Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

7/30/2009
10:18 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Core Security Launches New CORE IMPACT Global Training and Certification Program

Program teaches users how to get the most out of Core's automated penetration testing tool

BOSTON—July 27, 2009—Core Security Technologies, provider of CORE IMPACT, the most comprehensive product for proactive enterprise security testing, today unveiled a worldwide training and certification program for its industry-leading penetration testing software. This all-new program will teach both end users and trainers alike how to best utilize the market's only commercial-grade product for automated penetration testing, CORE IMPACT Pro.

Featured program tracks will cater to two groups: professional trainers seeking to instruct others on how to conduct penetrating tests using CORE IMPACT Pro and users who want to more effectively leverage the product to secure their IT infrastructures. Only a few, select organizations have been invited to participate as training partners. Additionally, only trainers who undergo a rigorous examination process will be approved as CORE IMPACT Certified Trainers (CICT). Students who attend the instructor-led, 2-day class and pass the final exam will be recognized as a CORE IMPACT Certified Professional (CICP).

Andrew Whitaker, senior instructor at Training Camp, one of the first organizations to join the program, said, "There's still a surprising amount of confusion in the marketplace about what constitutes a penetration test, specifically, as opposed to a vulnerability scan. Training and certification programs like Core Security's are critical to help build awareness about the specific benefits of this fundamentally important security process and to ensure best practices among more experienced testing and vulnerability management practitioners."

Core Security's training and certification program involves participation in intensive, on-site instruction, including labs and exercises built around practical use case scenarios. When training is completed, users will have a firm grasp of all CORE IMPACT Pro capabilities and will be able to actively assess their network, endpoint and web application defenses to manage related IT security risks.

"While I've been using CORE IMPACT software for some time, the training course helped me understand not only how much more I could get out of the product, but how to rapidly expand my personal skill set as a penetration tester," said Steve Povolny, a CICP class participant and IT Security manager at a major retailer.

"Given that Core Security's products are the de facto standard for penetration testing software, we're offering full training and certification courses built around our market-leading technology and our experiences in the field," said Mark Hatton, CEO of Core Security. "Many users are only scratching the surface of what they can achieve utilizing CORE IMPACT to validate their overall IT security standing. Through this program, we aim to provide attendees with a wealth of hands-on experience and practical knowledge so that they can derive maximum value from the entire penetration testing process."

To learn more about the new training and certification program, please visit www.coresecurity.com, or call 617-399-6980.

About Core Security Technologies Core Security Technologies is the leader in comprehensive penetration testing software solutions that IT executives rely on to expose vulnerabilities, measure operational risk and assure security effectiveness. The company's CORE IMPACT product family offers a comprehensive approach to assessing the security of network systems, endpoint systems, email users and web applications against complex threats. All CORE IMPACT security testing solutions are backed by trusted vulnerability research and leading-edge threat expertise from the company's Security Consulting Services, CoreLabs and Engineering groups. Based in Boston, MA and Buenos Aires, Argentina, Core Security Technologies can be reached at 617-399-6980 or on the Web at: http://www.coresecurity.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Edge-DRsplash-10-edge-articles
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
News
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23347
PUBLISHED: 2021-03-03
The package github.com/argoproj/argo-cd/cmd before 1.7.13, from 1.8.0 and before 1.8.6 are vulnerable to Cross-site Scripting (XSS) the SSO provider connected to Argo CD would have to send back a malicious error message containing JavaScript to the user.
CVE-2021-25315
PUBLISHED: 2021-03-03
A Incorrect Implementation of Authentication Algorithm vulnerability in of SUSE SUSE Linux Enterprise Server 15 SP 3; openSUSE Tumbleweed allows local attackers to execute arbitrary code via salt without the need to specify valid credentials. This issue affects: SUSE SUSE Linux Enterprise Server 15 ...
CVE-2021-27921
PUBLISHED: 2021-03-03
Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for a BLP container, and thus an attempted memory allocation can be very large.
CVE-2021-27922
PUBLISHED: 2021-03-03
Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICNS container, and thus an attempted memory allocation can be very large.
CVE-2021-27923
PUBLISHED: 2021-03-03
Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICO container, and thus an attempted memory allocation can be very large.