Recognizing the growing demand for information security education and training, we have put together some of the most sought-after technical training & certification classes offered by top training companies and led by well-respected instructors.

Make Atlanta your next destination to obtain quality information security knowledge and cutting edge skills, and let Hacker Halted | Academy be the platform to make your learning and training an enjoyable experience.


Register

Self register online or get help registering with Concierge Registration!

Benefits

What you get when you sign up for any of the training at the Hacker Halted Academy:

  • Official Courseware
  • 6 month subscription to iLabs (except CCISO)
  • 1 Complimentary Exam voucher (For EC-Council certification training only)
  • Certificate of attendance
  • Lunch and coffee breaks throughout the duration of the training
  • Complimentary 2-Day Pass to Hacker Halted

Venue

Georgia International Convention Center – Learn More

Parking: The rate is $10 per entry or $15 with in/out privileges per day.

CEHECSACHFICCISO

Certified Ethical Hacker (CEH) v10

Ethical Hacking and Counter measurers The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.

Earn your CEH at Hacker Halted and get more than just a class! CEH at Hacker Halted comes with a pass to Hacker Halted and the opportunity to join the STORM CTF and the Hacker Halted Go Ruck Challenge. Read below for more information!

STORM CTF

GoRuck Constellation Challenge

Course Outline

Module 1: Introduction to Ethical Hacking
Module 2: Footprinting and Reconnaissance
Module 3: Scanning Networks
Module 4: Enumeration
Module 5: Vulnerability Analysis
Module 6: System Hacking
Module 7: Malware Threats
Module 8: Sniffing
Module 9: Social Engineering
Module 10: Denial-of-Service
Module 11: Session Hijacking
Module 12: Evading IDS, Firewalls, and Honeypots
Module 13: Hacking Web Servers
Module 14: Hacking Web Applications
Module 15: SQL Injection
Module 16: Hacking Wireless Networks
Module 17: Hacking Mobile Platforms
Module 18: IoT Hacking
Module 19: Cloud Computing
Module 20: Cryptography

About the Instructor

Wayne Burke

His experience in the public / defense sectors is equally complemented by assignments undertaken for heavyweight world renowned corporations including Yahoo, Xerox, AT&T and Texas Instruments to name but a few. He is imminently qualified in his field in that he holds a string of professional qualifications in Networking to name a few (MCT, MCSE, Cisco, Network+) and IT Security (CIW-SA, Security+, CEH, ECSA, LPT, CHFI) besides a bachelor’s degree in science.

Wayne is currently the CSO for Sequrit CSI, responsible for the technical realm and security management, which includes consulting teams. He is a captain of a global operating group of penetration testers and security experts. Wayne and his group have delivered security assessments, Penetration Test assignments and customized training for International Corporations and many Government Agencies such as: EPA, FAA, DOJ, DOE, DOD + 8570: Air force, Army, Navy, Marines, FBI and Statewide Law Enforcement Offices in the USA.

In Europe: NATO, Europol, MOD (Military of Defense UK) various EU Law Enforcement, Dutch Ministry of Defense, Ministry of Justice, local European Law Enforcement: UK, Ireland, Switzerland, Belgium, Holland, Denmark.

Dates

September 9 – 12 2018

Pricing

Retail Rate: $2999

Early Bird Rate: $2499*

*Early bird rate valid if purchased and paid for prior to July 31st.

Class Capacity

25

Course Includes:

Official Courseware
6 month subscription to iLabs (except CCISO)
1 Complimentary ECC Exam Portal Voucher
Certificate of Attendance
Complimentary 2-Day Pass to Hacker Halted- Atlanta conference
Lunch and coffee breaks throughout the duration of the training

Certified Security Analyst – (ECSA)

The Certified Security Analyst “pen testing” program is a computer security certification designed to teach Information Security Professionals the advanced uses of the available methodologies, tools and techniques expected from a premier ethical hacking training and are required to perform comprehensive information security pen tests. Students will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose. By teaching the Licensed Penetration Tester, LPT methodology and ground breaking techniques for security and penetration testing, this class will help you perform the intensive assessments required to effectively identify and mitigate risks to the security of your infrastructure. As students learn to identify Information Security problems in this ethical hacking training certification course, they also learn how to avoid and eliminate them, with the class providing complete coverage of analysis and network security-testing topics.

Earn your ECSA at Hacker Halted and get more than just a class! ECSA at Hacker Halted comes with a pass to Hacker Halted and the opportunity to join the STORM CTF and the Hacker Halted Go Ruck Challenge. Read below for more information!

STORM CTF

GoRuck Constellation Challenge

Course Outline

Module 1: Need for Security Analysis
Module 2: TCP IP Packet Analysis
Module 3: Penetration Testing Methodologies
Module 4: Customers and Legal Agreements
Module 5: Rules of Engagement
Module 6: Penetration Testing Planning and Scheduling
Module 7: Pre-penetration Testing Steps
Module 8: Information Gathering
Module 9: Vulnerability Analysis
Module 10: External Penetration Testing
Module 11: Internal Network Penetration Testing
Module 12: Firewall Penetration Testing
Module 13: IDS Penetration Testing
Module 14: Password Cracking Penetration Testing
Module 15: Social Engineering Penetration Testing
Module 16: Web Application Penetration Testing
Module 17: SQL Penetration Testing
Module 18: Penetration Testing Reports and Post Testing Actions

About the Instructor

Kevin Cardwell

Kevin Cardwell served as the leader of a 5 person DoD Red Team that achieved a 100% success rate at compromising systems and networks for six straight years. He has conducted over 500 security assessments across the globe. His expertise is in finding weaknesses and determining ways clients can mitigate or limit the impact of these weaknesses.

He spent 22 years in the U.S. Navy. He has worked as both software and systems engineer on a variety of Department of Defense projects and early on was chosen as a member of the project to bring Internet access to ships at sea. Following this highly successful project he was selected to head the team that built a Network Operations and Security Center (NOSC) that provided services to the commands ashore and ships at sea in the Norwegian Sea and Atlantic Ocean . He served as the Leading Chief of Information Security at the NOC for six years. While there he created a Strategy and Training plan for the development of an expert team that took personnel with little or no experience and built them into expert team members for manning of the NOSC.

He currently works as a free-lance consultant and provides consulting services for companies throughout the world, and as an advisor to numerous government entities within the US, Middle East, Africa, Asia and the UK . He is an Instructor, Technical Editor and Author for Computer Forensics, and Hacking courses. He is the author of the Center for Advanced Security and Training (CAST) Advanced Network Defense and Advanced Penetration Testing courses. He is technical editor of the Learning Tree Course Penetration Testing Techniques and Computer Forensics. He has presented at the Blackhat USA, Hacker Halted, ISSA and TakeDownCon conferences as well as many others. He has chaired the Cybercrime and Cyberdefense Summit in Oman and was Executive Chairman of the Oil and Gas Cyberdefense Summit. He is author of Building Virtual Pentesting Labs for Advanced Penetration Testing, Advanced Penetration Testing for Highly Secured Environments 2nd Edition and Backtrack: Testing Wireless Network Security. He holds a BS in Computer Science from National University in California and a MS in Software Engineering from the Southern Methodist University (SMU) in Texas. He developed the Strategy and Training Development Plan for the first Government CERT in the country of Oman that recently was rated as the top CERT for the Middle East. He serves as a professional training consultant to the Oman Information Technology Authority, and developed the team to man the first Commercial Security Operations Center in the country of Oman. He has worked extensively with banks and financial institutions throughout the Middle East, Europe and the UK in the planning of a robust and secure architecture and implementing requirements to meet compliance. He currently provides consultancy to Commercial companies, governments, federal agencies, major banks and financial institutions throughout the globe. Some of his recent consulting projects include the Muscat Securities Market (MSM), Petroleum Development Oman and the Central Bank of Oman. He designed and implemented the custom security baseline for the existing Oman Airport Management Company (OAMC) airports and the two new airports opening in 2017. He created custom security baselines for all of the Microsoft Operating Systems, Cisco devices as well as applications. Additionally, he provides training and consultancy to the Oman CERT and the SOC team in monitoring and incident identification of intrusions and incidents within the Gulf region. He holds the CEH, ECSA, LPT and a number of other certifications.

Dates

September 9 – 12 2018

Pricing

Retail Rate: $2999

Early Bird Rate: $2499*

*Early bird rate valid if purchased and paid for prior to July 31st.

Class Capacity

25

Course Includes:

Official Courseware
6 month subscription to iLabs (except CCISO)
1 Complimentary ECC Exam Portal Voucher
Certificate of Attendance
Complimentary 2-Day Pass to Hacker Halted- Atlanta conference
Lunch and coffee breaks throughout the duration of the training

Computer Hacking Forensic Investigator

This computer forensics course will give participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute. Many of today’s top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. It is no longer a matter of “will your organization be comprised (hacked)?” but, rather, “when?”

Earn your CHFI at Hacker Halted and get more than just a class! CHFI at Hacker Halted comes with a pass to Hacker Halted and the opportunity to join the STORM CTF and the Hacker Halted Go Ruck Challenge. Read below for more information!

STORM CTF

GoRuck Constellation Challenge

Course Outline

Module 1: Computer Forensics in Today’s World
Module 2: Computer Forensics Investigation Process
Module 3: Searching & Seizing Computers
Module 4: Digital Evidence
Module 5: First Responder Procedures
Module 6: Computer Forensics Lab
Module 7: Understanding Hard Disks & File Systems
Module 8: Windows Forensics
Module 9: Data Acquisition & Duplication
Module 10: Recovering Delete Files & Deleted Partitions
Module 11: Forensics Investigation Using Access Data FTK
Module 12: Forensic Investigation Using EnCase
Module 13: Steganography & Image File Forensics
Module 14: Application Password Crackers
Module 15: Log Capturing & Event Correlation
Module 16: Network Forensics, Investigating Logs & Investigating Network Traffic
Module 17: Investigating Wireless Attacks
Module 18: Investigating Web Attacks
Module 19: Tracking Emails and Investigating Email Crimes
Module 20: Mobile Forensics
Module 21: Investigative Reports
Module 22: Becoming an Expert Witness

About the Instructor

Eric Reed

MCEI, CEH, CNDA, CHFI, ECSA, LPT, CISSP, MCT, MCSE:Security, MCDST, CNA, SCNS, SNCP, SCNA, Security+, A+, Network+, iNet+

Eric Reed has over 12 years of experience in the IT consulting and training field, specializing in security since 2005. He has consulted and delivered certification and customized training to all branches of the U.S. Military, and for many Fortune 100 and Fortune 500 companies, including: FBI, DCMA, SAIC, EPA, General Dynamics, Northrop Grumman, Best Buy, Target, Mayo Clinic, Medtronic, Blue Cross, Wells Fargo, US Bank, NASA, Boeing, Lockheed Martin, General Mills, Proctor and Gamble, AT&T,and Verizon, to name a few.

He has delivered CEH, CHFI, and ECSA/LPT for the last seven years, and has enjoyed a better than 95% pass across the board. He is a regular instructor for EC-Council’s iClass online training, and was also selected as the instructor for the official EC-Council iLearn self-study product for CEH v7.

Eric was awarded EC Council Instructor of the Year in 2009 and 2012, as well as the Circle of Excellence in 2006, 2007, and 2010.

Dates

September 9 – 12 2018

Pricing

Retail Rate: $2999

Early Bird Rate: $2499*

*Early bird rate valid if purchased and paid for prior to July 31st.

Class Capacity

25

Course Includes:

Official Courseware
6 month subscription to iLabs (except CCISO)
1 Complimentary ECC Exam Portal Voucher
Certificate of Attendance
Complimentary 2-Day Pass to Hacker Halted- Atlanta conference
Lunch and coffee breaks throughout the duration of the training

Certified Chief Information Security Officer (CCISO)

The CCISO program trains individuals who are looking to make the jump from middle management to the executive ranks by focusing on high-level management skills specifically needed for IS executives. From project to audit management, procurement and finance, to strategy and policy, students will be taught to steer complex security programs strategically and successfully. The CCISO program was created and is taught by sitting high-level information security executives from across industries, resulting in the most relevant, challenging, and applicable content on the market.

Earn your CCISO at Hacker Halted and get more than just a class! CCISO at Hacker Halted comes with a pass to Global CISO Forum and the opportunity to join the STORM CTF and the Hacker Halted Go Ruck Challenge. Read below for more information!

STORM CTF

GoRuck Constellation Challenge

Course Outline
Domain 1: Governance (Policy, Legal & Compliance)

1. Definitions
2. Information Security Management Program
3. Information Security Laws, Regulations, & Guidelines
4. Privacy Laws

2 – IS Management Controls and Auditing Management (Projects, Technology, and Operations)

1. Design, Deploy, and Manage Security Controls in Alignment with Business
Goals, Risk Tolerance, and Policies and Standards
2. Information Security Risk Assessment
3. Risk Treatment
4. Residual Risk
5. Risk Acceptance
6. Risk Management Feedback Loops
7. Business Goals
8. Risk Tolerance
9. Policies and Standards
10. Understanding Security Controls Types and Objectives
11. Implementing Control Assurance Frameworks
12. COBIT (Control Objectives for Information and Related Technology)
13. BAI06 Manage Changes
14. COBIT 4.1 vs. COBIT 5
15. ISO 27001/27002
16. Automate Controls
17. Understanding the Audit Management Process

Domain 3: Management – Projects & Operations

1. The Role of the CISO
2. Information Security Projects
3. Security Operations Management

Domain 4: Information Security Core Competencies

1. Access Controls
2. Physical Security
3. Disaster Recovery
4. Network Security
5. Threat and Vulnerability Management
6. Application Security
7. Systems Security
8. Encryption
9. Computer Forensics and Incident Response

Domain 5: Strategic Planning & Finance

1. Security Strategic Planning
2. Alignment with Business Goals and Risk Tolerance
3. Relationship between Security, Compliance, & Privacy
4. Leadership
5. Enterprise Information Security Architecture (EISA) Models, Frameworks, and Standards
6. Security Emerging Trends
7. It’s all about the Data
8. Key Performance Indicators (KPI)
9. Systems Certification and Accreditation Process
10. Resource Planning
11. Financial Planning
12. Procurement
13. Vendor Management
14. Request for Proposal (RFP) Process
15. Integrate Security Requirements into the Contractual Agreement and Procurement Process
16. Statement of Work
17. Service Level Agreements

About the Instructor

Charles L. (Chuck) McGann, Jr.

Chuck delivers Cyber Security expertise, insight and support to Federal Agencies & Large Commercial Enterprises under pressure to address increasing cybersecurity threats and challenges, with a current focus on SME leadership and direction for NIST compliance. His functional expertise in compliance includes: SOX compliance strategies, Firewall policy strategies and guidelines, hardening standards, metrics/reporting, Identity/Access Management and CA/PKI operations and support.

SPECIALTIES:

Cybersecurity Strategist, Security Solutions Architect, Risk Management Framework, Incident Response, Information Assurance, CISSP, CISM, IAM, Incident Response Team Creation, Incident Response Operations, Cyber Intrusion Prevention, Cyber Intrusion Detection, Cybersecurity Tools, CISO Management, Endpoint Protection, Security Awareness, PCI, PCI/DSS, Data Loss Prevention, FedRAMP, Security Analytics.

Dates

September 9 – 12 2018

Pricing

Retail Rate: $3499

Early Bird Rate: $2999*

*Early bird rate valid if purchased and paid for prior to July 31st.

Class Capacity

25

Course Includes:

Official Courseware
6 month subscription to iLabs (except CCISO)
1 Complimentary Exam Voucher
Certificate of Attendance
Complimentary 2-Day Pass to Hacker Halted conference.
Lunch and coffee breaks throughout the duration of the training

What’s Covered in Certified Chief Information Security Officer (CCISO)?

Hear what past students had to say:

turn-cert-to-edu-banner