CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved
CyberTron Certified Ethical Hacker (CT-CEH) Course Description This is a course on Penetration Testing & Information Security. The training will empower you with knowledge in the field of Information security through a simplified and easily graspable course. In the training, we teach our students how hackers penetrate into network, mobiles and website. We will present real life case studies before our student to give the experience out of Labs. This training will enable you to carry out attacking as well as defensive methodologies which will help you and your organization to not only protect but also assess the safety. Course Objectives At the end of this course, participants will be able to: Understand and perform Information Gathering. Understand various of kind Email attacks and will be able to protect accounts from these attacks. Analyze Malwares and reverse Engineer them to their source. Understand Web Application Attacks for securing a web application. Perform basic Reverse Engineering. Understand Enterprise Network Security Architecture. Understand Exploitation. Understand Wireless Security. Understand Security Architecture of Desktop Platforms & Mobile Platform. Target audience This course can be attended by security officers, auditors, security professionals, website administrators, anyone who is concerned about the security of their network infrastructure and everyone who want to have a promising career in cyber security. Prerequisites Basic knowledge of computers and internet technologies. Hands-On The course includes practical hands-on exercises that enable you to test your acquired skills during the training and understand its usage in a live environment. CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved
COURSE OUTLINE 1. Introduction to Ethical Hacking 2. Foot printing and Reconnaissance 3. Networks Scanning 4. Enumeration 5. System Hacking 6. Trojans and Backdoors 7. Viruses and Worms 8. Phishing & Its Prevention 9. Sniffers (Wire shark dissection.) 10. Social Engineering Methods & Toolset 11. Denial of Service 12. Session Attacks 13. Malware Reversing 14. Web Applications Penetration Testing 15. SQL Injection 16. Hacking Wireless Networks 17. Evading IDS, Firewalls and Honey pots 18. Cryptography 19. Information Disclosure Vulnerabilities 20. Hacking Web Servers 21. CSRF, Click Jacking & Privilege Escalation Vulnerabilities 22. Reverse Engineering 23. LFI / RFI 24. Network Vulnerability Scanning 25. Metasploit Framework CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved
26. Penetration Testing 27. Kali Linux Hacking 28. Demonstration of Live Cases and Case Studies Course Highlights & Benefits Live Demonstration. Latest Hacking Techniques & tools. Internship/Career Opportunities from CyberTron and its associates. Hands on Practice Sessions Ethical Hacking Toolkit (Includes Software Toolkit and EBooks) 24*7 Email Supports through Email. COURSE FEES Details Hours Days Course Fees (INR) Training (Mon-Fri) Training (Sat-Sun) 80 90 17500 80 90 17500 CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved
CT-CEH - 80 HOURS 1: Introduction to Ethical Hacking Hacking Vs. Ethical Hacking Types of Hackers Steps to conduct Ethical Hacking Malicious Hacker Strategies Advantage and Disadvantage of Cyber world Effects of Hacking on Business Types of Data Stolen From the Organizations Security Challenges Scope and Limitations of Ethical Hacking Why Ethical Hacking is Necessary? 2: Foot Printing and Reconnaissance Footprinting Terminologies What is Footprinting? Objectives of Footprinting Who is Lookup Traceroute Analysis Email Tracking Google Advance Search Operators Foot Printing Pen Testing 3: Networks Scanning Types of Scanning Three-Way Handshake TCP Communication Flags Banner Grabbing Vulnerability Scanning Proxy Servers Scanning Pen Testing Network Pen Testing
4: Enumeration Techniques for Enumeration Enumerating User Accounts SNMP Enumeration Enumerate Systems Using Default Passwords LDAP Enumeration DNS Zone Transfer Enumeration Enumeration Pen Testing 5: System Hacking System Hacking Password Cracking Techniques Types of Password Attacks Manual Password Cracking Privilege Escalation Types of Keystroke Loggers Types of Spywares 6: Trojans and Backdoors Types of Trojans Command Shell Trojans E-mail Trojans Botnet Trojans Scanning for Suspicious Network Activities Scanning for Suspicious Registry Entries Pen Testing for Trojans and Backdoors
7: Viruses and Worms Types of Viruses Virus Analysis Working of Viruses Online Malware Testing Computer Worms Writing a Simple Virus Program Malware Analysis Procedure 8: Phishing & Its Prevention What is phishing, and what are phishing scams How to detect phishing pages Detecting Phishing Crimes What is spear phishing What is advance-fee fraud? Phishing Awareness How to Prevent and avoid phishing scams 9: Sniffers How a Sniffer Works Types of Sniffing: MAC Flooding ARP Poisoning MAC Spoofing Packet Sniffing Sniffing Prevention Techniques
10: Social Engineering Methods What is Social Engineering Phases in a Social Engineering Attack Types of Social Engineering Insider Attack SET Through Impersonation on Social Networking Sites Social Engineering Countermeasures Social Engineering Pen Testing 11: Denial of Service What is a Denial of Service Attack? How Distributed Denial of Service Attacks Work DoS Attack Techniques Botnet Propagation Technique DDoS Attack DDoS Attack Countermeasures Denial of Service (DoS) Attack Penetration Testing 12: Session Hijacking Why Session Hijacking is Successful Brute Forcing Attack Types of Session Hijacking Man-in-the-Middle Attack Session Fixation Attack Modes of IPSec Session Hijacking Pen Testing
13: Malware Reversing The primary types of malware How to create a safe malware analysis environment Identify obfuscation methods Malware analysis shortcuts How to use scriptable debuggers How to capture and analyze stealth malware Analysis of several pieces of advanced malware from real-world intrusions 14: Web Applications Penetration Testing Introduction to Web Applications Web Application Architecture SQL Injection Attacks File Injection Attack Cross-Site Scripting (XSS) Attacks Cross-Site Request Forgery (CSRF) Attack Improper Error Handling Hacking Web Servers Analyze Web Applications Password Attacks Authorization Attack How to Defend Against Web Application Attacks 15: SQL Injection SQL Injection Attacks Types of SQL Injection SQL Injection Black Box Pen Testing Blind SQL Injection Understanding SQL Query SQL Injection Methodology Bypass Website Logins Using SQL Injection Database, Table, and Column Enumeration SQL Injection Detection Tools
16: Hacking Wireless Networks Types of Wireless Networks Wi-Fi Authentication Modes Types of Wireless Encryption How WEP Works How WPA2 Works How to Break WPA/WPA2 Encryption Rogue Access Point Attack HoneySpot Access Point Attack Wi-Fi Discovery Tool Wi-Fi Packet Sniffer MITM Attack Using Aircrack-ng WPA Cracking Tool 17: Evading IDS, Firewalls, and Honeypots How IDS Works Types of Intrusion Detection Systems Types of Firewall Types of Honeypots Insertion Attack IP Address Spoofing Bypassing Firewall through IDS Penetration Testing 18: Cryptography Types of Cryptography Advanced Encryption Standard Data Encryption Standard Cryptography Tools SSL (Secure Sockets Layer) Digital Signature Online MD5 Decryption Tool
19: Information Disclosure Vulnerabilities Introduction Setting up the correct Chmod Protecting the sensitive server files Preventing the data loss 20: Hacking Web Servers Understanding IIS and apache How to use PHP and ASP backdoors Implementing web server security What are local root exploits? Implementing web server security Patch Management 21: CSRF, Click Jacking & Privilege Escalation Vulnerabilities Introduction to csrf Building proof of concept code Protections against csrf Click Jacking & Protections 22: Reverse Engineering Introduction to Reverse Engineering Windows Memory Management System Application Debuggers & Disassemblers Assembly Language Basics Application Debuggers & Disassemblers Application Cracking, Patching & Keygenning
23: LFI / RFI Introduction to LFI / RFI Getting hands on commands Finding out LFI / RFI Vulnerabilities Hacking Linux with Metasploit Demonstration & Prevention 24: Network Vulnerability Scanning Introduction to Network Vulnerability Scanning Scanning Policies Vulnerability Assessment using Nessus & Open VAS Report Generation Patch Critical Loopholes System Hardening Secure System Configuration 25: Metasploit Framework Various Interfaces of Metasploit Framework Metasploit Framework Architecture Vulnerability Analysis Exploitation on Various Platforms Evade Anti-Virus & Firewalls Metasploit Scripting Configure Nmap with Metasploit Framework 26: Penetration Testing Penetration Testing Methodologies Penetration Testing Planning and Scheduling Penetration Testing Checklist External Penetration Testing Internal Network Penetration Testing Denial of Service Penetration Testing
Security Penetration Testing Database Penetration Testing Penetration Testing Report Analysis 27: Kali Linux Hacking Kali Linux Hacking Hacking With Kali Linux Wifi Hacking - WEP - Kali Linux Aircrack-ng suite Penetration Testing with Kali Linux Client Side Attack with kali Linux Server Side Attack with kali Linux Kali Linux Social Engineering 28: Demonstration of Live Cases and Case Studies ------------------------------------------------------------------------------------------------------------------------------------ Get in touch with us Regarding our Services. Contact Information Address (Corporate Office) A1-202 LGF, Sushant Lok-2 Sec-55 Golf Course Road Gurgaon India Phone Landline Number + 91 01244264797 Training Wing: +91-7042099319+91-7042125284 Email Training@cybertronns.com Website www.cybertronns.com