Would you like to learn about the actual malware that is targeting your networks? Would you like to know more about how your network is being attacked and how to mitigate the compromises your Anti-Virus (AV) is missing? How to obtain and create a signature to add to your AV within your organization and infrastructure devices? Would you like to know how researchers obtain their malware samples?
If yes, then this class is for you.
Honeynet Training in Maryland, Washington D.C. or Northern Virginia
Delivery Style: 80% Hands-On, 20% Lecture
Learn to Use Honey netting to Track and Catch Hackers Who Target Your Network, Mitigate Zero-Day Attacks and Build Your Own Best-Fit Antivirus
Honey Pots, Honey Farms, and Honey Nets Training Course Cost: $2,995 Per Enrollment
This is an Advanced Security course. You must meet specific prerequisites in order to enroll in this course. Please speak to your account manager for more details.
Custom Training For Your Organization
Does your organization have special training needs? Let us know! We'll put together a customized training course proposal targeted to the specific needs of your staff. Select your ideal start-date, your location preference and your equipment requests and we will gladly compose a training plan for your company quickly and free of any obligation.
All Times Listed in Eastern Standard Time (EST)
For information related to scheduling, please fill out the information request form to the right.
Topics & Concepts Covered in Honey Pots, Honey Farms, and Honey Nets Include:
- What honeypots are
- What they are for
- The different types (a general overview, but the class will focus primarily on the research variants)
- How to target a particular bot and what is required to do so
- How hackers detect them and common things they do once the honeypot is detected
- How to process the data collected
- How to share the data collected
Recommended Training Audience and Prerequisites
There is no firm prerequisite for this course. However, the more understanding of Networking, Programming (Python, C++, KMD’s), Hacking, Penetration Testing, Ethical Hacking, Exploits (how they work), encryption, MD5/SHA-1/Whirlpool Hashes, Linux/Windows and Forensic Investigation you have the more you will get out of this class.
News related to Honeynetting
- Recently Updated – Certified Ethical Hacker Exam Study Guide (4/24/2015)
- What is Big Data and Why is It So Important? (9/24/2014)
- The Importance of Mobile Security (9/16/2014)