EC-Council Conference and Events

EC-Council Conference & Events


Certified Ethical Hacker (CEH) v7 [4 days]

 

 

The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.



Start Date End Date City/State Event
May 4, 2012 May 7, 2012 Dallas, TX TakeDownCon
August 25, 2012 August 28, 2012 Baltimore, MD TakeDownCon
October 25, 2012 October 28, 2012 Miami, FL Hacker Halted
December 1, 2012 December 4, 2012 Las Vegas, NV TakeDownCon


Certified Security Analyst / Licensed Penetration Tester (ECSA/LPT)

 

EC Council Certified Security Analyst, ECSA an advanced ethical hacking training certification that is the progression after the Certified Ethical Hacker, CEH certification by exploring the analytical phase of ethical hacking. While the Certified Ethical Hacker certification exposes the learner to hacking tools and technologies, the Certified Security Analyst course takes it a step further by exploring how to analyze the outcome from these tools and technologies. Through ground-breaking network penetration testing methods and techniques, this pen testing computer security certification assessments required to effectively identify and mitigate risks to the information security of the infrastructure.
 
This makes the Certified Security Analyst “Pen Testing” certification a relevant milestone toward achieving EC Council’s Licensed Penetration Tester (LPT) certification, which also ingrains the learner in the business aspect of network penetration testing. The Licensed Penetration Tester standardizes the knowledge base for network penetration testing professionals by incorporating the best practices followed by experienced experts in the field.


Start Date End Date City/State Event
May 4, 2012 May 7, 2012 Dallas, TX TakeDownCon
August 25, 2012 August 28, 2012 Baltimore, MD TakeDownCon
October 25, 2012 October 28, 2012 Miami, FL Hacker Halted
December 1, 2012 December 4, 2012 Las Vegas, NV TakeDownCon


Computer Forensics Hacking Investigator (CHFI)

 

EC-Council releases the most advanced Computer Hacking Forensic Investigator program in the world. CHFIv8 presents detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enables students to acquire necessary hands-on experience on various forensic investigation techniques and standard forensic tools necessary to successfully carryout a computer forensic investigation leading to prosecution of perpetrators. Battles between corporations, governments, and countries are no longer fought using physical force. Cyber war has begun and we can also see the consequences in our daily lives. With the onset of sophisticated cyber-attacks, the need for advanced cyber security and investigation training is a mandate in present day. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cyber criminal, then this is the course for you. This course helps forensic investigators to excel in incident handling and investigate various types of security incidents such as data breaches, latest persistent security issues, insider employee threats and intricate digital forensic circumstances and cases.

Start Date End Date City/State Event
May 4, 2012 May 7, 2012 Dallas, TX TakeDownCon
August 25, 2012 August 28, 2012 Baltimore, MD TakeDownCon
October 25, 2012 October 28, 2012 Miami, FL Hacker Halted
December 1, 2012 December 4, 2012 Las Vegas, NV TakeDownCon


Certified Incident Handler (CIH) [2 days]

 

The EC-Council Certified Incident Handler program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system.  The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. Students will learn how to handle various types of incidents, risk assessment methodologies, and various laws and policy related to incident handling. After attending the course, they will be able to create incident handling and response policies and deal with various types of computer security incidents. The comprehensive training program will make students proficient in handling and responding to various security incidents such as network security incidents, malicious code incidents, and insider attack threats.

In addition, the students will learn about computer forensics and its role in handling and responding to incidents. The course also covers incident response teams, incident reporting methods, and incident recovery techniques in detail. When a student leaves this intensive 2 day class they will have hands on understanding and experience in Incident Handling.


Start Date End Date City/State Event
December 1, 2012 December 4, 2012 Las Vegas, NV TakeDownCon


CAST 611 – Advanced Penetration Testing [3 days]

 

 

Advanced Penetration Testing training provides penetration testers the training needed to perform advanced pen testing against known or unknown applications, services, and network systems which are patched and hardened with both Network and Host-based Intrusion Detection/Preventions systems (IDS/IPS) in place. The learning curve for this program is extremely steep, but the rewards are astronomical where students are presented with the opportunity of learning what it REALLY takes to hack into some of the most secure networks and applications in the world.

Views shared will include what it REALLY takes to hack and then defend some of the most secured networks and applications around today under the guidance and support of a world renowned expert in Advanced Pen Testing.

Start Date End Date City/State Event
May 19, 2012 March 21, 2012 Washington, DC EC Council Summit
May 5, 2012 May 7, 2012 Dallas, TX TakeDownCon
June 4, 2012 June 6, 2012 Boston, MA EC Council Summit
June 11, 2012 June 13, 2012 San Antonio, TX EC Council Summit
August 20, 2012 August 22, 2012 San Jose, CA EC Council Summit
August 25, 2012 August 28, 2012 Baltimore, MD TakeDownCon
October 26, 2012 October 28, 2012 Miami, FL Hacker Halted
December 1, 2012 December 4, 2012 Las Vegas, NV TakeDownCon


CAST 612 – Advanced Mobile Hacking & Forensics [3 days]

 

Digital Mobile Forensics is fast becoming a lucrative and constantly evolving field, this is no surprise as the mobile phone industry has been witnessing some unimaginable growth, some experts say it may even replace the Computer for those only wishing to send and receive emails. As this area of digital forensics grow in scope and size due to the prevalence and proliferation of mobile devices and as the use of these devices grows, more evidence and information important to investigations will be found on them. To ignore examining these devices would be negligent and result in incomplete investigations. This growth has now presented new and growing career opportunities for interested practitioners in corporate, enforcement, and military settings. Mobile forensics is certainly here to stay as every mobile device is different and different results will occur based on that device requiring unique expertise. This course was put together focusing on what today’s Mobile Forensics practitioner requires, some of the advanced areas this course will be covering are the intricacies of manual Acquisition (physical vs. logical) & advanced analysis using reverse engineering , understanding how the popular Mobile OSs are hardened to defend against common attacks and exploits.


Start Date End Date City/State Event
May 19, 2012 March 21, 2012 Washington, DC EC Council Summit
June 4, 2012 June 6, 2012 Boston, MA EC Council Summit
June 11, 2012 June 13, 2012 San Antonio, TX EC Council Summit
August 20, 2012 August 22, 2012 San Jose, CA EC Council Summit
August 25, 2012 August 28, 2012 Baltimore, MD TakeDownCon
October 22, 2012 October 28, 2012 Miami, FL Hacker Halted
October 1, 2012 December 4, 2012 Las Vegas, NV TakeDownCon



CAST 614 – Advanced Network Defense [3 days]

 

With this course you can be among the few who transcend the old idea of the hacker having all the fun, take pride being the defender, form an offensive mindset to skillfully orchestrate robust and solid defenses and reinvent popular belief by beating the hacker at his own game.
 
You will be evaluating advanced “hacks” and methods of defense fortification bringing you closer to establishing perfect security by reviewing best practices and methodologies you can apply to secure environments, provide segmentation and isolation to reduce the effectiveness of the Advanced Persistent Threat.
 
The course will cover fundamental areas of fortifying your defenses; you will discover methods of developing a secure baseline and how to “harden” your enterprise architectures from the most advanced attacks. Once a strategy for a fortified perimeter is defined the course moves on to defending against the sophisticated malware that is on the rise today and the importance of “live” memory analysis and real time monitoring.


Start Date End Date City/State Event
May 19, 2012 March 21, 2012 Washington, DC EC Council Summit
June 4, 2012 June 6, 2012 Boston, MA EC Council Summit
June 11, 2012 June 13, 2012 San Antonio, TX EC Council Summit
August 20, 2012 August 22, 2012 San Jose, CA EC Council Summit
August 25, 2012 August 28, 2012 Baltimore, MD TakeDownCon
October 22, 2012 October 28, 2012 Miami, FL Hacker Halted
October 1, 2012 December 4, 2012 Las Vegas, NV TakeDownCon



CAST 615 – Cryptography Deep Dive [3 days]

 

Cryptography Deep Dive: This is an in depth examination of the field of cryptography.  All modern security, at some level, depends on cryptography.  Whether it is using SSL to secure bank transactions, encrypting e-commerce purchases, or encrypting a hard drive, encryption is key to security.  

This course explores, in depth, the science of cryptography teaching students the history of cryptography, modern cryptographic methods, and how to use techniques like cryptanalysis to break cryptography. The course also covers closely related topics such as hashing and digital certificates.

This course is appropriate for security professionals who want to understand encryption on a deep level, and for those who may need to learn techniques to break encryption.


Start Date End Date City/State Event
May 5, 2012 March 21, 2012 Washington, DC EC Council Summit
June 4, 2012 June 6, 2012 Boston, MA EC Council Summit
June 11, 2012 June 13, 2012 San Antonio, TX EC Council Summit
August 20, 2012 August 22, 2012 San Jose, CA EC Council Summit
August 25, 2012 August 28, 2012 Baltimore, MD TakeDownCon
October 22, 2012 October 28, 2012 Miami, FL Hacker Halted
October 1, 2012 December 4, 2012 Las Vegas, NV TakeDownCon



Wireless & Bluetooth Hacking 101 [2 days]

 

Wireless networks are continually growing in our modern world and society. This 2 day course aims to demystify wireless network security and inform attendees on how to improve wireless LAN security and Bluetooth security. This will be achieved via theory and practical. Attendees will first obtain detailed theoretical analysis of different wireless security schemas (i.e. Theory), thereafter have hands on experience in how the attacks are performed (i.e. Practical).

Start Date End Date City/State Event
October 23, 2012 October 24, 2012 Miami, FL Hacker Halted



SAP Security In Depth [2 days]

 

Have you ever wondered whether your business-critical SAP implementation was secure? Do you know how to check it? Have you imagined which could be the impact of an attack to your core business platform? Do you know how to prevent it? This training is the answer to these questions.

For many years, SAP security has been a synonym of "segregation of duties" or "securing roles and profiles". While this kind of security is mandatory and of absolute importance, there are many threats that have been so far overlooked and are even more dangerous, such as the possibility of taking remote control of the entire SAP landscape without having any user in any system.

This training will help you to fill this knowledge gap, allowing you to understand the involved threats and risks and how to mitigate them. You will review the whole picture, from the security of the Environment and the SAP application-level gateways (SAP router, Web dispatcher), through the assessment and hardening of the Operating Systems and Databases and their interaction with the SAP systems up to the security of the SAP Application Layer: Authentication, User security, Password Policies, Authorization subsystem, Interface Security, Web applications Security, Backdoors, ABAP (in)security, Auditing, Monitoring and more!

The training is organized with many hands-on exercises, which will help you grasp practical knowledge quickly. You will learn how to assess the security of an SAP implementation and then secure the critical security gaps you discovered. You will be able to learn how to use different SAP security tools, as well as Biz ploit, the first open source ERP Penetration Testing framework, developed by the instructors.

The training also provides a quick introduction to basic SAP concepts, which allows non-SAP security professionals to follow the course smoothly.


Start Date End Date City/State Event
October 23, 2012 October 24, 2012 Miami, FL Hacker Halted



Certified Information Systems Security Professional (CISSP)

 

If you plan to build a career in information security – one of today’s most visible professions – and if you have at least five full years of experience in information security, then the CISSP® credential should be your next career goal. It’s the credential for professionals who develop policies and procedures in information security.

The CISSP was the first credential in the field of information security, accredited by the ANSI (American National Standards Institute) to ISO (International Organization for Standardization) Standard 17024:2003. CISSP certification is not only an objective measure of excellence, but a globally recognized standard of achievement.


Start Date End Date City/State Event
October 23, 2012 October 24, 2012 Miami, FL Hacker Halted



Crimeware Attribution [2 days]

 

It is more important to understand the 'who' and 'why' behind any intrusion within your enterprise. Tracking down and pursuing threats in a manner as to better understand and characterize their level of threat. In this course you will walk through numerous criminal groups and their various skill levels, capabilities, motivation, and resources. You will walk away with not only additional knowledge of criminal groups, but their capabilities, crime ware families, criminal tools, and how to trace back the threat to determine their level of capabilities. This course will also cover some tools and tactics any security professional or intelligence analyst can use to engage specific threats that are targeted in nature. These skills are right from the team who co-authored the content in the upcoming book "Trade craft: Countering Cyber Espionage and Advanced Cyber Threats" published by McGraw-Hill Professional Press.

Start Date End Date City/State Event
October 23, 2012 October 23, 2012 Miami, FL Hacker Halted



The Web Application Hacker’s Handbook 2nd Edition Live - [3 days]

 

Get direct hands-on hacking experience with the new 2nd Edition of the Web Application Hacker’s Handbook (WAHH)!

This course is a practical opportunity to take the skills and theory taught in the book to the next level, experimenting with all of the tools and techniques against numerous vulnerable web applications and labs, under the guidance the book’s authors.
  • How to quickly and efficiently pinpoint and exploit vulnerabilities in web applications
  • How to hack using LDAP, XPath, SOAP, HTTP Parameter Pollution (HPP), and HPI
  • Real-world, 2011 techniques in SQL Injection against Oracle, MySQL and MSSQL
  • The real risk: how to turn XSS/CSRF vulnerabilities into full account compromise
  • Harnessing new technologies such as HTML5, NoSQL, and Ajax
  • New attack types and techniques: Bit Flipping, Padding Oracle, Automated Access Control checking
  • How to immediately recognise and exploit Logic Flaws

Start Date End Date City/State Event
TBD TBD RBD TBD



PMP (Project Management Professional)

 

PMP (Project Management Professional) training and certification boot camp will prepare you to earn the credential in the most important industry-recognized certification for project managers. Globally recognized and demanded, the PMP® demonstrates that you have the experience, education and competency to successfully lead and direct projects.


Start Date End Date City/State Event
October 21, 2012 October 24, 2012 Miami, FL Hacker Halted



Training Inquiry