: Are you Secure?
    >.
    >
    P-Touch, Oct 21, 2004
    #2
    1. Advertising

  3. ExecuTrain wrote:
    > This three-hour Penetration Testing workshop


    BOY DID YOU EVER GET MY ATTENTION!

    SO LIKE HOW CAN I PENETRATE FOR THREE HOURS? ISN'T IT DANGEROUS TO HAVE AN
    ERECTION FOR THAT LONG? HOW MUCH IS IT? OKAY, BYE
    =?UTF-8?Q?Frisbee=C2=AE?=, Oct 21, 2004
    #3
  4. =?Utf-8?B?RXhlY3VUcmFpbg==?=

    Consultant Guest

    i always do free penetration testing. it's funny, i can always manage to
    penetrate.

    "ExecuTrain" <> wrote in message
    news:...
    > This three-hour Penetration Testing workshop will introduce attendees to
    > hacking techniques and methods used to break into networks. Attendees
    > will
    > learn how the focus of security has changed in recent years and will see
    > how
    > penetration testing can make a huge difference in your security program.
    > Attendees will see live or simulated demonstrations of attacks on computer
    > systems. There will also be a Metasploit demonstration with directions and
    > the tools given to attendees to practice at home. Seeing the ease with
    > which
    > these attacks are carried out will demonstrate the problems faced by
    > information security personnel every day.
    >
    > Knowing how attacks are carried out is the first step to defending against
    > them. Penetration Testers provide an invaluable service to those defending
    > networks worldwide. This seminar is not a sales event-it is a presentation
    > by
    > an experienced security professional with years of network attack and
    > defense
    > experience. Attendees will LEARN about penetration testing and hacking.
    > They
    > will not just see a demonstration of the frightening tools and attacks.
    >
    > Outline:
    > 1. Who are the Hackers?
    > o Introduction
    > o Attackers; Hackers; Crackers
    > o How do they work?
    > o Statistics
    > 2. Hacker's Methodology
    > o The process
    > 3. Penetration Testing
    > o What is Penetration Testing - An Introduction
    > o Why do you need a Penetration Test?
    > o Tools used in this process
    > 4. Types of Attacks
    > o Eavesdropping
    > o Data Modification
    > o Identity Spoofing
    > o Password Based Attacks
    > o Denial of Service Attack
    > o Man in the Middle Attack
    > o Malicious Applets
    > 5. Email Hacking - Demonstration
    > o Overview
    > o How it actually happens
    > 6. Metasploit Demonstration
    > 7. Security Objectives
    > o The CIA Triad ; Data Confidentiality; Data Integrity;Data Availability
    > o Security Guidelines
    >
    > 8. Intrusion Analysis
    > o Prevention
    > o Detection
    > o Response and Recovery
    > 9. Incident Preparation
    > o Risk Management
    > o Host Preparation
    > o Network Preparation
    > o Network Policies and Procedures
    > o A response toolkit
    > o The Incident Response Team
    > 10. Risk Management
    > o Asset Identification
    > o Threat Identification
    > o Vulnerability Analysis
    > o Risk Analysis
    > o Safeguard Selection
    > o Security Monitoring
    > 11. Why Do We Need Penetration Testers?
    > o The problem
    > o Some Statistics
    > 12. Case Study: Putting it all together
    > 13. The Million Dollar Question: Are you Secure?
    Consultant, Oct 21, 2004
    #4
  5. =?Utf-8?B?RXhlY3VUcmFpbg==?=

    TechGeekPro Guest

    On Oct 21, 2004 at 8:20am "Frisbee®" blathered:

    > ExecuTrain wrote:
    >> This three-hour Penetration Testing workshop

    >
    > BOY DID YOU EVER GET MY ATTENTION!
    >
    > SO LIKE HOW CAN I PENETRATE FOR THREE HOURS? ISN'T IT DANGEROUS TO HAVE AN
    > ERECTION FOR THAT LONG? HOW MUCH IS IT? OKAY, BYE


    No, it's four hours.

    "Although a rare occurrence, men who experience an erection for more than 4
    hours (priapism) should seek immediate medical attention." - www.cialis.com

    Three is perfectly fine.

    --
    TechGeekPro, MCNGP #36
    MCNGP.com - We're here to help!
    I'm TechGeekPro, and I approved this post.
    TechGeekPro, Oct 28, 2004
    #5
    1. Advertising

Want to reply to this thread or ask your own question?

It takes just 2 minutes to sign up (and it's free!). Just click the sign up button to choose a username and then you can ask your own questions on the forum.
Similar Threads
  1. Simon Watson
    Replies:
    1
    Views:
    1,227
    Hansang Bae
    May 24, 2005
  2. Lord Shaolin
    Replies:
    2
    Views:
    1,079
    Lord Shaolin
    Aug 12, 2003
  3. nobiscuit

    Account for penetration testing

    nobiscuit, Aug 17, 2005, in forum: Computer Security
    Replies:
    15
    Views:
    797
    Winged
    Aug 18, 2005
  4. penetration testing

    , Jul 6, 2006, in forum: Computer Security
    Replies:
    6
    Views:
    656
    Todd H.
    Jul 6, 2006
  5. saddam hoisin

    Penetration Testing Books

    saddam hoisin, Jul 12, 2008, in forum: Computer Security
    Replies:
    1
    Views:
    465
    Todd H.
    Jul 12, 2008
Loading...

Share This Page