Course Title: Course Description: Course Key Objective: Fee & Duration:



Similar documents
CRYPTUS DIPLOMA IN IT SECURITY

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

CYBERTRON NETWORK SOLUTIONS

CEH Version8 Course Outline

Certified Ethical Hacker Exam Version Comparison. Version Comparison

[CEH]: Ethical Hacking and Countermeasures

Certified Ethical Hacker (CEH)

Certified Cyber Security Expert V Web Application Development

Ethical Hacking Course Layout

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

EC Council Certified Ethical Hacker V8

FSP-201: Ethical Hacking & IT Security

Detailed Description about course module wise:

Professional Penetration Testing Techniques and Vulnerability Assessment ...

ETHICAL HACKING CYBER SECURITY

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

INFORMATION SECURITY TRAINING

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

LINUX / INFORMATION SECURITY

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Audience. Pre-Requisites

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Certified Cyber Security Analyst VS-1160

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

RMAR Technologies Pvt. Ltd.

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Ethical Hacking & Cyber Security Workshop

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

Course Content: Session 1. Ethics & Hacking

Workshop Designed & Powered by TCIL IT, Chandigarh

EC-Council. Certified Ethical Hacker. Program Brochure

Build Your Own Security Lab


SONDRA SCHNEIDER JOHN NUNES

Loophole+ with Ethical Hacking and Penetration Testing

Ethical Hacking v7 40 H.

Pen Testing Methodology Gueststealer TomCat Zero Day Directory Traversal VASTO

Application Security Testing

Ethical Hacking and Countermeasures 5.0 Course ECEH5.0 5 Days COURSE OVERVIEW AUDIENCE OBJECTIVES OUTLINE

Penetration Testing with Kali Linux

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

EC-Council Certified Security Analyst (ECSA)

Vulnerability Assessment and Penetration Testing

Learn Ethical Hacking, Become a Pentester

FORBIDDEN - Ethical Hacking Workshop Duration

McAfee Certified Assessment Specialist Network

EC-Council Ethical Hacking and Countermeasures

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

EC-Council. Program Brochure. EC-Council. Page 1

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

A Systems Engineering Approach to Developing Cyber Security Professionals

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

Attack and Penetration Testing 101

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

Demystifying Penetration Testing

CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security

Networking: EC Council Network Security Administrator NSA

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Web application testing

ETHICAL HACKING. By REAL TIME FACULTY

Toll Free: Official Web:

CH EHC EC-Council Ethical Hacking and Countermeasures [v.9]

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING. Anestis Bechtsoudis. abechtsoudis (at) ieee.

LUCIDEUS CERTIFIED SECURITY ANALYST (LCSA) LEVEL 1 LEVEL 2 LEVEL 3 TRAINING

Certified Cyber Security Analyst VS-1160

Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0

Certified Penetration Testing Specialist

Introduction to Cyber Security / Information Security

Information Security. Training

KEVIN CARDWELL. Q/SA (Qualified Security Analyst) Penetration Tester. & Optional Q/PTL (Qualified Penetration Licence) Workshop

PKF Avant Edge. Penetration Testing. Stevie Heong CISSP, CISA, CISM, CGEIT, CCNP

A Network Administrator s Guide to Web App Security

Penetration Testing - a way for improving our cyber security

LUCIDEUS CERTIFIED ETHICAL HACKER (LCEH) 80 HOURS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY

Hacking the WordpressEcosystem

CIS 4204 Ethical Hacking Fall, 2014

(WAPT) Web Application Penetration Testing

Reducing Application Vulnerabilities by Security Engineering

Simple Steps to Securing Your SSL VPN

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

IDS and Penetration Testing Lab ISA 674

13 Ways Through A Firewall

Transcription:

Course Title: Course Description: This is the Ethical hacking & Information Security Diploma program. This 6 months Diploma Program provides you Penetration Testing in the various field of cyber world. In the Training we teach to students how Hacker breaks the computer security, Mobile security, Network Security, web application security, cyber forensics etc., for making them secure from hackers. After the Diploma Course they can create own security rules between their data and hackers. This Training provides hacking skills as well defense techniques in various area of cyber security, because in the cyber world organizations need security, and we must learn hacking techniques before make the secure the cyber world. And we teach students more practical s sessions than theory part. So this diploma program is the best investment for the cyber security training program. Course Key Objective: Understanding Digital Foot-printing. Analyse Computer Malwares and How to secure computer from malwares and remove them manually. Hacking Email Accounts & Social networking accounts and How to secure them. Web application penetration testing. Bug Bounty programs. Understanding Latest Exploitations Understand Wireless mechanism and Its Security. Mobile hacking & Forensics. Software Cracking Understanding Networking Mechanism 1 TB software Digital Tool kit 3 years cryptus membership Fee & Duration: COURSE DURATION : 6 MONTHS Certification : CRYPTUS CERTIFIED CYBER SECURITY EXPERT VALID TILL : 3 years COURSE FEE : 50000/- INR Copyright Cryptus 2016 1

1 st Month Course Modules Introduction to Ethical Hacking Networking Basic and Web Application Digital Foot Printing Enumeration Social Engineering Email Hacking & Security Sending Fake Emails Google Hacking Database Nmap Scanning Nessus Scanning Network Scanning Tools Man in the Middle Attack using ARP Reply Attack Ettercap and Cain & Abel WEP Hacking De-authentification Attack Copyright Cryptus 2016 2

2 st Month Course Modules SSL Stripping Shell Uploading Website Defacement Virus & Worms RAT Trojan Key loggers Windows Password Cracking Botnet Metasploit Framework Firewall, IDS & Honeypots Metasploit Armitage Penetration Testing Methodologies Copyright Cryptus 2016 3

3 st Month Course Modules Web Application Working Mechanism Admin Login Authentication Bypass Union SQL Injection MOD Security Bypass DIOS Attack Error Based SQL Injection Time Based SQL Injection Post Based SQL Injection XSS Attack Session hijacking Website Scanners How to find Vulnerable Sites CSRF Attack Web Application Security Mechanism Copyright Cryptus 2016 4

4 st Month Course Modules Owasp Top 10 Mobile Application Hijacking Software Cracking Cryptography Buffer Overflow Rules Of Penetration Testing Penetration Testing Steps Firewall Penetration Testing Snort IDS Analysis Penetration Testing Report Generate Bug Bounty Program Copyright Cryptus 2016 5

5 st Month Course Modules Computer Forensic Investigation Digital Footprinting Computer Vulnerability Analysis Digital Signature Forensic Investigator Understanding Computer Hard Disks Operating System Forensic FTK Investigator Stangnography Mobile Forensic Process Investigating By Encase Website Attack Invstigator Copyright Cryptus 2016 6

6 st Month Course Modules Building a Simple Network Managing Network Device Security Troubleshooting Basic Connectivity Implementing EIGRP-Based Solutions Building a Medium-Sized Network Implementing a Scalable OSPF-Based Solution SNMP and Syslog Basic Configuration Project on IT Security Our Clients: Copyright Cryptus 2016 7

CRYPTUS CYBER SECURITY PVT. LTD. Cryptus Cyber Security Pvt Ltd. U-135D T/F, Lakshmi Nagar, Shakarpur Vikas Marg, Delhi 100092 www.cryptus.in info@cryptus.com +91 11 3222066. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or DE compilation is strictly prohibited without the prior written consent of Cryptus. No part of this document may be reproduced in any form or by any means without the prior written authorization of Cryptus. While every precaution has been taken in the preparation of this document, Cryptus assumes no responsibility for errors or omissions. Copyright of Cryptus 2016 Copyright Cryptus 2016 8