Ultimate Hacking: Wireless Edition

Foundstone

Register Now // apr 12 - 13


Overview:

Why Do We Teach This Class?

Mission-critical data, secrets and other company information transmitted into the air cause hackers everywhere to rejoice!

Wireless networks bring unique challenges to those tasked with their defense. How confident are you that your wireless infrastructure can withstand the latest attacks by the world’s cleverest hackers? Do vendors’ claims tell the whole story? Where is your Achilles heel? Beyond the authorized wireless infrastructure you know exists in your organization, what about the wireless networks that aren’t supposed to be there? Do you know when an onsite vendor or consulting company tucked away in a forgotten conference room plugs in their mobile access point?

What about that temporary access point in a QA lab that is still there months later? What about the wireless clients themselves? Laptops, smart phones, printers, VoIP phones, HVAC systems, and even the remote controls in your executive board rooms are all using wireless technologies. Organizations may have a secured wireless infrastructure but find themselves in trouble when these untamed devices are coaxed into connecting to a clever hackers fake access point. Untamed devices that are jacked into your companies ethernet seeking essids like “linksys” are creating a bridge for attackers to get onto your internal network.

Foundstone’s internationally renowned, “Ultimate Hacking: Hands On” series goes wireless to help you see your wireless networks the way hackers see them. Learn the tools, techniques and methods attackers use against you in order to develop an effective defense against their increasingly sophisticated onslaught. Knowledge is power and you do not want the hackers to know more about your wireless networks than you do…

What Will You Learn:

Security vulnerabilities are an unfortunate, but unavoidable, part of today's computing systems. If exploited by internal or external users, these weaknesses can be catastrophic to your organization. Foundstone teaches step-by-step procedures for executing Internet, intranet, and host-level security reviews. This course is the definitive training for learning how to perform "tiger team" and attack and penetration assessments.

Foundstone instructors cover all the bases, presenting manual and scripted security-review techniques that go far beyond what automated analysis tools can do. You return to your organization with valuable knowledge, experience, and the ability to put your new skills into practice.

What Do I Get?

Foundstone provides everything you will need to maximize your learning experience (e.g. laptops, targets, course materials).

All you need to bring is the desire to learn! Added Bonus! You get to take home the tools you use during class as below!

  • A customized Live Linux distribution installed on a USB thumb drive for maximum portability, increased speed, and laptop battery life
  • Your notes, live capture files, and anything else you put on the USB drive during class!
  • Foundstone T-shirt and pen

Who Should Take This Class?

Anyone responsible for the planning, implementation, maintenance, or assessment of wireless networks.

What to bring:

Nothing to bring. All necessary equipment will be provided including preconfigured workstations, tools and utilities.

Trainer:

Foundstone's management team and selected staff are uniquely qualified to present this material, having performed hundreds of security assessments for Fortune 500 companies. Instructors have managed or directed the security-assessment teams at three of the Big 5 accounting firms, as well as amassed real-world experience ranging from the United States Air Force to Wall Street. Members of the instructor team authored the best-selling Hacking Exposed: Network Security Secrets & Solutions and write a weekly column for InfoWorld magazine. They are also frequent speakers at industry conferences such as NetWorld+Interop, Usenix, and the Black Hat Briefings.

Carric Dooley: In his role as a Principal Consultant at Foundstone, Carric has provided a variety of services for enterprise customers, including Internal and External Penetration Testing, Security Architecture Reviews, Wireless Assessments, Firewall Reviews, Product Reviews, and Risk Assessments.

Carric has participated heavily in shaping Foundstone’s service line offerings and methodologies for Internal Penetration Testing, External Penetration Testing, VoIP Assessment, Mobile Device Assessment, and Host Configuration Reviews. Additionally, Carric assisted with the creation of the Ultimate Hacking Wireless course presented at BlackHat 2007.

Carric has more than eleven years of experience assisting numerous Fortune 500 companies as well as city, county, state, and federal government entities with their information security initiatives. Carric’s primary experience is in security architecture, penetration testing, vulnerability assessments, and wireless assessments.

Carric recently rejoined Foundstone in the UK after working for Microsoft’s Information Security team. Prior to coming to Foundstone in 2005, Carric worked for Internet Security Systems (ISS) for five years as a Senior Consultant on the Global X-Force Professional Services team.

Carric is a contributing author to the book How to Break Web Software. He also administered the web servers for the Open Web Application Security Project (OWASP), and he participates heavily in the information security community. He has also been on staff for Blackhat (2005 – 2007), Defcon (2003 – 2007), Shmoocon, and Toorcon, and presented at Defcon XVI in 2007.


Register Button


Super Early:
Ends Feb 1

Early:
Ends Mar 1

Regular:
Ends Apr 1

Late:
Ends Apr 11

Onsite:

€1460

€1535

€1680

€1825

€2045