Would you like to learn about the actual malware that is targeting your networks? Would you like to know more about how your network is being attacked and how to mitigate the compromises your Anti-Virus (AV) is missing? How to obtain and create a signature to add to your AV within your organization and infrastructure devices? Would you like to know how researchers obtain their malware samples?
If yes, then this class is for you.
Honeynet Training in Maryland, Washington D.C. or Northern Virginia
Delivery Style: 80% Hands-On, 20% Lecture
Learn to Use Honey netting to Track and Catch Hackers Who Target Your Network, Mitigate Zero-Day Attacks and Build Your Own Best-Fit Antivirus
Honey Pots, Honey Farms, and Honey Nets Training Course Cost: $2,995 Per Enrollment
This is an Advanced Security course. You must meet specific prerequisites in order to enroll in this course. Please speak to your account manager for more details.
Custom Training For Your Organization
If your organization needs something other than what we have listed here, no problem! Just fill out the request information form to the right and tell us more about your training needs, your ideal start-date, your location preference, your unique set of challenges and the expected outcome, and we will develop a customized training course proposal targeted to the specific needs of your staff within your scheduling constraints! We will gladly do this quickly and free of any obligation.
Topics & Concepts Covered in Honey Pots, Honey Farms, and Honey Nets Include:
- What honeypots are
- What they are for
- The different types (a general overview, but the class will focus primarily on the research variants)
- How to target a particular bot and what is required to do so
- How hackers detect them and common things they do once the honeypot is detected
- How to process the data collected
- How to share the data collected
Recommended Training Audience and Prerequisites
There is no firm prerequisite for this course. However, the more understanding of Networking, Programming (Python, C++, KMD’s), Hacking, Penetration Testing, Ethical Hacking, Exploits (how they work), encryption, MD5/SHA-1/Whirlpool Hashes, Linux/Windows and Forensic Investigation you have the more you will get out of this class.