Détails de la formation
Every day more and more systems and networks become connected to the IPv6 Internet, not without a fair share of security implications. Learn from the very same folks that have broken and patched the IPv6 protocols how to pentest and defend your IPv6 systems and networks before the bad guys do!
The IPv6 protocol suite has been designed to accommodate the present and future growth of the Internet, by providing a much larger address space than that of its IPv4 counterpart, and is expected to be the successor of the original IPv4 protocol suite. The imminent exhaustion of the IPv4 address space has resulted in the deployment of IPv6 in many production environments, with many other organizations planning to deploy IPv6 in the short or near term.
There are a number of factors that make the IPv6 protocol suite interesting from a security standpoint. Firstly, being a new technology, technical personnel has much less confidence with the IPv6 protocols than with their IPv4 counterparts, and thus it is likely that the security implications of the protocols be overlooked when they are deployed on production networks. Secondly, IPv6 implementations are much less mature than their IPv4 counterparts, and thus it is very likely that a number of vulnerabilities will be discovered in them before their robustness matches that of the existing IPv4 implementations. Thirdly, security products such as firewalls and NIDS’s (Network Intrusion Detection Systems) usually have less support for the IPv6 protocols than for their IPv4 counterparts. Fourthly, the security implications of IPv6 transition/co-existence technologies on existing IPv4 networks are usually overlooked, potentially enabling attackers to leverage these technologies to circumvent IPv4 security controls in unexpected ways.
The imminent global deployment of IPv6 has created a global need for security professionals with expertise in the field of IPv6 security, such that the aforementioned security issues can be mitigated.
While there exist a number of training courses about IPv6 security, they either limit themselves to a high-level overview of IPv6 security, and/or fail to cover a number of key IPv6 technologies that are vital in all real IPv6 deployment scenarios. During the last few years, SI6 Networks has offered its flagship course “Hacking IPv6 Networks”, providing in-depth hands-on IPv6 security training to networking and security professionals around the world.
Hacking IPv6 Networks (version 6.0) is a renewed edition of SI6 Networks’ IPv6 security training course, with background and theoretical information reduced to a minimum, a tremendous increase in hands-on exercises, and newly incorporated materials based on recent developments in the area of IPv6 security. The training is carried out by Fernando Gont, a renowned IPv6 security researcher.
Lien vers la description de la formation : https://hackinparis.com/trainings/#training-2020-hacking-ipv6-networks-v6-0-3-days
Pré-requis éventuel ou connaissances souhaitables ou exigées : Participants are required to have a good understanding of the IPv4 protocol suite (IPv4, ICMP, ARP, etc.) and of related components (routers, firewalls, etc.). Additionally, the attendee is expected to knowledge about basic IPv4 troubleshooting tools, such as: ping, traceroute, and network protocol analyzers (e.g., tcpdump). Basic knowledge of IPv6 is desirable, but not required.
Niveau souhaité : Confirmé
Fonction souhaitée : Network Engineers, Network Administrators, Security Administrators, Penetration Testers, and Security Professionals in general.
Prix de la formation : 2150 HT
Détail des supports remis au participant : https://hackinparis.com/trainings/#training-2020-hacking-ipv6-networks-v6-0-3-days
En intra : oui En inter : oui
Conditions repas et hébergement : Repas inclus
Nom : KOLTSIDIS
Prénom : Evangélia
Téléphone : 0178765800
Email : firstname.lastname@example.org
- Lead Implementer ISO22301
- Durcissement des Systèmes
- Sécurisation des infrastructures Windows – Réf : SECUPKIWIN
- Computer Hacking Forensic Investigator
- PIA : étude d’impact sur la vie privée : Quand, pourquoi, comment ? – Réf : PIA
- Sécurisation Windows
- Gestion de crise IT/SSI – Réf : SECUCRISE
- Hébergement de Données de Santé | Principes et exigences
- Black belt pentesting / Bung Hunting Millionaire : Mestering Web attacks with Full-Stack Exploitation
- Lutte contre la Cybercriminalité: mise en pratique