2 SEATS ARE STILL OPEN. RESERVE NOW!

Program

  • Day 1 (6th Mar 2013) – Security Essentials: What every security expert needs to know!
  • Day 2 (7th Mar 2013) – Ethical Hacking and Incident Response: Learn exactly what hackers already do!
  • Day 3 (8th Mar 2013) – Principles of Digital Forensics Investigation: Let’s find the digital criminals!
  • Day 1 – Security Essentials

    (What every security expert needs to know!)

    At this day candidates would learn the essence of computer security, up-to-minute knowledge and hands-on skills needed for securing systems and networks. This day provides necessary essentials for those who look seriously into digital security. The following subjects are covered at this day:

    • Understand the CIA and DAD triad.
    • Examine the pros and cons of various authentication systems.
    • Assess threats and vulnerabilities and recognize risk levels.
    • Understand common hacker tools and how to react to them properly.
    • Choose the most effective security policies and procedures for your organization.
    • Efficient implementation of cryptography and other protective devices.
    • Understand information warfare and how it affects security measures.

    By providing necessary knowledge of all domains of information security, this day is highly recommended to academicians who are supervising or involving in wide range of security projects. In addition, this day may fill the knowledge and technical gaps for security professionals, network administrators, and security students for effective implementation of essential domains of information security and provides needed backgrounds for following days.

  • Day 2- Ethical Hacking and Incident Response:

    Learn exactly what hackers already do!

    At this day candidates would learn attackers’ tactics and strategies by practicing most of them in real scenarios. The day starts with detailed discussion of incident detection and handling techniques and continues with in-depth review of attackers’ tools and techniques. Instead of learning merely few hacking tricks, candidates will be going through step-by-step process for responding to incidents and detailed description of techniques that hackers use to undermine a system. The following subjects are covered at this day:

    • Incident response and ethical hacking procedure
    • Incident handling, containment and eradication techniques
    • Penetration testing process
    • Network-level attacks
    • Gathering and parsing network traffics
    • Password cracking techniques
    • Web-application attacks
    • Maintaining access and covering tracks

    This day is specially designed for academicians who would like to get familiar with hacking techniques and incident responder behavior. In addition, it provides technical insights for individuals who are responsible for detecting or reacting to incidents. Furthermore, general security practitioners, system administrators, and security students will benefit by learning how to design, build, and act to stops attackers.

  • Day 3: Principles of Digital Forensics Investigation:

    Let’s find the digital criminals!

    In this day candidates would learn the techniques that computer forensics analysts are using to collect, analyze, and present digital evidences and track users behaviors. This day covers fundamentals of digital investigation, techniques for investigating Windows® and Linux® hosts, network traffic and network devices. The following subjects are covered at this day:

    • Forensic investigation process and host forensics
    • Writing a full forensic investigation report
    • Data Acquisition Techniques
    • Current Computer Forensics Tools
    • Windows and Linux Forensics
    • Network forensics and understanding network traffic structure

    This day is especially designed for academicians working on or supervising digital forensics projects with its balanced coverage of both academic and practical issues in digital forensics. In addition, system administrators, incident handlers, and forensics students will benefit by learning the tools and techniques necessary for finding digital criminals in their network/organization.