HackFormers June Event - Training on Penetrating Security Defenses and All...
by
HackFormers
Event Information
Event description
Description
"Secrets to Penetrating Security Defenses;
All things are possible through Christ"
Full Day Training
Instructor: Dave Kennedy, Founder and Principal Security Consultant, TrustedSec, LLC
Please note: Although we were able to bring a top notch speaker/instructor and make it possible for to have high quality training at no cost to the attendees, we are unable to provide food and beverages to the attendees, for this event, due to lack of 'food' sponsors. This is a bring your own food and snacks event. Breakfast and lunch are *not* provided
HackFormers' mission is to "Teach Security; Teach Christ. Teach Security in Christ" and in this training, Dave and the HackFormers team will cover the mission objectives.
Teach Security - what you can expect to learn
It is continuously becoming harder to circumvent the security controls on externally facing systems and gain full access to the internal network. With the different types of technologies, hardening techniques, and detection; the job of a penetration tester continues to get more advanced. This course is designed to teach advanced techniques in order to bypass security defenses, gain access to an organization, and further penetrate into the network. Learn the techniques, tricks, and secrets from the author of the Social-Engineer Toolkit (SET) and one of the top penetration testers. What you’ll learn in this course:
- Fundamental penetration testing concepts and an overview on methodologies and techniques.
- Basics of open-source tools and technologies and understanding attack avenues.
- Understanding of the Social-Engineer Toolkit (SET) and advanced features.
- Bypassing security technologies such as whitelisting/blacklisting, anti-virus, and other preventative measures.
- Develop a solid understanding of penetration testing techniques and tricks of the trade.
- High-level development concepts of Python and basics to programming.
- Creating your own exploits and tools in Python and utilizing them in attack vectors.
- An understanding of post exploitation and utilizing different tools and technologies in order to further penetrate a network.
- Hands on demonstrations, real world examples, and complete hands on with each of the phases of the course.
Teach Christ - what you can expect to hear/learn
I am always reminded of Matthew 6:33 "But seek ye first the kingdom of God, and his righteousness; and all these things shall be added unto you." Through Christ and God our Father, anything is possible and with enough hard work and dedication, new ideas and abilities for those that seek to learn. Our gift through God is our ability to learn from one another and continue to better ourselves through Christ. This class will build on what you know or want to know and help you on your journey to the next level in understanding penetration testing.
NOTE: An introduction to and fund-raising for Hackers For Charity (Johnny Long's) mission in Uganda, Africa is likely if we can work out the logistics and get all the details from Johnny.
Course Requirements - WHAT STUDENTS NEED TO BRING
The student must have a working machine with Kali Linux as well as a Windows machine with Java loaded. These can be virtualized and one can be the primary. No anti-virus on the Windows machine (we will need to write bypass payloads first to evade). Ensure connectivity between the two virtual machines and that networking is working properly.
Community Supporters/Co-Hosts:
To get more information about upcoming meetings and HackFormers, visit http://www.hackformers.org
Twitter: @hackformers