This course meets the standards of highly skilled security professionals by providing a comprehensive set of ethical hacking and network security skills, tools and methodologies.
Participants will begin by understanding how perimeter defenses work and will be guided into scanning and attacking their own networks (no real network is harmed). They will then learn how intruders escalate privileges and what steps can be taken to secure their organization’s system.
Participants will also gain in-depth knowledge on intrusion detection, policy creation, social engineering, Distributed Denial-of-Service (DDoS) attacks, buffer overflows and virus creation.
This course will prepare all participants wishing to take the EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.
Participants will be provided laptops and immersed into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. This lab intensive environment gives each participant the opportunity to gain in-depth knowledge and practical experience with the current essential security systems.
Each participant will have access to their own workstation and will be given exercises to practice penetration testing and create simple malware-type samples. They will also work in teams to create scenarios for the use of social engineering.
IT professionals, security professionals, auditors, site administrators, general management and anyone tasked with managing and protecting the integrity of the network infrastructure. This also includes anyone already familiar and involved with IT/Cyber/Digital Security and seeking to build on their fundamental principles of security. This course will also prepare professionals wishing to take the EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.
This course’s mission is to educate, introduce and demonstrate hacking tools for penetration testing purposes only. Participants are requested to remain ethical and to ensure the newly acquired skills are not used for illegal or malicious attacks and/or to compromise any computer system
John has over 30 years of IT experience in the areas of Cyber Security, Cloud Security, Cloud Architecture, Cyber Attack Detection, Incident Response and Ethical Hacking.
John is also a Certified Information Systems Security Professional (CISSP), a Certified Ethical Hacker (CEH) and a Microsoft Certified Systems Engineer (MCSE) with over 25 years’ experience with networks and 15 years’ experience as a Developer.
John is a Cyber Security Consultant for Boeing where he worked for the past 13 years involved with their Windows Security Team, the Enterprise VPN access, Boeing/NASA collaboration project, and the Cyber Security Operations Centers for US & foreign governments. He also developed and delivered custom Cyber Security training to Boeing’s IT security teams. During that time, he was awarded a US patent for the design of VPN integration for the Electronic Flight Bag project, (VPN software and architecture for devices on-board the airplane that downloads weather and flight plan information from airline networks)