HackMiami Conference 6 Training Classes

(Training includes general admission admissioin to Hackmiami Conference)

Enterprise Penetration Testing Methods 

By Rod Soto

During this comprehensive course, tools and methodologies that are used during penetration tests in enterprise network environments will be detailed.The course will utilize a lab environment for a hands-on instruction of manual penetration testing methods, in addition to, training for use of exploitation frameworks, such as Metasploit. Focus will be geared towards methodology,processes, vectors, tools, and techniques used for exploitation. By the end ofthe course, the student will have an in-depth understanding of the underlying principals of network exploitation and will have gained experience in the successful execution of attacks.

Minimum Course Requirements:
Bring a Laptop with: 4 GB of RAM at Minimum and Quad-Core Processor at Minimum Ability to Run Virtual Machines
Understanding of Basic Networking Concepts
Basic Linux Comprehension

Target Audience:This seminar is geared towards those seeking to enter the information security industry while also enriching those who seek to develop the skills and experience necessary to succeed as a penetration tester (for fun and for profit).

Register for training 
Rod Soto

Rod Soto has over 15 years of experience in information technology and
security.  He has spoken at ISSA, ISC2, OWASP,
BlackHat, DEFCON, Hackmiami, Bsides and also been featured in Rolling
Stone Magazine,
Pentest Magazine, Univision and CNN. Rod Soto was the winner of the
2012 BlackHat Las vegas CTF  competition and is the founder and lead
developer of the Kommand && KonTroll competitive hacking Tournament
series.
Register for training