Foundstone created the ultimate in “Hands On” security training. Designed to arm security pros with the skills to keep hackers at bay, Ultimate Hacking: Black Hat Edition is an action-packed two-day intensive class covering the latest methodologies, tools, and techniques necessary to assess and secure your connected environment. This special “Black Hat” edition is a derivative of the longer Ultimate Hacking class that is taught to the general public, the military, and many government agencies. Foundstone has taken the best content from Ultimate Hacking and created a shorter, accelerated version for Black Hat.
Ultimate Hacking: Black Hat Edition begins from a “zero-knowledge” perspective. Start by profiling your target, then learn how to identify and exploit well-known and obscure vulnerabilities in the most popular operating systems including Windows and multiple Unix flavors.
But don’t just listen to usput your skills to use and learn by doing. Foundstone challenges you with countless hands-on exercises to demonstrate your expertise as you race other students to achieve the ultimate goal…getting root.
- Assessing and Ppenetrating Windows® & Unix® networks and hosts
- Enumerating information from Windows hosts
- Linking Windows and Unix vulnerabilities for maximum impact
- Securing Windows & Unix hosts
Why Do We Teach This Class?
Security vulnerabilities are an unfortunate, but unavoidable, part of today's computing systems. If exploited by internal or external users, these weaknesses can be catastrophic to your organization. Foundstone teaches step-by-step procedures for executing Internet, intranet, and host-level security reviews. This course is the definitive training for learning how to perform "tiger team" and attack and penetration assessments.
Foundstone instructors cover all the bases, presenting manual and scripted security-review techniques that go far beyond what automated analysis tools can do. You return to your organization with valuable knowledge, experience, and the ability to put your new skills into practice.
Who Teaches This Class?
Your instructors are simply the very best. Foundstone instructors are practicing security consultants who bring real world experiences from their hundreds of security engagements to the classroom. They have a broad range of expertise and have collectively taught thousands of students.
Dedicated to pushing boundaries and staying at the fore-front of hacking techniques and technologies, our students have said, “These guys are scaryyou should lock them up!”
What Do I Get?
You get more than just knowledge of the latest hacker tricks and techniques. You take home the following cool stuff:
- Certificate of Completion
- A copy of the internationally best selling book, "Hacking Exposed 5th Edition"
- A cool Foundstone T-shirt
- A bootable BackTrack(tm) distribution - BackTrack is the Top rated Linux live distribution focused on penetration testing. The merging of two very popular distributions (Whax and Auditor Security Collection) has catapulted BackTrack to the #1 spot on the "Top 100 Network Security Tools" list - http://sectools.org.!
Plus you don’t need to bring anything with you to the class. You will be provided a laptop to use throughout the class as your attack platform as you put your new skills to work.
Who Should Take the Course?
If you are a system or network administrator, security personnel, auditor, and/or consultant concerned with network and system security, then you should take this course. Basic Unix and Windows competency is required for the course to be fully beneficial.