Workshops

Home

We have partnered with the EC-Council to offer two workshops! Both will be held on Friday, June 15th, 2018 at:

O'Hare Academic Center, Salve Regina University
100 Ochre Point Ave
Newport, RI 02840

To register, contact Jessica Johnson at EC-Council:
jessica.johnson@eccouncil.org or (505) 922-2894

Social Engineering and OSINT Workshop - $499

Download PDF

Fundamentals of Open Source Intelligence

  • Overview of Open Source Intelligence (OSINT)
  • Describe where OSINT can be gathered
  • Understanding Techniques to Gather OSINT
  • Gathering OSINT on people
  • Ethical and Legal Considerations
  • Understanding privacy in collection of OSINT

  • LAB: Gathering People OSINT

    Advanced OSINT

  • Motives of Collection
  • Gathering OSINT on businesses
  • Application of data gathered for social engineering
  • Application of data gathered for hacking (i.e. correlation with exploits)
  • Ethical and Legal Considerations

  • LAB: Gathering Business OSINT

    Fundamental Social Engineering

  • What is social engineering
  • Principles of persuasion
  • Types of social engineering
  • Ethical considerations
  • Social engineering as it pertains to "the hack"

  • LAB: Interpersonal communications and Pretexting

    Applied Social Engineering

  • Creating payloads
  • Cloning and standing up phishing web servers
  • Automated phishing solutions
  • Spoofing calls for vishing
  • Physical Security and baiting
  • Tailgating
  • Applying the concepts to gain access

  • LAB: Phishing, Vishing, and Baiting

    Ethical Hacking Attack Phases Workshop - $999

    Download PDF

    WHO SHOULD ATTEND?

    IT Admins who are interested in cybersecurity, Ethical Hackers, Pen Testers.

    WORKSHOP OVERVIEW

    Ethical hacking attack phases:
    In this workshop you will learn system hacking, following this you will learn how to hack and assess web applications. Once you have practices these hacks, you will learn attacks that target wireless devices as well as mobile devices. You will be introduced to techniques to identify the attack surface and then the vectors for attack depending on the device(s) encountered.

    System Hacking

  • Overview of CEH Hacking Methodology
  • Understanding Techniques to Gain Access to the System
  • Understanding Privilege Escalation Techniques
  • Understanding Techniques to Create and Maintain Remote Access to the System
  • Overview of Different Types of Rootkits
  • Overview of Steganography and Steganalysis Techniques
  • Understanding Techniques to Hide the Evidence of Compromise
  • Overview of System Hacking Penetration Testing

  • LAB: System Hacking

    Hacking Web Applications

  • Understanding Web Application Threats
  • Understanding Web Application Hacking Methodology
  • Web Application Hacking Tools
  • Web Application Security Tools
  • Overview of Web Application Penetration Testing

  • LAB: Web Applications

    Hacking Wireless Networks

  • Understanding Wireless Encryption Algorithms
  • Understanding Wireless Threats
  • Understanding Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Understanding Bluetooth Hacking Techniques
  • Wireless Security Tools
  • Overview of Wireless Penetration Testing

  • LAB: Hacking Wireless Networks

    Hacking Mobile Platforms

  • Understanding Mobile Platform Attack Vectors
  • Understanding various Android Threats and Attacks
  • Understanding various iOS Threats and Attacks
  • Mobile Security Guidelines and Security Tools
  • Overview of Mobile Penetration Testing

  • LAB: Hacking Mobile Networks

    Course includes:

  • e-Book
  • Certificate of Attendance (.pdf)
  • STORM device*
  • Keyboard
  • What is a STORM device?

  • 64 Bit Quad Core Mobile System with Case
  • 1 GB RAM
  • 7 inch touch screen display
  • 64 GB MicroSD - Preloaded w/Custom Linux Hacking OS
  • 100Mb Ethernet port
  • 4 USB ports
  • 802.11n wireless
  • Bluetooth 4.1
  • Combined 3.5mm audio jack and composite video
  • Camera interface (CSI)
  • Display interface (DSI)
  • VideoCore IV 3D graphics core
  • Full HDMI
  • USB 2.0 A to B Micro Power Cable. [The Storm can be powered from a 5V micro-USB source, Power Supply not included with base package.]
  • Rollup water resistant keyboard
  • Field Case Organizer for all your gear