RE: CEH and Intense School

From: Peter Mercer (inom@ozemail.com.au)
Date: Thu Nov 06 2003 - 17:19:07 EST


Hi Andrew,

A few questions to find out about Ethical Hacking courses;

Q-What's covered over the course
Remember most courses are +- 4 - 5k, that's good money, make the sales
man do his job and explain, ask for references from past attendees.

Q-How many times has this course been delivered
You want more than 4 to know the bugs are ironed out in labs and so on.

Q-What equipment do I get to use.
You don't want to be stuck with a p2 300 laptop with 64 megs.
 
Q-How many and what do the lab consist of
If it's a 5 day course you would want 4 - 5 labs of a reasonable
duration and complexity (not just one box with Unicode) or it may be
death by PPT

Q-Do the labs have multiple OS and applications that need exploiting.
Your there for as much experience as you can get

Q-How old are the patch levels on the lab boxes
If they are using NT4 sp 1 and Redhat 5.3 you are not going to learn
stuff you can use a lot every day. That said even old exploits can teach
you the mindset you need to use new exploits.

Q-Is there a Firewalls involved in the lab.
Once again you want experience, if the course developer has gone to the
trouble to configs and design labs that have multiple technologies and
made a hack that needs you to bounce around all of them, you can believe
the course is well thought out.

Q-In the course how much is different or not in the Hacking Exposed
book. Foundstone have not only been writing books for years on hacking,
that everybody consults at some stage but have also been teaching for as
long or longer. So I would want to know how they differentiate
themselves from other courses or what's is in the book. Remember the
book only costs $50.

Q-What tools do you use on the course and do I get a CDrom with them all
on at the end of the course
If they show you all the tools they have personally written and wont
share them or the ones they use cost gazillions to buy that may limit
how useful the course is.

Q-how much time is spent on automated vulnerability scanners (AVS)
Your not there to learn to point and click. AVS have there place but
knowing how to do it yourself is why you are there.

Q-What's for lunch

Q-Is the t-shirt cool

This is just a few questions I would ask.

Kind regards
Peter Mercer (look no alpherbet soup)
92487000
0419892600

-----Original Message-----
From: Andrew Turner [mailto:andrewhturner@yahoo.com]
Sent: Thursday, November 06, 2003 12:47 AM
To: pen-test@securityfocus.com
Subject: CEH and Intense School

Greetings,

I am considering taking the Ethical Hacking course
tought by Intense School. Has anyone had experience
with this training program? If so, I would be very
interested in hearing your comments on the program.

Thanks in Advance!

--
Andrew H. Turner, CISSP
__________________________________
Do you Yahoo!?
Protect your identity with Yahoo! Mail AddressGuard
http://antispam.yahoo.com/whatsnewfree
------------------------------------------------------------------------
---
Network with over 10,000 of the brightest minds in information security
at the largest, most highly-anticipated industry event of the year.
Don't miss RSA Conference 2004! Choose from over 200 class sessions and
see demos from more than 250 industry vendors. If your job touches
security, you need to be here. Learn more or register at
http://www.securityfocus.com/sponsor/RSA_pen-test_031023
and use priority code SF4.
------------------------------------------------------------------------
----
---------------------------------------------------------------------------
Network with over 10,000 of the brightest minds in information security
at the largest, most highly-anticipated industry event of the year.
Don't miss RSA Conference 2004! Choose from over 200 class sessions and
see demos from more than 250 industry vendors. If your job touches
security, you need to be here. Learn more or register at
http://www.securityfocus.com/sponsor/RSA_pen-test_031023
and use priority code SF4.
----------------------------------------------------------------------------


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:42 EDT