Training Steering Committee (Inside NANO OPT Media, Inc.)
contact@f2ff.jp

Cyber Security

March 5, 2019(Tue) - March 6, 2019(Wed)Penetration testing for Basic Infrastructure
 - NotSoSecure -

Dates March 5, 2019(Tue) - March 6, 2019(Wed)
Time 09:00-17:00
Venue JP Tower Hall & Conference (KITTE 5F) MAP
Capacity 30
Price
※Including lunch for 2 days
Early Bird Discount(Deadline: January 25, 2019(Fri)):¥210,000(+tax)
Price :¥275,000(+tax)

Course details

This courses familiarizes the attendees with a wealth of hacking tools and techniques.
The course starts from the very basic and gradually build up to the level where attendees can not only use the tools and techniques to hack various components involved in infrastructure hacking, but also walk away with a solid understanding of the concepts on which these tools work.

【PROGRAM】
●Day1
• Module 1: The Art of Port Scanning
• Module 2: The Art of Online Password Attacks
• Module 3: The Art of Hacking Databases
• Module 4: Metasploit Basics
• Module 5: Password Cracking
• Module 6: Hacking Unix

●Day2
• Module 7: Hacking Application Servers on Unix
• Module 8: Hacking Third Party CMS Software
• Module 9: Windows Enumeration
• Module 10: Client Side Attacks
• Module 11: Hacking Application Servers on Windows
• Module 12: Post Exploitation
• Module 13: Hacking Windows Domains

The Voice of the attendees

  • I had never had the opportunity to learn the attacking method, so I was happy to be able to take this time. I knew the existence of metasploit and thought that I would like to fiddle with it, but since I had no opportunity, I was glad that I could experience this time.
  • This experience will be helpful for me in the future because there were lots of useful information, practical contents, materials were also detailed.
  • I learned a lot. I will review it in order to acquire what I have studied today. I would like to take class again.
  • It was more difficult than I expected. I realize that I have to learn more. It definitely was a learning experience.

Trainer

Sam Sanoop
sam_photo.jpgSam is an information security enthusiast with interest in web application security. Sam holds a Bachelor of Science (BSc) degree in Computer Security with Forensics from Sheffield Hallam University, and international certifications such as Offensive Security Certified Professional (OSCP) and CREST Registered Penetration Tester (CRT).

WHO SHOULD TAKE THIS COURSE

  • System Administrators
  • SOC analysts
  • Entry level/intermediate level penetration testers
  • Network engineers
  • Security enthusiasts
anyone who wants to take their skills to the next level.

Benefits

  • Access to a hacking lab not just during the course but for 30 days after the class too.
    This gives them plenty of time to practice the concepts taught in the class.
  • Numerous scripts and tools will also be provided during the training, along with student hand-outs.
  • A certificate of attendance

WHAT STUDENTS SHOULD BRING

The only requirement for this class is that you must bring your own laptop and have admin/root access on it.
During the class, we will give you VPN access to our state-of-art hacklab which is hosted in our datacenter in UK.
Once you are connected to the lab, you will find all the relevant tools/VMs there.
We also provide a dedicated Kali VM to each attendee on the hacklab. So, you don't need to bring any VMs with you. All you need is admin access to install the VPN client and once connected, you are good to go!

【STUDENT REQUIREMENTS】

  • Bring your own laptop and have admin/root access on it.
  • Also, note that we will use an wireless network for this class.

ContactTraining Steering Committee (Inside NANO OPT Media, Inc.)

03-6258-0590

March 5, 2019(Tue) - March 8, 2019(Fri)Art of Hacking
 - NotSoSecure - 

Dates March 5, 2019(Tue) - March 8, 2019(Fri)
Time 09:00-17:00
Venue JP Tower Hall & Conference (KITTE 5F) MAP
Capacity 30
Price
※Including lunch for 4 days
Early Bird Discount(Deadline: January 25, 2019(Fri)):¥370,000(+tax)
Price :¥505,000(+tax)

Course details

This is a set plan of "Penetration testing for Basic Infrastructure" with "Web Hacking".

The Voice of the attendees

  • I had never had the opportunity to learn the attacking method, so I was happy to be able to take this time. I knew the existence of metasploit and thought that I would like to fiddle with it, but since I had no opportunity, I was glad that I could experience this time.
  • This experience will be helpful for me in the future because there were lots of useful information, practical contents, materials were also detailed.
  • I learned a lot. I will review it in order to acquire what I have studied today. I would like to take class again.
  • It was more difficult than I expected. I realize that I have to learn more. It definitely was a learning experience.
  • Thank you for teach me practical technique.
  • Thanks to the interpreter I was able to study without stress.This course was high level for me and I learned a lot.

Trainer

Sam Sanoop
sam_photo.jpgSam is an information security enthusiast with interest in web application security. Sam holds a Bachelor of Science (BSc) degree in Computer Security with Forensics from Sheffield Hallam University, and international certifications such as Offensive Security Certified Professional (OSCP) and CREST Registered Penetration Tester (CRT).

WHO SHOULD TAKE THIS COURSE

  • System Administrators
  • SOC analysts
  • Entry level/intermediate level penetration testers
  • Network engineers
  • Security enthusiasts
Anyone who wants to take their skills to next level.

Benefits

  • Access to a hacking lab not just during the course but for 30 days after the class too.
    This gives them plenty of time to practice the concepts taught in the class.
  • Numerous scripts and tools will also be provided during the training, along with student hand-outs.
  • A certificate of attendance

WHAT STUDENTS SHOULD BRING

The only requirement for this class is that you must bring your own laptop and have admin/root access on it.
During the class, we will give you VPN access to our state-of-art hacklab which is hosted in our datacenter in UK.
Once you are connected to the lab, you will find all the relevant tools/VMs there.
We also provide a dedicated Kali VM to each attendee on the hacklab. So, you don't need to bring any VMs with you. All you need is admin access to install the VPN client and once connected, you are good to go!

【STUDENT REQUIREMENTS】

  • Bring your own laptop and have admin/root access on it.
  • Also, note that we will use an wireless network for this class.

ContactTraining Steering Committee (Inside NANO OPT Media, Inc.)

03-6258-0590

March 7, 2019(Thu) - March 8, 2019(Fri)Basic Web Hacking
 - NotSoSecure -

Dates March 7, 2019(Thu) - March 8, 2019(Fri)
Time 09:00-17:00
Venue JP Tower Hall & Conference (KITTE 5F) MAP
Capacity 30
Price
※Including lunch for 2 days
Early Bird Discount(Deadline: January 25, 2019(Fri)):¥170,000(+tax)
Price :¥230,000(+tax)

Course details

This is an entry-level web Application Security-testing class.
This class familiarizes the attendees with the basics of Web and Application hacking. A number of tools and techniques will be taught during the 2 day class. If you would like to step into the world of ethical hacking / pen testing with a focus on web applications, then this is the right class for you

【Class Details】
This class familiarizes the attendees with a wealth of tools and techniques needed to breach the security of web applications and also covers the industry standards such as OWASP Top 10, PCI DSS and contains numerous real life examples to help the attendees understand the true impact of these vulnerabilities.

【PROGRAM】
●Day1
Information Gathering, Profiling and Cross-Site Scripting
• Understanding HTTP Protocol
• Identifying the Attack Surface
• Username Enumeration
• Information Disclosure
• Issues with SSL/TLS
• Cross-Site Scripting
• Cross-Site Request Forgery

●Day2
Injection, Flaws, Files and Hacks
• SQL Injection
• XXE Attacks
• OS Code Injection
• Local/Remote File Include
• Cryptographic Weakness
• Business Logic Flaws
• Insecure File Uploads

The Voice of the attendees

  • Thank you very much for kind instruction. Thank you interpreters too.
  • Thank you for teach me practical technique.

Trainer

Sam Sanoop
sam_photo.jpgSam is an information security enthusiast with interest in web application security. Sam holds a Bachelor of Science (BSc) degree in Computer Security with Forensics from Sheffield Hallam University, and international certifications such as Offensive Security Certified Professional (OSCP) and CREST Registered Penetration Tester (CRT).

WHO SHOULD TAKE THIS COURSE

  • System Administrators
  • SOC analysts
  • Web Developers
  • Network engineers
  • Security enthusiasts
  • Penetration Testers
anyone who wants to take their skills to the next level.

Benefits

  • Access to a hacking lab not just during the course but for 30 days after the class too.
    This gives them plenty of time to practice the concepts taught in the class.
  • Numerous scripts and tools will also be provided during the training, along with student hand-outs.
  • A certificate of attendance

WHAT STUDENTS SHOULD BRING

The only requirement for this class is that you must bring your own laptop and have admin/root access on it.
During the class, we will give you VPN access to our state-of-art hacklab which is hosted in our datacenter in UK.
Once you are connected to the lab, you will find all the relevant tools/VMs there.
We also provide a dedicated Kali VM to each attendee on the hacklab. So, you don't need to bring any VMs with you. All you need is admin access to install the VPN client and once connected, you are good to go!

【STUDENT REQUIREMENTS】

  • Bring your own laptop and have admin/root access on it.
  • Also, note that we will use an wireless network for this class.

ContactTraining Steering Committee (Inside NANO OPT Media, Inc.)

03-6258-0590

March 12, 2019(Tue) - March 15, 2019(Fri)Penetration Testing with Kali Linux
 - Offensive Security -

Dates March 12, 2019(Tue) - March 15, 2019(Fri)
Time 09:00-17:00
Venue NANO OPT Media, Inc. Conference room (L-TOWER 12F)
Capacity 25
Price
※Including lunch for 4 days
Early Bird Discount(Deadline: January 25, 2019(Fri)):¥590,000(+tax)
Price :¥720,000(+tax)

Course details

This course is the first step up the ladder of The Offensive Security Certified Professional (OSCP).
Penetration Testing with Kali Linux (PWK) is the industry standard for practical, hands-on, information security training. Created and taught by the creators of Kali Linux, this course is designed to provide the knowledge that you need for a career in penetration testing. Guiding you from the basics of automation of standard security tasks all the way to discovering, fuzzing and writing your own buffer overflow, this course provides you with not just more ""tool usage"" instruction. Instead, it details the underlying concepts of what you need to know to for a successful career in penetration testing.
※ Because this class is normally condensed for 5 days for 4 days, it will progress at a relatively fast pace.

【Topics covered in this course include】

  • Automating your environment with scripting
  • Attack surface identification through passive and active information gathering
  • Identifying and writing your first Windows exploit
  • Safe identification, modification, and use of public exploits
  • Data exfiltration and advanced tunneling techniques
  • Client side and privilege escalation attacks
  • Introduction to web application attacks
  • Use of Metasploit in a penetration test

Prerequisites

    PWK is a foundational security course, but still requires students to have certain knowledge prior to attending the live training class. A solid understanding of TCP/IP, networking and reasonable Linux skills are required. Familiarity with Bash scripting along with basic Perl or Python is considered a plus.

Trainer

Jim O'Gorman
jim_photo.jpgJim O'Gorman leads Offensive Security's penetration testing team and manages related consulting services. Jim is also an Offensive Security instructor, Kali Developer, and is a co-author of Metasploit: The Penetration Tester's Guide. He has been online from the days Gopher sites outnumbered websites and started working professionally in the field 19 years ago.
【Achievements】
・Black Hat Vegas (10th consecutive year)
・Black Hat Seattle
・Black Hat Asia
and various other private training and various events throughout the year

WHO SHOULD TAKE THIS COURSE

    Network administrators and security professionals who need to develop practical, real-world offensive security and penetration testing skills

Benefits

    Offensive Security training courses are designed to fill a gap in information security training, focusing on offensive techniques rather than defensive ones and are suited for would-be penetration testers, network administrators, as well as seasoned information security professionals. Through the use of offensive techniques students are better able to implement defensive measures within their organizations.

WHAT STUDENTS SHOULD BRING

  • Administrative access to the host operating system
  • At least 60 GB of HD free space
  • The ability to connect a wired LAN
  • 2 USB ports or more
  • Installing VMware Workstation / Fusion
  • Laptop with at least 8 GB of RAM

ContactTraining Steering Committee (Inside NANO OPT Media, Inc.)

03-6258-0590

March 21, 2019(Thu) - March 27, 2019(Wed)Cyber Incident Response Management

Dates March 21, 2019(Thu) - March 27, 2019(Wed)
Time 09:00-18:00
Venue DNP Gotanda Building
Capacity
Price
Special Discount¥665,000(+tax)
Price :¥700000(+tax)

Course details

We've recreated a real cyber attack. "Academy of emphasize hands-on learning"
The Cyber Incident Response Management course
By learning how to respond to cyber attacks that evolve daily, by hands-on practice exercises that can acquire the skill which can cope with an unknown attack. In team form, students learn from basic knowledge and coping methods for incident response to application practice. By attending this training, we recognize the usefulness of the team's response to the complex and sophisticated cyber attacks You can experience the fostering and the improvement of the team power. We also provide the curriculum to train your team leaders, not to mention personal skills.

Voice of previous attendees

  • Very practical content. Because it can not be done in a real environment, it was a valuable experience.
  • Since it was a more practical content than the classroom-centered course, we would like to recommend it to coworkers.
  • Although it was difficult to secure the 5-day attendance time, it was worth.
  • It is very good to experience from the beginning to the end of the attack.
  • It was very useful for improving own SOC operations.
  • It is interesting that each person in the team experiences each role and grasps the full range of attacks.

Introduced a training system to respond to the latest cyber attacks

TAME Range
The Cyber Incident Response Management course introduces the "TAME Range" a Israel IAI (Israel Aerospace Industries), which has the world's top-level cyber security technology. TAME Range is a training system capable of improving the level of ability to compete against real threats.

Target attendee

We recommend that you have practical experience in the following topics:
Basic knowledge of Windows Server clients, network fundamentals, and malware protection

What should attendees prepare

Since we are preparing all the equipment used in the exercise at the venue, bringing in a personal computer etc. is unnecessary.

ContactTraining Steering Committee (Inside NANO OPT Media, Inc.)

03-6258-0590