KEVIN CARDWELL. Q/SA (Qualified Security Analyst) Penetration Tester. & Optional Q/PTL (Qualified Penetration Licence) Workshop

Download (0)

Full text





(Qualified Security Analyst)

& Optional



(Qualified Penetration Licence) Workshop

Penetration Tester

MAY 18-22, 2009








Penetration Tester & opzional Q/PTL


The Q/SA Qualified/ Security Analyst Penetration Tester class is security analysis, Penetration Testing, Vulne-rability Testing, with tactical security skills certificationlabs. Over 40 Penetration Testing, shredding Web apps, & privilege escalation labs. No where will you get a more intense hands-on class in Penetration Testing and se-curity analysis! You earn a Sese-curity University Q/SA Certification and (Optional) Q/PTL Penetration Tester Li-cense that validates your skills. The Q/SA class has been considered the best Penetration Testing skills certifi-cation that validates you to be a Qualified Security Analyst Penetration Tester. Daily you learn “how to test” & “how to report” network vulnerabilities and exploit bad code. Daily live labs where you practice shredding appli-cations & exploiting vulnerabilities. The only way to get a Q/PTL Qualified Penetration License is to EARN one, not buy one. The Optional Q/PTL is 3 hours after Q/SA class ends each day (Tuesday – Thursday from 5.30 p.m until 8.30 p.m). You’ll practice how to gain access to unauthorized information with current exploitation tools and processes. Not just learn the tactical business skills necessary to perform valid vuln security testing re-gardless of the target. The Q/PTL workshop validates your Penetration Testing and security analysis tactical skills you learned in the Q/SA class. To achieve your Q/PTL Qualified/ Penetration Tester License you must perform a Penetration Test with a fully detailed management report to earn your Q/PTL License from Security University (due 7 days after class). Compliance requirements aside, penetration testing is an absolutely critical aspect of any security program. Attackers test every company’s defenses every day. An organization either knows what the bad guys are going to find, or it doesn’t. If you don’t, it’s not a matter of if, it’s a matter of when. Great pen-testers think like hackers. They use the same tools and techniques, only they tend to be much more comprehensive in their testing of attack scenarios.


• System and Network Administrators • Security Personnel

• Auditors

• Consultants concerned with network security • Threat Management Team

• Software Programmers • Forensic Experts

Class Completion

Q/SA Qualified/ Security Analyst Penetration Tester class will provide you with valuable skills and information, including:

• Latest exploit goals and methodologies

• Understanding the mind set needed to perform Penetration Testing • Advanced information-gathering techniques

• Expert network discovery tools and techniques

• Identifying & exploiting network weaknesses with Core Impact and more tools • Advanced enumeration of network devices, platforms and protocols

• Cracking contemporary authentication and authorization • Advanced router, firewall and IDS testing\Exploiting IPS

• Vulnerability research and automated scanning in the Enterprise • Scanning for root kits, trojans, malware and viruses

• Tools for Web application testing - Watchfire and freeware tools • Exploiting complex protocols, such as SSH, SSL, and IPSEC • Using payload generators

• Advanced wireless testing tools and techniques • Penetration Testing of “Wetware”

• Penetration Testing and the law

You’ll learn how to gather viable data on your network’s vulnerabilities using leading edge tools like Nessus, NeWT and NeVO vulnerability detection tools, MetaSploit, SaintScanner and Exploit, SOLARWINDS, NMAP, App Detective for Web attacks and the latest in exploit tools, CORE IMPACT from Core Security.




Penetration concepts you will master during this hands on class

• Attacking network infrastructure devices • Hacking by brute forcing remotely • Security testing methodologies

• Security exploit testing with IMPACT from Core Security • Stealthy network recon

• Remote root vulnerability exploitation • Multi-OS banner grabbing

• Privilege escalation hacking • Unauthorized data extraction

• Breaking IP-based ACLs via spoofing • Evidence removal and anti-forensics • Hacking Web Applications

• Breaking into databases with SQL Injection • Cross Site Scripting hacking

• Remote access trojan hacking • Offensive sniffing

• Justifying a Penetration Test to management and customers • Defensive techniques

Instructor-led hands-on lab exercises

• Capture the Flag hacking exercises • Abusing DNS for host identification

• Leaking system information from Unix and Windows • Stealthy Recon

• Unix, Windows and Cisco password cracking

• Remote buffer overflow exploit lab I - Stack mashing • Remote heap overflow exploit lab - Beyond the Stack • Desktop exploitation

• Remote keylogging

• Data mining authentication information from clear-text protocols • Remote sniffing

• Malicious event log editing

• Transferring files through firewalls • Hacking into Cisco routers

• Harvesting Web application data


Phase I – Gather the Data

A first look at a network site, from the eyes of a potential hacker. The simple, and often overlooked, things that tell hackers if a site is worth a penetration attempt.

Phase II – Penetrate the Network

How hackers get past the security and into the data

• Non-intrusive target search • Intrusive target search • Data analysis

Network Discovery Tools and Te-chniques: Hands-On Exercises • Discovery/profiling objectives • Locating Internet connections • Host-locating techniques:

ma-nual and automated

• Operating system footprinting • Evaluating Windows and

Unix-based network discovery softwa-re tools

• Evaluating Windows and Unix-based application scanning software tools

• Review Step-by-step process of each scanning and profiling tool • Directory services: DNS, DHCP,


• Look-up services: finger, whois, search engines

• Remote sessions: telnet, “r” commands, X-Windows • File sharing and messaging:

FTP, TFTP, World Wide Web • Windows Server Message Block

(SMB), Network File • Systems (NFS), and e-mail • Sample exploits using common

TCP/IP and NetBIOS utility software

The Q/SA & Q/PTL materials ad-dress common pitfalls in Penetra-tion Testing and ethical hacking projects, with real-world targets and to maximize the quality of test results. Daily capture the flag exer-cises increase your tactical skills.

Learn timesaving tactics based on years of tactical security experien-ces from real penetration testers and ethical hackers defeating a problem in minutes

We stress the mind-set of succes-sful Penetration Testers and ethi-cal hackers and balance skills with “outside-the-box” thinking, a Pe-netration methodology that stands the test of time and carefully wei-ghing risks, and creating a quality final report for management You analyze how Penetration Te-sting and ethical hacking fits into a comprehensive information secu-rity & assurance program

Phase III – Analyze the Results

Tips and techniques for effective, actionable penetration test analysis • Identifying network services • Pinpointing vulnerabilities

• Demonstrating risks and escala-ting permissions

• Reviewing reports and screens from prominent discovery/profi-ling tools

• Analyzing current configuration Real-World Scenarios

• Abusive e-mail • Embezzlement • Pornography • Denial-of-service • Web defacement • Trojan Horse

Phase IV – Write the Report

How to combine methodology, re-sults, and analysis into a report that generates management at-tention and buy-in… and provides clear, workable action items.

In-Class Exercises for your Q/PTL®Validation “Qualification”

• Building and maintaining a target list

• Conducting multiple non-intrusi-ve and intrusinon-intrusi-ve target searches • Tools and techniques for testing

for Web site vulnerabilities • Probing and attacking network


• Performing multiple remote tar-get assessment

• Performing multiple host asses-sment

• Writing up the final report

The Q/PTL®is the Most

Presti-gious Qualification for Security Analyst Penetration Testing Professionals

We wrote the book on Penetration Testing. 9 years ago Security Uni-versity started training security Professionals with the very best penetration step by step methodo-logy class, 9 years later we still are and have the leading Pen Testing Certification in the industry. Over 40 + labs and Security University Q/SA®class is only

CNSS-appro-ved Security Analyst Penetration Tester class.

Now you can take the same Pene-tration Testing Methodology class that the US Air Force, Army, Navy and Marines trained to defend mi-litary networks. Your class is tau-ght by SSME (Security Subject Matter Experts) who know the “Art of Penetration Testing & Hacking”. You’ll gain serious tactical security skills that will set you apart from your peers.




Rome May 18-22, 2009

Visconti Palace Hotel - Via Federico Cesi, 37 Registration fee: €2500


Rome May 19-21, 2009

Visconti Palace Hotel - Via Federico Cesi, 37 Registration fee: €1200



first name ...

surname ...

job title ...

organisation ...

address ...

postcode ...

city ...

country ...

telephone ...

fax ...

e-mail ...


Send your registration form with the receipt of the payment to: Technology Transfer S.r.l.

Piazza Cavour, 3 - 00193 Rome (Italy) Tel. +39-06-6832227 - Fax +39-06-6871102 Stamp and signature




Q/SA®Penetration Tester




Both Classes


The fee includes all seminar documentation, luncheon and coffee breaks.


Visconti Palace Hotel Via Federico Cesi, 37 Rome (Italy)

SEMINAR TIMETABLE 9.30 am - 1.00 pm 2.00 pm - 5.00 pm


You must send the registration form with the receipt of the payment to:

TECHNOLOGY TRANSFER S.r.l. Piazza Cavour, 3 - 00193 Rome (Italy) Fax +39-06-6871102

within May 4, 2009

PAYMENT Wire transfer to:

Technology Transfer S.r.l. Banca Intesa Sanpaolo S.p.A. Agenzia 6787 di Roma Iban Code:

IT 34 Y 03069 05039 048890270110


If a company registers 5 participants to the same seminar, it will pay only for 4. Those who benefit of this discount are not entitled to other discounts for the same seminar.


The participants who will register 30 days before the seminar are entitled to a 5% discount.


A full refund is given for any cancellation received more than 15 days before the seminar starts. Cancellations less than 15 days prior the event are liable for 50% of the fee. Cancellations less than one week prior to the event date will be liable for the full fee.


In the case of cancellation of an event for any reason, Technology Transfer’s liability is limited to the return of the registration fee only.

If registered participants are unable to attend, or in case of cancellation of the seminar, the general conditions mentioned before are applicable.




Kevin Cardwell, spent 22 years in the U.S. Navy. He has worked as both software and systems engineer on a variety of Department of Defense projects and was selected to head the team that built a Network Operations Center (NOC) that provided services to the command ashore and ships at sea in the Norwegian Sea and Atlantic Ocean. Mr. Cardwell served as the Leading Chief of Information Security at the NOC for six years prior to retiring from the U.S. Navy. He currently works as a free-lance consultant and provides consulting services for companies throughout the US, UK and Europe.




Related subjects : security analyst