Would you like to learn about the actual malware that is targeting your networks? Would you like to know more about how your network is being attacked and how to mitigate the compromises your Anti-Virus (AV) is missing? How to obtain and create a signature to add to your AV within your organization and infrastructure devices? Would you like to know how researchers obtain their malware samples?
If yes, then this class is for you.
Honeynet Training in Maryland, Washington D.C. or Northern Virginia
Delivery Style: 80% Hands-On, 20% Lecture
Learn to Use Honey netting to Track and Catch Hackers Who Target Your Network, Mitigate Zero-Day Attacks and Build Your Own Best-Fit Antivirus
Honey Pots, Honey Farms, and Honey Nets Training Course Cost: $2,995 Per Enrollment
Custom Training For Your Organization
If your organization needs something other than what we have listed here, no problem! Just fill out the request information form to the right and tell us more about your training needs, your ideal start-date, your location preference, your unique set of challenges and the expected outcome, and we will develop a customized training course proposal targeted to the specific needs of your staff within your scheduling constraints! We will gladly do this quickly and free of any obligation.
All Times Listed in Eastern Standard Time (EST)
Date: 04/14/2014 - 04/18/2014
Days: Mon | Tues | Weds | Thurs | Fri
Time: 8:30am - 5:00pm
Topics & Concepts Covered in Honey Pots, Honey Farms, and Honey Nets
In this honey potting – honey netting – honey farming training class you will see how the AV companies collect malware and its variants and get an introduction as to how they analyze it. The class will demonstrate a ZeuS (and SpyBot) attack from beginning to end with respect to the compromise.
By the end of this course you will learn:
- What honeypots are
- What they are for
- The different types (a general overview, but the class will focus primarily on the research variants)
- How to target a particular bot and what is required to do so
- How hackers detect them and common things they do once the honeypot is detected
- How to process the data collected
- How to share the data collected
You will also be exposed to many more vectors that affect each of these areas. Finally, we will discuss the latest in industry trends as they pertain to honeynetting.
Would you like to see the Honeynet Training course outline? If so, inquire by filling out the form on your right.
Recommended Training Audience and Prerequisites
There is no firm prerequisite for this course. However, the more understanding of Networking, Programming (Python, C++, KMD’s), Hacking, Penetration Testing, Ethical Hacking, Exploits (how they work), encryption, MD5/SHA-1/Whirlpool Hashes, Linux/Windows and Forensic Investigation you have the more you will get out of this class.
News related to Honeynetting
- Hunting Cyber Threats with Big Data: Our Latest Webinar (2/21/2014)
- University of Maryland…Hacked and Exposed (2/20/2014)
- Security+ Practice Test (2/19/2014)