Technical Security Training

Centre Of Advanced Security Training

Advanced Penetration Testing

Advanced Penetration Testing (CAST 611)
Attacking Hardened Defense Systems

 

CAST 611 will teach you how to do a professional security test and produce the most important thing from a test ... the findings and the report!

The ranges progresses in difficulty and reflect an enterprise level architecture. There will be defenses to defeat and challenges to overcome. This is not your typical FLAT network! As the range levels increase you will encounter the top defenses of today and learn the latest evasion techniques.

The format you will use has been used to train 1000s penetration testers globally, it is proven and effective!

Read More

Advanced Mobile Hacking & Forensics

Advanced Mobile Hacking & Forensics (CAST 612)
Elevating Mobile Forensics & Investigation To An Art Form

Mobile Forensics is defined as “the science of recovering digital evidence from a mobile device under forensically sound conditions using accepted methods.”  (NIST)

This Three-day instructor-led course provides students with the knowledge and real world hands-on practical skills for performing Mobile Forensic Investigations. The course is based on vendor neutral Digital Forensic principals, with a great deal of focus on Apple, Google Android, RIM Blackberry and an array of other mobile devices.

In order to successfully complete a Mobile Forensics investigation it is imperative that you learn both the hardware and software design intricacies of these platforms as well as the common investigation protocols currently recognized and accepted for court trials.


Read More



Advanced Application Security

Advanced Application Security (CAST 613)
Crafting Robust Defensive Codes

 

This highly technical and intensive program will center on thwarting off attackers by defensively writing your code. We will discuss and learn the new techniques for case hardening your application from within. We will be attacking applications from the web, off the shelf binary applications as well as popular runtimes such as .NET, Java and even Adobe AIR (In a legal and Ethical Way), learning where mistakes were made and ensuring our own house is in order.

In AAS we will discuss and learn the new techniques for case hardening your application from within. We will actually be attacking applications from the web, off the shelf binary applications as well as popular runtimes such as .net, Java and even adobe AIR (In a legal and Ethical Way), learning where mistakes were made and ensuring our own house is in order and we don’t have these same faults internally.

Read More



Advanced Network Defense

Advanced Network Defense (CAST 614)
Hardening Your Enterprise
 

 

This is a comprehensive fast paced technical security training program that will take the perspective of the “hacker”, and use that for the foundation of defending against the latest attacks. It is fun to be on offense and do the hacking and penetration testing, but for most us the reality is we have to play defense. This program provides an offensive mindset to provide a robust and solid defense.
 
While there is no such thing as perfect security, there are best practices and methodologies you can follow to secure most environments and provide segmentation and isolation to reduce the effectiveness of the Advanced Persistent Threat. The technical security training program starts with an introduction to advanced “hacks” and how you can fortify your defenses.


Read More



Securing Windows Infrastructure

Securing Windows Infrastructure (CAST 616)
Attack Based Defense from the Ground Up

This 3 day technical course focuses on the key aspects of Windows Infrastructure Security, applying best practices to secure interconnected information systems within your organization providing a holistically reliable framework to support an entire enterprise structure

 


Read More


Designing and Implementing Cloud Security

Advanced Security Training (CAST 618)
Designing and Implementing Cloud Security

The Designing and Implementing Cloud Security course provides comprehensive knowledge of cloud services, their characteristics, benefits, applications, and service models. The course will help professionals understand the risks and threats associated with cloud service adoption and migrating business-critical data to third party systems.

The program covers planning, designing, and implementing cloud security controls. It delves in to various cloud standards, countermeasures, and best practices to secure information in the cloud. The program also emphasizes the business aspects of cloud security such as cloud uptime, uptime guarantee, availability, fault tolerance, fail-over policy, and how cloud security strengthens the business case for cloud adoption.


Read More

cast 619

Advanced SQLi Attacks and Countermeasures (CAST 619)
CENTER FOR ADVANCED SECURITY TRAINING

cast 619 img

The rapidly evolving information security landscape now requires professionals to stay up to date on the latest security technologies, threats and remediation strategies. CAST was created to address the need for quality advanced technical training for information security professionals who aspire to acquire the skill sets required for their job functions. CAST courses are advanced and highly technical training programs co-developed by EC-Council and well-respected industry practitioners or subject matter experts. CAST aims to provide specialized training programs that will cover key information security domains, at a advanced level.

 


Read More

Objectives of CAST technical security training

  EC-Council's Professional Trainers for Advanced Security Training

  • Gain intensive hands-on skills in advanced technical security methodologies
  • Learn proven advanced security techniques and strategies from industry experts
  • Gain superior advanced technical security knowledge to combat real-life security attack scenarios