Toll Free: Official Web:

Size: px
Start display at page:

Download "Toll Free: 1800-3000-1115 Official Web: www.bytecode.in"

Transcription

1 . Ethical Hacking and Cyber Forensic Workshop

2 What is new?

3 Workshop Partners

4

5 About Techkriti (IIT Kanpur) With immense pleasure we would like to inform you that the Indian Institute of Technology (IIT) Kanpur is organizing its National Level Annual Technical and Entrepreneurship Festival, TECHKRITI 2014 during 06th - 09th March, Techkriti has fast emerged as one of the best technical festivals of the country over the past years and now resounds as a familiar name across the colleges as well as the industry, nationwide. It gets bigger and better by the years and needless to say we plan to keep up with the legacy! After the last year s renaissance, Techkriti is striking back with vengeance, in its very first green avatar, to redefine the technology which will transform the future of the commons. From workshops and guest lectures on the one hand to debates, quizzes and professional shows on the other, TECHKRITI 2014 is playing host to a gamut of activities which challenges the brightest minds in the country to push their capacity to ideate, drive their hunger to innovate and challenge their potential to create like never before. The 4 day fiesta of TECHKRITI to be held from 06th to 09th of March 2014 sees the confluence of thoughts and ideas amongst more than 50,000+ young minds from not only India's but the world's top notch universities.

6 Techkriti (Event Details) 2014 TECHKRITI 2014 is IIT Kanpur Technical festival going to held from 06th - 09th March, TECHKRITI 2014 is conducting an INTERNATIONAL Event Hackkriti who s Prelims round will be conducted at 20 Zonal Centers across different cities of India. The Prelims round will be conducted at the end of 2 days workshop on Ethical Hacking & Cyber Forensic. The final Round of Hackkriti, IIT Kanpur has Prize Money of ` 1,00,000/- to be given by BYTECODE CYBER SECURITY. Countries like Sri Lanka, China, Pakistan, Bangladesh, Australia and many more will be participating in the competition. The workshop will be conducted by BYTECODE CYBER SECURITY, Delhi a renowned company for delivering Technical Workshops in Engineering Colleges. We are looking forward to Make Your College as a ZONAL CENTER for conducting the workshop.

7 Techkriti (Event Details) 2014 Prelims of HACKKRITI : We want your association for TECHKRITI 2014, IIT Kanpur Ethical Hacking Outreach program in terms of providing support and holding a Zonal Center at your institution. Round 1 (Workshop to be held in 20 Zonal Centers) 1. The workshops will be organized in 20 different Zonal Centers/Colleges all across India from 1 st November 2013 to 28th February The workshop will be organized by BYTECODE CYBER SECURITY, Delhi (Workshop Partner TECHKRITI 2014, IIT Kanpur & Prize Sponsor BYTECODE). 3. The duration of workshop will be of 16 hours and will be covered in 2 days. 4. The Fees of Workshop will be ` 1,000/- per student.

8 Techkriti (Event Details) 2014 Each student will get the following during the workshop : Software Toolkit CD (Containing Software, Study Material, e-books, Tutorials etc) Students will get Certificate of Participation from TECHKRITI 2014, IIT Kanpur & BYTECODE CYBER SECURITY. 1. Your college can be one of the 20 Zonal Centers for organizing TECHKRITI 2014, IIT Kanpur HACKKRITI Outreach workshop. 2. Publicity material for the Promotion of the workshop will be send to different colleges by the Zonal Center (Publicity material will be provided by BYTECODE CYBER SECURITY). Your college name will be displayed on TECHKRITI 2014, IIT Kanpur & BYTECODE CYBER SECURITY. Official Website and Facebook page each having a daily visitor of more than

9 Zonal Center Round 2 (Prelims of HACKKRITI at Zonal Center) At the end of workshop on 2nd day, Prelims round of HACKKRITI Competition HACKRITI will be organized at the Zonal Center. Winners will get Direct Entry to the Final Round of HACKKRITI at Techkriti 2014, IIT Kanpur where participants from countries like Sri Lanka, Pakistan, Bangladesh, Nepal, Australia, India would be participating. Winning team will also get Certificate of Merit from TECHKRITI 2014, IIT Kanpur in association with BYTECODE CYBER SECURITY. Name of the Winning Team will be uploaded on TECHKRITI 2014 & BYTECODE CYBER SECURITY website.

10 Zonal Center SELECTION OF ZONAL CENTER The Zonal Center will be finalized on the following basis: 1. College having a Good Infrastructure with a Seminar Hall having sitting capacity of students. 2. Can provide Accommodation to Outstation college students. However college can charge extra for this from the students. 3. Laptop Charging Points. 4. Accommodation and Fooding to BYTECODE. 5. Arrange min. 150 students for the workshop. Since, every college will be interested to make his/her college as a Zonal center for this Event, priority will be given to the college fulfilling the above stated terms and conditions

11 Benefits to Zonal Center 1. International Promotion of your College. 2. Prelims Round of INTERNATIONAL Event HACKKRITI to be held at Zonal Center. 3. Certificate of Association to Zonal Center from TECHKRITI 2014, IIT Kanpur in association with BYTECODE CYBER SECURITY. 4. Zonal Center (College name) will be displayed on TECHKRITI 2014, IIT Kanpur & BYTECODE CYBER SECURITY. Official Website and Facebook page each having a daily visitor of more than Student getting Certificate of Participation will contain name of Zonal Center. 6. Certificate of Coordination for Students & Faculties Coordinators. 7. Your college will be one of the Zonal Center out of 20 Centers for organizing TECHKRITI 2014, IIT Kanpur Ethical Hacking Outreach workshop. 8. All Publicity material (Poster, Flex etc) send to different colleges will carry the name & logo of the Zonal Center. 9. Promotional and Invitation Mail send to different colleges (1 Lacks++) will contain the name & logo of Zonal Center. 10. Name of the Winning Team and Zonal Center will be uploaded on TECHKRITI 2014 & BYTECODE CYBER SECURITY.

12 Requirements from Zonal Center A Seminar Hall with sitting capacity of students. Two Projectors. 2 COLLAR MIKE with Sound System. White Board and Marker. Laptop Charging Points. Workshop Coordinators (2-5). One Laptop per team (1-3 Students), should be carried by all teams. Fooding and Lodging to BYTECODE team. Accommodation for the participants of workshop.

13 Certification Details During the whole Event Process following Certificate will be provided Certificate of Participation to all Participants from TECHKRITI 2014, IIT Kanpur in association with BYTECODE CYBER SECURITY. Certificate of Coordination to the Organizers/Coordinators from TECHKRITI 2014, IIT Kanpur in association with BYTECODE CYBER SECURITY. Certificate of Association to Zonal Center from TECHKRITI 2014, IIT Kanpur in association with BYTECODE CYBER SECURITY. Certificate of Merit to the Winners of Prelims round of Hackkriti from TECHKRITI 2014, IIT Kanpur in association with BYTECODE CYBER SECURITY.

14 About BYTECODE CYBER SECURITY Bytecode is an Information Security & IT trainings and certifications providing company, An authorized or accredited training center of EC-Council, Our head quarter is completely based in New Delhi (INDIA), In just a few years Bytecode has grown with a large number of new students, clients and partners. From the starting we only deliver the best quality and knowledge base solutions with a very high standard to our students, clients and partners because we believe that the high standards bring excellent output in long run and our standards is our strength, and we support these standards so that when we say We are Professional in it and we must really mean it. Bytecode believes in teamwork, With every new day the quest for acquiring new competencies continues. Forever searching, experimenting, innovating, learning, moving ahead with our sincere efforts and dedication, shaping the future, and challenging our competencies to create new opportunities, is a neverending process in the company.

15 About BYTECODE CYBER SECURITY Byte Code has conducted workshop on Ethical Hacking, Forensics and Robotics and other workshops with the giant engineering colleges, schools, companies, Govt. organizations such as: Delhi Public School HMDAV School - Delhi SPSS Public School - Delhi Innovative Group Of Colleges - Noida PCTI Computers and Technologies Delhi Technia College - Delhi IMS College - Noida IIT Kharagpur IIT Delhi IIT Jodhpur 2012, 2013 IIT Bombay IIT Jodhpur Feb 2012, March 2013 IIT Roorkee 2013 IIT Guwahati ISN DHANBAAD SRM UNIVERSITY Bengal COLLEGE OF ENGINEERING KNNCIT MADURAI Matrix Knowledge Solutions B.S.A.BDUR RAHMAN CHENNAI BITS PILANI-RAJASTHAN IIT BOMBAY Jaipur University SARVODYA College IGNOU and many more

16 PARTNERS BYTECODE CYBER SECURITY

17 Audience To Target Individuals School Students College Students IT Professionals IT Officers IT and LAW Officers Corporate IT Training Firms/Organizations/Society IT Consultants IT Experts IT Officers IT Institutions & Colleges IT Graduated or Computer Science Students Governance Security Agencies Security Groups Govt. IT Institutions IT Govt. & Security Officers.

18 Student Benefits Complimentary official study material, presentations worth 350$ USD. Complimentary 6 month virtual lab practicing/test access worth 350$ USD. Complimentary student learning kit, digital kit, complete software package worth 250$ USD. Byte-Code global Information Security & Ethical Hacking certification. Complimentary 50% discount gift voucher for Byte-Code official trainings. Complimentary 6 month virtual training support worth 500$ USD. Complimentary 6 month virtual e-courseware access worth 150$ USD. Complimentary sessions for education and career counselling.

19 Student s Benefits No other fee/costs. (like for: study material, exam charges, certification charges, exam fee, registration fee). Complimentary scholarship programs for first 10 (ten) winners of workshop worth 1000$ USD. Complimentary surprise gifts for first 10 (ten) winner of the workshop. Complimentary Byte-Code HACK T-Shirt for top 10 (ten) winners worth 50$ USD. Complimentary special appreciation Certificate for top 10 (ten) winners. Chance to work with Byte-Code on a Information Security, Ethical Hacking and Cyber Forensics' project for first top 10 (ten) winners.

20 Coordinator & Member s Benefits Complimentary official study material, presentations worth 350$ USD. Complimentary 6 month virtual lab practicing/test access worth 350$ USD. Complimentary student learning kit, digital kit, complete software package worth 250$ USD. Byte-Code global Information Security & Ethical Hacking certification. Complimentary 50% discount gift voucher for Byte-Code official trainings. Complimentary 6 month virtual training support worth 500$ USD. Complimentary 6 month virtual e-courseware access worth 150$ USD. Complimentary sessions for education and career counselling.

21 Coordinator & Member s Benefits No other fee/costs. (like for: study material, exam charges, certification charges, exam fee, registration fee). Complimentary workshop banners, posters, flex, workshop publicity through social network, marketing, updates on Byte- Code official website i.e. Complimentary surprise gifts. Complimentary Byte-Code HACK T-Shirt worth 50$ USD. Complimentary appreciation Certificate. Chance to work with Byte-Code on a Information Security, Ethical Hacking and Cyber Forensics' project for first top 10 (ten) winners.

22 What is Ethical Hacking? ETHICAL HACKING An ethical hacker is usually employed by an organization who trusts him or her to attempt to penetrate networks and/or computer systems, using the same methods as a hacker, for the purpose of finding and fixing computer security vulnerabilities. Unauthorized hacking (i.e., gaining access to computer systems without prior authorization from the owner) is a crime in most countries, but penetration testing done by request of the owner of the victim system(s) or network(s) is not.

23 What is Cyber Forensics? CYBER FORENSICS Computer forensics (sometimes known as computer forensic science is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information. Although it is most often associated with the investigation of a wide variety of computer crime, computer forensics may also be used in civil proceedings. The discipline involves similar techniques and principles to data recovery, but with additional guidelines and practices designed to create a legal audit trail.

24 Workshop Details. Workshop Name: Certified Ethical Hacking & Forensics Expert. Workshop Duration: 2 Days (8 Hours per day) Workshop Fee: INR (Eleven Hundred Only) for per student. Included: Study material, certification, digital kit, training, service tax i.e.

25 Course Content C EH Partner 1. Module 01: Introduction to Ethical Hacking 2. Module 02: Foot printing and Reconnaissance 3. Module 03: Scanning Networks 4. Module 04: Enumeration 5. Module 05: System Hacking 6. Module 06: Trojans and Backdoors 7. Module 07: Viruses and Worms 8. Module 08: Sniffers 9. Module 09: Social Engineering 10. Module 10: Denial of Service 11. Module 11: Session Hijacking 12. Module 12: Hacking Web servers 13. Module 13: Hacking Web Applications 14. Module 14: SQL Injection 15. Module 15: Hacking Wireless Networks 16. Module 16: Evading IDS, Firewalls, and Honey pots 17. Module 17: Buffer Overflow 18. Module 18: Cryptography 19. Module 19: Penetration Testing 20. Module 20: Mobile Hacking

26 Workshop Tools & Digital Kit

27 Byte-Code Gallery

28 BYTE CODE CYBER Security Contact Us Contact Us BYTE CODE CYBER SECURITY (P) LIMITED Head Office: 72-B, 3 rd Floor Main Vikas Marg Laxmi Nagar, Delhi: Web: [email protected] Telephone: / / Branches : New Delhi, Ghaziabad, Noida, Pune, Vadodara, Odisha, Gurgaon TEXT Website: ( Indian) ( International )

29 We seek your collaboration with us and look forward to make your campus one of zonal center of this event. The authorized team from BYTECODE CYBER SECURITY (Workshop Partner TECHKRITI 2014, IIT Kanpur & Prize Sponsor BYTECODE) would come to your campus to organize a workshop and Prelims Round of the concerned event. This workshop cum event can be organized at any weekend/weekday. We look forward for a quick and positive response from you and a long term association with your esteemed organization. THANK YOU I T H A S B E E N A P L E A S U R E!

FRANCHISE PROPOSAL BYTE CODE CYBER SECURITY PVT LTD

FRANCHISE PROPOSAL BYTE CODE CYBER SECURITY PVT LTD FRANCHISE PROPOSAL BYTE CODE CYBER SECURITY PVT LTD About Us Byte Code is an Information Security Training and development company, completely based in New Delhi (India). We started our small operations

More information

Ethical Hacking & Cyber Security Workshop

Ethical Hacking & Cyber Security Workshop Ethical Hacking & Cyber Security Workshop i3indya Technologies (A unit of ithree Infotech Pvt. Ltd.) Delhi Office: 37, First Floor, Defence Enclave, Preet Vihar, New Delhi-110092 Contact us: Email: [email protected]

More information

www.innobuzz.in Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0

www.innobuzz.in Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0 Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0 Innobuzz Knowledge Solutions (P) Limited is a Leading Global Firm providing Training Programs

More information

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information

EC Council Certified Ethical Hacker V8

EC Council Certified Ethical Hacker V8 Course Code: ECCEH8 Vendor: Cyber Course Overview Duration: 5 RRP: 2,445 EC Council Certified Ethical Hacker V8 Overview This class will immerse the delegates into an interactive environment where they

More information

[CEH]: Ethical Hacking and Countermeasures

[CEH]: Ethical Hacking and Countermeasures [CEH]: Ethical Hacking and Countermeasures Length Audience(s) Delivery Method : 5 days : This course will significantly benefit security officers, auditors, security professionals, site administrators,

More information

Course Title: Course Description: Course Key Objective: Fee & Duration:

Course Title: Course Description: Course Key Objective: Fee & Duration: Course Title: Course Description: This is the Ethical hacking & Information Security Diploma program. This 6 months Diploma Program provides you Penetration Testing in the various field of cyber world.

More information

Event Details. Stage 1 (Workshop Round to be held at Zonal Centers) Stage 2 (Zonal Round to be held at zonal center)

Event Details. Stage 1 (Workshop Round to be held at Zonal Centers) Stage 2 (Zonal Round to be held at zonal center) Introducing India s First Network Security Championship To, The HOD Date: 09/01/2014 Caarmel Engineering College Sub: National Network Security Championship by Network Bulls in association with ACM-IIT

More information

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker ALL ElNis ONE CEH Certified Ethical Hacker EXAM GUIDE Matt Walker Mc Grain/ New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto McGraw-Hill

More information

EC-Council. Certified Ethical Hacker. Program Brochure

EC-Council. Certified Ethical Hacker. Program Brochure EC-Council C Certified E Ethical Hacker Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional

More information

CYBERTRON NETWORK SOLUTIONS

CYBERTRON NETWORK SOLUTIONS CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified

More information

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.

More information

CRYPTUS DIPLOMA IN IT SECURITY

CRYPTUS DIPLOMA IN IT SECURITY CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information

More information

LINUX / INFORMATION SECURITY

LINUX / INFORMATION SECURITY LINUX / INFORMATION SECURITY CERTIFICATE IN LINUX SYSTEM ADMINISTRATION The Linux open source operating system offers a wide range of graphical and command line tools that can be used to implement a high-performance,

More information

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2) Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2) Course number: CFED Length: 5 days Certification Exam This course will help you prepare for the following exams: CCE --

More information

A Two days workshop on Information Security & Ethical Hacking Workshop Designed & Conceptualised by:

A Two days workshop on Information Security & Ethical Hacking Workshop Designed & Conceptualised by: A Two days workshop on Information Security & Ethical Hacking Workshop Designed & Conceptualised by: Robotics Social Media Forensics Security Consulting Educational Trainings TECHBHARAT CONSULTING TECHBHARAT

More information

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop. Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop. Our aim is to address the students apprehensions and anxieties regarding their career prospects in Ethical

More information

Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) Certified Ethical Hacker (CEH) Course Number: CEH Length: 5 Day(s) Certification Exam This course will help you prepare for the following exams: Exam 312 50: Certified Ethical Hacker Course Overview The

More information

CEH Version8 Course Outline

CEH Version8 Course Outline CEH Version8 Course Outline Module 01: Introduction to Ethical Hacking Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Hacking Phases Types of Attacks Information

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

EC-Council. Program Brochure. EC-Council. Page 1

EC-Council. Program Brochure. EC-Council. Page 1 Program Brochure Page 1 Certified Ethical Hacker Version 7 Revolutionary Product releases the most advanced ethical hacking program in the world. This much anticipated version was designed by hackers and

More information

HackINFINITY Workshop (A two day workshop on Ethical Hacking & Information Security)

HackINFINITY Workshop (A two day workshop on Ethical Hacking & Information Security) HackINFINITY Workshop (A two day workshop on Ethical Hacking & Information Security) About Us Since the beginning we have always followed the philosophy of the 3 "joys": "The joy of learning" "The joy

More information

CS 391-950 Ethical Hacking Spring 2016

CS 391-950 Ethical Hacking Spring 2016 CS 391-950 Ethical Hacking Spring 2016 Instructor: Shahriar Nick Rahimi Office: Faner 2136 Office Hours: MW 8:30 am-11 am Friday 10 am- 11 am E-Mail: [email protected] Course Web Site: https://online.siu.edu/

More information

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker EC-Council Hacking Technology C Certified E Ethical Hacker Certified Ethical Hacker v8 Certified Ethical Hacker Course Description CEHv8 is a comprehensive Ethical Hacking and Information Systems Security

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

MET s Institute of Engineering, Department of MCA. Faculty Development Programme on Digital Forensic & Cyber Security Conducted by

MET s Institute of Engineering, Department of MCA. Faculty Development Programme on Digital Forensic & Cyber Security Conducted by MET s Institute of Engineering, Department of MCA Faculty Development Programme on Digital Forensic & Cyber Security Conducted by Department of MCA MCA department has conducted Faculty Development Program

More information

Certified Cyber Security Expert V 2.0 + Web Application Development

Certified Cyber Security Expert V 2.0 + Web Application Development Summer Training Program Certified Cyber Security Expert V + Web Application Development A] Training Sessions Schedule: Modules Ethical Hacking & Information Security Particulars Duration (hours) Ethical

More information

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led Course Description This class will immerse the student into an interactive environment where they will

More information

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) NICE Conference 2014 CYBERSECURITY RESILIENCE A THREE TIERED SOLUTION NIST Framework for Improving Critical Infrastructure Cybersecurity

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

Summer Training Program 2014. CCSE V3.0 Certified Cyber Security Expert Version 3.0

Summer Training Program 2014. CCSE V3.0 Certified Cyber Security Expert Version 3.0 Summer Training Program 2014 CCSE V3.0 Certified Cyber Security Expert Version 3.0 TechD Facts Incorporated in November 2009 Trained more than 40000 students, conducted 400 Workshops Including all IITs,

More information

FORBIDDEN - Ethical Hacking Workshop Duration

FORBIDDEN - Ethical Hacking Workshop Duration Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once

More information

EC-Council Ethical Hacking and Countermeasures

EC-Council Ethical Hacking and Countermeasures EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed Venue Nairobi Kenya (exact hotel name to be confirmed before course) Dates March 31, 2014 April 4, 2014 Inovatec College Certified Ethical Hacker (CEH) boot camp The Certified Ethical Hacker (CEH) Certification

More information

Loophole+ with Ethical Hacking and Penetration Testing

Loophole+ with Ethical Hacking and Penetration Testing Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,

More information

FSP-201: Ethical Hacking & IT Security

FSP-201: Ethical Hacking & IT Security FSP-201: Ethical Hacking & IT Security Session 2015-16 OVERVIEW ABOUT SIFS INDIA COURSE INTRODUCTION ENTRY REQUIREMENTS HOW TO APPLY FEE STRUCTURE COURSE MODULES CAREER PROSPECTS LIBRARY TRAINING & INTERNSHIP

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses

More information

Detailed Description about course module wise:

Detailed Description about course module wise: Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference

More information

Workshop Designed & Powered by TCIL IT, Chandigarh

Workshop Designed & Powered by TCIL IT, Chandigarh Two Days Interactive workshop on Cyber Security and Ethical Hacking Total (16 HOURS) Workshop Designed & Powered by TCIL IT, Chandigarh Speaker:- Mr Rahul Tyagi - ETHICAL HACKER Workshop Contents Cyber

More information

CSP-4225 Cyber Security Professional Certification The Most demanding, depth and advanced of all...

CSP-4225 Cyber Security Professional Certification The Most demanding, depth and advanced of all... CSP-4225 Cyber Security Professional Certification The Most demanding, depth and advanced of all... Now, You can also learn with the EASE CSP (Cyber Security Profesional) Certification The most Demanding,

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

A Systems Engineering Approach to Developing Cyber Security Professionals

A Systems Engineering Approach to Developing Cyber Security Professionals A Systems Engineering Approach to Developing Cyber Security Professionals D r. J e r r y H i l l Approved for Public Release; Distribution Unlimited. 13-3793 2013 The MITRE Corporation. All rights reserved.

More information

SkyveBOTICS. A two days workshop on VoIP Controlled & Intelligent Robotics

SkyveBOTICS. A two days workshop on VoIP Controlled & Intelligent Robotics SkyveBOTICS A two days workshop on VoIP Controlled & Intelligent Robotics Zonal Center Hosting Proposal Participants will be awarded Certificate of Participation from EISystems Dear Sir/Madam This is to

More information

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation

More information

#Invitation Letter. RE: Invitation for participation of your school in Edu-Venture 15.

#Invitation Letter. RE: Invitation for participation of your school in Edu-Venture 15. #Invitation Letter RE: Invitation for participation of your school in Edu-Venture 15. Dear Sir/Madam, It is our immense pleasure to invite you and the students of your school to join Edu- Venture 15 presented

More information

ETHICAL HACKING CYBER SECURITY

ETHICAL HACKING CYBER SECURITY ETHICAL HACKING & CYBER SECURITY (Winter Training Program 2013-14) PRESENTED BY In association with Magniva Technology Pvt. Ltd. Office: 217, Murli Bhawan, 10A Ashok Marg, Hazratganj, Lucknow, (U.P.) Email:

More information

The Cultural and Fine Arts Committee National Law School of India University, Bangalore presents

The Cultural and Fine Arts Committee National Law School of India University, Bangalore presents The Cultural and Fine Arts Committee National Law School of India University, Bangalore presents Greetings! The Cultural and Fine Arts Committee of the National Law School of India University, Bangalore

More information

Analyze. Secure. Defend. Do you hold ECSA credential?

Analyze. Secure. Defend. Do you hold ECSA credential? 1 Analyze. Secure. Defend. Do you hold ECSA credential? TM E C S A EC-Council Certified Security Analyst 1 EC-Council Cyber Security Professional Path Threat Agent Application of Methodology So You Can

More information

SONDRA SCHNEIDER JOHN NUNES

SONDRA SCHNEIDER JOHN NUNES TECHNOLOGY TRANSFER PRESENTS SONDRA SCHNEIDER JOHN NUNES CERTIFIED ETHICAL HACKER TM THE ONLY WAY TO STOP A HACKER IS TO THINK LIKE ONE MAY 21-25, 2007 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME

More information

The International Certification in IT Security Training Program. fcch. foresec certified computer hacking

The International Certification in IT Security Training Program. fcch. foresec certified computer hacking The International Certification in IT Security Training Program fcch foresec certified computer hacking BACKGROUND Information Technology Security is important thing to your business because you re financial

More information

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services

More information

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services announces Training

More information

EC-Council Certified Security Analyst (ECSA)

EC-Council Certified Security Analyst (ECSA) EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for

More information

CIS 4204 Ethical Hacking Fall, 2014

CIS 4204 Ethical Hacking Fall, 2014 CIS 4204 Ethical Hacking Fall, 2014 Course Abstract: The purpose of this course is to provide a basic understanding of computing, networking, programming concepts, and exploitation techniques, as they

More information

Summer Training Program 2016. CCSE V3.0 Certified Cyber Security Expert Version 3.0

Summer Training Program 2016. CCSE V3.0 Certified Cyber Security Expert Version 3.0 Summer Training Program 2016 CCSE V3.0 Certified Cyber Security Expert Version 3.0 TechD Facts Incorporated in November 2009 Trained more than 50,000 students, conducted 400 Workshops Including all IITs,

More information

IT and Cyber Security Training Courses

IT and Cyber Security Training Courses AN FORAS RIARACHÁIN INSTITUTE OF PUBLIC ADMINISTRATION IT and Cyber Security Training s Spring 2016 Protection Through Knowledge, Skills, Practice Institute of Public Administration / 01 240 3600 IT Security

More information

CAD-CAM Application in CNC Machining with Solid & Surface Modelling

CAD-CAM Application in CNC Machining with Solid & Surface Modelling Short Term Course On CAD-CAM Application in CNC Machining with Solid & Surface Modelling ( February 22 26, 2016) Venue: CNC Room, CWISS Organized by Central Workshop & Instruments Service Section Indian

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Why should I follow the BSc. (Applied Accounting) degree programme at CA Sri Lanka? a. This is a degree approved by the University Grants Commission of Sri Lanka. b. It is

More information

Course Title: Penetration Testing: Network Threat Testing, 1st Edition

Course Title: Penetration Testing: Network Threat Testing, 1st Edition Course Title: Penetration Testing: Network Threat Testing, 1st Edition Page 1 of 6 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base

More information

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Professional Penetration Testing Techniques and Vulnerability Assessment ... Course Introduction Today Hackers are everywhere, if your corporate system connects to internet that means your system might be facing with hacker. This five days course Professional Vulnerability Assessment

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

Cyber Security at NSU

Cyber Security at NSU Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began

More information

RMAR Technologies Pvt. Ltd.

RMAR Technologies Pvt. Ltd. Course Name : StartXHack V2.0 Ethical Hacking & Cyber Security Course Duration : 2 Days (8Hrs./day) Course Fee : INR 1000/participant Course Module : 1. Introduction to Ethical Hacking a. What is Ethical

More information

INFORMATION SECURITY TESTING

INFORMATION SECURITY TESTING INFORMATION SECURITY TESTING SERVICE DESCRIPTION Penetration testing identifies potential weaknesses in a technical infrastructure and provides a level of assurance in the security of that infrastructure.

More information

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification 1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme B. Tech Cloud Technology & Information Security (4 Year Full Time Programme) Academic Year 2015 Page 1 Course Objective This unique B. Tech course provides dual career options

More information

New in online. Ground Realities. admission table. DULEEP DEOSTHALE, PhD

New in online. Ground Realities. admission table. DULEEP DEOSTHALE, PhD admission table New in online Engineering marketing & India: Ground Realities admissiontable.com DULEEP DEOSTHALE, PhD Co Founder and Vice President International Education Co Founder and Vice President

More information

Impact of Data Breaches

Impact of Data Breaches Research Note Impact of Data Breaches By: Divya Yadav Copyright 2014, ASA Institute for Risk & Innovation Applicable Sectors: IT, Retail Keywords: Hacking, Cyber security, Data breach, Malware Abstract:

More information

07 th to 12 th Dec. 2015 [6 DAYS] IST ADVANCED MANAGEMENT DEVELOPMENT PROGRAMME FOR HEALTHCARE PROFESSIONALS

07 th to 12 th Dec. 2015 [6 DAYS] IST ADVANCED MANAGEMENT DEVELOPMENT PROGRAMME FOR HEALTHCARE PROFESSIONALS 07 th to 12 th Dec. 2015 [6 DAYS] IST ADVANCED MANAGEMENT DEVELOPMENT PROGRAMME FOR HEALTHCARE PROFESSIONALS We look for the best, nothing but the best in management of Hospital and Health Services Organized

More information

Anurag Gautam Contact No: +91.9910233944

Anurag Gautam Contact No: +91.9910233944 Anurag Gautam Contact No: +91.9910233944 Email: [email protected] Web: www.anuraggautam.com Objective Current Research Offers To achieve professional satisfaction, career progression and personal

More information

Principles of Information Assurance Syllabus

Principles of Information Assurance Syllabus Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information

More information

CEH Certified Ethical Hacker More Than 100 Success Secrets: Over 100 Professional Security Testers Most Asked Questions and Resources

CEH Certified Ethical Hacker More Than 100 Success Secrets: Over 100 Professional Security Testers Most Asked Questions and Resources CEH Certified Ethical Hacker More Than 100 Success Secrets: Over 100 Professional Security Testers Most Asked Questions and Resources CEH 100 Success Secrets Copyright 2008 Notice of rights All rights

More information

www.innobuzz.in Certified PHP Professional (CPP) Brochure Certified PHP Professional Training Brochure

www.innobuzz.in Certified PHP Professional (CPP) Brochure Certified PHP Professional Training Brochure Certified PHP Professional (CPP) Brochure Certified PHP Professional Training Brochure Innobuzz Knowledge Solutions (P) Limited is a Leading Global Firm providing Training Programs on Information Security,

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

Certified Search Engine Optimizer (CSEO) Brochure

Certified Search Engine Optimizer (CSEO) Brochure Certified Search Engine Optimizer (CSEO) Brochure Certified Search Engine Optimizer - Brochure Innobuzz Knowledge Solutions (P) Limited is a Leading Global Firm providing Training Programs on Information

More information

Preliminary Course Syllabus

Preliminary Course Syllabus Preliminary Course Syllabus Designing Security for Microsoft SQL Server 2005 Elements of this syllabus are subject to change. Key Data Product #: 1917 Course #: 2787A Number of Days: 2 Format: Instructor-Led

More information

Course Title: Penetration Testing: Security Analysis

Course Title: Penetration Testing: Security Analysis Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced

More information

CS 450/650 Fundamentals of Integrated Computer Security

CS 450/650 Fundamentals of Integrated Computer Security CS 450/650 Fundamentals of Integrated Computer Security Course Information Department of Computer Science & Engineering UNR, Fall 2014 Class hours Tuesday & Thursday, 1:00 2:15am @ PE 101 Instructor E

More information

IDS and Penetration Testing Lab ISA 674

IDS and Penetration Testing Lab ISA 674 IDS and Penetration Testing Lab ISA 674 Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible Use

More information

IRCA QUALITY MANAGEMENT SYSTEMS AUDITOR/LEAD AUDITOR TRAINING IRCA Reg. No. A18021 (5 DAYS)

IRCA QUALITY MANAGEMENT SYSTEMS AUDITOR/LEAD AUDITOR TRAINING IRCA Reg. No. A18021 (5 DAYS) IRCA QUALITY MANAGEMENT SYSTEMS AUDITOR/LEAD AUDITOR TRAINING IRCA Reg. No. A18021 (5 DAYS) The purpose of the seminar is to present and analyze the requirements of the standard EN ISO 9001 and to train

More information

Course Content: Session 1. Ethics & Hacking

Course Content: Session 1. Ethics & Hacking Course Content: Session 1 Ethics & Hacking Hacking history : How it all begin Why is security needed? What is ethical hacking? Ethical Hacker Vs Malicious hacker Types of Hackers Building an approach for

More information

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15. NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities

More information

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP Security Certifications Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP Wie ben ik? Jordy Kersten 26 jaar Communicatie Systemen HAN Arhnem Informatiekunde RU Nijmegen Security Consultant

More information

InfoSec Academy Pen Testing & Hacking Track

InfoSec Academy Pen Testing & Hacking Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

Ethical Hacking Course Layout

Ethical Hacking Course Layout Ethical Hacking Course Layout Introduction to Ethical Hacking o What is Information Security? o Problems faced by the Corporate World o Why Corporate needs Information Security? Who is a Hacker? o Type

More information

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010) Indian Computer Emergency Response Team (CERT-In) Annual Report (2010) Indian Computer Emergency Response Team (CERT-In) Department of Information Technology Ministry of Communications & Information Technology

More information

Bapuji Educational Association(Regd.) Bapuji Institute of Engineering and Technology. Davangere-577004. Karnataka. Placement Brochure

Bapuji Educational Association(Regd.) Bapuji Institute of Engineering and Technology. Davangere-577004. Karnataka. Placement Brochure Bapuji Educational Association(Regd.) Bapuji Institute of Engineering and Technology Davangere-577004. Karnataka. Placement Brochure It is with immense pleasure, BIET extends you a most cordial invitation

More information

IDS and Penetration Testing Lab ISA656 (Attacker)

IDS and Penetration Testing Lab ISA656 (Attacker) IDS and Penetration Testing Lab ISA656 (Attacker) Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible

More information

ACCT5949 Managing Agile Organisations

ACCT5949 Managing Agile Organisations Business School School of Accounting ACCT5949 Managing Agile Organisations Course Outline Semester 1, 2015 Part A: Course-Specific Information Part B: Key Policies, Student Responsibilities and Support

More information

CH EHC EC-Council Ethical Hacking and Countermeasures [v.9]

CH EHC EC-Council Ethical Hacking and Countermeasures [v.9] CH EHC EC-Council Ethical Hacking and [v.9] Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Intermediate Ethical Hacking Core Delivery

More information

Part one: Programme Specification

Part one: Programme Specification Part one: Programme Specification Course record information Name and level of final award: Name and level of intermediate awards: Awarding body/institution: Status of awarding body/institution: Location

More information

Ethical Hacking I Course of Study for HAC2

Ethical Hacking I Course of Study for HAC2 Ethical Hacking I Course of Study for HAC2 Description This course of study is designed to prepare you for the HAC2 objective exam. It outlines the sequence of learning activities you should complete to

More information