 |

Training
Michel Blomgren has developed a 5 day training program called the Advanced
Ethical Hacking Course. The course has been held for participants from one
of Malaysia's leading IT security companies - their opinion was very positive.
Participants will learn the following:
- Information Gathering
- Vulnerability Scanning
- Penetration Testing and Penetration Testing methodologies
- Exploitation of "buffer overflow" vulnerabilities
- Exploitation of web application vulnerabilities
- Introduction to x86 assembly programming
- Introduction to shellcodes and how to write shellcode
- How to write an "exploit"
- How to avoid detection by a Network Intrusion Detection System (NIDS)
- Hacking strategies and tactics
- Backdoors and encryption
- How established and acknowledged standards can help you
- Open Source Security Testing Methodology Manual (OSSTMM)
- NIST SP 800-42
- ISO/IEC 17799
You will learn how shellcodes work in practice and how to write your
own exploits in order to take advantage of buffer overflow
vulnerabilities. For more detailed information, please read the PDF
Introduction to Shellcoding,
which is the literature for Hacking In Depth - the part of the course that
treat shellcode and exploits.
The course may be experienced as quite demanding, but we guarantee that when
you leave the class room you will be well equipped to combat the computer
security issues today and tomorrow. More information about this course and
other courses will be published soon.
Seminars
If you don't feel like sitting down on the school bench we offer a somewhat
controversial, but interesting seminar. You will get a lot of detailed
information about how criminal hacking is carried out in the wild in form
of practical demonstrations, but also how we as professional hackers conduct
Penetration Tests, Vulnerability Assessments and the benefit of these
services.
Contact michel.blomgren tigerteam.se for more
information.
|  |
|
 |