Would you like to learn about the actual malware that is targeting your networks? Would you like to know more about how your network is being attacked and how to mitigate the compromises your Anti-Virus (AV) is missing? How to obtain and create a signature to add to your AV within your organization and infrastructure devices? Would you like to know how researchers obtain their malware samples?

If yes, then this class is for you.

Honeynetting Training in Maryland, Washington D.C. or Northern Virginia

Advanced Security offers Honeynetting training at our two locations in the D.C. metro area: Greenbelt, MD and Ashburn, VA.

Delivery Style: 80% Hands-On, 20% Lecture

Learn to Use Honey netting to Track and Catch Hackers Who Target Your Network, Mitigate Zero-Day Attacks and Build Your Own Best-Fit Antivirus

Honey Pots, Honey Farms, and Honey Nets Training Course Cost: $2,995 Per Enrollment

This is an Advanced Security course. You must meet specific prerequisites in order to enroll in this course. Please speak to your account manager for more details.

Honeynetting Training Schedule

All Times Listed in Eastern Standard Time (EST)

For information related to scheduling, please fill out the information request form to the right.

Custom Training For Your Organization

Does your organization have special training needs? Let us know! We'll put together a customized training course proposal targeted to the specific needs of your staff. Select your ideal start-date, your location preference and your equipment requests and we will gladly compose a training plan for your company quickly and free of any obligation.

Custom Computer Training Inquiry Form
 

Topics & Concepts Covered in Honey Pots, Honey Farms, and Honey Nets Include:

  • What honeypots are
  • What they are for
  • The different types (a general overview, but the class will focus primarily on the research variants)
  • How to target a particular bot and what is required to do so
  • How hackers detect them and common things they do once the honeypot is detected
  • How to process the data collected
  • How to share the data collected

Recommended Training Audience and Prerequisites

There is no firm prerequisite for this course. However, the more understanding of Networking, Programming (Python, C++, KMD’s), Hacking, Penetration Testing, Ethical Hacking, Exploits (how they work), encryption, MD5/SHA-1/Whirlpool Hashes, Linux/Windows and Forensic Investigation you have the more you will get out of this class.