Make application development easier, faster, and more productive
EC-Council's Ethical Hacking and Countermeasures (CEH) covers concepts and tools related to exploiting systems, networks, devices and operating platforms. This includes hacking concepts such as vulnerability assessment, network intrusion, reverse engineering, defacing websites, damaging network appliances, launching distributed denial-of-service attacks, massive worm propagation, breaking passwords, brute-forcing authentication systems, cracking encryption, exploiting systems, advance viruses, Trojans, and other malware. This certificate is targeted at site administrators, security professionals, auditors and anyone who is concerned about the integrity of the network infrastructure.
Learn everything you need to know to pass the Certified Ethical Hacker exam in under 11 hours. Understand the basics of network and Internet accessible application technologies, common discovery, and analysis techniques as well as more advanced security concepts such as malware and cryptography.
Holding the CompTIA A+ certification is an IT career builder. Why? Because it indicates to IT hiring managers worldwide that you have the knowledge needed to set up and operate the technologies commonly deployed in today's IT centers. Obtaining the A+ certification requires that you pass two exams: The CompTIA A+ 220-901 and the CompTIA A+ 220-902.
DEF CON is all about thinking up cool and new ways to approach everything from the most complex modern technology to hacking grandma's toaster. Show us and the world what you have been up to and what attack exploits, defensive techniques, or unique research you have been working on.
In this project-based Preparing for CompTIA A+ - Exam 220-901 (2015 Objectives) video tutorial series, you'll quickly have relevant skills for real-world applications.
A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.
Peter briefly built Rails apps for a living, but quickly discovered the beauty of using Ruby as a catch-all "Swiss Army knife" for jobs all over the place. In his talk, he'll look at how Ruby can be rapidly put to work doing all sorts of random things that help in other types of day to day work.