IT Security Training CISSP / CEH / CHFI & CompTIA Security + Certification
Security is critical to every aspect of information technology, and in every role from the Chief Information Security Officer to the Security Engineer and IT Specialist. At Interface Technical Training we have security certification training that spans the entire range. This training is taught exclusively by Mike Danseglio CISSP CEH, a security veteran with more than 20 years of hands-on experience in the field.
Students learn all phases of IT security, including planning, implementation, and operations. They experience how hackers think, how they attack, and what they can do to protect their assets against a variety of threats. In the classroom, these classes use only real-world scenarios, never contrived or canned situations. Because security incidents aren’t theoretical paper-based problems, they’re emergencies that threaten an individual or a company.
I’m Mike Danseglio, and I’m an instructor here at Interface Technical Training. One of the classes I teach here at Interface isCertified Ethical Hacking CEHv9. I Ethical hacking is a critical skill-set for anybody to have that’s in IT Security.
Ethical Hacking is all about learning how hackers attack systems, how they look for vulnerabilities, how they examine systems, how they check security, how they use IT techniques and tools that typical IT users would use but in a negative way, in a very bad way, to try to find compromises and vulnerabilities to destroy businesses, extort money, steal, loot, and to do all kinds of very negative, nasty things.
White Hat vs. Black Hat
There’s a differences in the skill-sets here between the IT Professionals that usuallyDefendsystems (White Hat).
They typically understand these are good practices. It’s good to have a firewall in place. It’s good to have a malware scanner in place. It’s good to isolate networks.
That’s not a bad skill-set to have, but a different skill-set is what anAttackerbrings to the equation.
The attacker, or (Black Hat), typically brings to the table more of a skill-set of, “I know what the defenders are usually going to do”. They’re usually going to have a firewall. They’re usually going to have malware scanners. What kind of ways can I work around the malware scanners? What different kind of exploits or vulnerabilities can I find in the firewall so that I don’t have to worry about those firewalls stopping my attack? How do I work, how do I get my nefarious negative job, with all of those defenses in place?”
Learning those techniques of theattacker, understanding the “other-side” of IT Security helps enormously to protect a network. Because when you think as an attacker, you think, “I’m setting up this firewall, and it’s this, and it’s that, and the other.” But I wonder how an attacker would look at the firewall. An attacker might use this tool, might use this technique, might probe this way.
While I should have defenses against that, let me find out by banging on the thing, by throwing scanners,NmapthrowingMetasploit at it and other different kinds of spectrum tools, both very focus and very broad at this defense and see, “Does it hold up?” Because this is what an Attacker is going to do.
Not, in theory, theoretically, yes, that firewall should protect against this but in practice, how many times do you try to hack your own firewall to see if you can? That’s what we learned in CEHv9 Certified Ethical Hacking, being able to actually test the defenses with real tools and real techniques that attackers use. That’s the difference between just learning how to protect, and learning how to check the protection, and find the vulnerabilities before an attacker finds them.