Presented by Heorot.net. Your instructor Course material Structure of the course Individual Penetration Test Effort (PTE)

Slides:



Advertisements
Similar presentations
Involving businesses by professional education The most sustainable way to implement Travel Demand Management as a tool for accessibility problems is to.
Advertisements

Information Technology Management (ITM101) Week 01: Introduction Matthew W. Stephan: CISM, CISSP, CGEIT, CRISC, PMP.
WHAT DOES IT MEAN TO YOU? Information Technology.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Information Professionals for the 21 st Century Library Nancy K. Roderer October 16, 2008.
Y10 L2 BTEC ICT Preparing for assessment 1… Make sure you are reading YOUR section…
PENETRATION TESTING Presenters:Chakrit Sanbuapoh Sr. Information Security MFEC.
Module 2 – PenTest Overview
Chapter 1 Ethical Hacking Overview. Who Am I?  Kevin Riley  Systems / Network Analyst Orange Coast College   Phone
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
Hands-On Ethical Hacking and Network Defense
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
Chapter 15 Information Technology Careers.
Certified Information System Security Professional (CISSP)
Penetration Testing Edmund Whitehead Rayce West. Introduction - Definition of Penetration Testing - Who needs Penetration Testing? - Penetration Testing.
BackTrack Penetration Testing Workshop Michael Holcomb, CISSP Upstate ISSA Chapter.
Certification and Training Presented by Sam Jeyandran.
CS 101 Introduction to Programming Dr. Basit Qureshi Assistant Professor College of Computer and Information Sciences Prince Sultan University.
Future Jobs Denton MacDonald. Possible careers Architect Plan and design buildings and other structures Information Security Analyst Help ensure the security.
© Paradigm Publishing Inc Chapter 15 Information Technology Careers.
The FlexTraining Total E-Learning Solution
Promoting Research and Application of Information Assurance and Cybersecurity 6 th Annual Security Summit May 20, 2009 Mark Weatherford, Chief Information.
Career Opportunities in Information Technology There are four main categories of IT jobs, grouped by the main focus of the job: Sales and support Software.
Nata Raju Gurrapu Agenda What is Information and Security. Industry Standards Job Profiles Certifications Tips.
Railpad Lifecycle Architecture Overview. Skit! Scenario: Lon & Brian  Lon and Brian are software developers in a successful technology company.  Their.
VULNERABILITY ASSESSMENT FOR THE POLICE DEPARTMENT’S NETWORK.
Penetration Test
Using UBlearns for Advisors Fall 2013 Professional Development Panel Presentation Tuesday, December 10, 2013.
Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.
Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006.
Security+ Brian E. Brzezicki. About Me Instructor Brian E. Brzezicki Bachelor of Science, Computer.
IT Semester 1 Course Introduction IT Portfolio IT 1140 ( Semester 1) Hong Kong Baptist University IT 1140 – IT Portfolio – Course Introduction.
Careers in Information Technology. Pick a Career Computer Programmer Computer Software Engineers Computer Support Specialist Computer Systems Analysts.
PowerPoint Day 2 Class Exercise File. Morning Agenda  Working with Slide Masters  Creating PowerPoint Templates  Working with Smart Art  Adding Charts.
Center for Cybersecurity Research and Education (CCRE)
CMSC 345 Fall 2000 Software Design and Development.
Presents Ethical Hacking For Inplant Training / Internship, please download the "Inplant training registration form" from our website.
© 2009 Carnegie Mellon University Education in Flow Analysis Timothy J. Shimeall, Ph.D. CERT/NetSA January 2008.
Final Review 1453 Dec.14 Confirm exam schedule for date 3d03 3hrs.
Concept Presentation Philip Robbins - August 1, 2012 University of Phoenix Hawaii Campus Information Systems Security Management.
CSCD 303 Essential Computer Security Lecture 1 - Course Details.
Seminar 1IT484 - Network Security1 Welcome To IT484 Network Security Dr. David Teneyuca, CISSP Instructor.
Masters Program A Masters Tracks Courses taken by a masters students.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
CITA 352 Chapter 1 Ethical Hacking Overview. Introduction to Ethical Hacking Ethical hackers –Hired by companies to perform penetration tests Penetration.
Free Powerpoint Templates Page 1 Free Powerpoint Templates Pass Microsoft Exam MCSE: Data Platform.
Using United Streaming with PowerPoint Spring Training, 2007 P. Choate Technology Specialist.
«My future profession»
Design and development of a prototypical software for semi-automatic generation of test methodologies and security checklists for IT vulnerability.
IT Project Management MIS419/576 Fall 2017.
Chapter 15 Information Technology Careers.
CISSP-ISSEP® - Certified Information Systems Security Professional
CEH vs CISSP Course, Advantage, Career, Salary, Demand!
Cyber Defence Intelligence
Naval Postgraduate School
Career JEOPARDY! Cluster: Information Technology
SY0-501 Dumps PDF CompTIA Security+ Certification Exam Dumps4download SY0-501 Exam Question.
Welcome to AWS Certification Exam
Pass MCP Test MCSE: Messaging.
Joaquin Fuentes MBA, CEH, CPT, CISSP, CISA, NACA
Beth De Lima. OVERVIEW Beth De LimaBeth De Lima,president and principal of HRM Consulting, Inc. is nationally certified as a Senior Professional in Human.
Hands-On Ethical Hacking and Network Defense
Penetration Testing Computer Science and Software Engineering
Credentials Name: Matthew Robson
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
DID YOU KNOW??? Science - Technology - Engineering - Mathematics
Automation Specialist Level 2 Track Data Sheet
PT0-001 Exam Questions 2019
CSCD 303 Essential Computer Security
Presentation transcript:

Presented by Heorot.net

Your instructor Course material Structure of the course Individual Penetration Test Effort (PTE)

Job Experience 15 years in Information Security U.S. Army (M.I.) Signals Intelligence Analyst Cryptanalyst Russian Linguist Information Security Officer 2+ Years Penetration Testing Fortune 50 company Penetration Testing / Risk Assessments

Education Masters of Science in Computer Science Concentration: Computer Security Masters of Science in Management Concentration: Information Security PhD Student – Information Technology Concentration: Information Security

Certifications ISSMP – Information Systems Security Management Professional CISSP – Certified Information Systems Security Professional SCSECA – Sun Certified Security Administrator SCNA – Sun Certified Network Administrator SCSA – Sun Certified System Ad ministrator IAM – Information Assurance Methodology

Publications 2007 Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research Penetration Tester's Open Source Toolkit, Volume Netcat Power Tools Hakin9 Magazine – 3/2008 issue Conventions DefCon 15 PhreakNIC 10

Modules Video PowerPoint Slides Documents OSSTMM LiveCDs Practice Disks PTE Disks (2) Hands-On Exercises WebGoat DamnVulnerableLinux De-ICE.net Disks

Modules Very relaxed method of delivery No script Low emphasis on specific tools OSSTMM Special Topics Hands-On Exercises Chat Sessions Wiki

Required for HIPT Certification Individual PenTest of disks & Disks are meant to be run at the same time Customer Report I am the customer Some material will be provided Must follow report template Must use OSSTTM template(s) Spelling is graded (!?!?) Pass/Fail

Your instructor Course material Structure of the course Individual Penetration Test Effort (PTE)