EC-Council CAST 614 Advanced Network Defense Boot Camp - ASM , Rockville , Maryland
logo   Come experience a comprehensively structured and fast paced program that immerses you into the mysterious world of the “hacker”, providing insights of their mindset; a critical weapon for defending against some of the most malicious attacks around. Overview: With this course you can be among the few who transcend the old idea of the hacker having all the fun, take pride being the defender, form an offensive mindset to skill-fully orchestrate robust and solid defenses and reinvent popular belief by beating the hacker at his own game. You will be evaluating advanced “hacks” and methods of defense fortification bringing you closer to establishing perfect security by reviewing best practices and methodologies you can apply to secure environments, provide segmentation and isolation to reduce the effectiveness of the Advanced Persistent Threat. The course will cover fundamental areas of fortifying your defense; you will discover methods of developing a secure baseline and how to “harden” your enterprise architectures from the most advanced attacks. Once a strategy for a fortified perimeter is defined the course moves on to defending against the sophisticated malware that is on the rise today and the importance of “live” memory analysis and real time monitoring. Pre-requisite:
  • Only understanding of hacking
Course Outline: Please download PDF[sc:pdficon ] Who Should Attend the Advanced Network Defense Course (CAST 614)? Firewall administrators, system architects, system administrators, windows admin or those responsible for or interested in:
  • Identifying security weaknesses in computer systems or networks
  • Exposing weaknesses for system’s owners to fix breaches before being targets of compromise
  • Applying hacking and pen testing constructively to defend against various possible attacks
  • Analysing best practices in developing secure system and network configurations
  • Establishing a secure baseline in deploying machines in a protected state
  • Appreciating popular attack methods applied by hackers in order to fortify their systems
From practically any organization that handles important data would find this course beneficial, examples are:
  • Government agencies
  • Universities
  • Hospitality
  • Retail
  • Banking and Financial institutions
  • Brokerage and Trading firms
  • Insurance
  • Scientific institutions & research agencies
  • Telecommunication
  • Computer design firms
  • Consulting firms
  • Science and Engineering firms
  • Those involved with online related businesses & transactions
  • Card related businesses
Why Should You Attend the Advanced Network Defense Course?
  • Executing a set of techniques that are critical to the protection of your entire enterprise against some of today’s most advanced threats
  • Reviewing methods of system deployments in as secure a state as possible while supporting your daily business requirements
  • Applying necessary techniques required for malware identification throughout the enterprise even in the case of the malware not being detectable by any of your security controls
  • Staging Advanced Attacks to appreciate methods of correctly eliminating or mitigating risk to an acceptable level
What You Will Learn By Taking Advanced Network Defense:
  • Staging a strong defense against popular security threats
  • Fortifying your organization with a good foundation of risk protection methods
  • Applying latest references and guidance on best practices in the field of cyber security
  • Securing your enterprise architecture from a medium threat level and building towards more sophisticated threats
logoECH

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.

Overview:

CEHv10 is a comprehensive Ethical Hacking and Information Systems Security Auditing program focusing on latest security threats, advanced attack vectors, and practical real time demonstration of the latest Hacking Techniques, methodologies, tools, tricks, and security measures. Unlike other strictly theoretical training, you will be immersed in interactive sessions with hands-on labs after each topic. You can explore your newly gained knowledge right away in your classroom by pentesting, hacking and securing your own systems. The lab intensive environment gives you in-depth knowledge and practical experience with the current, essential security systems. You will first begin with understanding how perimeter defenses work and then move into scanning and attacking networks, of course, no real network is harmed. You will also learn how intruders escalate privileges and what steps can be taken to secure a system. You will also gain knowledge about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, and Virus Creation. When you leave this intensive 5 day class you will have hands on understanding and experience in Ethical Hacking.

Pre-requisite:

  • Two years of experience in field of IT
  • or Security+ and Network+ certification

Course Outline: Please download PDF[sc:pdficon ]

Why EC-Council CEHv10?

  • Compliance to National Initiative For Cybersecurity Education (NICE)
  • CNSS 4013 Recognition
  • ANSI Accredited Exam Process

The Certified Ethical Hacker certification will fortify the application knowledge of: 

  • Security officers
  • Auditors
  • Security professionals
  • Site administrators
  • And anyone who is concerned about the integrity of the network infrastructure
  • All-Inclusive Price:

     Live Instructor-Led Training
     Classrooms are equipped with Digital Whiteboard
     Certified Instructor
    Tuition
    Book/Curriculum
     Extensive Hands-on Lab Activities
     One Exam Voucher (Valued at $900.00 )
     Practice Exam
     Refreshments (N/A: Virtual/WebEx)
     Lunch (N/A: Evening & Virtual/WebEx)
    Daily Indoor Garage Parking Fee (N/A: Evening & Virtual/WebEx)
     One Year FREE Course Retake Policy at ASM HQ Facility
  • Group Price: Available upon request
  • GSA Price: Available for US Government and US Government Contractors. Please Contact ASM
  • Exam Requirements: 1 certification exam
  • Exam Format:
    ✔  Multiple choice questions 
    ✔  4 hours exam
    ✔  Maximum of 110 questions
  • Minimum Passing Score: 
    ✔ Varies around 800-850 out of 1000
  • Download Exam Objectives

null
null
What do you need for Virtual/WebEx class?
Computer & Internet Access
 
Take advantage of latest digital interactive “whiteboard” technology at ASM!
Classrooms are now equipped with digital whiteboard ( Powered by SMART Learning Suite )
 
Virtual ILT (Instructor Led-Training) courses combine the best of instructor-delivered lectures and presentations with the convenience and flexibility of an on-demand learning format.
 
Virtual ILT programs are delivered using latest virtual technologies such as WebEx to extend the classroom to you at your workplace or home and can be viewed by the student directly on their own computer with an internet connection. By employing Cisco’s WebEx, and integrating our state-of-the-art lab facilities, we can provide a near-classroom experience, remotely, to your own venue of choice.
 
WebEx provides the platform that allows ASM to deliver training to our customers, regardless of location – virtually anywhere in the world. By leveraging WebEx Training Center, we can provide a full multi-media experience, which provides interactive lecture, labs, and discussion, right to a standard personal computer.
 

All students will be provided with URL information, to link to the WebEx class that they have signed up for, the required lab facilities, and a toll free number for completely integrated audio.

Ready to sign up for your Virtual/WebEx class? Register Now!
  • ASM HQ: Washington DC Metropolitan Area | Rockville, Maryland
  • On-Site @ Customer: Available upon request
  • Other Locations: ASM partners, customer site, around the world

EC-Council CAST 614 Advanced Network Defense

With this course you can be among the few who transcend the old idea of the hacker having all the fun, take pride being the defender, form an offensive mindset to skill-fully orchestrate robust and solid defenses and reinvent popular belief by beating the hacker at his own game. You will be evaluating advanced “hacks” and methods of defense fortification bringing you closer to establishing perfect security by reviewing best practices and methodologies you can apply to secure environments, provide segmentation and isolation to reduce the effectiveness of the Advanced Persistent Threat. The course will cover fundamental areas of fortifying your defense; you will discover methods of developing a secure baseline and how to “harden” your enterprise architectures from the most advanced attacks. Once a strategy for a fortified perimeter is defined the course moves on to defending against the sophisticated malware that is on the rise today and the importance of “live” memory analysis and real time monitoring.
  • Only understanding of hacking
  • Firewall administrators, system architects, system administrators, windows admin or those responsible for or interested in:

    • Identifying security weaknesses in computer systems or networks
    • Exposing weaknesses for system’s owners to fix breaches before being targets of compromise
    • Applying hacking and pen testing constructively to defend against various possible attacks
    • Analysing best practices in developing secure system and network configurations
    • Establishing a secure baseline in deploying machines in a protected state
    • Appreciating popular attack methods applied by hackers in order to fortify their systems

    From practically any organization that handles important data would find this course beneficial, examples are:

    • Government agencies
    • Universities
    • Hospitality
    • Retail
    • Banking and Financial institutions
    • Brokerage and Trading firms
    • Insurance
    • Scientific institutions & research agencies
    • Telecommunication
    • Computer design firms
    • Consulting firms
    • Science and Engineering firms
    • Those involved with online related businesses & transactions
    • Card related businesses
  • Staging a strong defense against popular security threats
  • Fortifying your organization with a good foundation of risk protection methods
  • Applying latest references and guidance on best practices in the field of cyber security
  • Securing your enterprise architecture from a medium threat level and building towards more sophisticated threats

Schedule & Registration

Boot Camp
Register Apr 13 – 17, 2020(Cast614_BC18_20)Monday to Friday9 am to 5 pm
Washington DC Metropolitan Area
Rockville, Maryland
Register May 11 – 15, 2020(Cast614_BC19_20)Monday to Friday9 am to 5 pm
Washington DC Metropolitan Area
Rockville, Maryland
Register Jun 8 – 12, 2020(Cast614_BC20_20)Monday to Friday9 am to 5 pm
Washington DC Metropolitan Area
Rockville, Maryland
Register Jul 6 – 10, 2020(Cast614_BC21_20)Monday to Friday9 am to 5 pm
Washington DC Metropolitan Area
Rockville, Maryland
Register Aug 3 – 7, 2020(Cast614_BC22_20)Monday to Friday9 am to 5 pm
Washington DC Metropolitan Area
Rockville, Maryland
Register Aug 31 – Sept 4, 2020(Cast614_BC23_20)Monday to Friday9 am to 5 pm
Washington DC Metropolitan Area
Rockville, Maryland
Register Sept 8 – 11, 2020(Cast614_BC24_20)Monday to Friday9 am to 5 pm
Washington DC Metropolitan Area
Rockville, Maryland
Register Oct 5 – 9, 2020(Cast614_BC25_20)Monday to Friday9 am to 5 pm
Washington DC Metropolitan Area
Rockville, Maryland
Register Nov 2 – 6, 2020(Cast614_BC26_20)Monday to Friday9 am to 5 pm
Washington DC Metropolitan Area
Rockville, Maryland
Register Nov 30 – Dec 4, 2020(Cast614_BC27_20)Monday to Friday9 am to 5 pm
Washington DC Metropolitan Area
Rockville, Maryland
Boot Camp
Register Apr 13 – 17, 2020(Cast614_BC18_20)Monday to Friday9 am to 5 pm
Washington DC Metropolitan Area
Rockville, Maryland
Register May 11 – 15, 2020(Cast614_BC19_20)Monday to Friday9 am to 5 pm
Washington DC Metropolitan Area
Rockville, Maryland
Register Jun 8 – 12, 2020(Cast614_BC20_20)Monday to Friday9 am to 5 pm
Washington DC Metropolitan Area
Rockville, Maryland
Register Jul 6 – 10, 2020(Cast614_BC21_20)Monday to Friday9 am to 5 pm
Washington DC Metropolitan Area
Rockville, Maryland
Register Aug 3 – 7, 2020(Cast614_BC22_20)Monday to Friday9 am to 5 pm
Washington DC Metropolitan Area
Rockville, Maryland
Register Aug 31 – Sept 4, 2020(Cast614_BC23_20)Monday to Friday9 am to 5 pm
Washington DC Metropolitan Area
Rockville, Maryland
Register Sept 8 – 11, 2020(Cast614_BC24_20)Monday to Friday9 am to 5 pm
Washington DC Metropolitan Area
Rockville, Maryland
Register Oct 5 – 9, 2020(Cast614_BC25_20)Monday to Friday9 am to 5 pm
Washington DC Metropolitan Area
Rockville, Maryland
Register Nov 2 – 6, 2020(Cast614_BC26_20)Monday to Friday9 am to 5 pm
Washington DC Metropolitan Area
Rockville, Maryland
Register Nov 30 – Dec 4, 2020(Cast614_BC27_20)Monday to Friday9 am to 5 pm
Washington DC Metropolitan Area
Rockville, Maryland
Boot camp (Virtual/WebEx)
Register Apr 13 – 17, 2020(Cast614_BC18_20_Web)Monday to Friday9 am to 5 pm
WebEx (Washington DC Time Zone)
Register May 11 – 15, 2020(Cast614_BC19_20_Web)Monday to Friday9 am to 5 pm
WebEx (Washington DC Time Zone)
Register Jun 8 – 12, 2020(Cast614_BC20_20_Web)Monday to Friday9 am to 5 pm
WebEx (Washington DC Time Zone)
Register Jul 6 – 10, 2020(Cast614_BC21_20_Web)Monday to Friday9 am to 5 pm
WebEx (Washington DC Time Zone)
Register Aug 3 – 7, 2020(Cast614_BC22_20_Web)Monday to Friday9 am to 5 pm
WebEx (Washington DC Time Zone)
Register Aug 31 – Sept 4, 2020(Cast614_BC23_20_Web)Monday to Friday9 am to 5 pm
WebEx (Washington DC Time Zone)
Register Sept 8 – 11, 2020(Cast614_BC24_20_Web)Monday to Friday9 am to 5 pm
WebEx (Washington DC Time Zone)
Register Oct 5 – 9, 2020(Cast614_BC25_20_Web)Monday to Friday9 am to 5 pm
WebEx (Washington DC Time Zone)
Register Nov 2 – 6, 2020(Cast614_BC26_20_Web)Monday to Friday9 am to 5 pm
WebEx (Washington DC Time Zone)
Register Nov 30 – Dec 4, 2020(Cast614_BC27_20_Web)Monday to Friday9 am to 5 pm
WebEx (Washington DC Time Zone)

contact us


Contact Us