Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

7/30/2009
10:18 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Core Security Launches New CORE IMPACT Global Training and Certification Program

Program teaches users how to get the most out of Core's automated penetration testing tool

BOSTON—July 27, 2009—Core Security Technologies, provider of CORE IMPACT, the most comprehensive product for proactive enterprise security testing, today unveiled a worldwide training and certification program for its industry-leading penetration testing software. This all-new program will teach both end users and trainers alike how to best utilize the market's only commercial-grade product for automated penetration testing, CORE IMPACT Pro.

Featured program tracks will cater to two groups: professional trainers seeking to instruct others on how to conduct penetrating tests using CORE IMPACT Pro and users who want to more effectively leverage the product to secure their IT infrastructures. Only a few, select organizations have been invited to participate as training partners. Additionally, only trainers who undergo a rigorous examination process will be approved as CORE IMPACT Certified Trainers (CICT). Students who attend the instructor-led, 2-day class and pass the final exam will be recognized as a CORE IMPACT Certified Professional (CICP).

Andrew Whitaker, senior instructor at Training Camp, one of the first organizations to join the program, said, "There's still a surprising amount of confusion in the marketplace about what constitutes a penetration test, specifically, as opposed to a vulnerability scan. Training and certification programs like Core Security's are critical to help build awareness about the specific benefits of this fundamentally important security process and to ensure best practices among more experienced testing and vulnerability management practitioners."

Core Security's training and certification program involves participation in intensive, on-site instruction, including labs and exercises built around practical use case scenarios. When training is completed, users will have a firm grasp of all CORE IMPACT Pro capabilities and will be able to actively assess their network, endpoint and web application defenses to manage related IT security risks.

"While I've been using CORE IMPACT software for some time, the training course helped me understand not only how much more I could get out of the product, but how to rapidly expand my personal skill set as a penetration tester," said Steve Povolny, a CICP class participant and IT Security manager at a major retailer.

"Given that Core Security's products are the de facto standard for penetration testing software, we're offering full training and certification courses built around our market-leading technology and our experiences in the field," said Mark Hatton, CEO of Core Security. "Many users are only scratching the surface of what they can achieve utilizing CORE IMPACT to validate their overall IT security standing. Through this program, we aim to provide attendees with a wealth of hands-on experience and practical knowledge so that they can derive maximum value from the entire penetration testing process."

To learn more about the new training and certification program, please visit www.coresecurity.com, or call 617-399-6980.

About Core Security Technologies Core Security Technologies is the leader in comprehensive penetration testing software solutions that IT executives rely on to expose vulnerabilities, measure operational risk and assure security effectiveness. The company's CORE IMPACT product family offers a comprehensive approach to assessing the security of network systems, endpoint systems, email users and web applications against complex threats. All CORE IMPACT security testing solutions are backed by trusted vulnerability research and leading-edge threat expertise from the company's Security Consulting Services, CoreLabs and Engineering groups. Based in Boston, MA and Buenos Aires, Argentina, Core Security Technologies can be reached at 617-399-6980 or on the Web at: http://www.coresecurity.com.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: We need more votes, check the obituaries.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4815
PUBLISHED: 2021-01-27
IBM Cloud Pak for Security (CP4S) 1.4.0.0 could allow a remote user to obtain sensitive information from HTTP response headers that could be used in further attacks against the system.
CVE-2020-4816
PUBLISHED: 2021-01-27
IBM Cloud Pak for Security (CP4S) 1.4.0.0 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-For...
CVE-2020-4820
PUBLISHED: 2021-01-27
IBM Cloud Pak for Security (CP4S) 1.4.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
CVE-2020-4967
PUBLISHED: 2021-01-27
IBM Cloud Pak for Security (CP4S) 1.3.0.1 could disclose sensitive information through HTTP headers which could be used in further attacks against the system. IBM X-Force ID: 192425.
CVE-2020-36012
PUBLISHED: 2021-01-27
Stored XSS vulnerability in BDTASK Multi-Store Inventory Management System 1.0 allows a local admin to inject arbitrary code via the Customer Name Field.