Henry Dalziel | Concise Courses | November 25, 2014
Sign up whilst there is still a chance! If you have ever had an interest in Red Teaming then you must attend this free one hour cybersecurity training program.
Here’s the link.
The date for this event is November 25th 2014. If you are late or are reading this after that date then hit the link anyway because we will have more information relating to the event. Also! We have a multiple choice Red Team Hacking Quiz here.
Next Generation Red Teaming!
This course is particularly suited to CISO’s and CTO’s that need to learn how to build a successful Red Team. For those that are completely new to the world of information security and are confused by the term ‘Red Teaming’ here is a quick definition:
Red Teaming is basically a type of wargaming…In private business penetration testers audit and test organization security, often in a secretive setting. The entire point of the Red Team is to see how weak or otherwise the organization’s security posture is.
So, if this sounds of interest to you, as a budding cybersecurity professional you ought to be learning more about Red Teaming – then this event is for you.
In this class the instructor, Robert Wood, is going to teach how the following:
We’re going to teach you how to:
- Identify systemic security issues based on the analysis of vulnerability and configuration data
- Utilize different classes of attacks (e.g., passive, active, insider, close-in, distribution, etc.)
- Model different operational threat environments (e.g., first generation [script kiddies], second generation [non- nation state sponsored], and third generation [nation state sponsored])
- Take advantage of general attack stages (e.g., footprinting and scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks, etc.)
- Apply IA principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)
- Analyze network access, identity and access management (e.g., public key infrastructure, PKI)
- Network security architecture concepts including topology, protocols, components, and principles (e.g., application of Defense-in-Depth)
- Apply penetration testing principles, tools, and techniques (e.g., metasploit, neosploit, etc.)
- Understand relevant laws, policies, procedures, or governance as they relate to work that may impact critical infrastructure
- Identify system and application security threats and vulnerabilities
- Identify system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, PL/SQL and injections, race conditions, covert channel, replay, return-oriented attacks, and malicious code)
- Understand what constitutes a network attack and the relationship to both threats and vulnerabilities
- Assessing the robustness of security systems and designs
- Conducting vulnerability scans and recognizing vulnerabilities in security systems
- Mimicking threat behaviors
- Performing damage assessments
- Penetration testing tools and techniques
- Use of social engineering techniques
- Using network analysis tools to identify vulnerabilities
Sign up for our FREE class here!
This offer ends – November 25th @ midnight Pacific, but if you are reading this after the event then don’t worry, we will have a bunch of information on the same URL.
After this FREE class, we’re going to start charging for access to the content so we really recommend that you get involved in the course and take advantage.