Mobile Security Toolkit Workshop - Ethical Hacking Video: https://youtu.be/6ikIAce7zrg
In this course, you will learn the procedures to use a virtual bridge and connect to a physical network. How to run virtual software and bridge it to your Storm device as well as how to isolate the Storm with the bridge. Configure secure remote access, and connect from the Internet and do your assessments from your backyard with no airport security checks! You will learn methods of protocol analysis to identify intrusions. How to identify weaknesses and vectors of attack for both wired and wireless networks using the device. The hacking and penetration testing methodology will be conducted using the device as the main attack platform to gain access to the network and machines that you have targeted. In the course, you will perform against a set of targets using the device and knowledge learned from the course.
Outline: Module 01: Technical Introduction to the Storm platform Module 02: Network Security Threats, Vulnerabilities, and Attacks Module 03: Network Traffic Monitoring and Analysis Module 04: Network Risk and Vulnerability Management Module 05 Hacking Concepts, Types, and Phases Module 06: Exploring the Hacking Methodology Module 07: Wireless Network Threats and Attack What is the Mobile Security Tool Kit?
EC-Council’s Mobile Security Toolkit (Better known as the STORM!) is a fully-loaded pen-test platform which comes equipped with a customized distro ...
401 7th Ave New York, NY 10001 HACK NYC 2018 events@magegroupe.comIn this course, you will learn the procedures to use a virtual bridge and connect to a physical network. How to run virtual software and bridge it to your Storm device as well as how to isolate the Storm with the bridge. Configure secure remote access, and connect from the Internet and do your assessments from your backyard with no airport security checks! You will learn methods of protocol analysis to identify intrusions. How to identify weaknesses and vectors of attack for both wired and wireless networks using the device. The hacking and penetration testing methodology will be conducted using the device as the main attack platform to gain access to the network and machines that you have targeted. In the course, you will perform against a set of targets using the device and knowledge learned from the course.
EC-Council’s Mobile Security Toolkit (Better known as the STORM!) is a fully-loaded pen-test platform which comes equipped with a customized distro of Kali loaded onto a portable Raspberry Pi-based touchscreen device. EC-Council rolled out the STORM as a mobile tool to enhance our certification course offerings by giving online asynchronous students a mobile training option. In this option, the video lectures are loaded directly onto the STORM.
Code of Conduct | Press Releases |
Get Involved | Report ISSUE / BUG |
Tickets |
The Critical Infrastructure Association of America, Inc. is a 501(c)6 Not for Profit. The mission of Critical Infrastructure Association of America is to create a membership-based, trade association of like-minded cybersecurity and closely related industry professionals that work in the field of cybersecurity. The goal is to share best practices, establish and maintain high operational standards and to educate and interact with those in the cybersecurity community within public, private and governmental sectors.