IT Security Training

Friday, 26 August 2011

Introduce your friend to EC-Council Academy and get rewarded!

For those who wish to become a member of EC-Council Academy but don't know how, here's your chance.

How about getting rewarded by sharing free membership to your friend?
Learn how to join our Referral Program and get the sweet deal today!

The rewards for yourself:

  • One (1) complimentary pass to HackAway workshop (worth RM 399)
  • Free EC-Council Membership
  • Free EC-Council Special Edition T-Shirt
  • 10% referral fee of referral’s total sign-up fee
  • 10% rebate on any EC-Council training sign-up
  • EC-Member Lucky Draw - Stand a chance to win a Hacker Halted Asia Pacific 2011 Conference pass


The rewards for your friend:

  • One (1) complimentary pass to Hackaway workshop (worth RM399)
  • Free EC-Council membership
  • 10% discounts on EC-Council IT Security Training

Apart from that, signing up for ECA membership will allow you a free access to our informative journals and videos exclusively from our sought-after HackAway workshops!

Why EC- Membership?

With EC-Membership, members will enjoy the following:

  • Be on priority mailing list for all EC-Council Academy promotions and updates
  • Discounts on EC-Council Academy training*
  • Members will receive the latest IT security news and job opportunities globally

*Terms and Conditions apply.



Friday, 19 August 2011

HackAway Online Workshop - Metasploit for ServerHacking




How much do you know about Metasploit?

Join our HackAway Online Workshop as we uncover the latest hacking methodology to you!

Learn the security tips and tricks as you sign up for the webinar.

Sign up for August HackAway Online Workshop 2 today to reserve your seat as we only offer limited seats for it!

Title : Metasploit for Server Hacking
Date : August 23rd 2011
Time : 5pm - 7pm SGT








Hands-on Labs include:

* The Insights of Metasploit
* Metasploit Components
* Interacting with Metasploit
* Server-side Attack
* Choosing the Right Exploit
* The Art of Privilege Escalation
* Advanced Metasploit Hacking
* Planting backdoors
* and many more..!


Friday, 8 July 2011

Exposing Hacker Methodologies - July's HackAway


Hey everyone!

There will be three workshops available in the month of July!

If you are interested to sign up, visit July's Hackaway to get your seats now! Keep in mind that each workshop is only limited to 20 seats!

If you are wondering what Hackaway workshops are, a simple description of HackAway is a special tailor-made workshop which covers hands-on IT Security training for you to experience real-time practice and learn the security tips.

HackAway 1 - Hacking Simplified

Date : July 23, 2011 (Sat)
Time: 9.00am-1.00pm

This workshop covers how hackers penetrate in to your Desktops, Laptops and your Corporate Network with freely available tools with very little expertise.

Hands-on Labs include:

  • Footprinting
  • Google Hacking
  • Scanning
  • Sniffers
  • Phishing
  • Session Hijacking
  • Web Application Hacking
  • Network Hacking
  • and many more
For more information or registration, visit July's Hackaway - Hacking Simplified

HackAway 2 - Web Application Security

Date : July 27, 2011 (Wed)
Time: 9.00am-1.00pm

Topics to be covered:

  • Web 2.0
  • SQL Injection, Cross Site Scripting
  • WAF, IPS, IDS
For more information or registration, visit July's Hackaway - Web Application Security

HackAway3 - Penetration Testing & Vulnerability Analysis

Date : July 30, 2011 (Sat)
Time: 9.00am-1.00pm

Topics to be covered:

  • Introduction to Penetration Testing
  • Vulnerability Assessment
  • Types of Penetration Testing
  • Testing Points and Locations
  • Step by Step on doing a Pentest
  • Tools
For more information or registration, visit July's Hackaway - Penetration Testing & Vulnerability Analysis


Limited to 20 seats!

* Participants MUST be able to bring their own laptops to the workshop.

Thursday, 16 June 2011

'Operation Malaysia' by Anonymous - Real Threats by Real Hackers



The news on 'Operation Malaysia' appeared on the front page of local Malaysian newspapers today. It caught the attention of many and was a hot topic over the internet.

Anonymous has been circulating their video titled 'Operation Malaysia' and its content reads;

"Greetings, Malaysia, We have seen the censorship taken by the Malaysian government, blocking sites like The Pirate Bay, and WikiLeaks. Malaysia is one of the world's strictest governments, even blocking out movies, and television shows. These acts of censorship are inexcusable. You are taking away a basic human right. The internet is here for freedom, without fear of government interference. Do not think that no one else notices. Your structured government has done the talking, and we hear loud and clear. Let this be an announcement to all your people. This is a sign, a warning, and an opportunity to listen to ideas above your own. In a way you are being stubborn. But how will this help anyone or your country. We fear that if you make further decisions to take away human freedom. We are obligated to act fast and have no mercy. For rules were meant to be broken. And corruption was meant to be washed away and forgiven. Now we will wash your corruption away so be prepared. Take this as a favour."

The cyberworld was never a safe place, and will definitely not be a 100% secure platform for everyone to use safely without any worries. Hackers are becoming diligent at trying to find ways to break into computer systems and this has been going on for years and the number of incidents are growing as the years goes by. Today, the damage done by cybercriminals has increased and they are not afraid anymore, forming into groups and announcing on their attacks.

The world uses the internet where almost every transaction you can think of is taken place. What can we expect in the future for our cyberworld? What do all of you think about 'Operation Malaysia'? Drop us your feedbacks and let us know!

Thursday, 9 June 2011

HackAway this June!

Hey everyone!

This month is an exciting month as there are four different workshops available! Yes, FOUR exciting topics!

The topics had been requested over and over again, so we decided, why not?

If you are interested to sign up, visit June's Hackaway

If you are wondering what Hackaway workshops are, a simple description of HackAway is a special tailor-made workshop which covers hands-on IT Security training for you to experience real-time practice and learn the security tips.

HackAway1 - Social Engineering – The Human Hacking

Date: June 14, 2011 (Tue)
Time: 9.00am-1.00pm

The participants will be exposed with the latest techniques used by the attacker to defeat human protection against any con-based attacks (cheating, acting/pretending). Social engineering have evolved to not only over phone & email.

For more information or registration, visit June's Hackaway - Social Engineering - The Human Hacking

HackAway2 - Malware Exposed

Date: June 18, 2011 (Sat)
Time: 9.00am-1.00pm

'Say Hi to Malware' will introduce various types of malware and its features (hands-on)

Dealing with Malware Incident will expose system / network admin on how to response towards malware cases (include end-users response)

Malware Analysis will share on how to setup lab environment & perform static + dynamic analysis

For more information or registration, visit June's Hackaway - Malware Exposed

HackAway3 - Memory Forensic

Date: June 25, 2011 (Sat)
Time: 9.00am-1.00pm

Memory Forensic has become a very popular incident handling / response procedure in the past few years. This is due to the wealth information hidden in memory/RAM.

In this workshop, participants will expose the method to acquire RAM contents, searching relevant evidences by analyzing the content (running processes, registry details, passwords and even to uncover rootkit).

Today, “Pull-the-plug” is no longer the ultimate solution to first responder.

For more information or registration, visit June's Hackaway - Memory Forensic

HackAway4 - Server Vulnerability Assessment & Penetration Testing

Date: June 30, 2011 (Thu)
Time: 9.00am-1.00pm

Participant will be exposed with a quick "hacker mindset" to be used for penetration testing.

The session will covered the need for reconnaissance, vulnerability scanning, penetration testing proof of concept, business impact demos (crucial steps in closing penetration testing exercise)

For more information or registration, visit June's Hackaway - Server Vulnerability Assessment & Penetration Testing

The fees for the workshop is RM 399.00, but register now to get Early Bird price at RM 99.00!

Grab you seat today as seats are limited to only 20!



Wednesday, 1 June 2011

Redeem your CEH T-Shirt and stand a chance to win an iPad 2!


To those redeeming your T-shirts, we have something else to add on to the fun! EC-Council Academy is giving out an iPad2 in ‘The Best CEH Picture Posting Competition’!

All you need to do is to snap a picture of yourself creatively, wearing your new ‘Certified Ethical Hacker’ T-shirt!

Next is to send the following to admin@eccouncilacademy.orgThis e-mail address is being protected from spambots. You need JavaScript enabled to view it

   1. Your picture,
   2. Name,
   3. Facebook username,
   4. Company,
   5. Designation and
   6. A short description on your picture, the scenery, or even on how you feel (Optional)

We will post your pictures into an album on our Facebook page, EC-Council Academy Malaysia upon receiving your picture. The picture with the most ‘Likes’ will bring home the iPad2, as simple as that! So make sure you collect your ‘Certified Ethical Hacker’ T-shirts as soon as possible to start working on your picture!

Get your friends, family & everyone you know to support by voting for your picture!

The last day for voting will be on July 15, 2011 at 12.00 p.m.

Happy voting!

And to those waiting to claim your ‘Certified Ethical Hacker’ T-shirt, we have good news for you! T-shirts are ready for collection!

Emails have been sent to successful applicants that followed the required steps.  The redemption method, either by postage or by collection will be based on the filled information in each individual’s redemption form.

Note:

    * Certified Ethical Hacker T-shirt is required for the participation of ‘The Best CEH Picture Posting Competition’
    * If you have not participated to redeem your ‘Certified Ethical Hacker’ T-shirt, please visit http://www.eccouncilacademy.org/tshirt

Friday, 20 May 2011

May 2011 HackAway - Exposing Hacker Methodologies



This May 2011, EC-Council Academy is back with HackAway, a special tailor-made workshop, covering hands-on IT Security training for participants to experience real-time practice and learn the latest security tips.

The topics which are to be covered this May are Disaster Recovery and Hacking Simplified!

The fees per person is RM 399.00, but early bird price is only RM 99.00 so make sure you sign-up earlier as seats are also limited to only 20!

The coming HackAway, Hacking Simplified! which will be on the May 28, 2011 from 9 am - 1 pm, this workshop covers IT Security basics and how hackers penetrated into your Desktops, Laptops and your Corporate Network with freely available tools with very little expertise.

Hacking Simplified! is a hands-on workshop which includes;

1) Footprinting
2) Google Hacking
3) Scanning
4) Sniffers
5) Phishing
6) Session Hijacking
7) Web Application Hacking
8) Network Hacking
and many more!

This workshop, conducted by our professional trainer, expert in the IT Security industry with many years of experience, will give you an understanding on real-world challenges faced around the world, allowing you to prepare yourself with the knowledge and skills required for such situations.

For more information or registration, click May's HackAway


As for Disaster Recovery workshop which had already past, was on the 19th of May, 2011. This workshop exposes audience with backup strategy & plan, recover & carve files from corrupted hard disk and how to purge/secure delete data before disposing computer/server hard disks.

The workshop was a success once again and we had to control the crowd as it had reached the maximum number of participants. Some pictures to share as below. Enjoy :)