Advanced Network Defense
Come experience a comprehensively structured and fast paced program that immerses you into world of an ethical hacker, providing insights of their mindset; a critical weapon for defending against some of the most malicious attacks around.
With this course you can be among the few who transcend the old idea of the hacker having all the fun, take pride being the defender, form an offensive mindset to skillfully orchestrate robust and solid defenses and reinvent popular belief by beating the hacker at his own game.
You will be evaluating advanced hacking methods of defense fortification bringing you closer to establishing perfect security best practices and methodologies you can apply to secure environments. This course provides segmentation and isolation to reduce the effectiveness of the advanced persistent threats.
CAST 614 will cover fundamental areas of fortifying your defenses by discovering methods of developing a secure baseline and how to harden your enterprise architecture from the most advanced attacks. Once a strategy for a fortified perimeter is defined the course moves on to defending against the sophisticated malware that is on the rise today and the importance of live memory analysis and real time monitoring.
Mr. Kevin Cardwell spent 22 years in the U.S. Navy, during this time he tested and evaluated surveillance and weapon system software, some of this work was on projects like the Multi-Sensor Torpedo Alertment Processor (MSTRAP), Tactical Decision Support System (TDSS), Computer Aided Dead Reckoning Tracer (CADRT), Advanced Radar Periscope Discrimination and Detection (ARPDD), and the Remote Mine Hunting System (RMHS). He has worked as both software and systems engineer on a variety of Department of Defense projects and early on was chosen as a member of the project to bring Internet access to ships at sea. Following this highly successful project he was selected to head the team that built a Network Operations Center (NOC) that provided services to the commands ashore and ships at sea in the Norwegian Sea and Atlantic Ocean. He served as the Leading Chief of Information Security at the NOC for six years prior to retiring from the U.S. Navy. During this time, he was the leader of a 5 person Red Team that had a 100% success rate at compromising systems and networks.
Mr. Cardwell currently works as a free-lance consultant and provides consulting services for companies throughout the world, and as an advisor to numerous government entities within the US and UK. He is an instructor, technical editor and author for computer forensics, and hacking courses. He is technical editor of the Learning Tree Course Ethical Hacking and Countermeasures and Computer Forensics. He is author of the Controlling Network Access course. He has presented at Blackhat USA Conferences. He is a contributing author to the Computer Hacking Forensics Investigator V3 Study Guide and The Best Damn Cybercrime and Digital Forensics Book Period. He is a Certified Ethical Hacker (CEH), Certified Security analyst (E|CSA), Qualified Penetration Tester (QPT), Certified in Handheld Forensics, Computer Hacking Forensic Investigator (CHFI) and Live Computer Forensics Expert (LCFE), and holds a BS in Computer Science from National University in California and a MS in Software Engineering from the Southern Methodist University (SMU) in Texas. His current research projects are in Computer Forensic evidence collection on “live” systems, Professional Security Testing and Advanced Rootkit technologies. He developed the Strategy and Training Development Plan for the first Government CERT in the country of Oman, he serves as a professional training consultant to the Oman Information Technology Authority, and is currently developing the team to man the first Commercial Security Operations Center in the country of Oman.
Students completing this course will gain an in-depth knowledge in the following areas:
- Staging a strong defense against popular security threats
- Fortifying your organization with a good foundation of risk protection methods
- Applying latest references and guidance on best practices in the field of cyber security
- Securing your enterprise architecture from a medium threat level and building towards more sophisticated threats
How will this course benefit you?
- Executing a set of techniques that are critical to the protection of your entire enterprise against some of today’s most advanced threats
- Reviewing methods of system deployments in as secure a state as possible while supporting your daily business requirements
- Applying necessary techniques required for malware identification throughout the enterprise even in the case of the malware not being detectable by any of your security controls
- Staging Advanced Attacks to appreciate methods of correctly eliminating or mitigating risk to an acceptable level
Firewall administrators, system architects, system administrators, windows admin or those responsible for or interested in:
- Identifying security weaknesses in computer systems or networks
- Exposing weaknesses for system’s owners to fix breaches before being targets of compromise
- Applying hacking and pen testing constructively to defend against various possible attacks
- Analysing best practices in developing secure system and network configurations
- Establishing a secure baseline in deploying machines in a protected state
- Appreciating popular attack methods applied by hackers in order to fortify their systems
From practically any organization that handles important data would find this course beneficial, examples are:
- Government agencies
- Banking and Financial institutions
- Brokerage and Trading firms
- Scientific institutions & research agencies
- Computer design firms
- Consulting firms
- Science and Engineering firms
- Those involved with online related businesses & transactions
- Card related businesses
NOTE: This is definitely not a beginner’s course; participants will be expected to possess the knowledge of attempting attacks against a variety of platforms and architectures under the supervision of an expert. Ideally, the student will be CEH, ECSA or hold equivalent industry experience
CAST on-site provides personalized advanced security courses to meet the needs of an individual or company that are planning to ensure maximum flexibility in terms of logistics, dates and cost issues. Our certified expert trainers are experienced instructors and highly knowledgeable in their respective fields. CAST on-site prides itself on strict quality control principles at all times to ensure that clients receive the highest standard of training and service. On-Site training is designed to add great value to your work force by increasing staff efficiency and skills ensuring improved productivity and output that far exceeds the value of the initial training costs.
Key features of CAST On-site:
- Each of the courses selected from the CAST Advanced Training Suite will be specifically designed to meet the needs of each individual, based according to their current skills and pace of learning to meet your organization’s unique objectives and goals
- CAST On-site expert trainers will be flown to your premise of choice at a date most suitable to you
- CAST On-site allows students to receive training in more manageable sessions arranged over a few days allowing for greater absorption of knowledge with an opportunity to practice and verify the new skills after each session prior to commencing the next one.
- With CAST On-site Advanced Security courses students will be able to take advantage of directly conversing with the instructor in matters unique to the student and your organization.
- You can be rest assured that all challenges and objectives pertaining to your organization’s goals can be discussed in an environment that ensures complete confidentiality.
- Each individual client receives the required high level of training that is benchmarked to international best practices and standards
- Each student receives CAST Advanced Security Training Courseware that allows them to follow and revise the material that has been taught to them
- Upon completion of the course, each student will receive a CAST On-Site Advanced Security Training certificate of attendance
To download CAST 614 printable brochure Please Click Here
We at CAST would like to hear from you
Inquire online about advanced security training programs if you have questions, comments or feedback for us, please send us a message using the form below or email us at [email protected] For more information and news updates, connect with us via social media or our mailing list. We look forward to hearing from you!
CAST General Enquiry Form
This solution is an asynchronous, self-study environment which delivers EC-Council’s sought after IT Security training courses in a streaming video format.
iWeek (Live Online)
This solution is a live, online, instructor-led training course which means you can attend a course with a live instructor from anywhere with an internet connection.
This solution offers you the opportunity to learn from world-class instructors and the opportunity to collaborate with top Infosecurity professionals.
Training Partner (In Person)
This solution offers “in-person” training so that you can get the benefit of collaborating with your peers and gaining real-world skills, conveniently located in your backyard.
EC-Council’s Official delivery platform includes your exam, iLabs (online labs) and gives you the most flexible options for training to fit your busy work schedule! With this option, you will not have to apply and prove 2 years IT Security experience to test.