Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

7/30/2009
10:18 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Core Security Launches New CORE IMPACT Global Training and Certification Program

Program teaches users how to get the most out of Core's automated penetration testing tool

BOSTON—July 27, 2009—Core Security Technologies, provider of CORE IMPACT, the most comprehensive product for proactive enterprise security testing, today unveiled a worldwide training and certification program for its industry-leading penetration testing software. This all-new program will teach both end users and trainers alike how to best utilize the market's only commercial-grade product for automated penetration testing, CORE IMPACT Pro.

Featured program tracks will cater to two groups: professional trainers seeking to instruct others on how to conduct penetrating tests using CORE IMPACT Pro and users who want to more effectively leverage the product to secure their IT infrastructures. Only a few, select organizations have been invited to participate as training partners. Additionally, only trainers who undergo a rigorous examination process will be approved as CORE IMPACT Certified Trainers (CICT). Students who attend the instructor-led, 2-day class and pass the final exam will be recognized as a CORE IMPACT Certified Professional (CICP).

Andrew Whitaker, senior instructor at Training Camp, one of the first organizations to join the program, said, "There's still a surprising amount of confusion in the marketplace about what constitutes a penetration test, specifically, as opposed to a vulnerability scan. Training and certification programs like Core Security's are critical to help build awareness about the specific benefits of this fundamentally important security process and to ensure best practices among more experienced testing and vulnerability management practitioners."

Core Security's training and certification program involves participation in intensive, on-site instruction, including labs and exercises built around practical use case scenarios. When training is completed, users will have a firm grasp of all CORE IMPACT Pro capabilities and will be able to actively assess their network, endpoint and web application defenses to manage related IT security risks.

"While I've been using CORE IMPACT software for some time, the training course helped me understand not only how much more I could get out of the product, but how to rapidly expand my personal skill set as a penetration tester," said Steve Povolny, a CICP class participant and IT Security manager at a major retailer.

"Given that Core Security's products are the de facto standard for penetration testing software, we're offering full training and certification courses built around our market-leading technology and our experiences in the field," said Mark Hatton, CEO of Core Security. "Many users are only scratching the surface of what they can achieve utilizing CORE IMPACT to validate their overall IT security standing. Through this program, we aim to provide attendees with a wealth of hands-on experience and practical knowledge so that they can derive maximum value from the entire penetration testing process."

To learn more about the new training and certification program, please visit www.coresecurity.com, or call 617-399-6980.

About Core Security Technologies Core Security Technologies is the leader in comprehensive penetration testing software solutions that IT executives rely on to expose vulnerabilities, measure operational risk and assure security effectiveness. The company's CORE IMPACT product family offers a comprehensive approach to assessing the security of network systems, endpoint systems, email users and web applications against complex threats. All CORE IMPACT security testing solutions are backed by trusted vulnerability research and leading-edge threat expertise from the company's Security Consulting Services, CoreLabs and Engineering groups. Based in Boston, MA and Buenos Aires, Argentina, Core Security Technologies can be reached at 617-399-6980 or on the Web at: http://www.coresecurity.com.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/1/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Threat from the Internet--and What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15478
PUBLISHED: 2020-07-01
The Journal theme before 3.1.0 for OpenCart allows exposure of sensitive data via SQL errors.
CVE-2020-6261
PUBLISHED: 2020-07-01
SAP Solution Manager (Trace Analysis), version 7.20, allows an attacker to perform a log injection into the trace file, due to Incomplete XML Validation. The readability of the trace file is impaired.
CVE-2020-15471
PUBLISHED: 2020-07-01
In nDPI through 3.2, the packet parsing code is vulnerable to a heap-based buffer over-read in ndpi_parse_packet_line_info in lib/ndpi_main.c.
CVE-2020-15472
PUBLISHED: 2020-07-01
In nDPI through 3.2, the H.323 dissector is vulnerable to a heap-based buffer over-read in ndpi_search_h323 in lib/protocols/h323.c, as demonstrated by a payload packet length that is too short.
CVE-2020-15473
PUBLISHED: 2020-07-01
In nDPI through 3.2, the OpenVPN dissector is vulnerable to a heap-based buffer over-read in ndpi_search_openvpn in lib/protocols/openvpn.c.