This training covers the most common
questions of Computer Security ingeniers. In this course you are
going to understand why security could be compromised by hackers.
HyperSec Security Seminar is the tiny way to create eficient
security policies and understand hacking techniques.
As a seminar this course is half practical and half technical, the
main diference between G-Con Security Tips and Tricks is that the
participants doesn´t have a machine to practice,
but as G-Con Security Tips and Tricks participant they have the
access to a war-game machine to encourage the practices.
In this course you cover the security of:
-Microsoft Windows NT (NT/2000/2003 and XP)
-The Linux kernel in the most common distributions
(Redhat/Slackware/Mandrake/Gentoo/etc).
-OpenBSD and FreeBSD
-Web applications and SQL Databases
And learn the most common techniques of:
-Pentesting
-Code Audit
-Scanning
-Shellcoding
-Steganographic and criptographic algorithms
-Forensics (Memory/Disk and Networking)
-Exploit making
-Etc.
Global Time: |
-10 Hours (Saturday´s
11:00am to 1:00pm) |
Administrative Requirements: |
-Covered Payment |
-Copy of your
oficial ID Card. |
Technical Requirements: |
-C Language
knowledge |
-Assembly
Language knowledge |
-Windows Basics |
-Unix Basics |
-Networking
Basics |
-Teory of
Operative Systems |
Objectives: |
-Learning of the
real network threads |
-Learning of the
attacking and defense techniques that can be used by hackers |
-Learning of
networking security |
-Code generation
to audit and prevent network hacking |
-Detect common
programation errors |
Participant Profile: |
-Interested in
networks |
-Interested in
security |
-Hability to
learn |
Included Material: |
-Presentations
used in the training |
-Security
Tutorial |
-Checklists |
-Exercises |
-Programs used in
the workshop |
Modules: |
-Hackers who are
they? |
-Anatomy of an
attack |
-How a hacker
works |
-Network Mapping |
-Hacking Windows |
-Hacking Unix |
-Buffer Overflows
and common programming errors |
-Application
errors (SQL Injection, include errors, etc). |
-TCP/IP hacking |
-Pentesting |
|