This training covers the most common 
            questions of Computer Security ingeniers. In this course you are 
            going to understand why security could be compromised by hackers.
            
            HyperSec Security Seminar is the tiny way to create eficient 
            security policies and understand hacking techniques.
            
            As a seminar this course is half practical and half technical, the 
            main diference between G-Con Security Tips and Tricks is that the 
            participants doesn´t have a machine to practice,
            but as G-Con Security Tips and Tricks participant they have the 
            access to a war-game machine to encourage the practices.
            
            In this course you cover the security of:
            
  -Microsoft Windows NT (NT/2000/2003 and XP)
  -The Linux kernel in the most common distributions 
            (Redhat/Slackware/Mandrake/Gentoo/etc).
  -OpenBSD and FreeBSD
  -Web applications and SQL Databases
            
            And learn the most common techniques of:
            
            -Pentesting
            -Code Audit
            -Scanning
            -Shellcoding
            -Steganographic and criptographic algorithms
            -Forensics (Memory/Disk and Networking)
            -Exploit making
            -Etc.
            
              
                | 
                Global Time: | 
              
              
                | -10 Hours (Saturday´s 
                11:00am to 1:00pm) | 
              
              
                | 
                Administrative Requirements: | 
              
              
                | -Covered Payment | 
              
              
                | -Copy of your 
                oficial ID Card. | 
              
              
                | 
                Technical Requirements: | 
              
              
                | -C Language 
                knowledge | 
              
              
                | -Assembly 
                Language knowledge | 
              
              
                | -Windows Basics | 
              
              
                | -Unix Basics | 
              
              
                | -Networking 
                Basics | 
              
              
                | -Teory of 
                Operative Systems | 
              
              
                | 
                Objectives: | 
              
              
                | -Learning of the 
                real network threads | 
              
              
                | -Learning of the 
                attacking and defense techniques that can be used by hackers | 
              
              
                | -Learning of 
                networking security | 
              
              
                | -Code generation 
                to audit and prevent network hacking | 
              
              
                | -Detect common 
                programation errors | 
              
              
                | 
                Participant Profile: | 
              
              
                | -Interested in 
                networks | 
              
              
                | -Interested in 
                security | 
              
              
                | -Hability to 
                learn | 
              
              
                | 
                Included Material: | 
              
              
                | -Presentations 
                used in the training | 
              
              
                | -Security 
                Tutorial | 
              
              
                | -Checklists | 
              
              
                | -Exercises | 
              
              
                | -Programs used in 
                the workshop | 
              
              
                | 
                Modules: | 
              
              
                | -Hackers who are 
                they? | 
              
              
                | -Anatomy of an 
                attack | 
              
              
                | -How a hacker 
                works | 
              
              
                | -Network Mapping | 
              
              
                | -Hacking Windows | 
              
              
                | -Hacking Unix | 
              
              
                | -Buffer Overflows 
                and common programming errors | 
              
              
                | -Application 
                errors (SQL Injection, include errors, etc). | 
              
              
                | -TCP/IP hacking | 
              
              
                | -Pentesting | 
              
              
                |   |