Você está na página 1de 7

http://www.meraevents.

com/event/certified-white-hat-hacker-level-1-

Nueva Latitud 12 Serie 5000 (E5250) Core i5


Tienda
Busque Por Marca
DELL
Notebooks Dell

N/P DELNBLATE5250-001

En stock

Código:CREA-008-0143
Marca:Dell
Código Fabricante:DELNBLATE5250-001
ESTADO PRODUCTO:Stock

$1 254.00
Uds.

Pida consejo a sus amigos

Comparte

Ver mas
(6)
imagenes
Construida para el trabajo. Diseñada para impresionar.

DELL LATITUDE E5250, Intel 5th gen Intel i5-5300U (2.3 up to 2.9GHz, 3M), 4GB,DDR3, HDD 500GB

La Latitude 12 de la serie 5000 ofrece una experiencia móvil de primera calidad con funciones com

El nuevo tamaño de pantalla de 12,5 pulgadas ofrece un diseño delgado y elegante, que comienza

Esta herramienta móvil de clase empresarial está diseñada para hacer que los usuarios finales siga
manejable del mundo con una confiabilidad excepcional.

Está bien equipada con una gama de accesorios esenciales para alcanzar una productividad máxim
día, los 7 días de la semana

Código CREATIVO CREA-008-0143


NOTEBOOK DELL LATITUDE E5250 BTX CORE I5 (210-
Nro de Parte Producto
ACSO)
5th Generation Intel Core i5-5300U (Dual Core, 2.3GHz, 3M
Procesador
cache) (379-BBTH)
Memoria 4GB (1x4GB) 1600MHz DDR3L Memory (370-AAQI)
Teclado Internal Single Pointing Keyboard, Spanish (583-BCGI)
Intel Dual Band Wireless-AC 7265 Driver (555-BCBF) Intel
Video Core i5-5300U Base, Intel Integrated HD Graphics 5500,
Smart card Reader, E-Dock (338-BGCP)
500GB 2.5inch Serial ATA (7,200 Rpm) Hard Drive, Latitude
Disco Duro
(400-AGIY) 7MM HDD SSDR Bracket (575-BBDH)
Windows 7 Professional, Spanish, 64bit (includes Windows
Software
8.1 Pro 64bit License and Media) (536-BBBE)
Bateria Primary 3-cell 38W/HR Battery (451-BBJR)
Intel vPro Technology Advanced Management Features
V Pro
(631-AAKN)
HD de 12,5 in (1.366 x 768) antirreflejo (16:9)
WLED, 200 nits, parte posterior LCD de magnesio FHD de
Pantalla 12,5 in con NBT Corning® Gorilla® Glass, (1.920 x 1.080)
anti huellas digitales (16:9), WLED, 360 nits, parte posterior
LCD de magnesio
Ethernet 10/100/1.000 Opciones de LAN inalámbrica: Wi-Fi
de banda simple Dell Wireless™ 1707 802.11N + Tarjeta
inalámbrica BT 4.0 LE (1x1) Banda doble inalámbrica Intel®
AC 7265 802.11AC Wi-Fi + Tarjeta inalámbrica BT 4.0 LE
(2x2) Banda doble inalámbrica Intel® - AC 7265 802.11AC
Wi-Fi + Tarjeta inalámbrica BT 4.0 LE (Indonesia) (2x2)
Conectividad
Banda doble inalámbrica Intel® - AN 7265 802.11AGN Wi-
Fi + Tarjeta inalámbrica BT 4.0 LE (2x2) Banda doble
inalámbrica Intel® - AN 7265 802.11AGN Wi-Fi Tarjeta
inalámbrica (No BT) (2x2) Opciones de banda ancha móvil
opcional:10 Tarjeta inalámbrica Qualcomm Gobi™ 4G
LTE (Dell Wireless™ DW5809E para EMEA/APJ/ROW)
Ficha universal Lector de tarjeta de memoria SD 4.0
Conector Edocking opcional, 3 USB 3.0
(uno con PowerShare), HDMI, mDP Conector de red (RJ-45
Puertos, ranuras y chasis ranura de tarjeta SIM opcional Dos ranuras de expansión
M.2: 1 WWAN/HCA y 1 WLAN/BT/WiGig Lector de tarjetas
inteligentes opcional y lector de huellas digitales opcional
Ranura de bloqueo
Ancho: 12,2 in/310,5 mm Altura (parte posterior): 0,9 in/22,7
Dimensiones y peso
Profundidad: 8,4 in/212,8 mm Peso inicial: 3,44 lb /1,56 kg

Cyber Security & Privacy Foundation is proud to announce the Corporate training
in Bangalore.

The Topics of this session include:

1. Introduction to Security (30 minutes)

a. Psychology of an attacker

b. General concepts

c. Hacker Methodologies

2. Distinguishing Various classes of Hackers

a. Black, White, Grey


b. New class of Hackers – The bounty hunters

c. Various perspectives of offering a service as an advocate of offensive


security

3. Various Toolkits (Hands on sessions):(2 hours)

a. Tamperdata

b. Firebug

c. Hackbar

d. Live HTTP Headers

e. Maltego

f. Shodan

g. Google Hacking

h. FOCA

i. Acunetix Web Vulnerability Scanner

4. Advanced tools for vulnerability assessment/penetration testing(hands


on):(2 hours)

a. Exploiting vulnerabilities: Metasploit , nmap

b. Reverse Engineering: Ollydbg

c. Password crackers& win password crackers

d. Web application vulnerability : sqlmap

e. Network Vulnerability Scanner :Nessus

5. Advanced Persistent Threats – A corporate nightmare (30 minutes)

a. An overview of APTs

b. Various Phases of an APT

6. Crypto Currencies - BitCoins, Namecoin (60 minutes)


a. All about mining, bots, cloud mining

b. Dangers of online currency

c. Underground-hackers, exploits and bitcoins

d. Domains .bit, Malware using .bit misuse of .bit domains.

The remaining 90 minutes will be used for scenario based hacking sessions and
Question and Answer sessions. Each module is divided in to theory as well as
hands on practical sessions.

Pre Requisites:

The workshop will be completely hands-on and would require attendees to


bring their own laptops installed with isolated network like VMware/Virtual
box to gain hands on exposure.

Price:

The Corporate Training tickets would cost Rs. 1500/- per person.

Lunch and Tea/Snacks will be provided at the venue.

Trainer’s Profile:

Karthik Ranganath is a security researcher with CSPF and also the POC for
DEFCON Bangalore Group (DC9180). He has published various web application
advisories in portals such as exploit-db and packetstorm security. As a passionate
security researcher, he has found critical vulnerabilities in various corporate
networks and responsibly disclosed it to the concerned authorities. He holds the
EC-Council CEH certification and has a Bachelor’s degree in Information
Technology from National Institute of Technology Karnataka, India. In his free time,
he shares his knowledge with the student community in the form of workshops and
has conducted such programs for various technical universities in India. He has
authored two well known cyber security books on backtrack and metasploit. He has
presented papers at various national level security conferences. He blogs
at http://securityresearch.cysecurity.org.

Mr.Nikhil.P.Kulkarni(Trainer):
Mr.Nikhil.P.Kulkarni is a 21 year old one of the youngest Cyber Security
Researchers of India. He was one of the key speakers at DEFCON Bangalore
Meet where he presented his research paper on Credit Card Frauds.

He is also an active member of the NULL Security Community and has presented
his talks at NULL Bangalore Security Meet and NULL Infosys Mysore Security
Meet. He has helped various companies such as DELL, TechCrunch, Apple,
Microsoft, Google, Adobe, Barracuda Networks, Engine Yard, etc. in improving
their Network Security. He has also found various Vulnerabilities/Security
weaknesses in websites such as Mega.co.nz, About.me, DELL, Harmony App,
Phishtank, MakeUseOf and many more. He has been appreciated by Cyber Czar
Kim Dotcom for his efforts and has received an appreciation letter from the CMO of
“Mega Privacy Ltd.”

He has been listed and acknowledged in various “HALL OF FAMES” of various


including microsoft.

Mr.Sabari Selvan(Trainer)

Mr. Sabari Selvan is a young Entrepreneur, founder of BreaktheSecurity.com and


the BreaktheSecurity Team. He is also the Editor-in-Chief of the famous E-
magazine “E HACKING NEWS” (one of India’s Leading IT Security Portal). His
field of expertise include Malware Analysis, Web Application Penetration Testing,
and Linux Security. He has an experience of more than 3 years in the field of
Cyber Security. He has discovered various security flaws in various high profile
websites including Mozilla, Nokia, AT&T, 160By2 ,Way2SMS and more.

Suriya Prakash (Trainer)

has been in the security field for more than three years. He has exposed and
helped fix vulnerabilities in lots of high profile websites. He has done research into
malware , particularly he predicted the raise of TOR based botnets and showed
how they work before major antivirus vendors where even aware of them. He also
writes for EHN a leading security oriented news website.

Who should attend:

Software developers, Security Programmers, CISO, IT Managers , System


Administrators , Ethical hackers, Information system auditors, CISSP’s

What do we take away from the conference:


In-depth knowledge on latest security threats/trends and keeping your cyber
security knowledge up to date.

Você também pode gostar