cart

Members

Join Login

Membership and collaboration facilitated by Member 365.

Members

Join Login

Membership and collaboration facilitated by Member 365.

22nd Colloquium

STORM Mobile Security Toolkit Ethical Hacking Workshop

  • Concluded
  • June 10, 2018
  • 8:00 AM to 5:00 PM
  • Acadian I & II

CISSE has partnered with EC-Council to bring the STORM Mobile Security Toolkit to the 22nd Colloquium at a discounted rate. This workshop will be held on Sunday, June 10th, preceding the conference.

What is the Mobile Security Tool Kit?

EC-Council's Mobile Security Toolkit (Better known as the STORM!) is a fully-loaded pen-test platform which comes equipped with a customized distro of Kali loaded onto a portable Raspberry Pi-based touchscreen device. EC-Council rolled out the STORM as a mobile tool to enhance our certification course offerings by giving online asynchronous students a mobile training option. In this option, the video lectures are loaded directly onto the STORM.

What is the STORM Mobile Security Toolkit Ethical Hacking Workshop?

Mobile Security Toolkit (STORM)

In this course, you will learn the procedures to use a virtual bridge and connect to a physical network. How to run virtual software and bridge it to your Storm device as well as how to isolate the Storm with the bridge. Configure secure remote access, and connect from the Internet and do your assessments from your backyard with no airport security checks! You will learn methods of protocol analysis to identify intrusions. How to identify weaknesses and vectors of attack for both wired and wireless networks using the device. The hacking and penetration testing methodology will be conducted using the device as the main attack platform to gain access to the network and machines that you have targeted. In the course, you will perform against a set of targets using the device and knowledge learned from the course.

Course Includes

  • e-Book
  • Certificate of Attendance
  • STORM device
  • Keyboard
  • Carry case
  • STORM T-shirt
  • STORM Sticker

What Students Should Bring

  • Laptop (Micro SD card Reader a plus)
  • Enthusiasm for Learning
  • Knowledge of Linux a major plus!

Pricing

  • Discounted Price: $799
  • Regular Price: $999

Use Code: CISSESTORM


Kevin Cardwell

Kevin Cardwell is an expert Cybersecurity Penetration tester with over 30 years of experience in the public and private sector. He has spent 22 years in the U.S. Navy where he worked as both a software and systems engineer on a variety of Department of Defense projects. He has served as a dynamic leader of a 5-person DoD Red Team that achieved a 100% success rates at compromising systems and networks for six years straight. He has conducted over 500 security assessments across the globe. His expertise is in finding weaknesses and determining ways clients can mitigate or limit the impact of these weaknesses. Early on Kevin was chosen as a member of a state-of-the-art project to bring internet access to naval ships at sea. Following the success of this project was then selected to oversee a team to build a Network Operations and Security Center (NOSC) to provide command services for vessels ashore and at sea in the Norwegian Sea and Atlantic Ocean. Kevin has served as the leading Chief of Information Security at the NOSC for six years. While serving, he oversaw policies, strategies and training plans to develop expert teams with individuals starting with little experience, building them into expert cyber specialists to manage and maintain the NOSC.

Kevin currently teaches at the University of Maryland University College (UMUC) and University of California Los Angeles Extension (UCLA) and has instructed hundreds of students through bachelor's and master's level programs. He currently works as a free-lance consultant and provides consulting services for companies throughout the world, and as an advisor to numerous government entities within the US, Middle East, Africa, Asia and the UK. He is an Instructor, Technical Editor and Author for Computer Forensics, and Hacking courses. He is the author of the Center for Advanced Security and Training (CAST) Advanced Network Defense and Advanced Penetration Testing courses. He has presented at the Blackhat USA, Hacker Halted, ISSA and TakeDownCon conferences as well as many others. He has chaired the Cybercrime and Cyberdefense Summit in Oman and was Executive Chairman of the Oil and Gas Cyberdefense Summit. Kevin has also authored a number of books including, Building Virtual Pentesting Labs for Advanced Penetration Testing and Backtrack: Testing Wireless Network Security. He holds a BS in Computer Science from National University in California and a MS in Software Engineering from the Southern Methodist University (SMU) in Texas. Kevin has developed the Strategy and Training Development Plan for the first Government CERT in the country of Oman that recently was rated as the top CERT for the Middle East. He serves as a professional training consultant to the Oman Information Technology Authority and developed the team to man the first Commercial Security Operations Center in the country of Oman. He has worked extensively with banks and financial institutions throughout the Middle East, Europe and the UK in the planning of a robust and secure architecture and implementing requirements to meet compliance. He currently provides consultancy to Commercial companies, governments, federal agencies, major banks and financial institutions throughout the globe. Some of his recent consulting projects include the Muscat Securities Market (MSM), Petroleum Development Oman and the Central Bank of Oman. Additionally, he provides training and consultancy to the Oman CERT and the SOC team in monitoring and incident identification of intrusions and incidents within the Gulf region.

Last modified on Friday, 08 June 2018 12:17

The Colloquium recognizes that the protection of information and infrastructures that are used to create, store, process, and communicate information is vital to business continuity and security. The Colloquium's goal is to work together to define current and emerging requirements for information assurance education and to influence and encourage the development and expansion of information assurance curricula, especially at the graduate and undergraduate levels.


giving

Save money and support the Colloquium for Information Systems Security Education.


Recent Posts