Sie sind auf Seite 1von 2

Hacking Threats & Countermeasures 101

(based on Backtrack 5 R3 & Kali Linux)

TRAINER PROFILE

INTRODUCTION
Ethical hacking is an important tool in many
national security agencies and even companies. An
Ethical Hacker is usually employed with the
organization and can be trusted to undertake an
attempt to penetrate networks and/or computer
systems using the same methods as a Hacker.

Mohd Hamizi bin Jamaludin, 35 years old is a

The goal of the ethical hacker is to help the


organization take pre-emptive measures against
malicious attacks by attacking the system himself;
all the while staying within legal limits. In order to
become an Ethical Hacker or Security Expert, one
must think out of the box with the mentality that
in order to catch a thief.

Certificate in Microsoft Windows NT Workstation

recognized Microsoft Certified Trainer (MCT) and


PSMB Certified Trainer, graduated with an Microsoft
Certified Solution Associate (MCSA), Microsoft
MCITP Server Administrator (Server 2008 R2), MCTS
Server 2008 R2, A + Certification, Professional

4.0, NT Server 4.0, Microsoft Press Certificate in


Microsoft Windows 2000 Server, and he also had
attended Kursus Induksi Pegawai Pengesah Dalaman
PPD (MLVK / SKM) and Training of Trainer course
in UTM

This workshop is specifically designed to provide


the right knowledge to the aspiring Hacking and
Cyber Security enthusiasts. This workshop will
explore the various means that an intruder has
available to gain access to computer resources.

COMSYSTEM SOLUTIONS SDN BHD


Tel : 603.5162 8254 Fax : 603.5162 8654

It will investigate weaknesses by discussing the


theoretical background behind, and whenever
possible, actually performing the attack

Pax
FEE

Before/On
As stated

As stated

RM1775

RM1995

After

Subject to 6% GST
Date

Venue

Early Bird

12-13th January 2016

Training Centre, Plaza Pantai,


KL

2nd January 2016

30-31st March 2016

20th March 2016

HACKING LAB
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
45.
46.
47.
48.
49.
50.

Backtrack / Kali Linux Bootable Pendrive


Zenmap Port Scanner On Backtrack 5
How To Make New User On Backtrack 5
Install Software On Backtrack 5
The Harvester On Backtrack 5
Hack The Facebook With Backtrack 5
How To Use Msfconsole To Collect Email Addresses
Learn Linux Command On Backtrack 5
Spoof Your Mac Address On Backtrack 5
Sniff The Images On Backtrack 5
Learn Hack And Patch Windows 7 On Backtrack 5
Remote Desktop On Backtrack 5
Dnsdict6 On Backtrack 5
Dnsenum On Backtrack 5
How To Use Netstat On Backtrack5
Dnsrecon On Backtrack 5
Nmap Scanning On Backtrack5
Pentbox On Backtrack 5
Fierce On Backtrack 5
Arping On Backtrack5
How To Convert Jpg Into Ascii On Backtrack5
Fping On Backtrack 5
Loadbalancerdetecter On Backtrack 5
Netcat On Backtrack 5
Netdiscover On Backtrack 5
Truecrypt On Backtrack 5
Joomscan On Backtrack 5
Hexedit On Backtrack 5
Fatback On Backtrack 5
Recover Jpeg On Backtrack 5
Safecopy On Backtrack 5
Cmospwd On Backtrack 5
Samdump On Backtrack 5
Chntpw On Backtrack 5
Armitage On Backtrack 5
How To Install Chromium Browser On Backtrack 5
Findmyhash On Backtrack 5
Wiffit-Waffwoof On Backtrack 5
Autoscan On Backtrack 5
Linux Networking Commands On Backtrack 5
Telnet On Backtrack 5
Netmask On Backtrack 5
Nbtscan On Backtrack 5
Whatweb On Backtrack 5
Netenum On Backtrack 5
Protos On Backtrack 5
Pipal On Backtrack 5
Hping2 On Backtrack 5
Siege On Backtrack 5
Xprobe2 On Backtrack 5

51. Goohost On Backtrack 5


52. Urlsnarf On Backtrack 5
53. Dnstracer On Backtrack 5
54. Steamlocomotive On Backtrack 5 - Games
55. Websecurify On Backtrack 5
56. Dnswalk On Backtrack 5
57. Linux Partition On Backtrack 5
58. Honeypot On Backtrack 5
59. Nmapscanning On Backtrack 5
60. Etherape On Backtrack 5
61. Firestarter Firewall On Backtrack 5
62. Lynis On Backtrack 5 - Linux Auditing
63. Teamviewer On Backtrack 5
64. Genlist On Backtrack 5
65. Ipcalc On Backtrack 5
66. Shutter On Backtrack 5
67. Macchanger On Backtrack 5
68. Dsniff On Backtrack 5
69. Driftnet On Backtrack 5
70. Oneko & Cowsay On Backtrack 5
71. Ssldump On Backtrack 5
72. Dmitry On Backtrack 5
73. Gerixcracker On Backtrack 5
74. Command Shell Upgrade On Backtrack 5
75. Installing & Accessing Backdoor On Backtrack 5
76. Removing Backdoor On Backtrack 5
77. Cracking Unix Password On Backtrack 5
78. Exploit Samba Server On Backtrack 5
79. Browser Autopwn On Backtrack 5
80. Client Side Attack On Backtrack 5
81. Fern Cracker On Backtrack 5
82. Urlcrazy On Backtrack 5
83. Grendel Scan On Backtrack 5
84. Uniscan On Backtrack 5
85. Netifera On Backtrack 5
86. Smbclient On Backtrack 5
87. Smtpscan On Backtrack 5
88. Golismero On Backtrack 5
89. Tctrace On Backtrack 5
90. Httprint On Backtrack 5
91. Unicornscan On Backtrack 5
92. Msfscanning On Backtrack 5
93. Webshagcli On Backtrack 5
94. Openoffice On Backtrack 5
95. List-Urls On Backtrack 5
96. Conky On Backtrack 5
97. Nessus On Backtrack 5
98. Honeyd On Backtrack 5
99. Openvas On Backtrack 5
100. Rkhunter On Backtrack 5
101. Snort On Backtrack 5

Das könnte Ihnen auch gefallen