WARSAW - Training Agenda (EN)
WARSAW - Training Agenda (PL)
Are you in need for dedicated IT security training? Invite us over! We deliver
worldwide!
About the Trainer
Paula Januszkiewicz
Paula is an IT Security Auditor and
Penetration Tester, Enterprise Security MVP and trainer (MCT) and
Microsoft Security Trusted Advisor. She also is a
top-speaker on many well-known conferences (for example:
TechEd North America, TechEd Europe, TechEd Middle East,
TechDays worldwide RSA worldwide, CyberCrime etc.) and a
publihed author of articles on Windows Security. She conducted
hundreds of IT security audits and penetration tests, including
those for military customers. Her distinct specialization is
definitely in Microsoft security solutions, the field she holds
multiple Microsoft certifications in (MCITP, MCTS, MCSE, MCDBA
etc.). A number of certifications in other related
technologies add up to a successful expert portfolio. Paula
is passionate about sharing her knowledge with others. In her
private time, she enjoys researching new technologies, which she
converts into authored trainings. She authored a book on Threat
Management Gateway 2010. She has been doing penetration
tests for 10 years now! She has got official access to a
source code for Windows!
Paula says:
We go far beyond simply presenting how to 'break into operating
systems'! We are proud to say that this course is
equally important for those who
need to test, defend or perform a risk assessment of their
infrastructure. Let us infect you with technology
PASSION!
Overview
Our course has been developed around professional penetration
testing and security awareness in the business and IT fields.
To make sure that all participants will gain the necessary
infrastructure security knowledge our classes have the intensive
hands-‐on format. All labs are constantly updated and have 3 levels
of difficulty and can be easily adjustable to the overall level of
the group. Every exercise is supported with the lab instructions
and multiple tools, traditional and specialized.
We recommend students have some
knowledge of security concepts, such as operating system services
and architecture. However, all required concepts will be covered
throughout the course.
Training objectives
- Identify security profile of the target
- Perform the testing activities
- Figure out protection opportunities
- Optimize security controls to reduce risks
Materials
- Student Workbook
- Student Manual
- Tools - 1 DVD
Outline
Modul 1. Evolution of Hacking
Module 2. Operating System Services Security
Overview
Module 3. Operating System Internal
Security
Module 4. Databases Security
Module 5. Google Hacking
Module 6. HTTP Request Building
Module 7. Reconnaissance and Target
Profiling
Module 8. Information Leakage and Error
Handling
Module 9. Session Manipulation
Module 10. Tampering with Communication (Wired
and Wireless)
Module 11. Exploiting a Lack of Access
Controls
Module 12. Malicious Files Execution
Module 13. Legal Issues