Identify - "Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities." 401 7th Ave New York, NY 10001 TRAINING
May 09, 2018 10:00 AM - 04:00 PM(America/New_York)
20180509T1000 20180509T1600 America/New_York STORM Ethical Hacking Course - 2 day

Mobile Security Toolkit Workshop - Ethical Hacking Video: https://youtu.be/6ikIAce7zrg  

In this course, you will learn the procedures to use a virtual bridge and connect to a physical network.  How to run virtual software and bridge it to your Storm device as well as how to isolate the Storm with the bridge. Configure secure remote access, and connect from the Internet and do your assessments from your backyard with no airport security checks! You will learn methods of protocol analysis to identify intrusions. How to identify weaknesses and vectors of attack for both wired and wireless networks using the device. The hacking and penetration testing methodology will be conducted using the device as the main attack platform to gain access to the network and machines that you have targeted. In the course, you will perform against a  set of targets using the device and knowledge learned from the course.

 

Outline: Module 01: Technical Introduction to the Storm platform Module 02: Network Security Threats, Vulnerabilities, and Attacks Module 03: Network Traffic Monitoring and Analysis  Module 04: Network Risk and Vulnerability Management Module 05  Hacking Concepts, Types, and Phases Module 06: Exploring the Hacking Methodology Module 07: Wireless Network Threats and Attack What is the Mobile Security Tool Kit?

EC-Council’s Mobile Security Toolkit (Better known as the STORM!) is a fully-loaded pen-test platform which comes equipped with a customized distro ...

401 7th Ave New York, NY 10001 HACK NYC 2018 events@magegroupe.com
5 attendees saved this session
Mobile Security Toolkit Workshop - Ethical Hacking
 

In this course, you will learn the procedures to use a virtual bridge and connect to a physical network.  How to run virtual software and bridge it to your Storm device as well as how to isolate the Storm with the bridge. Configure secure remote access, and connect from the Internet and do your assessments from your backyard with no airport security checks! You will learn methods of protocol analysis to identify intrusions. How to identify weaknesses and vectors of attack for both wired and wireless networks using the device. The hacking and penetration testing methodology will be conducted using the device as the main attack platform to gain access to the network and machines that you have targeted. In the course, you will perform against a  set of targets using the device and knowledge learned from the course.

 

Outline:
  • Module 01: Technical Introduction to the Storm platform
  • Module 02: Network Security Threats, Vulnerabilities, and Attacks
  • Module 03: Network Traffic Monitoring and Analysis 
  • Module 04: Network Risk and Vulnerability Management
  • Module 05  Hacking Concepts, Types, and Phases
  • Module 06: Exploring the Hacking Methodology
  • Module 07: Wireless Network Threats and Attack
What is the Mobile Security Tool Kit?

EC-Council’s Mobile Security Toolkit (Better known as the STORM!) is a fully-loaded pen-test platform which comes equipped with a customized distro of Kali loaded onto a portable Raspberry Pi-based touchscreen device. EC-Council rolled out the STORM as a mobile tool to enhance our certification course offerings by giving online asynchronous students a mobile training option. In this option, the video lectures are loaded directly onto the STORM.

Workshop Fees Include:
  •  Keyboard
  •  Carry case
  • STORM T-shirt
  • STORM Sticker
  • Access to the STORM Resource Center (Video Demos, Support, ISO Image Download)
Trainer
,
EC-Council
Moderators public profile is disabled.
Attendees public profile is disabled.
Upcoming Sessions
300 visits

FAQ

 Code of Conduct  Press Releases
 Get Involved   Report ISSUE / BUG
Tickets  

The Critical Infrastructure Association of America, Inc. is a 501(c)6 Not for Profit. The mission of Critical Infrastructure Association of America is to create a membership-based, trade association of like-minded cybersecurity and closely related industry professionals that work in the field of cybersecurity. The goal is to share best practices, establish and maintain high operational standards and to educate and interact with those in the cybersecurity community within public, private and governmental sectors.