Method Based - Foundstone courses teach you the Hacker Methodology so that you thoroughly understand the threats that you face. Utilizing this methodology, unwanted intruders are adept at finding weaknesses across their targeted networks. By combining these weaknesses, they methodically escalate their privileges as they burrow through defenses to their ultimate goal getting root.
Understanding the Hacker Methodology and the thought process that intruders employ is critical to protecting your network and will allow you to build effective defenses and limit your risk.
Hands On Foundstone courses always use Hands On exercises and labs to reinforce key concepts. Our courses are never slide shows. Youre challenged with multiple exercises that require you to apply your new knowledge on our target networks so that youre ready to apply your new skills immediately.
Time Tested Foundstone has taught thousands of security professionals how best to defend their networks. Ranging from the principles of good security practices and advanced techniques to web security, secure coding and incident response, Foundstone is the proven expert in security education.
Experts Foundstone courses are taught by practicing security consultants who are hired by leading Fortune 100 companies, the military and government agencies to secure their networks. Foundstone brings real world experience from these engagements to the class room. Many of our instructors are authors of internationally best selling security titles. Learn from the ones who wrote the book on security not the ones who read it.
Foundstone's management team and selected staff are uniquely qualified to present this material, having performed hundreds of security assessments for Fortune 500 companies. Instructors have managed or directed the security-assessment teams at three of the Big 5 accounting firms, as well as amassed real-world experience ranging from the United States Air Force to Wall Street. Members of the instructor team authored the best-selling Hacking Exposed: Network Security Secrets & Solutions and write a weekly column for InfoWorld magazine. They are also frequent speakers at industry conferences such as NetWorld+Interop, Usenix, and the Black Hat Briefings.