Recognizing the growing demand for information security education and training, we have put together some of the most sought-after technical training & certification classes offered by top training companies and led by well-respected instructors.

Make Atlanta your next destination to obtain quality information security knowledge and cutting edge skills, and let Hacker Halted | Academy be the platform to make your learning and training an enjoyable experience.


Register

Self register online or get help registering with Concierge Registration!

 

Benefits

What you get when you sign up for any of the training at the Hacker Halted Academy:

  • Official Courseware
  • 6 month subscription to iLabs (except CCISO)
  • 1 Complimentary Exam voucher (For EC-Council certification training only)
  • Certificate of attendance
  • Lunch and coffee breaks throughout the duration of the training
  • Complimentary 2-Day Pass to Hacker Halted

Venue

Renaissance Atlanta Waverley – Learn More

CEHECSACNDCHFICCISO

Certified Ethical Hacker v10– (CEH)

The worlds most advanced ethical hacking course with 20 of the most current security domains an ethical hacker will want to know when planning to beef up the information security posture of their organization. In 20 comprehensive modules, the course covers over 270 attack technologies, commonly used by hackers. Our security experts have designed over 140 labs which mimic real time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world. The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the globally recognized Certified Ethical Hacker certification!

Course Outline
  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service
  • Session Hijacking
  • Evading IDS, Firewalls, and Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • IoT Hacking
  • Cloud Computing
  • Cryptography
Dates

October 6th – 9th, 2019

Pricing

Retail Rate: $2999

Early Bird Rate: $2499*

*Early bird rate valid if purchased and paid for prior to August 31st.

Class Capacity

25

Course Includes:

Official Courseware
6 month subscription to iLabs (except CCISO)
1 Complimentary ECC Exam Portal Voucher
Certificate of Attendance
Complimentary 2-Day Pass to Hacker Halted- Atlanta conference
Lunch and coffee breaks throughout the duration of the training

Certified Security Analyst – (ECSA)

The Certified Security Analyst “pen testing” program is a computer security certification designed to teach Information Security Professionals the advanced uses of the available methodologies, tools and techniques expected from a premier ethical hacking training and are required to perform comprehensive information security pen tests. Students will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose. By teaching the Licensed Penetration Tester, LPT methodology and ground breaking techniques for security and penetration testing, this class will help you perform the intensive assessments required to effectively identify and mitigate risks to the security of your infrastructure. As students learn to identify Information Security problems in this ethical hacking training certification course, they also learn how to avoid and eliminate them, with the class providing complete coverage of analysis and network security-testing topics.

Course Outline

Module 1: Need for Security Analysis
Module 2: TCP IP Packet Analysis
Module 3: Penetration Testing Methodologies
Module 4: Customers and Legal Agreements
Module 5: Rules of Engagement
Module 6: Penetration Testing Planning and Scheduling
Module 7: Pre-penetration Testing Steps
Module 8: Information Gathering
Module 9: Vulnerability Analysis
Module 10: External Penetration Testing
Module 11: Internal Network Penetration Testing
Module 12: Firewall Penetration Testing
Module 13: IDS Penetration Testing
Module 14: Password Cracking Penetration Testing
Module 15: Social Engineering Penetration Testing
Module 16: Web Application Penetration Testing
Module 17: SQL Penetration Testing
Module 18: Penetration Testing Reports and Post Testing Actions

Dates

October 6th – 9th, 2019

Pricing

Retail Rate: $2999

Early Bird Rate: $2499*

*Early bird rate valid if purchased and paid for prior to August 31st.

Class Capacity

25

Course Includes:

Official Courseware
6 month subscription to iLabs (except CCISO)
1 Complimentary ECC Exam Portal Voucher
Certificate of Attendance
Complimentary 2-Day Pass to Hacker Halted- Atlanta conference
Lunch and coffee breaks throughout the duration of the training

Certified Network Defender– (CND)

The program prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect and respond approach to network security. The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real world expertise on current network security technologies and operations. The study-kit provides you with over 10 GB of network security best practices, assessments and protection tools. The kit also contains templates for various network policies and a large number of white papers for additional learning.

Course Outline

Module 1: Computer Network and Defense Fundamentals
Response & Handling
Module 2: Network Security Threats, Vulnerabilities, and Attacks
Module 3: Network Security Controls, Protocols, and Devices
Module 4: Network Security Policy Design and Implementation
Module 5: Physical Security
Module 6: Host Security
Module 7: Secure Firewall Configuration and Management
Module 8: Secure IDS Configuration and Management
Module 9: Secure VPN Configuration and Management
Module 10: Wireless Network Defense
Module 11: Network Traffic Monitoring and Analysis
Module 12: Network Risk and Vulnerability Management
Module 13: Data Backup and Recovery
Module 14: Network Incident Response and Management

Dates

October 6th – 9th, 2019

Pricing

Retail Rate: $2999

Early Bird Rate: $2499*

*Early bird rate valid if purchased and paid for prior to August 31st.

Class Capacity

25

Course Includes:

Official Courseware
6 month subscription to iLabs (except CCISO)
1 Complimentary ECC Exam Portal Voucher
Certificate of Attendance
Complimentary 2-Day Pass to Hacker Halted- Atlanta conference
Lunch and coffee breaks throughout the duration of the training

Computer Hacking Forensic Investigator

This computer forensics course will give participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute. Many of today’s top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. It is no longer a matter of “will your organization be comprised (hacked)?” but, rather, “when?”

Course Outline

Module 1: Computer Forensics in Today’s World
Module 2: Computer Forensics Investigation Process
Module 3: Searching & Seizing Computers
Module 4: Digital Evidence
Module 5: First Responder Procedures
Module 6: Computer Forensics Lab
Module 7: Understanding Hard Disks & File Systems
Module 8: Windows Forensics
Module 9: Data Acquisition & Duplication
Module 10: Recovering Delete Files & Deleted Partitions
Module 11: Forensics Investigation Using Access Data FTK
Module 12: Forensic Investigation Using EnCase
Module 13: Steganography & Image File Forensics
Module 14: Application Password Crackers
Module 15: Log Capturing & Event Correlation
Module 16: Network Forensics, Investigating Logs & Investigating Network Traffic
Module 17: Investigating Wireless Attacks
Module 18: Investigating Web Attacks
Module 19: Tracking Emails and Investigating Email Crimes
Module 20: Mobile Forensics
Module 21: Investigative Reports
Module 22: Becoming an Expert Witness

Dates

October 6th – 9th, 2019

Pricing

Retail Rate: $2999

Early Bird Rate: $2499*

*Early bird rate valid if purchased and paid for prior to August 31st.

Class Capacity

25

Course Includes:

Official Courseware
6 month subscription to iLabs (except CCISO)
1 Complimentary ECC Exam Portal Voucher
Certificate of Attendance
Complimentary 2-Day Pass to Hacker Halted- Atlanta conference
Lunch and coffee breaks throughout the duration of the training

Certified Chief Information Security Officer (CCISO)

The CCISO program trains individuals who are looking to make the jump from middle management to the executive ranks by focusing on high-level management skills specifically needed for IS executives. From project to audit management, procurement and finance, to strategy and policy, students will be taught to steer complex security programs strategically and successfully. The CCISO program was created and is taught by sitting high-level information security executives from across industries, resulting in the most relevant, challenging, and applicable content on the market.

Course Outline
Domain 1: Governance (Policy, Legal & Compliance)

1. Definitions
2. Information Security Management Program
3. Information Security Laws, Regulations, & Guidelines
4. Privacy Laws

2 – IS Management Controls and Auditing Management (Projects, Technology, and Operations)

1. Design, Deploy, and Manage Security Controls in Alignment with Business
Goals, Risk Tolerance, and Policies and Standards
2. Information Security Risk Assessment
3. Risk Treatment
4. Residual Risk
5. Risk Acceptance
6. Risk Management Feedback Loops
7. Business Goals
8. Risk Tolerance
9. Policies and Standards
10. Understanding Security Controls Types and Objectives
11. Implementing Control Assurance Frameworks
12. COBIT (Control Objectives for Information and Related Technology)
13. BAI06 Manage Changes
14. COBIT 4.1 vs. COBIT 5
15. ISO 27001/27002
16. Automate Controls
17. Understanding the Audit Management Process

Domain 3: Management – Projects & Operations

1. The Role of the CISO
2. Information Security Projects
3. Security Operations Management

Domain 4: Information Security Core Competencies

1. Access Controls
2. Physical Security
3. Disaster Recovery
4. Network Security
5. Threat and Vulnerability Management
6. Application Security
7. Systems Security
8. Encryption
9. Computer Forensics and Incident Response

Domain 5: Strategic Planning & Finance

1. Security Strategic Planning
2. Alignment with Business Goals and Risk Tolerance
3. Relationship between Security, Compliance, & Privacy
4. Leadership
5. Enterprise Information Security Architecture (EISA) Models, Frameworks, and Standards
6. Security Emerging Trends
7. It’s all about the Data
8. Key Performance Indicators (KPI)
9. Systems Certification and Accreditation Process
10. Resource Planning
11. Financial Planning
12. Procurement
13. Vendor Management
14. Request for Proposal (RFP) Process
15. Integrate Security Requirements into the Contractual Agreement and Procurement Process
16. Statement of Work
17. Service Level Agreements

Dates

October 6th – 9th, 2019

Pricing

Retail Rate: $3499

Early Bird Rate: $2999*

*Early bird rate valid if purchased and paid for prior to August 31st.

Class Capacity

25

Course Includes:

Official Courseware
6 month subscription to iLabs (except CCISO)
1 Complimentary Exam Voucher
Certificate of Attendance
Complimentary 2-Day Pass to Hacker Halted conference.
Lunch and coffee breaks throughout the duration of the training

What’s Covered in Certified Chief Information Security Officer (CCISO)?

Hear what past students had to say: