Due to the exceptional interest in our July 16 session, we'd like to offer a second session of the Ethical Hacking Attack Phases training! Same content and trainer as last time.
The Middle Tennessee chapters of ISACA and ISSA will be hosting the EC-Council as they provide a full day training on hacking methodologies and attack vectors for systems, web applications, wireless networks, and mobile platforms. Based on the CEH Hacking Methodology, you will be instructed in key concepts, techniques, and tools as well as benefit from four interactive labs. Attendance is limited to 30, so register now and don’t miss out!
An overview of the workshop as provided by EC-Council is as follows:
Session One: System Hacking
- Overview of CEH Hacking Methodology
- Understanding Techniques to Gain Access to the System
- Understanding Privilege Escalation Techniques
- Understanding Techniques to Create and Maintain
- Remote Access to the System
- Overview of Different Types of Rootkits
- Overview of Steganography and Steganalysis Techniques
- Understanding Techniques to Hide the Evidence of Compromise
- Overview of System Hacking Penetration Testing
- Lab: System Hacking
Session Two: Hacking Web Applications
- Understanding Web Application Threats
- Understanding Web Application Hacking Methodology
- Web Application Hacking Tools
- Web Application Security Tools
- Overview of Web Application Penetration Testing
- Lab: Web Applications
Session Three: Hacking Wireless Networks
- Understanding Wireless Encryption Algorithms
- Understanding Wireless Threats
- Understanding Wireless Hacking Methodology
- Wireless Hacking Tools
- Understanding Bluetooth Hacking Techniques
- Wireless Security Tools
- Overview of Wireless Penetration Testing
- Lab: Hacking Wireless Networks
Session Four: Hacking Mobile Platforms
- Understanding Mobile Platform Attack Vectors
- Understanding various Android Threats and Attacks
- Understanding various iOS Threats and Attacks
- Mobile Security Guidelines and Security Tools
- Overview of Mobile Penetration Testing
- Lab: Hacking Mobile Networks
Speaker: Moderator: Kevin King (EC-Council), CEI, CEH, CND
Date/Time: Thursday, October 8, 2020 from 8:00AM to 5:00PM
PLEASE NOTE: A webinar link will be provide by EC-Council prior to the event. This event will be hosted from their platform.
CPE: Up to 8 Hours of (non-NASBA accredited) CPE credit will be issued to attendees
PLEASE NOTE: As this workshop is not NASBA accredited, CPE from this event cannot count towards the CPE requirements of the CPA certification; however, this CPE can be applied to ISACA certifications and potentially other certifications, depending on their requirements.
Attendance Cap and Subsequent Event: This event is limited to 30 attendees, but if sufficient interest is generated a second workshop will be offered.
The Middle Tennessee Chapter of ISACA is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.NASBARegistry.org.
Chapter Event Policy: See the Chapter website for complete details on the Chapter's event policies.
After studying at New Mexico Tech in the mid 90s, Kevin came into the tech world as a technical instructor for New Horizons Computer Learning Centers. Throughout his illustrious teaching career, Kevin has taught thousands of students in universities as well as major corporations through Instructor-led in-person and live, online delivery. He has held many certifications including CCENT, CCNA, CCNA Data Center, CCSI, MCT, MCSE, MCSE Private Cloud, MCSA. He has completed projects with companies from Baxter Healthcare and Charles Schwab to small Internet Startups and small businesses.
Since joining EC-Council in the Spring of 2017 Kevin has become a Certified EC-Council Instructor (CEI) and has earned his certifications in the Certified Ethical Hacking (CEH), Certified Network Defender (CND), EC-Council Certified Security Analyst courses and has delivered dozens of these courses including EC-Council’s Mobile Security Tool Kit workshops at a plethora of third-party cons.