Your Growth, Our Mission
Cybersecurity professionals, including security analysts, intel analysts, policy analysts, security operations personnel, network administrators, system integrators, VARS, and security consultants
The Cyber Battlefield
Critical Business Security
Worldwide Internet Growth
Security Fundamentals
Security Goals
Terminology Threats and Exposures
Exploits and Exposures
Hackers and Crackers
Attack Methods
Social Engineering
Common Attack Vectors
Traffic Analysis
Responding to Threats and Attacks
Documents and Procedures to Manage Risk
Vulnerability Scanners
Penetration Testing
The OSSTMM
NIST
Risks of Penetration Testing
CNCI
Initiatives
Legal Compliance Standards
Acts
Federal Agency Compliance
Commercial Regulatory Compliance
Internet Leadership IANA
Regional Internet Registry
Protocols and RFCs
TCP/IP Model
Network Access Layer
Internet Layer
Host-to-Host Layer
Process Layer
Domain Name Service
Vulnerabilities and Exploits
Vulnerability Assessment Tools
Application-Level Scanners
System-Level Scanners
System-Level Testing Tools
Open Source System-Level Scanner Tools
Commercial System-Level Scanner Tools
Advanced Attack Techniques and Tools
Commercial Exploit Tools
Free Exploit Tool: Meta sploit
Free Exploit Tool: BeEF
Fuzz Testing
Preventing Exploits and Attacks
Patch Management
Common Vulnerabilities and Exposures
Alerts and Software
Tools
Vulnerability Research
Common Security Sites
Patch Management
Tools
Social Engineering
Social Engineering Goals
What Makes Social Engineering Possible
Targets
Attacks
Phishing
Phishing via Email
Online Attacks
Statistical Data
Sources of Security Breaches
Preventing Social Engineering
Cyber Awareness: Policies and Procedures
Security Policy Topics
Social Media
Social Networking Sites
Foot printing
Gathering Information
Unearthing Initial Information
Internet Archive
People Search
Locations and Mapping
Job Boards
Financial Information
Google and Search Operators
Identifying the Target Network and Its Range
WHOIS Utility
DNS Online Search Tools
Traceroute
Foot printing Countermeasures
Detecting Live Systems
Bypassing Authentication
War Dialing
War driving
ICMP: Ping
Port Scanning
Performing TCP and UDP Scans
Port Numbers
TCP Flags
TCP Three Way Handshake
Port Scanning Techniques
TCP Full Connect Port Scan
TCP Half Open (SYN) Scanning
N map Half Open Scan
UDP Port Scan
N map Scan Types and Switches
Port Scanning Tools
OS Fingerprinting
Active Stack Fingerprinting
Passive Fingerprinting
Proxies and Anonymizers
Scanning Countermeasures
Password Attacks
Privilege Escalation
Maintaining Access
Windows Authentication
Sys Key Encryption
LAN Manager Password Encryption
Windows LAN Manager and NTLM Hashes
Linux Password Encryption
SAM Database Insecurities
Password Extraction Cracking
Password Cracking Techniques
Password Cracking Tools
LCP
John the Ripper
Cain and Abel
Password Cracking Countermeasures
Covering Tracks
Principle of Exchange
Clearing the Logs
Hiding Tools, Files, and Programs
NTFS Alternate Data Streaming
Information Hiding: Methods
Steganography
Steganography Detection
Rootkits
Countermeasures: Rootkits
Malware
Trojans
Trojan Infection Mechanisms
Well-Known Trojans
Distribution Methods Wrappers
Trojan Auto start Methods
Covert Communications
Stealth Technique: Avoiding Detection
Backdoor Countermeasures
Malware Countermeasure
Anti-Spyware Software
Malware Countermeasure Practices
Risk Management Steps
Determining ALE
CRAMM Process
Risk Management Lifecycle
Protected Assets
CIA Triad
Quantitative Risk Assessment
Threat Determination Process
Risk Assessment
Lifecycle
Steps
Vulnerability Categories
Business Assets vs. Risk
Benefits of Risk Management
Policy
Assessment
Security Policy
Use
Importance
Legal Issues
Example
Policy References
Policies, Guides, Standards, Procedures, and Controls
Security Policy Coverage Matrix
Example: Internet Security Coverage Matrix
Granular View of a Security Matrix
Basic Policies
Types of Hosts
General Configuration Guidelines
Clean Systems
Unnecessary Services
Warning Banners
Limiting Access
Configuring and Logging
Security Patches
Security Baselines
Traffic Filtering Monitoring
DoS Vulnerabilities
Server Hardening
Web Server Hardening
Mail Server Hardening
FTP Server Hardening
DNS Server Hardening
Other Servers
Workstation Considerations
Network Appliances
Wireless Access Hardening
VLAN Security
Software Attacks
Applying Cryptography to OSI Model
Tunnels
Securing Services
FTP and Telnet
SSL and TLS
Gateway-to-Gateway VPN
Host-to-Gateway VPN
IP Security
Wireless Access Communication
Wireless Security
Authentication
Authentication Issues
Cryptosystems Password Authentication
Hash Functions
Kerberos Cryptographic Benefits
Symmetric Key Encryption Asymmetric Encryption Digital Signatures PKI Components
Models
Policies
Lifecycle
Distribution
General Security Integration
Services
Needs for Services
Security Zones
Filtering
Screened Subnets
Trusted Zones
Devices
Routers
Firewalls
DMZ Hosts
Other Security Considerations
Business-to-Business Communications
Exceptions to Policy
Special Services and Protocols
Configuration Management
Software Development Security
Certification and Accreditation
Common Criteria
Intrusion Detection and Prevention
Defense in Depth
Network Device Logging
Host Monitoring and Logging
Events Correlation
Placement of IDS Monitors and Sensors
Monitoring
Host-Based and Network-Based Differences
Policy Management
Behavioral Signatures
IDS and IPS Weaknesses
Encryption
Incorrect Configuration
Incident Handling
Security Incident Response
Time and Reaction Sensitivity
Incident Handling Issues and Considerations
Response Procedures
Evidence
Logging
Log Analysis Tools
Active Ports
Dependency Walker
Log Maintenance
Disaster Types
Disaster Recovery Plan (DRP)
DRP Goals
Creating a DRP
DRP Contents
DRP Design Requirements
DRP Priorities
Recovery Strategies
High Availability
Data Collection Documentation
DRP Testing
Business Continuity Planning
BCP Steps
Cyber Forces
Cyber Terrorism
Cyber Security: Crime, War, or Fear Mongering?
Cyber Future 7 Compliance Initiatives
Cyber Defense in Depth
Education and Training
| Code | Date | Venue | Fees | Action |
|---|
Prices don't include VAT
Your Growth, Our Mission