Vous êtes sur la page 1sur 6

TECHNOLOGY TRANSFER PRESENTS

KEVIN
CARDWELL
CEH (Certified Ethical Hacher)
QEH (Qualified Ethical Hacker)
and Defender Class
IF YOU WANT TO STOP HACKERS

FROM INVADING YOUR NETWORK,

FIRST YOU’VE GOT TO INVADE THEIR MINDS

JUNE 16-20, 2008


VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37
ROME (ITALY)

info@technologytransfer.it
www.technologytransfer.it
CEH /QEH AND DEFENDER CLASS

ABOUT THIS SEMINAR


Scan, test, hack and secure your systems. Security Hacking for Professionals. Certified Ethical Hacking™ 5-
Day Class certifies students in the specific network security discipline of Ethical Hacking. The lab intensive en-
vironment gives each student in-depth knowledge and practical experience of perimeter defenses, scanning
and attacking lab networks escalating privileges on a system and how to secure a system. No real network is
harmed. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks,
Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on
understanding and experience in Ethical Hacking.

Class Tuition and Bonuses

• Instruction and review with an experienced master of Ethical Hacking


• CEH Certification Exam on site last day of class
• Access to Security University’s IT Professional Reference Library of targeted pre-class reading, with:
- Free CD of Linux & Free 2-CD set containing over 300 up-to-date Hacking tools and exploits
- Labs times are 8-9 am, 5-7 pm.
- Class book, lab handouts

Certified Ethical Hacker, CEH Certification, tests on the following 22 domains:

1. Ethics and Legal Issues


2. Footprinting
3. Scanning
4. Enumeration
5. System Hacking
6. Trojans and Backdoors
7. Virus and Worms
8. Sniffers
9. Denial of Service
10. Social Engineering
11. Hacking Web Servers
12. Web Application Vulnerabilities
13. Web Based Password Cracking Techniques
14. SQL Injection
15. Buffer Overflows
16. Hacking Wireless Networks
17. Physical Security
18. Linux Hacking
19. IDS, Firewalls and Honeypots
20. Cryptography
21. Penetration Testing Methodologies

The partecipants are kindly requested to bring their laptop with wireless connection capability.

CEH Certification Exam on site last day of class.


CERTIFIED ETHICAL HACKER TM

OUTLINE
1. Ethics and Legality • List TCP communication flag • How does reverse connecting
types Trojans work?
• Understand Ethical Hacking ter-
• Understand War dialing tech- • What are the countermeasure
minology
niques techniques in preventing Trojans?
• Define the Job role of an Ethical
• Understand banner grabbing and • Understand Trojan evading tech-
Hacker
OF fingerprinting techniques niques
• Understand the different phases
• Understand how proxy servers
involved in Ethical Hacking
are used in launching an attack 7. Virus and Worms
• Identify different types of Hacking
• How does anonymizers work
technologies • Understand the difference be-
• Understand HTTP tunneling tech-
• List the 5 stages of Ethical Hack- tween an Virus and a Worm
niques
ing? • Understand the types of Viruses
• Understand IP spoofing tech-
• What is hacktivism? • How a Virus spreads and infects
niques
• List different types of Hacker the system
classes • Understand antivirus evasion
• Define the skills required to be- 4. Enumeration techniques
come an Ethical Hacker • Understand Virus detection me-
• What is Enumeration?
• What is vulnerability research? thods
• What is meant by null sessions
• Describe the ways in conducting
• What is SNMP Enumeration?
Ethical Hacking
• What are the steps involved in 8. Sniffers
• Understand the Legal implica-
performing Enumeration?
tions of Hacking • Understand the protocol suscepti-
ble to sniffing
5. System Hacking • Understand active and passive
2. Footprinting
• Understanding password cracking sniffing
• Define the term Footprinting • Understand ARP poisoning
techniques
• Describe information gathering • Understand ethereal capture and
• Understanding different types of
methodology display filters
passwords
• Describe competitive intelligence • Understand MAC flooding
• Identifying various password
• Understand DNS enumeration • Understand DNS spoofing techni-
cracking tools
• Understand Whois, ARIN lookup ques
• Understand Escalating privileges
• Identify different types of DNS • Describe sniffing countermea-
• Understanding keyloggers and
records sures
other spyware technologies
• Understand how traceroute is
• Understand how to Hide files
used in Footprinting
• Understanding rootkits 9. Denial of Service
• Understand how e-mail tracking
• Understand Steganography tech-
works • Understand the types of DoS At-
nologies
• Understand how Web spiders work tacks
• Understand how to covering your
tracks and erase evidences • Understand how DDoS attack
3. Scanning works
• Understand how BOTs/BOT-
• Define the term port scanning, 6. Trojans and Backdoors NETS work
network scanning and vulnerabili- • What is “smurf” attack
• What is a Trojan?
ty scanning • What is “SYN” flooding
• What is meant by overt and covert
• Understand the CEH scanning • Describe the DoS/DDoS counter-
channels?
methodology measures
• List the different types of Trojans
• Understand Ping Sweep tech-
• What are the indications of a Tro-
niques
jan attack? 10. Social Engineering
• Understand nmap command
• Understand how “Netcat” Trojan
switches • What is Social Engineering?
works
• Understand SYN, Stealth, XMAS, • What are the Common Types of
• What is meant by “wrapping”
NULL, IDLE and FIN scans Attacks
• Understand Dumpster Diving 14. SQL Injection 19. Evading IDS, Honeypots and
• Understand Reverse Social Engi- Firewalls
• What is SQL injection?
neering
• Understand the Steps to conduct • List the types of Intrusion Detec-
• Understand Insider attacks
SQL injection tion Systems and evasion tech-
• Understand Identity Theft
• Understand SQL Server vulnera- niques
• Describe Phishing Attacks
bilities • List firewall and honeypot evasion
• Understand Online Scams
• Describe SQL injection counter- techniques
• Understand URL obfuscation
measures
• Social Engineering countermea-
sures 20. Cryptography
15. Buffer Overflows
• Overview of cryptography and en-
11. Hacking Web Servers • Overview of stack based buffer cryption techniques
overflows • Describe how public and private
• List the types of Web Server vul- • Identify the different types of keys are generated
nerabilities buffer overflows and methods of • Overview of MD5, SHA, RC4,
• Understand the attacks Against detection RC5, Blowfish algorithms
Web Servers • Overview of buffer overflow muta-
• Understand IIS Unicode exploits tion techniques
• Understand patch Management 21. Penetration Testing Metho-
techniques dologies
16. Hacking Wireless Networks
• Understand Web Application • Overview of Penetration Testing
Scanner • Overview of WEP, WPA authenti-
methodologies
• What is Metasploit Framework? cation systems and cracking tech-
• List the Penetration Testing steps
• Describe Web Server hardening niques
• Overview of the Pen-Test legal
methods • Overview of wireless Sniffers and
framework
SSID, MAC Spoofing
• Overview of the Pen-Test deliver-
• Understand Rogue Access Points
12. Web Application Vulnerabili- ables
• Understand Wireless Hacking
ties • List the automated Penetration
techniques
Testing tools
• Understanding how Web Applica- • Describe the methods in securing
tion works Wireless Networks
• Objectives of Web Application
Hacking 17. Physical Security
• Anatomy of an attack
• Web Application threats • Physical security breach incidents
• Understand Google Hacking • Understanding physical security
• Understand Web Application • What is the need for physical se-
Countermeasures curity?
• Who is accountable for physical
security?
13. Web Based Password • Factors affecting physical security
Cracking Techniques
• List the Authentication types 18. Linux Hacking
• What is a Password Cracker?
• Understand how to compile a Linux
• How does a Password Cracker
Kernel
work?
• Understand GCC compilation
• Understand Password Attacks -
commands
Classification
• Understand how to install LKM
• Understand Password Cracking
modules
Countermeasures
• Understand Linux hardening
methods
INFORMATION
PARTICIPATION FEE HOW TO REGISTER GENERAL CONDITIONS

€ 2600 You must send the registration form with If anyone registered to participate is
the receipt of the payment to: unable to attend, a substitute may
The fee includes all seminar TECHNOLOGY TRANSFER S.r.l. participate in their place. A full refund is
documentation, luncheon and coffee Piazza Cavour, 3 - 00193 Rome (Italy) given for any cancellation received more
breaks. Fax +39-06-6871102 than 15 days before the seminar starts.
Cancellations less than 15 days prior the
event are liable for 50% of the fee.
Cancellations less than one week prior to
within the event are liable for the full fees as
VENUE June 3, 2008 invoiced.
In case of cancellation of the seminar,
Visconti Palace Hotel Technology Transfer’s responsibility only
Via Federico Cesi, 37 applies to the refund of the participation
Rome (Italy) PAYMENT fees which have already been forwarded.

Wire transfer to:


Technology Transfer S.r.l.
SEMINAR TIMETABLE Banca Intesa Sanpaolo S.p.A.
Agenzia 4815 di Roma
9.30 am - 1.00 pm Iban Code:
2.00 pm - 5.00 pm IT 34 Y 03069 05039 048890270110

"
KEVIN CARDWELL first name ...............................................................
CEH /QEH AND DEFENDER CLASS
surname .................................................................
June 16-20, 2008
Visconti Palace Hotel job title ................................................................... Stamp and signature
Via Federico Cesi, 37
Rome (Italy)
organisation ...........................................................
Registration fee:
€ 2600 address ..................................................................

postcode ................................................................

city .........................................................................

country ...................................................................

telephone ............................................................... Send your registration form


with the receipt of the payment to:
Technology Transfer S.r.l.
If registered participants are unable to attend, fax .......................................................................... Piazza Cavour, 3 - 00193 Rome (Italy)
or in case of cancellation of the seminar, the Tel. +39-06-6832227 - Fax +39-06-6871102
general conditions mentioned before are info@technologytransfer.it
applicable. e-mail ..................................................................... www.technologytransfer.it
SPEAKER
Kevin Cardwell, spent 22 years in the U.S. Navy. He has worked as both software and systems engineer on a
variety of Department of Defense projects and was selected to head the team that built a Network Operations
Center (NOC) that provided services to the command ashore and ships at sea in the Norwegian Sea and
Atlantic Ocean. Mr. Cardwell served as the Leading Chief of Information Security at the NOC for six years prior
to retiring from the U.S. Navy. He currently works as a free-lance consultant and provides consulting services for
companies throughout the US, UK and Europe.

Vous aimerez peut-être aussi