Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

7/30/2009
10:18 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Core Security Launches New CORE IMPACT Global Training and Certification Program

Program teaches users how to get the most out of Core's automated penetration testing tool

BOSTON—July 27, 2009—Core Security Technologies, provider of CORE IMPACT, the most comprehensive product for proactive enterprise security testing, today unveiled a worldwide training and certification program for its industry-leading penetration testing software. This all-new program will teach both end users and trainers alike how to best utilize the market's only commercial-grade product for automated penetration testing, CORE IMPACT Pro.

Featured program tracks will cater to two groups: professional trainers seeking to instruct others on how to conduct penetrating tests using CORE IMPACT Pro and users who want to more effectively leverage the product to secure their IT infrastructures. Only a few, select organizations have been invited to participate as training partners. Additionally, only trainers who undergo a rigorous examination process will be approved as CORE IMPACT Certified Trainers (CICT). Students who attend the instructor-led, 2-day class and pass the final exam will be recognized as a CORE IMPACT Certified Professional (CICP).

Andrew Whitaker, senior instructor at Training Camp, one of the first organizations to join the program, said, "There's still a surprising amount of confusion in the marketplace about what constitutes a penetration test, specifically, as opposed to a vulnerability scan. Training and certification programs like Core Security's are critical to help build awareness about the specific benefits of this fundamentally important security process and to ensure best practices among more experienced testing and vulnerability management practitioners."

Core Security's training and certification program involves participation in intensive, on-site instruction, including labs and exercises built around practical use case scenarios. When training is completed, users will have a firm grasp of all CORE IMPACT Pro capabilities and will be able to actively assess their network, endpoint and web application defenses to manage related IT security risks.

"While I've been using CORE IMPACT software for some time, the training course helped me understand not only how much more I could get out of the product, but how to rapidly expand my personal skill set as a penetration tester," said Steve Povolny, a CICP class participant and IT Security manager at a major retailer.

"Given that Core Security's products are the de facto standard for penetration testing software, we're offering full training and certification courses built around our market-leading technology and our experiences in the field," said Mark Hatton, CEO of Core Security. "Many users are only scratching the surface of what they can achieve utilizing CORE IMPACT to validate their overall IT security standing. Through this program, we aim to provide attendees with a wealth of hands-on experience and practical knowledge so that they can derive maximum value from the entire penetration testing process."

To learn more about the new training and certification program, please visit www.coresecurity.com, or call 617-399-6980.

About Core Security Technologies Core Security Technologies is the leader in comprehensive penetration testing software solutions that IT executives rely on to expose vulnerabilities, measure operational risk and assure security effectiveness. The company's CORE IMPACT product family offers a comprehensive approach to assessing the security of network systems, endpoint systems, email users and web applications against complex threats. All CORE IMPACT security testing solutions are backed by trusted vulnerability research and leading-edge threat expertise from the company's Security Consulting Services, CoreLabs and Engineering groups. Based in Boston, MA and Buenos Aires, Argentina, Core Security Technologies can be reached at 617-399-6980 or on the Web at: http://www.coresecurity.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18575
PUBLISHED: 2019-12-06
Dell Command Configure versions prior to 4.2.1 contain an uncontrolled search path vulnerability. A locally authenticated malicious user could exploit this vulnerability by creating a symlink to a target file, allowing the attacker to overwrite or corrupt a specified file on the system.
CVE-2019-11293
PUBLISHED: 2019-12-06
Cloud Foundry UAA Release, versions prior to v74.10.0, when set to logging level DEBUG, logs client_secret credentials when sent as a query parameter. A remote authenticated malicious user could gain access to user credentials via the uaa.log file if authentication is provided via query parameters.
CVE-2019-16771
PUBLISHED: 2019-12-06
Versions of Armeria 0.85.0 through and including 0.96.0 are vulnerable to HTTP response splitting, which allows remote attackers to inject arbitrary HTTP headers via CRLF sequences when unsanitized data is used to populate the headers of an HTTP response. This vulnerability has been patched in 0.97....
CVE-2019-1551
PUBLISHED: 2019-12-06
There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are n...
CVE-2019-16671
PUBLISHED: 2019-12-06
An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Remote authenticated users can crash a device with a special packet because of Uncontrolled Resource Consumption.