Events for week of 17-02-2020

This Week Navigation

Loading Events
Mon 17th
Tue 18th

Partner Event

February 18 @ 08:00 - 17:00 MST

Training Mission: DB Dump via FTP Exploit

February 18 @ 12:00 - 16:00 EST

Advanced Cybersecurity Essentials

February 18 @ 13:00 - 17:00 EST
Wed 19th

Training Mission: Java Send Mail

February 19 @ 12:00 - 14:00 EST

Advanced Incident Response, Forensics and Threat Hunting

February 19 @ 13:00 - 17:00 EST
Thu 20th

Private Tour

February 20 @ 09:00 - 10:00 MST

Training Mission: Trojan Share PE

February 20 @ 12:00 - 14:00 EST

Penetration Testing and Ethical Hacking

February 20 @ 13:00 - 17:00 EST
Fri 21st

Mobile Device Security and Ethical Hacking

February 21 @ 13:00 - 17:00 EST
Sat 22nd
No Events Today
Sun 23rd
No Events Today

Loading Events

← Back to Events

Virtual

February 2020

Training Mission: Trojan Share PE

February 20 @ 12:00 - 14:00 EST
|Recurring Event (See all)

One event on 20-02-2020 at 12:00

One event on 26-03-2020 at 12:00

$349.00

This scenario begins with a phishing attack where an unsuspecting employee receives an Trojan-infected email for a legitimate source. The Trojan is executed with user privileges, motivating the attacker to determine a path to privilege escalation. In this complex attack, participants will use advanced detection and prevention techniques to mitigate the scenario before significant data is exfiltrated from the environment.

Find out more »

Penetration Testing and Ethical Hacking

February 20 @ 13:00 - 17:00 EST
|Recurring Event (See all)

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 16-04-2020

$5900.00

In this advanced network and penetration testing lab based course, students will utilize a comprehensive cyber range to learn advanced pentesting methodologies to build on proper planning and, scoping, reconnaissance, scanning, exploitation techniques. Students will build their own Kali Linux and Metasploit instance and learn advanced functions to learn the tools and concepts of attacking a “real-world” network designed with specific vulnerabilities with the Cloud Range Cyber Range. This lab based, purpose built environment assists students in exercising attack skills…

Find out more »

Mobile Device Security and Ethical Hacking

February 21 @ 13:00 - 17:00 EST
|Recurring Event (See all)

An event every week that begins at 13:00 on Friday, repeating until 10-04-2020

An event every week that begins at 13:00 on Friday, repeating until 10-04-2020

An event every week that begins at 13:00 on Friday, repeating until 10-04-2020

$5900.00

In this course, students will learn the fundamentals of mobile security to evaluate the security weaknesses of built-in and third party applications, bypass platform encryption and manipulate apps to circumvent client side controls. Students will leverage automated and manual mobile application analysis tools to identify deficiencies in mobile traffic, file storage and inter-app channels. Using the knowledge learned in Network penetration techniques, students will deploy a mobile based environment within the Cloud Range Cyber Range and use hands-on exercises leveraging…

Find out more »

Introduction to Cybersecurity Concepts and Techniques

February 24 @ 13:00 - 17:00 EST
|Recurring Event (See all)

An event every week that begins at 13:00 on Monday, repeating until 13-04-2020

An event every week that begins at 13:00 on Monday, repeating until 13-04-2020

An event every week that begins at 13:00 on Monday, repeating until 13-04-2020

$5900.00

This introduction to the field of computing and cyber security will give trainees an extensive overview of the various branches of computing security. They will learn cyber security concepts, issues, and tools that are critical in solving problems in the computing security domain. Students will have the opportunity to learn essential techniques in building and protecting systems and network infrastructures, analyzing and monitoring potential threats and attacks, devising and implementing security solutions for organizations large or small.

Find out more »

Training Mission: WPAD Man in the Middle

February 25 @ 12:00 - 16:00 EST
|Recurring Event (See all)

One event on 21-01-2020 at 12:00

One event on 25-02-2020 at 12:00

One event on 31-03-2020 at 12:00

$349.00

In this scenario, a Man-in-the-Middle (MiTM) attack is executed on the network where the attacker impersonates a legitimate proxy in the segment in order to deceive victim hosts. In this complex scenario, participants will use advanced detection and prevention techniques to mitigate the scenario before significant data is exfiltrated from the environment, leaving the organization in a more vulnerable position.

Find out more »

Advanced Cybersecurity Essentials

February 25 @ 13:00 - 17:00 EST
|Recurring Event (See all)

An event every week that begins at 13:00 on Tuesday, repeating until 14-04-2020

An event every week that begins at 13:00 on Tuesday, repeating until 14-04-2020

An event every week that begins at 13:00 on Tuesday, repeating until 14-04-2020

$5900

In this course, students will be guided through a series of laboratories and experiments in order to explore various mechanisms to learn penetration testing, vulnerability analysis and exploit techniques utilizing common attack frameworks and tools against wired, wireless, web and social engineering examples. They will utilize the Cloud Range in both hands-on exercises and to reinforce these concepts. They will undertake a more advanced approach in recognizing attack within internal and external systems by identifying traffic flows and irregular traffic…

Find out more »

Advanced Incident Response, Forensics and Threat Hunting

February 26 @ 13:00 - 17:00 EST
|Recurring Event (See all)

An event every week that begins at 13:00 on Wednesday, repeating until 15-04-2020

An event every week that begins at 13:00 on Wednesday, repeating until 15-04-2020

An event every week that begins at 13:00 on Wednesday, repeating until 15-04-2020

$5900.00

Digital forensics involves the investigation of computer-related crimes with the goal of obtaining evidence to be presented in a court of law. In this course, participants will learn the principles and techniques for digital forensics investigation and the spectrum of available computer forensics tools. Participants will learn about core forensics procedures to ensure court admissibility of evidence, as well as the legal and ethical implications. Participants will learn how to perform a forensic investigation on both Unix/Linux and Windows systems…

Find out more »

Penetration Testing and Ethical Hacking

February 27 @ 13:00 - 17:00 EST
|Recurring Event (See all)

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 16-04-2020

$5900.00

In this advanced network and penetration testing lab based course, students will utilize a comprehensive cyber range to learn advanced pentesting methodologies to build on proper planning and, scoping, reconnaissance, scanning, exploitation techniques. Students will build their own Kali Linux and Metasploit instance and learn advanced functions to learn the tools and concepts of attacking a “real-world” network designed with specific vulnerabilities with the Cloud Range Cyber Range. This lab based, purpose built environment assists students in exercising attack skills…

Find out more »

Mobile Device Security and Ethical Hacking

February 28 @ 13:00 - 17:00 EST
|Recurring Event (See all)

An event every week that begins at 13:00 on Friday, repeating until 10-04-2020

An event every week that begins at 13:00 on Friday, repeating until 10-04-2020

An event every week that begins at 13:00 on Friday, repeating until 10-04-2020

$5900.00

In this course, students will learn the fundamentals of mobile security to evaluate the security weaknesses of built-in and third party applications, bypass platform encryption and manipulate apps to circumvent client side controls. Students will leverage automated and manual mobile application analysis tools to identify deficiencies in mobile traffic, file storage and inter-app channels. Using the knowledge learned in Network penetration techniques, students will deploy a mobile based environment within the Cloud Range Cyber Range and use hands-on exercises leveraging…

Find out more »

March 2020

Introduction to Cybersecurity Concepts and Techniques

March 2 @ 13:00 - 17:00 EST
|Recurring Event (See all)

An event every week that begins at 13:00 on Monday, repeating until 13-04-2020

An event every week that begins at 13:00 on Monday, repeating until 13-04-2020

An event every week that begins at 13:00 on Monday, repeating until 13-04-2020

$5900.00

This introduction to the field of computing and cyber security will give trainees an extensive overview of the various branches of computing security. They will learn cyber security concepts, issues, and tools that are critical in solving problems in the computing security domain. Students will have the opportunity to learn essential techniques in building and protecting systems and network infrastructures, analyzing and monitoring potential threats and attacks, devising and implementing security solutions for organizations large or small.

Find out more »

Advanced Cybersecurity Essentials

March 3 @ 13:00 - 17:00 EST
|Recurring Event (See all)

An event every week that begins at 13:00 on Tuesday, repeating until 14-04-2020

An event every week that begins at 13:00 on Tuesday, repeating until 14-04-2020

An event every week that begins at 13:00 on Tuesday, repeating until 14-04-2020

$5900

In this course, students will be guided through a series of laboratories and experiments in order to explore various mechanisms to learn penetration testing, vulnerability analysis and exploit techniques utilizing common attack frameworks and tools against wired, wireless, web and social engineering examples. They will utilize the Cloud Range in both hands-on exercises and to reinforce these concepts. They will undertake a more advanced approach in recognizing attack within internal and external systems by identifying traffic flows and irregular traffic…

Find out more »

Training Mission: Web Defacement + DDOS SYN Flood

March 4 @ 12:00 - 16:00 EST
|Recurring Event (See all)

One event on 11-12-2019 at 12:00

One event on 29-01-2020 at 12:00

One event on 04-03-2020 at 12:00

$349.00

In the Web Defacement scenario, an attack using brute-force techniques is launched against the SSH daemon on an Apache web server. The attacker, upon successful breach of credentials, defaces the website with their own “hacked “version prior to detection. Participants must first identify and subsequently stop the attacker from taking further actions and correct the defacement in order to maintain the company’s image.

Find out more »

Advanced Incident Response, Forensics and Threat Hunting

March 4 @ 13:00 - 17:00 EST
|Recurring Event (See all)

An event every week that begins at 13:00 on Wednesday, repeating until 15-04-2020

An event every week that begins at 13:00 on Wednesday, repeating until 15-04-2020

An event every week that begins at 13:00 on Wednesday, repeating until 15-04-2020

$5900.00

Digital forensics involves the investigation of computer-related crimes with the goal of obtaining evidence to be presented in a court of law. In this course, participants will learn the principles and techniques for digital forensics investigation and the spectrum of available computer forensics tools. Participants will learn about core forensics procedures to ensure court admissibility of evidence, as well as the legal and ethical implications. Participants will learn how to perform a forensic investigation on both Unix/Linux and Windows systems…

Find out more »

Training Mission: SQL Injection

March 5 @ 12:00 - 14:00 EST
|Recurring Event (See all)

One event on 05-03-2020 at 12:00

One event on 05-03-2020 at 12:00

One event on 05-03-2020 at 12:00

$349.00

In this scenario, a series of security flaws pertaining to a public web server under your control enables the attacker to exploit the system using SQL injection exploitation techniques. The successful nefarious activities of the attacker pivot to internal systems, extract privileged information and interfere with business processes. Participants will learn to identify the attack through SQL, Firewall and SIEM log analytics and implement controls to block additional data exfiltration, lateral movement and protect the organization from future malicious activity.

Find out more »

Penetration Testing and Ethical Hacking

March 5 @ 13:00 - 17:00 EST
|Recurring Event (See all)

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 16-04-2020

$5900.00

In this advanced network and penetration testing lab based course, students will utilize a comprehensive cyber range to learn advanced pentesting methodologies to build on proper planning and, scoping, reconnaissance, scanning, exploitation techniques. Students will build their own Kali Linux and Metasploit instance and learn advanced functions to learn the tools and concepts of attacking a “real-world” network designed with specific vulnerabilities with the Cloud Range Cyber Range. This lab based, purpose built environment assists students in exercising attack skills…

Find out more »

Mobile Device Security and Ethical Hacking

March 6 @ 13:00 - 17:00 EST
|Recurring Event (See all)

An event every week that begins at 13:00 on Friday, repeating until 10-04-2020

An event every week that begins at 13:00 on Friday, repeating until 10-04-2020

An event every week that begins at 13:00 on Friday, repeating until 10-04-2020

$5900.00

In this course, students will learn the fundamentals of mobile security to evaluate the security weaknesses of built-in and third party applications, bypass platform encryption and manipulate apps to circumvent client side controls. Students will leverage automated and manual mobile application analysis tools to identify deficiencies in mobile traffic, file storage and inter-app channels. Using the knowledge learned in Network penetration techniques, students will deploy a mobile based environment within the Cloud Range Cyber Range and use hands-on exercises leveraging…

Find out more »

Introduction to Cybersecurity Concepts and Techniques

March 9 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Monday, repeating until 13-04-2020

An event every week that begins at 13:00 on Monday, repeating until 13-04-2020

An event every week that begins at 13:00 on Monday, repeating until 13-04-2020

$5900.00

This introduction to the field of computing and cyber security will give trainees an extensive overview of the various branches of computing security. They will learn cyber security concepts, issues, and tools that are critical in solving problems in the computing security domain. Students will have the opportunity to learn essential techniques in building and protecting systems and network infrastructures, analyzing and monitoring potential threats and attacks, devising and implementing security solutions for organizations large or small.

Find out more »

Training Mission: Apache Shutdown

March 10 @ 12:00 - 14:00 EDT
|Recurring Event (See all)

One event on 20-02-2020 at 12:00

One event on 20-02-2020 at 12:00

One event on 20-02-2020 at 12:00

$349 20 tickets left

Targeting a known public web server, this scenario emulates an attack on an Apache web server where the attacker uses a Secure Shell (SSH) brute-force attack to gain access to the system. Participants are confronted with a disruption to critical business components and must act swiftly in order to maintain up-time and to mitigate the attack. Participants will learn to detect the attack through the analysis of apache log files, linux system commands and forensics as well as understanding the…

Find out more »

Advanced Cybersecurity Essentials

March 10 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Tuesday, repeating until 14-04-2020

An event every week that begins at 13:00 on Tuesday, repeating until 14-04-2020

An event every week that begins at 13:00 on Tuesday, repeating until 14-04-2020

$5900

In this course, students will be guided through a series of laboratories and experiments in order to explore various mechanisms to learn penetration testing, vulnerability analysis and exploit techniques utilizing common attack frameworks and tools against wired, wireless, web and social engineering examples. They will utilize the Cloud Range in both hands-on exercises and to reinforce these concepts. They will undertake a more advanced approach in recognizing attack within internal and external systems by identifying traffic flows and irregular traffic…

Find out more »

Training Mission: Trojan Data Leak

March 11 @ 12:00 - 16:00 EDT
|Recurring Event (See all)

One event on 18-12-2019 at 12:00

One event on 05-02-2020 at 12:00

One event on 11-03-2020 at 12:00

$349.00

In this scenario, the system sends an infected e-mail with a link to a Trojan executable. When the executable is opened, a Trojan is installed and performs a local search of secret files and sends them to the attacker by e-mail. Participants experience first-hand the entire attack chain of a successful spear-phishing campaign demonstrating a real-world example of system compromise and exfiltration of sensitive information referencing examples of high-profile attacks when spear-phishing was used include the attack on RSA, HBGary…

Find out more »

Advanced Incident Response, Forensics and Threat Hunting

March 11 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Wednesday, repeating until 15-04-2020

An event every week that begins at 13:00 on Wednesday, repeating until 15-04-2020

An event every week that begins at 13:00 on Wednesday, repeating until 15-04-2020

$5900.00

Digital forensics involves the investigation of computer-related crimes with the goal of obtaining evidence to be presented in a court of law. In this course, participants will learn the principles and techniques for digital forensics investigation and the spectrum of available computer forensics tools. Participants will learn about core forensics procedures to ensure court admissibility of evidence, as well as the legal and ethical implications. Participants will learn how to perform a forensic investigation on both Unix/Linux and Windows systems…

Find out more »

Training Mission: Killer Trojan

March 12 @ 12:00 - 14:00 EDT
|Recurring Event (See all)

One event on 19-12-2019 at 12:00

One event on 06-02-2020 at 12:00

One event on 12-03-2020 at 12:00

$349.00

In this scenario, a Trojan-infected CD-ROM has been inserted into a Windows Machine where the malware is auto-run and loaded from the device. Once inside, the malicious Trojan connects back to a Command and Control server where commands to steal secret files and important user information are executed. Participants will learn to detect and contain the malicious outbreak in order to control further spreading of the infected files, mitigate the data exfiltration, and confirm that the outbreak has been contained.

Find out more »

Penetration Testing and Ethical Hacking

March 12 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 16-04-2020

$5900.00

In this advanced network and penetration testing lab based course, students will utilize a comprehensive cyber range to learn advanced pentesting methodologies to build on proper planning and, scoping, reconnaissance, scanning, exploitation techniques. Students will build their own Kali Linux and Metasploit instance and learn advanced functions to learn the tools and concepts of attacking a “real-world” network designed with specific vulnerabilities with the Cloud Range Cyber Range. This lab based, purpose built environment assists students in exercising attack skills…

Find out more »

Penetration Testing and Ethical Hacking

March 12 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 16-04-2020

$5900.00

In this advanced network and penetration testing lab based course, students will utilize a comprehensive cyber range to learn advanced pentesting methodologies to build on proper planning and, scoping, reconnaissance, scanning, exploitation techniques. Students will build their own Kali Linux and Metasploit instance and learn advanced functions to learn the tools and concepts of attacking a “real-world” network designed with specific vulnerabilities with the Cloud Range Cyber Range. This lab based, purpose built environment assists students in exercising attack skills…

Find out more »

Mobile Device Security and Ethical Hacking

March 13 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Friday, repeating until 10-04-2020

An event every week that begins at 13:00 on Friday, repeating until 10-04-2020

An event every week that begins at 13:00 on Friday, repeating until 10-04-2020

$5900.00

In this course, students will learn the fundamentals of mobile security to evaluate the security weaknesses of built-in and third party applications, bypass platform encryption and manipulate apps to circumvent client side controls. Students will leverage automated and manual mobile application analysis tools to identify deficiencies in mobile traffic, file storage and inter-app channels. Using the knowledge learned in Network penetration techniques, students will deploy a mobile based environment within the Cloud Range Cyber Range and use hands-on exercises leveraging…

Find out more »

Introduction to Cybersecurity Concepts and Techniques

March 16 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Monday, repeating until 13-04-2020

An event every week that begins at 13:00 on Monday, repeating until 13-04-2020

An event every week that begins at 13:00 on Monday, repeating until 13-04-2020

$5900.00

This introduction to the field of computing and cyber security will give trainees an extensive overview of the various branches of computing security. They will learn cyber security concepts, issues, and tools that are critical in solving problems in the computing security domain. Students will have the opportunity to learn essential techniques in building and protecting systems and network infrastructures, analyzing and monitoring potential threats and attacks, devising and implementing security solutions for organizations large or small.

Find out more »

Training Mission: Java NMS Kill

March 17 @ 12:00 - 16:00 EDT
|Recurring Event (See all)

One event on 07-01-2020 at 12:00

One event on 11-02-2020 at 12:00

One event on 17-03-2020 at 12:00

Free

The JAVA NMS scenario emulates a Watering-Hole attack in which the attacker sits and waits for the victim to perform the expected action of navigating to a known, infected website that contains a Trojan Horse. Participants will leverage advanced techniques in this complex attack to detect, analyze and stop the malicious code to minimize the attack surface and protect the organization from further compromise.

Find out more »

Advanced Cybersecurity Essentials

March 17 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Tuesday, repeating until 14-04-2020

An event every week that begins at 13:00 on Tuesday, repeating until 14-04-2020

An event every week that begins at 13:00 on Tuesday, repeating until 14-04-2020

$5900

In this course, students will be guided through a series of laboratories and experiments in order to explore various mechanisms to learn penetration testing, vulnerability analysis and exploit techniques utilizing common attack frameworks and tools against wired, wireless, web and social engineering examples. They will utilize the Cloud Range in both hands-on exercises and to reinforce these concepts. They will undertake a more advanced approach in recognizing attack within internal and external systems by identifying traffic flows and irregular traffic…

Find out more »

Training Mission: Ransomware

March 18 @ 12:00 - 14:00 EDT
|Recurring Event (See all)

One event on 08-01-2020 at 12:00

One event on 12-02-2020 at 12:00

One event on 18-03-2020 at 12:00

$349.00

In this scenario, an unsuspecting employee opens a legitimate looking email from a trusted source with an attached document, and the ominous message demands for the transfer of bitcoin to unlock their system. Within minutes of opening the attachment, the user’s system has been compromised. Participants must contain the incident and learn proper handling and response techniques in order to solve the case and save the organization from complete lockdown.

Find out more »

Advanced Incident Response, Forensics and Threat Hunting

March 18 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Wednesday, repeating until 15-04-2020

An event every week that begins at 13:00 on Wednesday, repeating until 15-04-2020

An event every week that begins at 13:00 on Wednesday, repeating until 15-04-2020

$5900.00

Digital forensics involves the investigation of computer-related crimes with the goal of obtaining evidence to be presented in a court of law. In this course, participants will learn the principles and techniques for digital forensics investigation and the spectrum of available computer forensics tools. Participants will learn about core forensics procedures to ensure court admissibility of evidence, as well as the legal and ethical implications. Participants will learn how to perform a forensic investigation on both Unix/Linux and Windows systems…

Find out more »

Training Mission: WMI Worm Attack

March 19 @ 12:00 - 14:00 EDT
|Recurring Event (See all)

One event on 20-02-2020 at 12:00

One event on 20-02-2020 at 12:00

One event on 20-02-2020 at 12:00

$349.00 20 tickets left

Participants in this scenario are faced firsthand with a worm outbreak in the internal network. Company-wide panic ensues as participants work quickly to analyze the attack flow, utilize forensic tools and perform basic malware analysis / reverse-engineering in order to mitigate the threat. The attack simulates the characteristics of a modern Bot-Net and focuses on developing the real time response capabilities of the trainees.

Find out more »

Penetration Testing and Ethical Hacking

March 19 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 16-04-2020

$5900.00

In this advanced network and penetration testing lab based course, students will utilize a comprehensive cyber range to learn advanced pentesting methodologies to build on proper planning and, scoping, reconnaissance, scanning, exploitation techniques. Students will build their own Kali Linux and Metasploit instance and learn advanced functions to learn the tools and concepts of attacking a “real-world” network designed with specific vulnerabilities with the Cloud Range Cyber Range. This lab based, purpose built environment assists students in exercising attack skills…

Find out more »

Penetration Testing and Ethical Hacking

March 19 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 16-04-2020

$5900.00

In this advanced network and penetration testing lab based course, students will utilize a comprehensive cyber range to learn advanced pentesting methodologies to build on proper planning and, scoping, reconnaissance, scanning, exploitation techniques. Students will build their own Kali Linux and Metasploit instance and learn advanced functions to learn the tools and concepts of attacking a “real-world” network designed with specific vulnerabilities with the Cloud Range Cyber Range. This lab based, purpose built environment assists students in exercising attack skills…

Find out more »

Mobile Device Security and Ethical Hacking

March 20 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Friday, repeating until 10-04-2020

An event every week that begins at 13:00 on Friday, repeating until 10-04-2020

An event every week that begins at 13:00 on Friday, repeating until 10-04-2020

$5900.00

In this course, students will learn the fundamentals of mobile security to evaluate the security weaknesses of built-in and third party applications, bypass platform encryption and manipulate apps to circumvent client side controls. Students will leverage automated and manual mobile application analysis tools to identify deficiencies in mobile traffic, file storage and inter-app channels. Using the knowledge learned in Network penetration techniques, students will deploy a mobile based environment within the Cloud Range Cyber Range and use hands-on exercises leveraging…

Find out more »

Introduction to Cybersecurity Concepts and Techniques

March 23 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

One event on 23-03-2020 at 13:00

One event on 23-03-2020 at 13:00

One event on 23-03-2020 at 13:00

$5900.00 20 tickets left

This introduction to the field of computing and cyber security will give trainees an extensive overview of the various branches of computing security. They will learn cyber security concepts, issues, and tools that are critical in solving problems in the computing security domain. Students will have the opportunity to learn essential techniques in building and protecting systems and network infrastructures, analyzing and monitoring potential threats and attacks, devising and implementing security solutions for organizations large or small.

Find out more »

Introduction to Cybersecurity Concepts and Techniques

March 23 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Monday, repeating until 13-04-2020

An event every week that begins at 13:00 on Monday, repeating until 13-04-2020

An event every week that begins at 13:00 on Monday, repeating until 13-04-2020

$5900.00

This introduction to the field of computing and cyber security will give trainees an extensive overview of the various branches of computing security. They will learn cyber security concepts, issues, and tools that are critical in solving problems in the computing security domain. Students will have the opportunity to learn essential techniques in building and protecting systems and network infrastructures, analyzing and monitoring potential threats and attacks, devising and implementing security solutions for organizations large or small.

Find out more »

Training Mission: DB Dump via FTP Exploit

March 24 @ 12:00 - 16:00 EDT
|Recurring Event (See all)

One event on 18-02-2020 at 12:00

One event on 24-03-2020 at 12:00

$349.00

This scenario demonstrates how a sophisticated attacker, using multiple methods of pivoting within the system, circumvents numerous security mechanisms allowing access to segments of the network that are otherwise unavailable. Participants will use advanced detection and prevention techniques to mitigate the scenario before significant data is exfiltrated from the environment.

Find out more »

Advanced Cybersecurity Essentials

March 24 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Tuesday, repeating until 14-04-2020

An event every week that begins at 13:00 on Tuesday, repeating until 14-04-2020

An event every week that begins at 13:00 on Tuesday, repeating until 14-04-2020

$5900

In this course, students will be guided through a series of laboratories and experiments in order to explore various mechanisms to learn penetration testing, vulnerability analysis and exploit techniques utilizing common attack frameworks and tools against wired, wireless, web and social engineering examples. They will utilize the Cloud Range in both hands-on exercises and to reinforce these concepts. They will undertake a more advanced approach in recognizing attack within internal and external systems by identifying traffic flows and irregular traffic…

Find out more »

Training Mission: Java Send Mail

March 25 @ 12:00 - 14:00 EDT
|Recurring Event (See all)

One event on 19-02-2020 at 12:00

One event on 25-03-2020 at 12:00

$349.00

Similar to Java NMS Kill, this scenario emulates a Watering-Hole attack in which the attacker sits and waits for the victim. The victim, having performed the expected action of navigating to a known, infected website enables the hacker to “eavesdrop” on all messages within the organization through the execution of a Trojan Horse. Participants will leverage their advanced analysis techniques in this complex attack to detect, analyze and stop the malicious code to minimize the attack surface and protect the…

Find out more »

Advanced Incident Response, Forensics and Threat Hunting

March 25 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Wednesday, repeating until 15-04-2020

An event every week that begins at 13:00 on Wednesday, repeating until 15-04-2020

An event every week that begins at 13:00 on Wednesday, repeating until 15-04-2020

$5900.00

Digital forensics involves the investigation of computer-related crimes with the goal of obtaining evidence to be presented in a court of law. In this course, participants will learn the principles and techniques for digital forensics investigation and the spectrum of available computer forensics tools. Participants will learn about core forensics procedures to ensure court admissibility of evidence, as well as the legal and ethical implications. Participants will learn how to perform a forensic investigation on both Unix/Linux and Windows systems…

Find out more »

Training Mission: Trojan Share PE

March 26 @ 12:00 - 14:00 EDT
|Recurring Event (See all)

One event on 20-02-2020 at 12:00

One event on 26-03-2020 at 12:00

$349.00

This scenario begins with a phishing attack where an unsuspecting employee receives an Trojan-infected email for a legitimate source. The Trojan is executed with user privileges, motivating the attacker to determine a path to privilege escalation. In this complex attack, participants will use advanced detection and prevention techniques to mitigate the scenario before significant data is exfiltrated from the environment.

Find out more »

Penetration Testing and Ethical Hacking

March 26 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 16-04-2020

$5900.00 20 tickets left

In this advanced network and penetration testing lab based course, students will utilize a comprehensive cyber range to learn advanced pentesting methodologies to build on proper planning and, scoping, reconnaissance, scanning, exploitation techniques. Students will build their own Kali Linux and Metasploit instance and learn advanced functions to learn the tools and concepts of attacking a “real-world” network designed with specific vulnerabilities with the Cloud Range Cyber Range. This lab based, purpose built environment assists students in exercising attack skills…

Find out more »

Penetration Testing and Ethical Hacking

March 26 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 16-04-2020

$5900.00

In this advanced network and penetration testing lab based course, students will utilize a comprehensive cyber range to learn advanced pentesting methodologies to build on proper planning and, scoping, reconnaissance, scanning, exploitation techniques. Students will build their own Kali Linux and Metasploit instance and learn advanced functions to learn the tools and concepts of attacking a “real-world” network designed with specific vulnerabilities with the Cloud Range Cyber Range. This lab based, purpose built environment assists students in exercising attack skills…

Find out more »

Penetration Testing and Ethical Hacking

March 26 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 16-04-2020

$5900.00

In this advanced network and penetration testing lab based course, students will utilize a comprehensive cyber range to learn advanced pentesting methodologies to build on proper planning and, scoping, reconnaissance, scanning, exploitation techniques. Students will build their own Kali Linux and Metasploit instance and learn advanced functions to learn the tools and concepts of attacking a “real-world” network designed with specific vulnerabilities with the Cloud Range Cyber Range. This lab based, purpose built environment assists students in exercising attack skills…

Find out more »

Mobile Device Security and Ethical Hacking

March 27 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Friday, repeating until 10-04-2020

An event every week that begins at 13:00 on Friday, repeating until 10-04-2020

An event every week that begins at 13:00 on Friday, repeating until 10-04-2020

$5900.00

In this course, students will learn the fundamentals of mobile security to evaluate the security weaknesses of built-in and third party applications, bypass platform encryption and manipulate apps to circumvent client side controls. Students will leverage automated and manual mobile application analysis tools to identify deficiencies in mobile traffic, file storage and inter-app channels. Using the knowledge learned in Network penetration techniques, students will deploy a mobile based environment within the Cloud Range Cyber Range and use hands-on exercises leveraging…

Find out more »

Introduction to Cybersecurity Concepts and Techniques

March 30 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Monday, repeating until 13-04-2020

An event every week that begins at 13:00 on Monday, repeating until 13-04-2020

An event every week that begins at 13:00 on Monday, repeating until 13-04-2020

$5900.00

This introduction to the field of computing and cyber security will give trainees an extensive overview of the various branches of computing security. They will learn cyber security concepts, issues, and tools that are critical in solving problems in the computing security domain. Students will have the opportunity to learn essential techniques in building and protecting systems and network infrastructures, analyzing and monitoring potential threats and attacks, devising and implementing security solutions for organizations large or small.

Find out more »

Training Mission: WPAD Man in the Middle

March 31 @ 12:00 - 16:00 EDT
|Recurring Event (See all)

One event on 21-01-2020 at 12:00

One event on 25-02-2020 at 12:00

One event on 31-03-2020 at 12:00

$349.00

In this scenario, a Man-in-the-Middle (MiTM) attack is executed on the network where the attacker impersonates a legitimate proxy in the segment in order to deceive victim hosts. In this complex scenario, participants will use advanced detection and prevention techniques to mitigate the scenario before significant data is exfiltrated from the environment, leaving the organization in a more vulnerable position.

Find out more »

Advanced Cybersecurity Essentials

March 31 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Tuesday, repeating until 14-04-2020

An event every week that begins at 13:00 on Tuesday, repeating until 14-04-2020

An event every week that begins at 13:00 on Tuesday, repeating until 14-04-2020

$5900

In this course, students will be guided through a series of laboratories and experiments in order to explore various mechanisms to learn penetration testing, vulnerability analysis and exploit techniques utilizing common attack frameworks and tools against wired, wireless, web and social engineering examples. They will utilize the Cloud Range in both hands-on exercises and to reinforce these concepts. They will undertake a more advanced approach in recognizing attack within internal and external systems by identifying traffic flows and irregular traffic…

Find out more »

April 2020

Advanced Incident Response, Forensics and Threat Hunting

April 1 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Wednesday, repeating until 15-04-2020

An event every week that begins at 13:00 on Wednesday, repeating until 15-04-2020

An event every week that begins at 13:00 on Wednesday, repeating until 15-04-2020

$5900.00

Digital forensics involves the investigation of computer-related crimes with the goal of obtaining evidence to be presented in a court of law. In this course, participants will learn the principles and techniques for digital forensics investigation and the spectrum of available computer forensics tools. Participants will learn about core forensics procedures to ensure court admissibility of evidence, as well as the legal and ethical implications. Participants will learn how to perform a forensic investigation on both Unix/Linux and Windows systems…

Find out more »

Penetration Testing and Ethical Hacking

April 2 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 16-04-2020

$5900.00

In this advanced network and penetration testing lab based course, students will utilize a comprehensive cyber range to learn advanced pentesting methodologies to build on proper planning and, scoping, reconnaissance, scanning, exploitation techniques. Students will build their own Kali Linux and Metasploit instance and learn advanced functions to learn the tools and concepts of attacking a “real-world” network designed with specific vulnerabilities with the Cloud Range Cyber Range. This lab based, purpose built environment assists students in exercising attack skills…

Find out more »

Penetration Testing and Ethical Hacking

April 2 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 16-04-2020

$5900.00

In this advanced network and penetration testing lab based course, students will utilize a comprehensive cyber range to learn advanced pentesting methodologies to build on proper planning and, scoping, reconnaissance, scanning, exploitation techniques. Students will build their own Kali Linux and Metasploit instance and learn advanced functions to learn the tools and concepts of attacking a “real-world” network designed with specific vulnerabilities with the Cloud Range Cyber Range. This lab based, purpose built environment assists students in exercising attack skills…

Find out more »

Penetration Testing and Ethical Hacking

April 2 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 16-04-2020

$5900.00

In this advanced network and penetration testing lab based course, students will utilize a comprehensive cyber range to learn advanced pentesting methodologies to build on proper planning and, scoping, reconnaissance, scanning, exploitation techniques. Students will build their own Kali Linux and Metasploit instance and learn advanced functions to learn the tools and concepts of attacking a “real-world” network designed with specific vulnerabilities with the Cloud Range Cyber Range. This lab based, purpose built environment assists students in exercising attack skills…

Find out more »

Mobile Device Security and Ethical Hacking

April 3 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Friday, repeating until 10-04-2020

An event every week that begins at 13:00 on Friday, repeating until 10-04-2020

An event every week that begins at 13:00 on Friday, repeating until 10-04-2020

$5900.00

In this course, students will learn the fundamentals of mobile security to evaluate the security weaknesses of built-in and third party applications, bypass platform encryption and manipulate apps to circumvent client side controls. Students will leverage automated and manual mobile application analysis tools to identify deficiencies in mobile traffic, file storage and inter-app channels. Using the knowledge learned in Network penetration techniques, students will deploy a mobile based environment within the Cloud Range Cyber Range and use hands-on exercises leveraging…

Find out more »

Introduction to Cybersecurity Concepts and Techniques

April 6 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Monday, repeating until 13-04-2020

An event every week that begins at 13:00 on Monday, repeating until 13-04-2020

An event every week that begins at 13:00 on Monday, repeating until 13-04-2020

$5900.00

This introduction to the field of computing and cyber security will give trainees an extensive overview of the various branches of computing security. They will learn cyber security concepts, issues, and tools that are critical in solving problems in the computing security domain. Students will have the opportunity to learn essential techniques in building and protecting systems and network infrastructures, analyzing and monitoring potential threats and attacks, devising and implementing security solutions for organizations large or small.

Find out more »

Advanced Cybersecurity Essentials

April 7 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Tuesday, repeating until 14-04-2020

An event every week that begins at 13:00 on Tuesday, repeating until 14-04-2020

An event every week that begins at 13:00 on Tuesday, repeating until 14-04-2020

$5900

In this course, students will be guided through a series of laboratories and experiments in order to explore various mechanisms to learn penetration testing, vulnerability analysis and exploit techniques utilizing common attack frameworks and tools against wired, wireless, web and social engineering examples. They will utilize the Cloud Range in both hands-on exercises and to reinforce these concepts. They will undertake a more advanced approach in recognizing attack within internal and external systems by identifying traffic flows and irregular traffic…

Find out more »

Advanced Incident Response, Forensics and Threat Hunting

April 8 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Wednesday, repeating until 15-04-2020

An event every week that begins at 13:00 on Wednesday, repeating until 15-04-2020

An event every week that begins at 13:00 on Wednesday, repeating until 15-04-2020

$5900.00

Digital forensics involves the investigation of computer-related crimes with the goal of obtaining evidence to be presented in a court of law. In this course, participants will learn the principles and techniques for digital forensics investigation and the spectrum of available computer forensics tools. Participants will learn about core forensics procedures to ensure court admissibility of evidence, as well as the legal and ethical implications. Participants will learn how to perform a forensic investigation on both Unix/Linux and Windows systems…

Find out more »

Penetration Testing and Ethical Hacking

April 9 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 16-04-2020

$5900.00

In this advanced network and penetration testing lab based course, students will utilize a comprehensive cyber range to learn advanced pentesting methodologies to build on proper planning and, scoping, reconnaissance, scanning, exploitation techniques. Students will build their own Kali Linux and Metasploit instance and learn advanced functions to learn the tools and concepts of attacking a “real-world” network designed with specific vulnerabilities with the Cloud Range Cyber Range. This lab based, purpose built environment assists students in exercising attack skills…

Find out more »

Penetration Testing and Ethical Hacking

April 9 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 16-04-2020

$5900.00

In this advanced network and penetration testing lab based course, students will utilize a comprehensive cyber range to learn advanced pentesting methodologies to build on proper planning and, scoping, reconnaissance, scanning, exploitation techniques. Students will build their own Kali Linux and Metasploit instance and learn advanced functions to learn the tools and concepts of attacking a “real-world” network designed with specific vulnerabilities with the Cloud Range Cyber Range. This lab based, purpose built environment assists students in exercising attack skills…

Find out more »

Penetration Testing and Ethical Hacking

April 9 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 16-04-2020

$5900.00

In this advanced network and penetration testing lab based course, students will utilize a comprehensive cyber range to learn advanced pentesting methodologies to build on proper planning and, scoping, reconnaissance, scanning, exploitation techniques. Students will build their own Kali Linux and Metasploit instance and learn advanced functions to learn the tools and concepts of attacking a “real-world” network designed with specific vulnerabilities with the Cloud Range Cyber Range. This lab based, purpose built environment assists students in exercising attack skills…

Find out more »

Mobile Device Security and Ethical Hacking

April 10 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Friday, repeating until 10-04-2020

An event every week that begins at 13:00 on Friday, repeating until 10-04-2020

An event every week that begins at 13:00 on Friday, repeating until 10-04-2020

$5900.00

In this course, students will learn the fundamentals of mobile security to evaluate the security weaknesses of built-in and third party applications, bypass platform encryption and manipulate apps to circumvent client side controls. Students will leverage automated and manual mobile application analysis tools to identify deficiencies in mobile traffic, file storage and inter-app channels. Using the knowledge learned in Network penetration techniques, students will deploy a mobile based environment within the Cloud Range Cyber Range and use hands-on exercises leveraging…

Find out more »

Introduction to Cybersecurity Concepts and Techniques

April 13 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Monday, repeating until 13-04-2020

An event every week that begins at 13:00 on Monday, repeating until 13-04-2020

An event every week that begins at 13:00 on Monday, repeating until 13-04-2020

$5900.00

This introduction to the field of computing and cyber security will give trainees an extensive overview of the various branches of computing security. They will learn cyber security concepts, issues, and tools that are critical in solving problems in the computing security domain. Students will have the opportunity to learn essential techniques in building and protecting systems and network infrastructures, analyzing and monitoring potential threats and attacks, devising and implementing security solutions for organizations large or small.

Find out more »

Advanced Cybersecurity Essentials

April 14 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Tuesday, repeating until 14-04-2020

An event every week that begins at 13:00 on Tuesday, repeating until 14-04-2020

An event every week that begins at 13:00 on Tuesday, repeating until 14-04-2020

$5900

In this course, students will be guided through a series of laboratories and experiments in order to explore various mechanisms to learn penetration testing, vulnerability analysis and exploit techniques utilizing common attack frameworks and tools against wired, wireless, web and social engineering examples. They will utilize the Cloud Range in both hands-on exercises and to reinforce these concepts. They will undertake a more advanced approach in recognizing attack within internal and external systems by identifying traffic flows and irregular traffic…

Find out more »

Advanced Incident Response, Forensics and Threat Hunting

April 15 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Wednesday, repeating until 15-04-2020

An event every week that begins at 13:00 on Wednesday, repeating until 15-04-2020

An event every week that begins at 13:00 on Wednesday, repeating until 15-04-2020

$5900.00 20 tickets left

Digital forensics involves the investigation of computer-related crimes with the goal of obtaining evidence to be presented in a court of law. In this course, participants will learn the principles and techniques for digital forensics investigation and the spectrum of available computer forensics tools. Participants will learn about core forensics procedures to ensure court admissibility of evidence, as well as the legal and ethical implications. Participants will learn how to perform a forensic investigation on both Unix/Linux and Windows systems…

Find out more »

Penetration Testing and Ethical Hacking

April 16 @ 13:00 - 17:00 EDT
|Recurring Event (See all)

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 09-04-2020

An event every week that begins at 13:00 on Thursday, repeating until 16-04-2020

$5900.00

In this advanced network and penetration testing lab based course, students will utilize a comprehensive cyber range to learn advanced pentesting methodologies to build on proper planning and, scoping, reconnaissance, scanning, exploitation techniques. Students will build their own Kali Linux and Metasploit instance and learn advanced functions to learn the tools and concepts of attacking a “real-world” network designed with specific vulnerabilities with the Cloud Range Cyber Range. This lab based, purpose built environment assists students in exercising attack skills…

Find out more »
+ Export Events