AUDIT DEFEND TRAIN TOOLS BOOKS TEAM CONTACT
Train
Courses

In Hacking Exposed Erik Pace Birkholz stated, “The majority of my (security) concerns, in most cases, are not a result of poor products but products being implemented poorly.” Special Ops Security aims to deliver you the education you need to fight host and network negligence.

Training is offered in the following areas:

PEOPLE and PROCESS

  • How to Perform a Rapid Self-Assessment for Security and Optimization
  • Vulnerability Management
  • Security Awareness
  • Planning and Performing Security Assessments
  • Creating Effective Corporate Security Policies
  • Architecting the Human Element of Security

NETWORK

  • Perimeter Assessment: Routers, Switches and Firewalls
  • Assessing and Hardening the Network Infrastructure
  • Secure Architecture and Infrastructure
  • Wireless LANs: Discovery and Defense
  • Network Security Monitoring
  • Building DMZs for Enterprise Networks

HOST

  • Hardening Windows Server 2003 for SQL Server
  • Hardening Windows Server 2003 for IIS
  • Hardening Windows Server 2003 for AD
  • Hardening Microsoft Windows Small Business Server 2003
  • Attacking and Defending Windows XP
  • Attacking and Defending Windows 2000
  • Attacking and Defending Windows Server 2003
  • Attacking and Defending UNIX Servers
  • Attacking and Defending UNIX Workstations (Desktops)

SERVICE

  • Securing Windows 2000 Active Directory
  • Securing Windows 2003 Active Directory
  • Securing Exchange and Outlook Web Access (OWA)
  • Attacking and Defending DNS
  • Attacking and Defending Microsoft Terminal Services
  • Securing IIS
  • Attacking and Defending Microsoft SQL Server
  • Attacking and Defending Oracle

APPLICATION SECURITY AND SECURE CODING

  • Threat Modeling in the Software Development Process
  • Security in the Software Development Lifecycle
  • Injecting Security into Functional and Technical Requirements
  • Secure Software Development Practices - Hands On
  • Assessing Web Application Security
  • SQL Server Security
  • Web Application and Database Security
  • Secure Coding
  • Hacking Web Applications

SECURITY ASSESSMENT

  • Planning and Executing an Asset-Centric Security Assessment
  • Assessing Network Security
  • Information Warfare: Attack, Monitor and Defend
  • Automated Vulnerability Assessment
  • Special Ops: Network Strike Team
  • Open Source Vulnerability Management
  • Assessing Internal Network Security
  • Inventory and Exposure of Corporate Assets
  • Hunting for High Severity Vulnerabilities
  • Penetration Testing for Non-intrusive Attacks
  • Penetration Testing for Intrusive Attacks
  • Hands-On: Security Assessment Case Studies
  • Building an Effective Security Assessment Arsenal

PRODUCT TRAINING

  • Foundstone Enterprise Product Training
  • Foundstone Scripting Language (FSL) Training
Authorized SBA 8(a) Minority-Owned Small Disadvantaged Business · Terms of Use · Privacy Policy Copyright © 2002-2018 • All Rights Reserved.