Silensec Banners-02

Silensec logos - 300px x 300 px-04The majority of security and hacking tools used today by professional penetration testers and security auditors have been developed for the Unix/Linux environment. Therefore the ethical hacking profession demands individuals to possess more and more Linux technical competences. Linux NinjaTM introduces delegates to the Backtrack distribution, the de facto Linux distribution used by ethical hackers and penetration testers around the world. While learning how to use and customize the Backtrack distribution, delegates will develop important hands-on Linux competences they need to better use existing and future hacking tools. This course is an essential requirement for anyone wishing to become a professional ethical hacker and penetration tester.

Read more... pdf-icon

Silensec logos - 300px x 300 px-01Ethical NinjaTM is about ‘doing stuff’ and practically learning how to assess the security posture of an organization before the ‘bad guys’ do. The course has been designed from the ground up to allow you to understand how attacks are commonly carried out by malicious users, and in particular to learn how to apply hacking tools and techniques to gain unauthorized access to information assets. Ethical NinjaTM I focuses on a few selected tools, which are widely used, giving you the opportunity to learn how to use them effectively; the final aim is to understand the mind set of malicious users in order to protect your organization from common attacks.

Read more... pdf-icon

Silensec logos - 300px x 300 px-02Ethical Ninja SenpaiTM is about ‘doing stuff’ and practically learning the advanced techniques used by hackers to penetrate an organization’s network and systems. This course goes beyond the standard hacking techniques and covers the more advanced exploits and tools used by hackers to reach the inner most sensitive areas of an organization and steal valuable information without getting caught. The course also addresses advanced hacking techniques used by hackers to compromise client machines to be used in bot nets. Ethical Ninja SenpaiTM focuses on a selected range of tools, showing how they are tailored and used efficiently to achieve the most damage. The final aim of the course is
to understand the advanced hacking techniques of malicious users in order to protect your organization from the more stealth and targeted activities that go beyond common hacking attacks. By attending this course you will learn how to test your organization against such advanced attacks before it is done by the ‘bad guys’!

Read more... pdf-icon

 

 

Mobile Security SharkTM is a practical course designed to address the risks of using mobile devices for both personal, corporate and mobile banking applications. The aim of this course is to equip users of mobile devices and mobile applications with the knowledge and competences necessary to minimize the risks of owning devices such as Blackberry, iPhone, iPad and Android. Mobile users are exposed, virtually 24x7, to a wider range of attacks which could result in financial loss, disclosure and loss of sensitive information. Through this course delegates will learn how to assess and maintain the security of mobile devices and applications as well as assessing the risks of using mobile devices in a wide range of day to day scenarios, from simply making and receiving calls to reading emails, using social sites, paying bills and transferring money.

Read more... pdf-icon

 


Silensec logos - 300px x 300 px-11Red BundiTM provides you with hands on practice with the tools you will be using to defend an organization against systems and network attacks. The course will improve your knowledge and understanding of the TCP/IP based protocols to better equip you to perform effective analysis of  intrusion attempts and investigations. The emphasis of this
course is to help you develop the fundamental competences to be able to perform network traffic analysis, configure intrusion detection and prevention systems, and ultimately keep them up to date with effective signatures and rules to match new attacks.

Read more... pdf-icon

Silensec logos - 300px x 300 px-10Black BundiTM is a course developed for those professionals who need to manage and secure a corporate environment. The course builds on the skills and competences acquired with Red BundiTM  and teaches you how to deploy, configure and operate intrusions detection and prevention systems in a corporate IT infrastructure where you are required to deal with potentially thousands of security events daily. In this course you will learn how to use large scale monitoring systems to keep track of a corporate IT infrastructure and how to operate and customize Security Information and Event Management (SIEM) systems to effectively correlate security events and act upon them in a timely manner
Read more... pdf-icon


CertifiedRedChunguRed ChunguTM addresses the challenges faced by modern organizations with regards to Log Management in order to comply with business requirements, as well as the requirements imposed by the law, regulations and contractual obligations. A typical organization will have devices, computer systems and applications generating thousands of logs daily, each with specific requirements which must be met. In this course the student will work through a practical case study following a top-down approach to log management, starting from the requirements analysis down to the choice, deployment and configuration of log management tools and solutions.

Read more... pdf-icon

 

Silensec logos - 300px x 300 px-07

RevCode PantherTM is a hands on training course through which the student will develop the competences required to identify and analyse malware in order to react to security incidents and perform in depth computer forensics investigations. RevCode PantherTM provides the student with the hands-on environment to use disassemblers and debuggers and learn the different techniques used to reverse engineer software and perform malware analysis. The course takes the student through the analysis of different operating system structures, and complete source code reconstruction methodologies, teaching how to modify low level software programs, to patch software vulnerabilities in legacy systems, and  to identify malicious behavior.

Read more... pdf-icon

Silensec logos - 300px x 300 px-09Forensics eSpectorTM is a practical, hands-on training course designed to transfer skills in responding to security breaches and carry out a computer forensics investigation. Using a variety of computer forensics tools and a portable forensics laboratory you will be working through a number of practical exercises and challenges. You will learn how to best react to incidents while collecting volatile and non volatile evidence. In addition you will understand how to investigate security breaches and analyse digital evidence that could be used internally or in a court of law. During the course you will play the role of a computer forensics professional in charge of a real investigation case and apply the methods, techniques and tools required in a real scenario.

Read more... pdf-icon

Silensec logos - 300px x 300 px-08Forensics BeeTM is a practical hands on training course through which you will develop the competences required to engage in forensic analysis of mobile devices and gadgets. With the constantly changing technologies in mobile gadgets, an analyst needs to understand the various forensic techniques used across different device operating systems and types. This hands on course takes you through a journey of analyzing the different aspects of major mobile operating systems, extracting forensic artifacts and working on a mobile forensic case.

Read more... pdf-icon

Silensec Africa

Feel free to contact us if you have any problems.

Silensec UK

Feel free to contact us if you have any problems.