DEF CON (also written as DEFCON or Defcon) is one of the world's largest annual computer hacker conventions, held every year in Las Vegas, Nevada. The first DEF CON took place in June 1993. Many of the attendees at DEF CON include computer security professionals, journalists, lawyers, federal government employees, crackers, cyber-criminals, security researchers, and hackers with a general interest in computer code, computer architecture, phone phreaking, hardware modification, and anything else that can be "hacked".
Learn the latest computer security tools & techniques of Ethical Hacking from world-renowned Computer Security Guru Ankit Fadia and open various career opportunities for yourself. Ankit Fadia Certified Ethical Hacker ( AFCEH) 5.0 is a one-of-its-kind certification program in Ethical Hacking that aims at training and certifying a whole new generation of world-class Ethical Hackers in the field of computer security. AFCEH 5.0 updates you on the most dangerous computer security vulnerabilities and teaches you newly discovered techniques to safeguard computer systems.
With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems. Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find issues with their security before the bad guys do.
EC-Council's Ethical Hacking and Countermeasures (CEH) covers concepts and tools related to exploiting systems, networks, devices and operating platforms. This includes hacking concepts such as vulnerability assessment, network intrusion, reverse engineering, defacing websites, damaging network appliances, launching distributed denial-of-service attacks, massive worm propagation, breaking passwords, brute-forcing authentication systems, cracking encryption, exploiting systems, advance viruses, Trojans, and other malware. This certificate is targeted at site administrators, security professionals, auditors and anyone who is concerned about the integrity of the network infrastructure.
Black Hat USA 2012 is set to bring together the best minds in security to define tomorrow's information security landscape in Las Vegas. This year's training courses offer the essential knowledge and skills to defend your enterprise against today's threats.
In this course you will learn key issues plaguing the information security world, incident management process, and penetration testing.
Learn penetration testing methodologies while preparing for the CSAT certifications. The Certified Security Analyst Training (CSAT) program teaches information security professionals to conduct realistic penetration tests.
CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.
The previously untold – and previously highly classified – story of the conflux of espionage and technology, a compelling narrative rich with astonishing revelations taking readers from World War II to the Internet age.