1 / 10

Module 1 Introduction - HIPT

Presented by Heorot.net. Module 1 Introduction - HIPT. Objectives. Your instructor Course material Structure of the course Individual Penetration Test Effort (PTE). Your Instructor. Job Experience 15 years in Information Security U.S. Army (M.I.) Signals Intelligence Analyst

jirair
Download Presentation

Module 1 Introduction - HIPT

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Presented by Heorot.net Module 1Introduction - HIPT

  2. Objectives • Your instructor • Course material • Structure of the course • Individual Penetration Test Effort (PTE)

  3. Your Instructor • Job Experience • 15 years in Information Security • U.S. Army (M.I.) • Signals Intelligence Analyst • Cryptanalyst • Russian Linguist • Information Security Officer • 2+ Years Penetration Testing • Fortune 50 company • Penetration Testing / Risk Assessments

  4. Your Instructor • Education • Masters of Science in Computer Science • Concentration: Computer Security • Masters of Science in Management • Concentration: Information Security • PhD Student– Information Technology • Concentration: Information Security

  5. Your Instructor • Certifications • ISSMP – Information Systems Security Management Professional • CISSP – Certified Information Systems Security Professional • SCSECA – Sun Certified Security Administrator • SCNA – Sun Certified Network Administrator • SCSA – Sun Certified System Administrator • IAM – Information Assurance Methodology

  6. Your Instructor • Publications • 2007 • “Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research” • “Penetration Tester's Open Source Toolkit, Volume 2” • 2008 • “Netcat Power Tools” • Hakin9 Magazine – 3/2008 issue • Conventions • DefCon 15 • PhreakNIC 10

  7. Course Material • Modules • Video • PowerPoint Slides • Documents • OSSTMM • LiveCDs • Practice Disks • PTE Disks (2) • Hands-On Exercises • WebGoat • DamnVulnerableLinux • De-ICE.net Disks

  8. Course Structure • Modules • Very relaxed method of delivery • No script • Low emphasis on specific tools • OSSTMM • Special Topics • Hands-On Exercises • Chat Sessions • Email • Wiki

  9. Penetration Test Effort • Required for HIPT Certification • Individual PenTest of disks 2.101 & 2.102 • Disks are meant to be run at the same time • Customer Report • I am the customer • Some material will be provided • Must follow report template • Must use OSSTTM template(s) • Spelling is graded (!?!?) • Pass/Fail

  10. Conclusions • Your instructor • Course material • Structure of the course • Individual Penetration Test Effort (PTE)

More Related