Printable Version | Subscribe | Add to Favourites
New Topic New Poll New Reply
Author: Subject: FREE Workshop to all IT MANAGERS who can drive to MANCHESTER.
jossey

posted on 17/1/11 at 04:23 PM Reply With Quote
FREE Workshop to all IT MANAGERS who can drive to MANCHESTER.

If you work for a company that does penetration testing this will be helpful for you.
We run this for our customers throughout the year.
Penetration Testing and Data leakage prevention Workshop. (25th March 2011)
You will get Bespoke tools to look for the common vulnerabilities and fix them to a Accredited standard. We will also give you FREE vulnerability assessments by our CHECK penetration testing team.

Throughout 2010, Sec-1 performed a number of Security Tests. Through carrying out these tests, Sec-1 uncovered a range of common vulnerabilities. This workshop presents a summary of the most common findings, including live demos of hacking techniques and defines remediation activities.
Workshop Content:

Top 5 Network Vulnerabilities
Measured by impact as well as prevalence of vulnerability, this list summarises the key
findings:
1. SQL Injection
2. Insecure (Administrative, Interfaces)
3. Persistent Cross Site Scripting
4. Insecure File Upload Vulnerabilities
5. Weak Passwords

Introduction

Understanding the threats to your network
Recent attack trends
Real world examples
Attacking the Network Perimeter
Understanding “Attack Surface”
A review of the top 5 remotely exploitable vulnerabilities
Finding, exploiting and preventing:
SQL Injection, Cross Site Scripting,
Insecure Administrative Interfaces,
File Upload and Host Configuration vulnerabilities
Live demonstration of common attack techniques
Using open source and free tools to discover flaws within your network perimeter
Defending the network perimeter Attacks from the Inside
A review of the top 5 network vulnerabilities
Live demonstration of common attack techniques
Gaining domain administrator control in 15 minutes
Using open source and free tools to identify and fix common vulnerabilities
Defensive strategies
Penetration Testing
Introduction to Penetration Testing
Commissioning a Penetration Test
What information to provide and
what to expect

There is 10 places left.


David Johnson
Davidj@sec-1.com
0113 2248094


[Edited on 17/1/11 by jossey]

[Edited on 17/1/11 by jossey]





Thanks



David Johnson

Building my tiger avon slowly but surely.

View User's Profile E-Mail User Visit User's Homepage View All Posts By User U2U Member

New Topic New Poll New Reply


go to top






Website design and SEO by Studio Montage

All content © 2001-16 LocostBuilders. Reproduction prohibited
Opinions expressed in public posts are those of the author and do not necessarily represent
the views of other users or any member of the LocostBuilders team.
Running XMB 1.8 Partagium [© 2002 XMB Group] on Apache under CentOS Linux
Founded, built and operated by ChrisW.