2 DAY COURSE: In this course you will learn the procedures to use a virtual bridge and connect to a physical network. How to run virtual software and bridge it to your Storm device as well a how to isolate the Storm with the bridge. Configure secure remote access, and connect from the Internet and do your assessments from your back yard with no airport security checks! You will learn methods of protocol analysis to identify intrusions. How to identify weaknesses and vectors of attack for both wired and wireless networks using the device. The hacking and penetration testing methodology will be conducted using the device as the main attack platform to gain access to the network and machines that you have targeted. In the course you will perform against a set of targets using the device and knowledge learned from the course.