Free Hackinars (Hacking Webinars) Now Available for Download:
These webinars, or hackinars as we like to call them, are designed around the latest and greatest advances in the fields of information technology and cyber security. As always, they are completely free and always ready to download so you can view them at your convenience. TrainACE is rolling these out at least once a quarter, so be on the lookout for the opportunity to attend one live!
Webinars & Tutorials
Fighting Cyber Threats isn’t an easy task—and many times, security products are limited in their ability to communicate the severity of the issue–or of any issue at all—to the end-user. In turn, that leaves you and your network at major risk for data breach. This webinar will prepare you to fight against security threats with big data tactics.
Hunting Cyber Threats with Big Data – A Webinar on Big Data for Cyber Security
We teamed up with Vahna, the security solutions experts, to bring you a groundbreaking webinar on Big Data Analysis!Watch Now
RomanHunter – How to Catch Hackers with an Open Source Wireless Honeypot
Join us for this excellent defensive focused hacking webinar. In this webinar Advanced Security Instructor, Timber Wolfe will show you how to use romanHunter (ROuter MAN HUNTER) to catch hackers attacking your network.Watch Now
CEH Training Lab Demo – Process Injection Using Metasploit Framework and Syringe
In this video, Christian Crank, Security Researcher for Advanced Security by TrainACE, demonstrates the hacking skill set of process injection, which is a hands-on lab covered in our Certified Ethical Hacker (CEH) training course.
Honey Pots, Honey Nets, and Honey Farms Hacker’s Breakfast Event
Honey nets are a tool which can help to beat attackers at their own game. Learn how to trap unwanted network intruders and how to use this collected data to gain vital information about your enemies in this presentation brought to you by our resident Honey Net expert, Timber Wolfe.
Advanced Threat Intel – I Can Have Most of My Threat Research Tools in a Single Interface?
This hour-long webinar is stuffed full with demos analyzing suspected malicious URL to show attendees how they can get to the bottom of a potential threat to their company.
Knowing the basics of port security is a MUST for anyone involved in protecting a network of any size. This in-depth webinar will take you from “hubs and switches” all the way to spoofing MAC addresses.
NMAP vs. Wireshark
Taking the time to understand the differences between port scanner and protocol analyzers is essential to successfully passing any security certification. This webinar ensures you’ll understand NMAP and Wireshark through live demos using the two programs.
Check out the basics of steganography; the science of writing hidden messages in a carrier file. Basically, security through obscurity!
Access Controls Lists
James Younger is back to explain ACL’s. A main focus of this webinar is the concept of implicit deny being that it is a necessary part to gaining several certifications.
Learn to Subnet
If Subnetting has been a problem area for you, you are not alone! Take a look, or two, at these subnetting demo’s presented by lead instructor, James Younger. There are both introductory and advanced videos available so you are able to learn and review at your own pace.
Attacking and Defending Windows 8 by TrainACE
Windows 8 is the new kid on the block and people all over are trying to dissect it. Take a look at this webinar packed with demos and tips on how to attack Windows 8. To successfully defend something, you must first know all of the vulnerabilities present.
Mobile App Penetration Testing
A glimpse at a few fundamental methods to hacking mobile devices through some of the more prevalent applications that exist on those devices.
Join us as we take a look at how dangerous open Wifi networks, like the ones found in coffee shops, hotels and airports, can be. We’ll demonstrate how easy it is for a hacker to pull off a wireless Man-In-the-Middle attack. This attack is nearly undetectable, even to many security professionals.