Cybersecurity Training At Hacker Halted


Recognizing the growing demand for information security education and training, we have put together some of the most sought-after technical training & certification classes offered by top training companies and led by well-respected instructors.

Make Atlanta your next destination to obtain quality information security knowledge and cutting edge skills, and let Hacker Halted | Academy be the platform to make your learning and training an enjoyable experience.


Register

Self register online or get help registering with Concierge Registration!

 

Benefits

What you get when you sign up for any of the training at the Hacker Halted Academy:

  • Official Courseware
  • 6 month subscription to iLabs (except CCISO)
  • 1 Complimentary Exam voucher (For EC-Council certification training only)
  • Certificate of attendance
  • Lunch and coffee breaks throughout the duration of the training
  • Complimentary 2-Day Pass to Hacker Halted

Venue

Renaissance Atlanta Waverley – Learn More

CEH - Sold outECSACNDCHFICCISO - Sold OutSTORM Ethical HackingSTORM Intrusion AnalysisDrone Hacking Workshop powered by STORM

SOLD OUT

Certified Ethical Hacker v10– (CEH)

The worlds most advanced ethical hacking course with 20 of the most current security domains an ethical hacker will want to know when planning to beef up the information security posture of their organization. In 20 comprehensive modules, the course covers over 270 attack technologies, commonly used by hackers. Our security experts have designed over 140 labs which mimic real time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world. The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the globally recognized Certified Ethical Hacker certification!

Course Outline
  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service
  • Session Hijacking
  • Evading IDS, Firewalls, and Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • IoT Hacking
  • Cloud Computing
  • Cryptography
Dates

October 6th – 9th, 2019

Pricing

$2999

Class Capacity

25

Course Includes:

Official Courseware
6 month subscription to iLabs (except CCISO)
1 Complimentary ECC Exam Portal Voucher
Certificate of Attendance
Complimentary 2-Day Pass to Hacker Halted- Atlanta conference
Lunch and coffee breaks throughout the duration of the training

Register Today

Certified Security Analyst – (ECSA)

The Certified Security Analyst “pen testing” program is a computer security certification designed to teach Information Security Professionals the advanced uses of the available methodologies, tools and techniques expected from a premier ethical hacking training and are required to perform comprehensive information security pen tests. Students will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose. By teaching the Licensed Penetration Tester, LPT methodology and ground breaking techniques for security and penetration testing, this class will help you perform the intensive assessments required to effectively identify and mitigate risks to the security of your infrastructure. As students learn to identify Information Security problems in this ethical hacking training certification course, they also learn how to avoid and eliminate them, with the class providing complete coverage of analysis and network security-testing topics.

Course Outline

Module 1: Need for Security Analysis
Module 2: TCP IP Packet Analysis
Module 3: Penetration Testing Methodologies
Module 4: Customers and Legal Agreements
Module 5: Rules of Engagement
Module 6: Penetration Testing Planning and Scheduling
Module 7: Pre-penetration Testing Steps
Module 8: Information Gathering
Module 9: Vulnerability Analysis
Module 10: External Penetration Testing
Module 11: Internal Network Penetration Testing
Module 12: Firewall Penetration Testing
Module 13: IDS Penetration Testing
Module 14: Password Cracking Penetration Testing
Module 15: Social Engineering Penetration Testing
Module 16: Web Application Penetration Testing
Module 17: SQL Penetration Testing
Module 18: Penetration Testing Reports and Post Testing Actions

Dates

October 6th – 9th, 2019

Pricing

$2999

Class Capacity

25

Course Includes:

Official Courseware
6 month subscription to iLabs (except CCISO)
1 Complimentary ECC Exam Portal Voucher
Certificate of Attendance
Complimentary 2-Day Pass to Hacker Halted- Atlanta conference
Lunch and coffee breaks throughout the duration of the training

Register Today

Certified Network Defender– (CND)

The program prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect and respond approach to network security. The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real world expertise on current network security technologies and operations. The study-kit provides you with over 10 GB of network security best practices, assessments and protection tools. The kit also contains templates for various network policies and a large number of white papers for additional learning.

Course Outline

Module 1: Computer Network and Defense Fundamentals
Response & Handling
Module 2: Network Security Threats, Vulnerabilities, and Attacks
Module 3: Network Security Controls, Protocols, and Devices
Module 4: Network Security Policy Design and Implementation
Module 5: Physical Security
Module 6: Host Security
Module 7: Secure Firewall Configuration and Management
Module 8: Secure IDS Configuration and Management
Module 9: Secure VPN Configuration and Management
Module 10: Wireless Network Defense
Module 11: Network Traffic Monitoring and Analysis
Module 12: Network Risk and Vulnerability Management
Module 13: Data Backup and Recovery
Module 14: Network Incident Response and Management

Dates

October 6th – 9th, 2019

Pricing

$2999

Class Capacity

25

Course Includes:

Official Courseware
6 month subscription to iLabs (except CCISO)
1 Complimentary ECC Exam Portal Voucher
Certificate of Attendance
Complimentary 2-Day Pass to Hacker Halted- Atlanta conference
Lunch and coffee breaks throughout the duration of the training

Register Today

Computer Hacking Forensic Investigator

This computer forensics course will give participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute. Many of today’s top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. It is no longer a matter of “will your organization be comprised (hacked)?” but, rather, “when?”

Course Outline

Module 1: Computer Forensics in Today’s World
Module 2: Computer Forensics Investigation Process
Module 3: Searching & Seizing Computers
Module 4: Digital Evidence
Module 5: First Responder Procedures
Module 6: Computer Forensics Lab
Module 7: Understanding Hard Disks & File Systems
Module 8: Windows Forensics
Module 9: Data Acquisition & Duplication
Module 10: Recovering Delete Files & Deleted Partitions
Module 11: Forensics Investigation Using Access Data FTK
Module 12: Forensic Investigation Using EnCase
Module 13: Steganography & Image File Forensics
Module 14: Application Password Crackers
Module 15: Log Capturing & Event Correlation
Module 16: Network Forensics, Investigating Logs & Investigating Network Traffic
Module 17: Investigating Wireless Attacks
Module 18: Investigating Web Attacks
Module 19: Tracking Emails and Investigating Email Crimes
Module 20: Mobile Forensics
Module 21: Investigative Reports
Module 22: Becoming an Expert Witness

Dates

October 6th – 9th, 2019

Pricing

$2999

Class Capacity

25

Course Includes:

Official Courseware
6 month subscription to iLabs (except CCISO)
1 Complimentary ECC Exam Portal Voucher
Certificate of Attendance
Complimentary 2-Day Pass to Hacker Halted- Atlanta conference
Lunch and coffee breaks throughout the duration of the training

Register Today

SOLD OUT

Certified Chief Information Security Officer (CCISO)

The CCISO program trains individuals who are looking to make the jump from middle management to the executive ranks by focusing on high-level management skills specifically needed for IS executives. From project to audit management, procurement and finance, to strategy and policy, students will be taught to steer complex security programs strategically and successfully. The CCISO program was created and is taught by sitting high-level information security executives from across industries, resulting in the most relevant, challenging, and applicable content on the market.

Course Outline
Domain 1: Governance (Policy, Legal & Compliance)

1. Definitions
2. Information Security Management Program
3. Information Security Laws, Regulations, & Guidelines
4. Privacy Laws

2 – IS Management Controls and Auditing Management (Projects, Technology, and Operations)

1. Design, Deploy, and Manage Security Controls in Alignment with Business
Goals, Risk Tolerance, and Policies and Standards
2. Information Security Risk Assessment
3. Risk Treatment
4. Residual Risk
5. Risk Acceptance
6. Risk Management Feedback Loops
7. Business Goals
8. Risk Tolerance
9. Policies and Standards
10. Understanding Security Controls Types and Objectives
11. Implementing Control Assurance Frameworks
12. COBIT (Control Objectives for Information and Related Technology)
13. BAI06 Manage Changes
14. COBIT 4.1 vs. COBIT 5
15. ISO 27001/27002
16. Automate Controls
17. Understanding the Audit Management Process

Domain 3: Management – Projects & Operations

1. The Role of the CISO
2. Information Security Projects
3. Security Operations Management

Domain 4: Information Security Core Competencies

1. Access Controls
2. Physical Security
3. Disaster Recovery
4. Network Security
5. Threat and Vulnerability Management
6. Application Security
7. Systems Security
8. Encryption
9. Computer Forensics and Incident Response

Domain 5: Strategic Planning & Finance

1. Security Strategic Planning
2. Alignment with Business Goals and Risk Tolerance
3. Relationship between Security, Compliance, & Privacy
4. Leadership
5. Enterprise Information Security Architecture (EISA) Models, Frameworks, and Standards
6. Security Emerging Trends
7. It’s all about the Data
8. Key Performance Indicators (KPI)
9. Systems Certification and Accreditation Process
10. Resource Planning
11. Financial Planning
12. Procurement
13. Vendor Management
14. Request for Proposal (RFP) Process
15. Integrate Security Requirements into the Contractual Agreement and Procurement Process
16. Statement of Work
17. Service Level Agreements

Dates

October 6th – 9th, 2019

Pricing

$3499

Class Capacity

25

Course Includes:

Official Courseware
6 month subscription to iLabs (except CCISO)
1 Complimentary Exam Voucher
Certificate of Attendance
Complimentary 2-Day Pass to Hacker Halted conference.
Lunch and coffee breaks throughout the duration of the training

Register Today

What’s Covered in Certified Chief Information Security Officer (CCISO)?

Hear what past students had to say:

Mobile Security Toolkit – Ethical Hacking Workshop

What is the Mobile Security Tool Kit Workshop?

The course content was derived by pulling carefully selected modules from EC-Council’s Certified Network Defender (CND) and Certified Ethical Hacker (CEH) certification courses.

What is the Mobile Security Tool Kit?

EC-Council’s Mobile Security Toolkit (Better known as the STORM!) is a fully-loaded pen-test platform which comes equipped with a customized distro of Kali loaded onto a portable Raspberry Pi-based touchscreen device. EC-Council rolled out the STORM as a mobile tool to enhance our certification course offerings by giving online asynchronous students a mobile training option. In this option, the video lectures are loaded directly onto the STORM.

Course Outline

Overview:

In this course, you will learn the procedures to use a virtual bridge and connect to a physical network. How to run virtual software and bridge it to your Storm device as well as how to isolate the Storm with the bridge. Configure secure remote access, and connect from the Internet Do your assessments from your backyard with no airport security checks! Following this, you will learn network monitoring and protocol analysis. Performing the hacking and penetration testing methodology and using the device as your attack platform.

Module 01: Technical Introduction to the Storm

Hardware Assembly and Chipsets
Imaging Techniques
Linux ARM Distro options
Management of Modules and Meta Packages
Industry tips and best practices
LAB: Backing up and restoring the Storm image

Module 02: Network Traffic Monitoring and Analysis

Network Traffic Monitoring and Analysis(Introduction)
Advantages of Network Traffic Monitoring and Analysis
Network Monitoring and Analysis: Techniques
SNMP Monitoring
Network Traffic Signatures (normal and attack)
Categories of Suspicious Traffic Signatures
Attack Signature Analysis Techniques
LAB: Using the Storm device for network traffic monitoring and analysis

Module 03 Hacking Concepts, Types, and Phases

What is Hacking
Who is a hacker?
Hacker Classes
Hacking Phases
Ethical Hacking Concepts and Scope
Skills of an Ethical Hacker
The Hacking Methodology
Footprinting
Scanning
Enumeration
Identify Vulnerabilities
Exploitation
LAB: Using the Storm Device to perform the hacking methodology and penetration testing

Module 04: Exploring the Hacking Methodology

Footprinting Concepts
What is Footprinting
Objectives of Footprinting
Footprinting methods
Overview of Scanning
Abstract Scanning Methodology
Live Systems
Ports
Services
Enumeration
Identify Vulnerabilities
Exploit
Introduction to System Hacking
Cracking passwords
Privilege escalation
Rootkits
LAB: Gaining and maintaining access using your Storm device

Mobile Security Toolkit Specs
64 Bit – Quad Core Mobile System with Case
1 GB RAM
7 inch touch screen display
64 GB MicroSD – Preloaded w/Custom Linux Hacking OS
100Mb Ethernet port
4 USB ports
802.11n wireless
Bluetooth 4.1
Combined 3.5mm audio jack and composite video
Camera interface (CSI)
Display interface (DSI)
VideoCore IV 3D graphics core
Full HDMI
USB 2.0 A to B Micro Power Cable. [The Storm can be powered from a 5V micro-USB source, Power Supply not included with base package.] Rollup water resistant keyboard
Field Case Organizer for all your gear

Dates

October 8th, 2019

Pricing

$999

Note: Students who choose to bundle with STORM Intrusion Analysis can do so with a price of $1499.

Course Includes:

e-Book
Certificate of Attendance (.pdf)
STORM Device
Keyboard
Carry Case
STORM T-Shirt
STORM Sticker

Register Today

Mobile Security Toolkit Workshop
at INNOTECH Conference Dallas, TX


Mobile Security Toolkit Workshop in Huntsville, AL

Intrusion Analysis with the STORM Unveiled Workshop

The foundation of all hacking and security work is TCP/IP traffic. In this workshop you will learn the foundation of TCP/IP, you will be introduced to what normal traffic looks like, then you will review traffic for signs of an attack. The process of protocol analysis will be covered to assist you in identifying the attacks and what the risk is to the network. The workshop will provide you practice with basic, advanced and web attack analysis techniques.

What is the Mobile Security Tool Kit?

EC-Council’s Mobile Security Toolkit (Better known as the STORM!) is a fully-loaded pen-test platform which comes equipped with a customized distro of Kali loaded onto a portable Raspberry Pi-based touchscreen device. EC-Council rolled out the STORM as a mobile tool to enhance our certification course offerings by giving online asynchronous students a mobile training option. In this option, the video lectures are loaded directly onto the STORM.

Course Outline

Course Overview:

Session 01: Technical Introduction to the STORM
Session 02: Introduction to Intrusion Analysis
Session 03: Capturing Traffic On The “Wire” And Implementing Network Forensics
Session 04: Intrusion Analysis of Network Traffic on Windows and Linux

Mobile Security Toolkit Specs
64 Bit – Quad Core Mobile System with Case
1 GB RAM
7 inch touch screen display
64 GB MicroSD – Preloaded w/Custom Linux Hacking OS
100Mb Ethernet port
4 USB ports
802.11n wireless
Bluetooth 4.1
Combined 3.5mm audio jack and composite video
Camera interface (CSI)
Display interface (DSI)
VideoCore IV 3D graphics core
Full HDMI
USB 2.0 A to B Micro Power Cable. [The Storm can be powered from a 5V micro-USB source, Power Supply not included with base package.] Rollup water resistant keyboard
Field Case Organizer for all your gear

Dates

October 9th, 2019

Pricing

$999

Note: Students who choose to bundle with STORM Ethical Hacking can do so with a price of $1499.

Course Includes:

e-Book
Certificate of Attendance (.pdf)
STORM Device
Keyboard
Carry Case
STORM T-Shirt
STORM Sticker

Register Today

Drone Hacking Workshop powered by STORM

Physical payload delivery with sUAS

About the workshop:

Learn the operational underpinnings of unmanned systems by exploring the technologies firsthand. Build a foundational understanding of autonomy vs. automation while learning to code for a drone. Use your newfound skills and understanding of COTS sUAS to attack an air-gapped network.

Course Outline

Overview:

Module 1: Drone Anatomy

  • Flight Controller (base components and operation – acts as brain stem)
  • Propulsion (Motors and speed controllers – Motor cortex)
  • Decision maker/Radio system (Either onboard logic/ autonomy or Radio link / Automation – acts like frontal cortex)
  • Introduction to Tello (pictures of disassembly)

LAB 1: Pass out Tellos, have class open them and familiarize themselves (and put labeled batteries on chargers)

Module 2: Autonomy vs Automation

  • Decision making locally vs. remotely – and how that influences communication
  • What the different radios look like on SDR – spread spectrum or compact?
  • Why wifi is not used with drones

LAB 2: Fly your Tello – have students initiate link and fly a battery (and start charging the next set)

Module 3: Learning to code a drone

  • Introduction to Tello SDK
  • Learning the tools for coding the Tello
  • Write class code to take off, fly a shape in the air, and land at the takeoff point

LAB 3: Drone Challenge - Split into teams (2-3 people per) and complete the challenge! (Teams ranked against a decrementing time scale. If drone needs to be fixed, it adds a minute to the team's time)

  • Map out the flight path
  • Write code to:
  • deliver the physical payload,
  • steal the password (take picture of computer screen)
  • double the points if completely automated (no human interaction after initiation)

Dates

October 7th, 2019 9 AM - 5 PM

Pricing

$999

Register Today

Use EC-Council's STORM Mobile Security Toolkit to pilot and automate a COTS unmanned vehicle!

EC-Council’s Mobile Security Toolkit (Better known as the STORM!) is a fully-loaded pen-test platform which comes equipped with STORM Linux (a Raspbian based, customized distro of Linux equipped with the industry’s most popular hacking tools) loaded onto a portable touchscreen device.

EC-Council rolled out the STORM as a mobile tool to enhance our certification course offerings by giving online asynchronous students a mobile training option. In this option, the video lectures are loaded directly onto the STORM.

Includes:

EBook
Certificate of Attendance (.pdf)
Tello Drone
STORM Device
Keyboard
Carry Case
STORM T-Shirt
STORM Sticker
Access to the STORM Resource Center (Video Demos, Support, ISO Image Download)

What students should bring:

Laptop (Micro SD Card Reader a plus)
Enthusiasm for learning; knowledge of Linux a major plus!