 |
- Become a Certified Incident Handler & Ethical Hacker -
Unique Course Feature
Instead of merely teaching a few hacker attack tricks, this course
provides a proven, step-by-step process for responding to computer
incidents, a detailed description of how attackers undermine systems
so you can prepare, detect, and respond to them, and a hands-on
workshop for discovering holes before the bad guys do. Specifically,
this course features:
- Strong emphasis on the technical and practical aspects of
the Incident Handling Step-by-Step model which has been proven
effective in hundreds of organizations
- In-depth coverage of the 5 phases of hacker attacks:
passive reconnaissance, active profiling, gaining access,
preserving access and covering the tracks
- Over 40 Hands-on Labs on the latest cutting-edge as well
as the "oldie-but-goodie" attacks prevailing on the Windows,
Linux, Netware operating systems
- Course leaded by qualified and knowledgeable i-Total instructors
with over 12-year pure information security experiences
Course Outline
For comprehensive coverage of the examination curriculum, we structure
this course into 4 modules with a total of 24 contact hours.
Details about individual modules are given below. Please email us at
info@i-TotalSecurity.net for more information.
Course Module |
Description |
1 |
Incident Handling and Computer Forensics
This module introduces a proven incident handling process,
using the six steps (preparation, detection, containment,
eradication, recovery and follow-up) one needs to follow
to prepare for and deal with a computer security incident.
A number of from-the-field case studies will be examined
and discussed to illustrate how identify computer attackers,
and to provide valuable information on the steps students
can take to improve the chances of catching and prosecuting
attackers. |
2 |
Discovering Network and Systems Details (Hands-On*)
In this module, particulars associated with passive
profiling and active scanning using low-tech and
sophisticated methods are discussed.
Various hacker techniques that gather system information,
obscure attackers sources and intentions, locate weak
DMZ systems and unsecured modem pools, mapping firewall
rules and systems behind, penetrate wireless LANs and
evade intrusion detection systems, are discussed in details.
Live demonstrations and hands-on practices will be
provided to let participants understand the information
gathering stages in great details. |
3 |
Penetrating the Targeted (Hands-On*)
In this module, the penetration phase of hacker attack
is unveiled in-depth. Various attack techniques such
as buffer overflow, vulnerability exploitations,
password cracking, format string attack, Web server
and SQL server attacks, Web application attacks, SQL
injection, cross-site scripting, cross site request forgery, IP spoofing,
session hijacking, denial of service and a variety of other
mechanisms are examined and practiced. For each attack,
the module explains the vulnerability, how various
tools exploit it, the signature of the attack, and
how to harden the system or application against the
attack. |
4 |
Owning the Victim (Hands-On*)
This module covers the occupation phase of hacker
attacks, in which attackers install sniffers and
backdoors, apply RootKits, establish covert channels,
manipulate log files, deploy stenography so as to hide
their tracks and to maintain access to the owned machines.
Extensive live demonstrations and hands-on exercises are
given so that students can effectively defend and handle
against these attacks. |
* To get the most value out of the course, students are required to bring their own notebook computers.
Course Date & Venue
Date | 8 Monday Evening Sessions Starting 10 Mar 2014 |
Time | 7:00pm - 10:00pm |
Venue | B2, the CharterHouse, 209-219 Wan Chai Road, Hong Kong [See Map] |
*i-TotalSecurity reserves the rights to modify the schedule as required.
Course Fee
Lectures + Workshops (24 Hours) = Early Bird price HK$8,000.00*
Early bird price - enroll 1 week before course commencement.
Full price = HK$8,000.00.
Course Leader
Mr. Alen Lo, MBA(CUHK), BSc(HKU), CISA, CISSP, CISM, CEH, IRCA Certified ISMS Lead Auditor
He has over 15 years of solid experiences on information systems
security, control and audit. During this period, he has been
responsible for assessing the efficiency and effectiveness of
information systems security and controls, implementing information security management systems for various
financial institutions, insurance companies, government departments, telecommunications service providers, commercial data centres, utilities
and multi-national conglomerate.
Moreover, Alen has over 10 years of international teaching
experiences and has been an instructor of the HKU SPACE, the SCS of
the Chinese of University of Hong Kong, and the Open University of Hong Kong
designing and delivering various award-bearing e-Commerce and information
systems security courses and seminars for numerous public, leading, listed
and military organizations in Asia Pacific, Europe, Greater China, Oceania and Middle East.
About i-TotalSecurity
A pioneer in information systems control and security education and
consultancy who bring the best knowledge, skills and practices to meet
the certification and working needs of individuals and corporations.
Since 1995, our qualified and no-nonsense security specialists are
teaching information security with students from leading corporations,
government and military organizations internationally.
Enquiry
Call us at +852 2965.4445 or e-mail info@i-TotalSecurity.net
|