Baltimore, MD (PRWEB) May 9, 2010
Security Consultant and Trainer Joe McCray has been hacking into the Department of Defense (DoD), Federal Agencies, Financial Institutions, and other big companies for years - legally of course. He's a Penetration Tester, a term used to describe a computer security consultant that hacks into companies in order to demonstrate security weaknesses. He helps companies identify and fix vulnerabilities that could lead to catastrophic security breaches - he routinely gains access to thousands of bank accounts, credit card numbers, social security numbers, and company trade secrets.
Because of Joe's unique experience penetration testing DoD, Federal Agencies, Financial Institutions, and other large companies he is frequently sought out as a trainer. People want to know how he consistently bypasses common IT Security mechanisms such as Firewalls, Anti-Virus, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Network Access Control (NAC), Web Application Firewalls (WAF), etc.
Joe has recently developed a course to teach IT and IT Security professionals how hackers break into systems and bypass these common security mechanisms. There are lots of courses on the market that claim to do this. Joe says, "I developed the Advanced Penetration Testing course because there were too many security courses out there that are written and taught by people that haven't actually been pentesters. These teachers are reading word for word from old computer security books and teaching the students hacks that are ten years old. That kind of teaching is fine if you just want to introduce someone to our field and raise awareness, but it does nothing to help people working in the DoD, Federal Agencies, Financial Institutions, and other large companies secure critical systems from attack. "
Advanced Penetration Testing (APT): Pentesting High Security Environments is a course that focuses on attacking and defending highly secured environments such as 3-letter agencies, DoD, financial organizations, federal organizations, and large companies. This course that can be taken as either a five-day course, or a two-day workshop at a security conference.
This is not your normal Ethical Hacking course. This is not a "death by powerpoint" course. You won't be attacking unpatched Windows 2000 Servers, and you won't be learning a bunch of outdated tools like most Ethical Hacking courses.
In APT, you will be learning how to attack new operating systems such as Windows Vista, Windows 7, Windows Server 2008, and the latest Linux servers. All of these servers will be patched, and hardened. Both Network and Host-based Intrusion Detection/Preventions systems (IDS/IPS) will be in place as well.
The course starts with attacking heavily protected environments from the outside and dealing with things like Load Balancing, Deep Packet Inspection, and Network-Based IDS/IPS. Next is attacking web applications and dealing with common application security measures in PHP/ASP.NET, and Web Application Firewalls. Then the course moves on to attacking from the LAN, dealing with NAC solutions, locked down workstations/GPOs, and Host-Based IDS/IPS. Then finally the last section of the course covers gaining control of Active Directory.
This course can be taken at the following locations/events:
Academy of Computer Education in Greenbelt, MD 17 - 21 May 2010 (5-Day Course)
TechnoSecurity Conference in Myrtle Beach, SC June 9 - 10, 2010 (2-Day Workshop)
Black Hat Security Conference Las Vegas, NV July 26-27 (2-Day Workshop)
BruCON Security Conference Brussels, Belgium 22-23 September (2-Day Workshop)
Joe McCray can also be contacted directly at:
Toll Free: 1-866-892-2132
# # #