Tutorial Session

Date : 25th August 2014
Time : 8.30am - 5:30pm
Venue : Bangunan UTMSPACE, No. 195A, Jalan Tun Razak, Kuala Lumpur(Map)

Download Workshop Registration Form
Download Call For Participant

TUTORIAL 1
(9:00 am – 5:00 pm)

TUTORIAL 2
(9:00 am – 5:00 pm)

Profile :

Bharanidharan Shanmugam has received his Ph.D from Univesriti Teknologi Malaysia and is attached to Information Assurance and Security Research Group, Advanced Informatics School, Universiti Teknologi Malaysia. In addition, he also engaged in conducting workshops that includes penetration testing, application security, forensic investigation, risk assessment and big data.  His research interest is towards Network Security, Cloud computing, Intrusion detection systems and risk assessment. He is a member of IEEE, AISA, DSCI etc, and hold the following professional certifications : CEH,CHFI, CEI, CTFL, GSEC, GCIH, IS0 27001 Lead Auditor and Implementer and also one of the accredited trainer of EC-Council Worldwide.


Title :  Penetration testing – Level 1

As cyber attacks increase, so does the demand for information security professionals who possess true network penetration testing and it is a foundation of the enterprise security. The course starts with proper planning, scoping and recon, and then dives into scanning, target exploitation, with detailed hands-on exercises and practical tips for doing the job safely and effectively. In this one day class the students will be taught with penetration testing with a focus on using the Metasploit Framework. We will begin by introducing the penetration testing methodology and then becoming proficient at using Metasploit. Then we will work through the phases of penetration testing using Linux and Windows victims. Students will be introduced to finding and exploiting many different kinds of vulnerabilities as well as post exploitation strategies. In addition to Metasploit, students will gain experience with additional information gathering tools such as Maltego and scanning tools such as Nmap.


Requirement:

  • Decent notebook with minimum 2GB RAM (advisable 4GB for those who run Windows Vista/7), and HDD with minimum 30GB free space & VMWare Player or Workstation installed.
  • Basic knowledge of networking and packets

Profile :

Syed Zainudeen Mohd Shaid is a member of Information Assurance and Security Research Group (IASRG) in Universiti Teknologi Malaysia (UTM). With a Software Reverse Engineering background, he is now active in Malware Research and Penetration Testing. He also does training and consultancy on Android, Hacking and give talks on Computer & Internet Security. He is a Certified Penetration Testing Professional (CPTP). He loves gadgets and enjoys exploring new things related to security.

 

 

 


Title: Malware Analysis Fundamentals

Malware is nothing new. It is dangerous and it is real. It is important that we understand them in order to deal with them -- properly. This crash course explains the things that needs to be done in order to obtain, handle, and analyze malware samples with special focus on malware analysis. Participants will learn to use tools like Honeypots, Virtual Machines, Debuggers, Disassemblers and many other tools to help them in their quest in taming real malware samples. This course is certainly not for the faint hearted. Proceed with caution.


 

 

 


Requirements:

* Notebook with 4GB of RAM (8 GB recommended) running Windows 7 (recommended) or any modern operating systems (you will be on your own to figure out how to do things in OSes other than the recommended one)

* VMware Player/Workstation (recommended) or VirtualBox

* Basic knowledge on malware

* Good command in x86 assembly is an advantage (but not a must

 

Fees per workshop:

Malaysian

RM   200

International

USD 40

Malaysian Student

RM 100

International Student

USD 30

 

Program Schedule :


WORKSHOP SESSION

08.30am – 09.00am

Registration

09.00am – 12.00pm

Morning Session

Tutorial I

Tutorial II

12.00pm –02.00pm

Lunch

02.00pm – 05.00pm

Afternoon Session

Tutorial I

Tutorial II

 

 

Copyright © isbast2014