Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

7/30/2009
10:18 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Core Security Launches New CORE IMPACT Global Training and Certification Program

Program teaches users how to get the most out of Core's automated penetration testing tool

BOSTON—July 27, 2009—Core Security Technologies, provider of CORE IMPACT, the most comprehensive product for proactive enterprise security testing, today unveiled a worldwide training and certification program for its industry-leading penetration testing software. This all-new program will teach both end users and trainers alike how to best utilize the market's only commercial-grade product for automated penetration testing, CORE IMPACT Pro.

Featured program tracks will cater to two groups: professional trainers seeking to instruct others on how to conduct penetrating tests using CORE IMPACT Pro and users who want to more effectively leverage the product to secure their IT infrastructures. Only a few, select organizations have been invited to participate as training partners. Additionally, only trainers who undergo a rigorous examination process will be approved as CORE IMPACT Certified Trainers (CICT). Students who attend the instructor-led, 2-day class and pass the final exam will be recognized as a CORE IMPACT Certified Professional (CICP).

Andrew Whitaker, senior instructor at Training Camp, one of the first organizations to join the program, said, "There's still a surprising amount of confusion in the marketplace about what constitutes a penetration test, specifically, as opposed to a vulnerability scan. Training and certification programs like Core Security's are critical to help build awareness about the specific benefits of this fundamentally important security process and to ensure best practices among more experienced testing and vulnerability management practitioners."

Core Security's training and certification program involves participation in intensive, on-site instruction, including labs and exercises built around practical use case scenarios. When training is completed, users will have a firm grasp of all CORE IMPACT Pro capabilities and will be able to actively assess their network, endpoint and web application defenses to manage related IT security risks.

"While I've been using CORE IMPACT software for some time, the training course helped me understand not only how much more I could get out of the product, but how to rapidly expand my personal skill set as a penetration tester," said Steve Povolny, a CICP class participant and IT Security manager at a major retailer.

"Given that Core Security's products are the de facto standard for penetration testing software, we're offering full training and certification courses built around our market-leading technology and our experiences in the field," said Mark Hatton, CEO of Core Security. "Many users are only scratching the surface of what they can achieve utilizing CORE IMPACT to validate their overall IT security standing. Through this program, we aim to provide attendees with a wealth of hands-on experience and practical knowledge so that they can derive maximum value from the entire penetration testing process."

To learn more about the new training and certification program, please visit www.coresecurity.com, or call 617-399-6980.

About Core Security Technologies Core Security Technologies is the leader in comprehensive penetration testing software solutions that IT executives rely on to expose vulnerabilities, measure operational risk and assure security effectiveness. The company's CORE IMPACT product family offers a comprehensive approach to assessing the security of network systems, endpoint systems, email users and web applications against complex threats. All CORE IMPACT security testing solutions are backed by trusted vulnerability research and leading-edge threat expertise from the company's Security Consulting Services, CoreLabs and Engineering groups. Based in Boston, MA and Buenos Aires, Argentina, Core Security Technologies can be reached at 617-399-6980 or on the Web at: http://www.coresecurity.com.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Lessons from the NSA: Know Your Assets
Robert Lemos, Contributing Writer,  12/12/2019
4 Tips to Run Fast in the Face of Digital Transformation
Shane Buckley, President & Chief Operating Officer, Gigamon,  12/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19807
PUBLISHED: 2019-12-15
In the Linux kernel before 5.3.11, sound/core/timer.c has a use-after-free caused by erroneous code refactoring, aka CID-e7af6307a8a5. This is related to snd_timer_open and snd_timer_close_locked. The timeri variable was originally intended to be for a newly created timer instance, but was used for ...
CVE-2014-8650
PUBLISHED: 2019-12-15
python-requests-Kerberos through 0.5 does not handle mutual authentication
CVE-2014-3536
PUBLISHED: 2019-12-15
CFME (CloudForms Management Engine) 5: RHN account information is logged to top_output.log during registration
CVE-2014-3643
PUBLISHED: 2019-12-15
jersey: XXE via parameter entities not disabled by the jersey SAX parser
CVE-2014-3652
PUBLISHED: 2019-12-15
JBoss KeyCloak: Open redirect vulnerability via failure to validate the redirect URL.