Educause Security Discussion mailing list archives

Registration Now Open for University of Virginia and SANS Hacker Techniques Course on June 18-23, 2007


From: Marty Peterman <mdp4s () VIRGINIA EDU>
Date: Fri, 2 Mar 2007 15:55:56 -0500

Early-bird registration is now open for the SANS SEC504 Hacking
Techniques, Exploits, & Incident Handling 6-day course hosted by the
University of Virginia from June 18 through June 23, 2007.  Highlights
of the event follow. You will find additional information and may
register at http://www.itc.virginia.edu/security/sansedu. The cost of
the class increases after April 16th, so be sure to register before
then. Questions should be directed to sans-uva () virginia edu.

Date/Time: Monday June 18th through Saturday June 23th; 9am to 5pm each day

Registration Fee: Employees of accredited educational institutions,
state and local law enforcement agencies, and state and local
governments qualify for the substantially discounted fee of $1110
($1,210 for registrations after April 16). The course fee for all others
is $3,445 ($3,545 for registrations after April 16).  **Registration fee
includes daily gourmet lunch buffet at U.Va. Darden School of Business.**

Although not required, upon completion of the course attendees will be
eligible to sit for the associated SANS GIAC certification exam for an
additional fee of $300 ($500 if signing up for the exam after the last
day of the course). More information on this GIAC certification can be
found at http://www.giac.org/certifications/security/gcih.php.

Course: SANS "SECURITY 504: Hacking Techniques, Exploits, and Incident
Handling". If your organization has an Internet connection, your
computer systems will get attacked. From the five, ten, or even one
hundred daily probes against your Internet infrastructure to the
malicious insider slowly creeping through your most vital information
assets, attackers are targeting your systems with increasing viciousness
and stealth.

By helping you understand attackers' tactics and strategies in detail,
giving you hands-on experience in finding vulnerabilities and
discovering intrusions, and equipping you with a comprehensive incident
handling plan, the in-depth information in this course helps you turn
the tables on computer attackers. This course addresses the latest
cutting-edge insidious attack vectors and the "oldie-but-goodie" attacks
that are still so prevalent, and everything in between. Instead of
merely teaching a few hack attack tricks, this course includes a
time-tested, step-by-step process for responding to computer incidents,
a detailed description of how attackers undermine systems so you can
prepare, detect, and respond to them, and a hands-on workshop for
discovering holes before the bad guys do. Additionally, the course
explores the legal issues associated with responding to computer
attacks, including employee monitoring, working with law enforcement,
and handling evidence.

Who Should Attend:
         o Members and leaders of incident handling teams.
         o System administrators and security personnel.
         o Ethical hackers/penetration testers who want to understand the
concepts underlying their testing regimen.

A Sampling of Topics:
        o The step-by-step approach used by many computer attackers
        o The latest computer attack vectors and how you can stop them
        o Defenses for each stage of a computer attack
        o Workshop addressing scanning and defending systems
        o Strategies and tools for detecting each type of attack
        o Attacks/defenses for Windows, Unix, switches, routers and more
        o Application-level vulnerabilities, attacks, and defenses
        o Developing an incident handling process and preparing a team
        o Legal issues in incident handling
        o Recovering from computer attacks and restoring systems
        o More information on Security 504, see
http://www.sans.org/training/description.php?tid=243.

Instructor - Mike Poor

Mike is a founder and Senior Security Analyst for the DC firm
Intelguardians LLC. In his recent past life he has worked for
Sourcefire, as a research engineer, and for the SANS Institute leading
their Intrusion Analysis Team. As a consultant, Mike conducts forensic
analysis, penetration tests, vulnerability assessments, security audits
and architecture reviews. His primary job focus however is in intrusion
detection, response, and mitigation. Mike currently holds both GSEC and
GCIA certifications and is an expert in network engineering and systems,
network and web administration. Mike is an author of the international
best selling Snort 2.1 book from Syngress, and is a Handler for the
Internet Storm Center.

I hope to welcome you in Charlottesville in June!
--
Marty Peterman, CISSP
Office of Information Technologies
108 Cresap Road
PO Box 400217
Charlottesville, VA 22904

Current thread: