EC-Council offers ISSA IT Security Training Scholarship for TakeDownCon

Date: 
Thursday, July 16, 2015 - 08:00 to Sunday, July 19, 2015 - 16:00

EC-Council will reserve 5 seats in a series of IT Security courses on a first come, first serve basis at the TakeDownCon IT Security Conference in Huntsville, AL July 16 - 19th! Scolarship will also include a complementary pass to TakeDownCon (20-21st) which will feature 16 keynote presentations that will focus on Attack and Defense vectors.

Note: If you are interested in the scholarship, please contact us (see flyer) as soon as possible, because seats are limited and scholarship programs tend to go quickly! Thank you!

Kali Linux 1-Day Penetration Testing Overview Course

Date: 
Monday, May 18, 2015 - 08:00 to 15:30
Speaker: 
Computer Training Center of Huntsville
Location: 
Dynetics Headquarters Building, 1002 Explorer Blvd., Huntsville, AL 35816
Topic: 
Advanced Penetration Testing Using Open Source Tools

This course is 85-90% hands on and utilizes the Kali Linux suite of tools. The course covers in detail various attacks and tools that are contained in the Kali Linux tool suite. Kali Linux is mature, secure, and enterprise-ready for professional pen-testing.

Please bring a 4 Gig thumb drive to class if you would like a copy of your lab exercises.

Raytheon Cyber

Date: 
Wednesday, March 18, 2015 - 11:30 to 13:00
Speaker: 
Raytheon Cyber
Location: 
Delta Research, 996 Explorer Blvd., Huntsville, AL 35806
Topic: 
Raytheon Cyber

At this event, speakers will provide a comprehensive overview of the insider threat and advanced Linux threat detection & response solutions Raytheon uses to protect its network. Attendees will learn how Raytheon’s insider threat solution, SureView, enables users to predict possible insider threats and how Raytheon’s Second Look solution is able to analyze volatile memory from Linux systems and advise on where potential indicators of vulnerability exist. Through live product demonstrations and speaker presentations, attendees will better understand industry best practices on how to mitigate the damage of possible insider threats and/or Linux system breaches and the full capabilities of Raytheon’s Second Look and SureView solutions.