Security vulnerabilities are an unfortunate, but unavoidable, part of today's computing systems. If exploited by internal or external users, these weaknesses can be catastrophic to your organization. Foundstone teaches step-by-step procedures for executing Internet, intranet, and host-level security reviews. This course is the definitive training for learning how to perform "tiger team" and attack and penetration assessments.
Foundstone instructors cover all the bases, presenting manual and scripted security-review techniques that go far beyond what automated analysis tools can do. You return to your organization with valuable knowledge, experience, and the ability to put your new skills into practice.
If you are a system or network administrator, security personnel, auditor, and/or consultant concerned with network and system security, then you should take this course. Basic Unix and Windows competency is required for the course to be fully beneficial.
Basic Unix and Windows competency is required for the course to be fully beneficial.
Nothing to bring. All necessary equipment will be provided including preconfigured workstations, tools and utilities.
• Certificate of Completion
• A cool Foundstone T-shirt, backpack, pen, and highlighter
• Plus you don't need to bring anything with you to the class. You will be provided a laptop to use throughout the class as your attack platform as you put your new skills to work.
Foundstone's management team and selected staff are uniquely qualified to present this material, having performed hundreds of security assessments for Fortune 500 companies. Instructors have managed or directed the security-assessment teams at three of the Big 4 accounting firms, as well as amassed real-world experience ranging from the United States Air Force to Wall Street. Members of the instructor team authored the best-selling Hacking Exposed: Network Security Secrets & Solutions.