|
Dear Executive,
Workshop Overview:
In this two-day workshop we will attack systems and networks at all segments, following each attack we will apply security controls and defensive measures to eliminate or mitigate the attack. The attack will first be demonstrated, and then YOU will perform it!
We will compromise machines, and then perform a post-mortem of the compromise, so you fully understand how it happened and more importantly how to counter it. The defensive methods deployed will block up to 90% of the attacks you hear about in the news, you will learn measures to mitigate the risk of the other 10% should you ever be targeted with those.
About the Trainer:
• Leader of a 5 person DoD Red Team that achieved a 100% success rate at compromising systems and networks for six straight years
• Conducted over 500 security assessments across the global
• Worked as both software and systems engineer on a variety of Department of Defense
• Member of the project to bring Internet access to ships at sea
• Past clients include: United States Navy, Federal Reserve Bank, Ernst and Young, Deloitte and Touche, Cybersecurity Malaysia, Oman LNG, HSBC, Citibank, Saudi Aramco, etc…
Testimonials:
“Every facet of the course was exceptional, the instructor’s knowledge of the material showed with the precision of the presentation.” ~ Senior Engineer
“Best instructor I have ever had.” ~ Senior Support Analyst
Click Here to Request for Defend Network Brochure |
Other Event:
Live Mobile Application Hacking Lab 2 – 4 June 2014 · Kuala Lumpur, Malaysia
Why You Should Attend
Attending this course will give you the critical knowledge and skills to learn hacking techniques commonly used to breach and exploit corporate networks. Understanding how such hacking is done is crucial to take on countermeasures to defend the organizations’ security systems. This course enables you to identify vulnerabilities in networks, operations systems and applications and also provides defensive measures that can be taken to avoid such attacks. Furthermore, a section on mobile forensics will provide delegates with essential data recovery skills and possibly help to deter cyber-crime.
Click Here to Request for Mobile Hacking Brochure
|