Ultimate Hacking

Learn how to execute Internet, intranet, and host-level security, as well as how to perform penetration assessments and develop countermeasures

Next Steps:

Overview

Upcoming Course Dates & Locations: View Schedule

Type of Course: Classroom

No company can respond to, or even protect against, all the threats it faces. When exploited by internal or external users, network vulnerabilities can be catastrophic to an organization. As a security professional, you must learn how to leverage your knowledge of security techniques to identify the biggest threats to your company’s most critical assets.

In this industry-standard course on hacking, you will learn step-by-step procedures for executing Internet, intranet, and host-level security. Ultimate Hacking is the definitive training regiment for developing countermeasure strategies, such as performing attack and penetration assessments.

Expert instructors will present manual and scripted security review techniques that go far beyond what automated analysis tools can accomplish. More importantly, the hands-on classroom lab provides the real-world security knowledge you need to safeguard your organization.

What You'll Learn

Because security is an ever-changing battlefield, Ultimate Hacking exposes you to the latest in web application and network vulnerabilities and defenses. From Windows and Unix hosts to web applications and backend databases, instructors will illustrate each technology’s default security posture, installation weaknesses, methods hackers use to circumvent secure settings, and countermeasures for each vulnerability.

More than just theory, you will gain critical security skills by practicing with your classmates and instructors in a full-featured computer lab environment. Foundstone instructors will walk you through footprinting an organization’s Internet presence, showing you how to identify, exploit, and secure commonly encountered vulnerabilities in Windows and Unix systems. You will also explore web application vulnerabilities and learn how to attack and defend those critical applications. Finally, your skills will be put to the test with major labs at the end of each day, designed to reinforce your knowledge of web application, Windows, and Unix hacking.

Why We Teach This Course

To secure and monitor your network and applications, you need to know all the vulnerabilities. Traditional security assessments, performed by auditing firms or boutiques, can yield some useful data. However, these assessments lack the structure for transferring critical information to the people in your organization who need it the most.

Who Teaches this Course

Uniquely qualified to present this material, Foundstone’s management team and training staff have performed hundreds of security assessments for Fortune 500 companies. These expert instructors have exceptional professional backgrounds, including experience at Big Five consulting firms, government agencies, the Air Force Information Warfare Center, and on Wall Street. Members of the instructor team authored the best-selling “Hacking Exposed: Network Security Secrets & Solutions.” They are also invited speakers at industry conferences such as Interop, USENIX, and the Black Hat Briefings.

Who Should Take this Course

This course is for system and network administrators, security personnel, auditors, and consultants concerned with network and system security. Basic Unix and Windows competency is required for this course to be fully beneficial.

Continuing Education Credits

This course qualifies for up to 32 hours of continuing professional education (CPE) credits for Certified Information Systems Security Professional (CISSP)/Systems Security Certified Practitioner (SSCP), and 28 hours of CPE credits for Certified Information Systems Auditor (CISA)/Certified Information Security Manager (CISM) holders.