BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20150217T180000Z
DTEND:20150217T220000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:Ethical Hacking Fundamentals
DESCRIPTION:Ethical Hacking Fundamentals\nDate: February 17\, 2015			Time: 12:00pm - 4:00pm\nInstructor: Vy Nguyen\nIn this course\, you'll learn what it takes to become an ethical hacker and the methods real attackers use to penetrate networks and computer systems.  You will get a clear understanding of the mindset\, techniques and terminology that are used in hacking and penetration testing.  This course will also provide the fundamentals which will help you to become a better security professional and a more valuable asset to any security team.\n\nHands-On Experience Includes:     \n 	Footprinting and Reconnaissance\n 	Scanning networks     \n 	Enumeration     \n 	System Hacking\n          o	Hiding a message with image steganography          \no	Cracking passwords and escalating privileges     \n 	Trojans and Backdoors\n          o	Injecting a Trojan into a host\n      	Cryptography\nNOTE:\nNothing learned in this class is intended to teach or encourage the use of security tools or methodologies for illegal or unethical purposes. Always act in a responsible manner. Make sure that you have written permission from the proper individuals before you use any of the tools or techniques described within. Always obtain permission before installing any of these tools on a network.\nCampus/Location: Niceville/B-112\nFee: $	100.00				Ref #:94183
X-ALT-DESC;FMTTYPE=text/html:<p></p><p><span style="font-size:medium\;">Ethical Hacking Fundamentals\n</span></p><p><span style="font-size:medium\;">Date: February 17\, 2015			Time: 12:00pm - 4:00pm\n</span></p><p><span style="font-size:medium\;">Instructor: Vy Nguyen\n</span></p><p><span style="font-size:medium\;">In this course\, you'll learn what it takes to become an ethical hacker and the methods real attackers use to penetrate networks and computer systems.  You will get a clear understanding of the mindset\, techniques and terminology that are used in hacking and penetration testing.  </span></p><p><span style="font-size:medium\;">This course will also provide the fundamentals which will help you to become a better security professional and a more valuable asset to any security team.\n\n</span></p><p><span style="font-size:medium\;">Hands-On Experience Includes:</span></p><p><span style="font-size:medium\;">&nbsp\;&nbsp\;&nbsp\;&nbsp\; \n&bull\;	Footprinting and Reconnaissance\n&bull\;	Scanning networks</span></p><p><span style="font-size:medium\;">&nbsp\;&nbsp\;&nbsp\;&nbsp\; \n&bull\;	Enumeration</span></p><p><span style="font-size:medium\;">&nbsp\;&nbsp\;&nbsp\;&nbsp\; \n&bull\;	System Hacking\n</span></p><p><span style="font-size:medium\;">&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\; o	Hiding a message with image steganography</span></p><p><span style="font-size:medium\;">&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\; \no	Cracking passwords and escalating privileges</span></p><p><span style="font-size:medium\;">&nbsp\;&nbsp\;&nbsp\;&nbsp\; \n&bull\;	Trojans and Backdoors\n</span></p><p><span style="font-size:medium\;">&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\; o	Injecting a Trojan into a host\n</span></p><p><span style="font-size:medium\;">&nbsp\;&nbsp\;&nbsp\;&nbsp\; &bull\;	Cryptography\n</span></p><p><span style="font-size:medium\;">NOTE:\nNothing learned in this class is intended to teach or encourage the use of security tools or methodologies for illegal or unethical purposes. Always act in a responsible manner. Make sure that you have written permission from the proper individuals before you use any of the tools or techniques described within. Always obtain permission before installing any of these tools on a network.\n</span></p><p><span style="font-size:medium\;">Campus/Location: Niceville/B-112\nFee: $	100.00				Ref #:94183\n</span></p>
LOCATION:100 College Blvd.\, Niceville\, FL 32578 Northwest Florida State College-Costa Leadership Institute 100 College Blvd. Niceville\, FL 32578
UID:e.3173.2488
SEQUENCE:3
DTSTAMP:20260410T070154Z
URL:http://greaterfortwaltonbeach.chambermaster.com/events/details/ethical-hacking-fundamentals-02-17-2015-2488
END:VEVENT

END:VCALENDAR
