
EXPLOITING AND DEFENDING NETWORKS – ADVANCE LINUX EDITION by Nish Bhalla – Security Compass
PRACTICAL WIFI (IN) SECURITY by Cedric "Sid" Blancher – EADS Research
DEFENDING WEB APPLICATIONS by Nish Bhalla – Security Compass
ADVANCED HONEYPOT TACTICS by Thorsten Holz – Aachen University
EXPLOITING AND DEFENDING NETWORKS – ADVANCE LINUX EDITION
| Trainer: | Nish Bhalla – Security Compass |
| Duration: | 2-days |
| Date: | 18th July – 19th July, 2006 |
| Time: | 0900 hours – 1700 hours |
| Style: | Classroom, hands-on |
| Cost: | S$3,000 per student |
Description:
The purpose of this course is to provide advanced tech leads, testers, administrators, network administrators and all other participants detailed security techniques and knowledge as applied to Network security and Host Security. It is focused towards helping users understand how to find and write basic stack based exploits. Participants will also learn how to take advantages of vulnerabilities that might exists in an environment and use backchannels to connect back into a network. Hands-on lab exercises reinforce the course material in a real world environment.
Pre-requisite:
Basic knowledge of programming on Windows or Linux is a pre-requisite. Having knowledge of using an editor like vi or Emacs and having the knowledge of compiled using Gcc / Visual Studio is a pre-requisite.
All students will be required to bring their own laptop; and must
have administrative access on their laptops to install software.
VM-Player (http://www.vmware.com/products/player/) will be installed.
Windows/Linux images will be provided for use during the class.
It is recommended that the laptops have 512 MB of RAM.
Class Outline: |
Part I - | Introduction to Buffer Overflows Buffer Overflows (Linux)
|
||||
| Part II – | Wireless Basics of Wireless Hacking
|
|||||
| Part III– | Network Scanning and Back Channels Network Scanning & Hacking
Back Channels [Methods of hiding and bypassing firewalls]
|
PRACTICAL WIFI (IN) SECURITY
| Trainer: | Cedric “Sid” Blancher – EADS Research |
| Duration: | 2-days |
| Date: | 18th July – 19th July, 2006 |
| Time: | 0900 hours – 1700 hours |
| Style: | Classroom, hands-on |
| Cost: | S$3,000 per student |
Class Outline:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
DEFENDING WEB APPLICATIONS
| Trainer: | Nish Bhalla – Security Compass |
| Duration: | 2-days |
| Date: | 18th July – 19th July, 2006 |
| Time: | 0900 hours – 1700 hours |
| Style: | Classroom, hands-on |
| Cost: | S$3,000 per student |
Description:
The two day course is an intense course in understanding how to defend web application attacks. The goal is to provide tech leads and developers, detailed security techniques and knowledge as it applies to web application security. The training introduces the concepts of web application security, the latest techniques in exploiting web applications, and most important of all teaches hands on defending web application. Participants will learn JSP and ASP.NET vulnerabilities, as well as learn how to securely write web applications in ASP.NET and JSP. This is a complete hands-on class where the concepts are re-enforced by labs based on real world environment.
Pre-requisite:
Knowledge of programming in JSP or ASP.NET environment is required.
All students will be required to bring their own laptop; and must have administrative access on their laptops to install software. VM-Player (http://www.vmware.com/products/player/) will be installed. Windows/Linux images will be provided for use during the class. It is recommended that the laptops have 512 MB of RAM.
Class Outline: |
Part I - | Introduction to Web Servers
|
||||||||||||||
| Part II – | Attacking the Web Server Foot-printing
|
|||||||||||||||
| Part III– | Defending Application
|
|||||||||||||||
ADVANCED HONEYPOT TACTICS
| Trainer: | Thorsten Holz – Aachen University |
| Duration: | 2-days |
| Date: | 18th July – 19th July, 2006 |
| Time: | 0900 hours – 1700 hours |
| Style: | Classroom, hands-on |
| Cost: | S$3,000 per student |
Description:
Honeypots or their younger brother Honeynets are very much en vogue nowadays. Firewalls, VPNs, IDS, IPS - are honeypots the next big hype? This two day course explains what honeypots are, what they are good for, when they can bring rapid ROI to an organization deploying them and when they are only of academic interest.
This course will teach how to setup different types of honeypots and how to learn more about the tools, tactics, and motives of blackhats. In addition, the course also shows how to swiftly detect and react to malware outbreaks in an organization. Moreover, it will be demonstrated how honeypot technology can be used to estimate risks in a way management understands. This course shows how to use honeypot technologies as a concrete improvement to your organisations security defences, combined with many hands-on exercises.
Pre-requisite:
Students should have a basic understanding of the concept behind honeypots. Moreover, having knowledge of programming on Linux and a good understanding of TCP/IP networking is helpful. All other material will be briefly introduced during the class.
Class Outline: |
Part I - | Honeypots
|
||
| Part II – | Honeyd
|
|||
| Part III– | Collecting malware with honeypots
| |||
| Part IV– | Bots/Botnets
|











