Overview We are living in a world of incredible modern conveniences. Computers, Smart phones, game console, embedded system are involved in our daily lives and have made it possible to have access to all kinds of information where and when we need it. Access control to these information systems if often implement via encryption & password. Passwords are the most commonly used security tool in the world today. Strong password are the single most important aspect of information security and weak password are the single greatest  failure; Hence attacking the password is one of the straight forward attack vectors. Password cracking is the process of attempting to guest or recovering secret passwords from data that has been stored in or transmitted by a computer system.The objective of this seminar is to provide practical and useable information to professionals on how to protect both infrastructure and data from the destruction of cyber criminals. Course Outline Introduction

  • Introduction to Password & encryption
  • What are the Password attacks and how does it work?
  • What systems are at risk?
  • Why is it possible to bypass a password?
  • Defining System password components
  • Windows authentication protocols
  • Introduction to various password cracking
  • Breaking an encryption scheme
  • Cracking into embedded devices

Strategies

  • Reconnaissance
  • Scanning
  • Gaining access

Techniques

  • Password cracking techniques
  • Password Dump locally and remotely
  • Sniff the password of the network
  • Passive online attack
  • Active online attack
  • Offline attack
  • Rainbow attack
  • FTP, POP3, SNMP Bruteforce
  • Smart Phones security attack

Tools

  • Network sniffing Tools
  • Administration Password bypassing Tools
  • Decryption Tools
  • Password cracking tools

What you will take away from this course

  • Key Elements of the Coaching process
  • Lab scenarios and manual
  • Course manual

 Must Attend This Master Class is specifically designed for key decision makers in both government agencies and private sectors:

  • Senior officers from government & not-for- profit sector
  • GMs, Profit-Centre Managers who have assumed security/IT
  • Auditors who need to build deeper technical skills
  • Penetration tester and Ethical hackers
  • Corporate Attorneys / Legal Professionals
  • Engineers / Technical Managers
  • Product & Marketing Managers
  • IT manager
  • Security manager

Pre requirement

  • A fair understanding of computer and network security
  • Participants are required to bring along a Laptop for training

Contact Us in Singapore

  • Blk 4010 #04-08
    Techplace 1, Ang Mo Kio Ave 10
    Singapore (569626)
  • One Pemimpin #01-03, 1 Pemimpin Drive,
    Singapore (576151)
  • Phone:  +65 6262 -2072
  • Fax:        +65 6554 -7259
  • Genernal Enquiry: [email protected]
  • Alibaba Related: [email protected]

Contact Us in Myanmar

  • No.(47) Thazin Street,
    IGS Building, Ahlone Township,
    Yangon, Myanmar
  • Phone:  +95 11 220 449
  • Fax:        +95 11 220 366
  • [email protected]

Contact Us in China

  • No.886, Xiahe Road,
    #20-108 World Trade Mall
    Xiamen, Fujian, China
  • Blk C1 #910-911, Baoli Central,
    No. 1 Jing Xiu Road, Wu Hou District,
    Chengdu, Sichuan, China
  • [email protected]