List of Technical Security Training

EC-Council’s Center for Advanced Security Training (CAST)


              

Technical Security Training

Technical security training is essential in the current state of information security. The information security workforce requires not just technically proficient people to operate and support existing systems that are already deployed. There is a great demand for highly skilled professionals who can design security systems, application engineers who can write secure codes, as well as forensics experts who are well trained with highly advanced computer examination skills. CAST will feature some of the most advanced technical security training programs.

 

Advanced Application Security

Advanced Penetration Testing

Advanced Penetration Testing (CAST 611)
Attacking Hardened Defense Systems

 

Pen Testing High Security Environments is a three-day highly intensive and technical security training program that focuses on attacking and defending highly secured environments.

In APT, you will be learning how to attack new operating systems such as Windows Vista, Windows 7, Windows Server 2008, and the latest Linux servers. All of these servers will be patched, and hardened. Both Network and Host-based Intrusion Detection/Preventions systems (IDS/IPS) will be in place as well. The learning curve for this program is extremely steep, but the rewards are astronomical. Students will learn what it REALLY takes to hack into some of the most secure networks and applications in the world.

Read More



Advanced Mobile Hacking & Forensics

Advanced Mobile Hacking & Forensics (CAST 612)
Elevating Mobile Forensics & Investigation To An Art Form

Mobile Forensics is defined as “the science of recovering digital evidence from a mobile device under forensically sound conditions using accepted methods.”  (NIST)

This Three-day instructor-led course provides students with the knowledge and real world hands-on practical skills for performing Mobile Forensic Investigations. The course is based on vendor neutral Digital Forensic principals, with a great deal of focus on Apple, Google Android, RIM Blackberry and an array of other mobile devices.

In order to successfully complete a Mobile Forensics investigation it is imperative that you learn both the hardware and software design intricacies of these platforms as well as the common investigation protocols currently recognized and accepted for court trials.


Read More



Advanced Application Security

Advanced Application Security (CAST 613)
Crafting Robust Defensive Codes

 

This highly technical and intensive program will center on thwarting off attackers by defensively writing your code. We will discuss and learn the new techniques for case hardening your application from within. We will be attacking applications from the web, off the shelf binary applications as well as popular runtimes such as .NET, Java and even Adobe AIR (In a legal and Ethical Way), learning where mistakes were made and ensuring our own house is in order.

In AAS we will discuss and learn the new techniques for case hardening your application from within. We will actually be attacking applications from the web, off the shelf binary applications as well as popular runtimes such as .net, Java and even adobe AIR (In a legal and Ethical Way), learning where mistakes were made and ensuring our own house is in order and we don’t have these same faults internally.

Read More



Advanced Network Defense

Advanced Network Defense (CAST 614)
Hardening Your Enterprise
 

 

This is a comprehensive fast paced technical security training program that will take the perspective of the “hacker”, and use that for the foundation of defending against the latest attacks. It is fun to be on offense and do the hacking and penetration testing, but for most us the reality is we have to play defense. This program provides an offensive mindset to provide a robust and solid defense.
 
While there is no such thing as perfect security, there are best practices and methodologies you can follow to secure most environments and provide segmentation and isolation to reduce the effectiveness of the Advanced Persistent Threat. The technical security training program starts with an introduction to advanced “hacks” and how you can fortify your defenses.


Read More



Hacking Secure Encryption and Countermeasures

Hacking "Secure" Encryption and Countermeasures (CAST 615)
An In-Depth Analysis of Cryptography

 

 

This technical security training is an in depth examination of the field of cryptography.  All modern security, at some level, depends on cryptography.  Whether it is using SSL to secure bank transactions, encrypting e-commerce purchases, or encrypting a hard drive, encryption is key to security.  This technical security training explores, in depth, the science of cryptography teaching students the history of cryptography, modern cryptographic methods, and how to use techniques like cryptanalysis to break cryptography. The program also covers closely related topics such as hashing and digital certificates.

Read More
FAQ



Securing Windows Infrastructure

Securing Windows Infrastructure (CAST 616)
Attack Based Defense from the Ground Up

This 3 day technical course focuses on the key aspects of Windows Infrastructure Security, applying best practices to secure interconnected information systems within your organization providing a holistically reliable framework to support an entire enterprise structure


Read More

Advanced Metasploit Decoded

Advanced Metasploit Decoded (CAST 617)
Mastering a Hacking Power-Tool

 

 

A 3 day hands on workshop taking students into every nook and cranny necessary to taming the Metasploit Framework towards your benefit. Go beyond the basics and get the hang of wielding what is now a weapon of choice among a critical threat; potential hackers looking to harm your organization.

Read More

Objectives of CAST technical security training

  EC-Council's Professional Trainers for Advanced Security Training

  • Gain intensive hands-on skills in advanced technical security methodologies
  • Learn proven advanced security techniques and strategies from industry experts
  • Gain superior advanced technical security knowledge to combat real-life security attack scenarios