Ethical Hacker Training Focus Of Institute

In response to a growing need to combat illegal hacking, Halock Security Labs announces the opening of the Institute 4 Ethical Hacking (I4EH). The Institute's first offering will be an instructor-lead, hands-on course that empowers students to evaluate the security posture of their company using the tools and techniques employed by black hats, giving them an understanding of the real-world threats that their company's assets face while helping them to level the playing field in this 'war' between white hats and black hats.

"The subject of hacking has so captivated this country, that even Hollywood has made a cottage industry out of hacker-themed movies. War Games, Swordfish, Hackers, Sneakers, the list goes on. Ironically, the launch of the Institute coincides with the release of the new movie Untraceable," said Terry Kurzynski, Halock CEO. "But these threats are very real and have cost U.S. businesses millions over the years. Ethical hacking is all about leveling the playing field, and we are arming corporate America with real fire power against this threat."

"It's imperative that our students understand not only the technologies and techniques used by sophisticated hackers today, but also the mindset and motivation of these attackers," said Dan Simon, Institute trainer and certified ethical hacker.

Students will learn to use the tools of the hacking trade to understand how black hats gather intelligence about an organization, enumerate potential targets, and exploit systems to provide access to the internal resources of a company's IT infrastructure.

"We are an EC-Council Authorized Training Center, but what really sets us apart is the fact that our instructors are in the trenches everyday working to protect our clients' assets,” Kurzynski said. "We've gone beyond the basic curriculum with the help of some very skilled white hats, giving corporate IT professionals a leg up against the dark side. It's the classic 'good versus evil' conflict."

Topics covered in I4EH's Ethical Hacker training include public information gathering, passive scanning and foot-printing of systems, active scanning and enumeration of systems, services, and related vulnerabilities, exploitation of known vulnerabilities, expansion of access and establishing covert access channels on exploited systems. Students will also learn how an attacker evaluates a target using public information and competitive intelligence gathering.

The five day Ethical Hacker training course is limited to only 10 students and is heavily participatory, with frequent hands-on activities and demonstrations. Certification prep and a voucher for the EC-Council Certified Ethical Hacking and Countermeasures exam are provided on the fifth day of class.

For more information, or to sign up for the I4EH's Ethical Hacker training course, visit http://www.i4eh.com/ or call 866.781.7799.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3