CYBERTRON NETWORK SOLUTIONS



Similar documents
Certified Ethical Hacker Exam Version Comparison. Version Comparison

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

CEH Version8 Course Outline

CRYPTUS DIPLOMA IN IT SECURITY

[CEH]: Ethical Hacking and Countermeasures

Detailed Description about course module wise:

EC Council Certified Ethical Hacker V8

Ethical Hacking Course Layout

Certified Ethical Hacker (CEH)

SONDRA SCHNEIDER JOHN NUNES


Course Title: Course Description: Course Key Objective: Fee & Duration:

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Certified Cyber Security Expert V Web Application Development

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Professional Penetration Testing Techniques and Vulnerability Assessment ...

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

FSP-201: Ethical Hacking & IT Security

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

RMAR Technologies Pvt. Ltd.

INFORMATION SECURITY TRAINING

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

Ethical Hacking v7 40 H.

Course Outline: Certified Ethical Hacker v8. Learning Method: Instructor-led Classroom Learning

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Course Content: Session 1. Ethics & Hacking

Network Attacks. Common Network Attacks and Exploits

Learn Ethical Hacking, Become a Pentester

FORBIDDEN - Ethical Hacking Workshop Duration

EC-Council. Certified Ethical Hacker. Program Brochure

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Vulnerability Assessment and Penetration Testing

IBM Protocol Analysis Module

Understanding Security Testing

CH EHC EC-Council Ethical Hacking and Countermeasures [v.9]

Audience. Pre-Requisites

Application Security Testing

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Malicious Network Traffic Analysis

Build Your Own Security Lab

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

McAfee Certified Assessment Specialist Network

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

A Systems Engineering Approach to Developing Cyber Security Professionals

ETHICAL HACKING. By REAL TIME FACULTY

Loophole+ with Ethical Hacking and Penetration Testing

CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE

Description: Objective: Attending students will learn:

(WAPT) Web Application Penetration Testing

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

INFORMATION SECURITY TRAINING CATALOG (2015)

Ethical Hacking and Countermeasures 5.0 Course ECEH5.0 5 Days COURSE OVERVIEW AUDIENCE OBJECTIVES OUTLINE

Networking: EC Council Network Security Administrator NSA

Web application testing

Penetration Testing with Kali Linux

ETHICAL HACKING CYBER SECURITY

Ethical Hacking & Cyber Security Workshop

LINUX / INFORMATION SECURITY

The Information Security Problem

Information Security. Training

Client logo placeholder XXX REPORT. Page 1 of 37

2016 TÜBİTAK BİLGEM Cyber Security Institute

INFORMATION SECURITY TRAINING CATALOG (2016)

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

CIS 4204 Ethical Hacking Fall, 2014

SCP - Strategic Infrastructure Security

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

Certified Penetration Testing Specialist

Securing Cisco Network Devices (SND)

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

EC-Council. Program Brochure. EC-Council. Page 1

ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION

The Key to Secure Online Financial Transactions

CERTIFIED PENETRATION TESTING CONSULTANT

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

EC-Council Certified Security Analyst (ECSA)

LUCIDEUS CERTIFIED ETHICAL HACKER (LCEH) 80 HOURS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

KEVIN CARDWELL. Q/SA (Qualified Security Analyst) Penetration Tester. & Optional Q/PTL (Qualified Penetration Licence) Workshop

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

Transcription:

CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved

CyberTron Certified Ethical Hacker (CT-CEH) Course Description This is a course on Penetration Testing & Information Security. The training will empower you with knowledge in the field of Information security through a simplified and easily graspable course. In the training, we teach our students how hackers penetrate into network, mobiles and website. We will present real life case studies before our student to give the experience out of Labs. This training will enable you to carry out attacking as well as defensive methodologies which will help you and your organization to not only protect but also assess the safety. Course Objectives At the end of this course, participants will be able to: Understand and perform Information Gathering. Understand various of kind Email attacks and will be able to protect accounts from these attacks. Analyze Malwares and reverse Engineer them to their source. Understand Web Application Attacks for securing a web application. Perform basic Reverse Engineering. Understand Enterprise Network Security Architecture. Understand Exploitation. Understand Wireless Security. Understand Security Architecture of Desktop Platforms & Mobile Platform. Target audience This course can be attended by security officers, auditors, security professionals, website administrators, anyone who is concerned about the security of their network infrastructure and everyone who want to have a promising career in cyber security. Prerequisites Basic knowledge of computers and internet technologies. Hands-On The course includes practical hands-on exercises that enable you to test your acquired skills during the training and understand its usage in a live environment. CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved

COURSE OUTLINE 1. Introduction to Ethical Hacking 2. Foot printing and Reconnaissance 3. Networks Scanning 4. Enumeration 5. System Hacking 6. Trojans and Backdoors 7. Viruses and Worms 8. Phishing & Its Prevention 9. Sniffers (Wire shark dissection.) 10. Social Engineering Methods & Toolset 11. Denial of Service 12. Session Attacks 13. Malware Reversing 14. Web Applications Penetration Testing 15. SQL Injection 16. Hacking Wireless Networks 17. Evading IDS, Firewalls and Honey pots 18. Cryptography 19. Information Disclosure Vulnerabilities 20. Hacking Web Servers 21. CSRF, Click Jacking & Privilege Escalation Vulnerabilities 22. Reverse Engineering 23. LFI / RFI 24. Network Vulnerability Scanning 25. Metasploit Framework CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved

26. Penetration Testing 27. Kali Linux Hacking 28. Demonstration of Live Cases and Case Studies Course Highlights & Benefits Live Demonstration. Latest Hacking Techniques & tools. Internship/Career Opportunities from CyberTron and its associates. Hands on Practice Sessions Ethical Hacking Toolkit (Includes Software Toolkit and EBooks) 24*7 Email Supports through Email. COURSE FEES Details Hours Days Course Fees (INR) Training (Mon-Fri) Training (Sat-Sun) 80 90 17500 80 90 17500 CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved

CT-CEH - 80 HOURS 1: Introduction to Ethical Hacking Hacking Vs. Ethical Hacking Types of Hackers Steps to conduct Ethical Hacking Malicious Hacker Strategies Advantage and Disadvantage of Cyber world Effects of Hacking on Business Types of Data Stolen From the Organizations Security Challenges Scope and Limitations of Ethical Hacking Why Ethical Hacking is Necessary? 2: Foot Printing and Reconnaissance Footprinting Terminologies What is Footprinting? Objectives of Footprinting Who is Lookup Traceroute Analysis Email Tracking Google Advance Search Operators Foot Printing Pen Testing 3: Networks Scanning Types of Scanning Three-Way Handshake TCP Communication Flags Banner Grabbing Vulnerability Scanning Proxy Servers Scanning Pen Testing Network Pen Testing

4: Enumeration Techniques for Enumeration Enumerating User Accounts SNMP Enumeration Enumerate Systems Using Default Passwords LDAP Enumeration DNS Zone Transfer Enumeration Enumeration Pen Testing 5: System Hacking System Hacking Password Cracking Techniques Types of Password Attacks Manual Password Cracking Privilege Escalation Types of Keystroke Loggers Types of Spywares 6: Trojans and Backdoors Types of Trojans Command Shell Trojans E-mail Trojans Botnet Trojans Scanning for Suspicious Network Activities Scanning for Suspicious Registry Entries Pen Testing for Trojans and Backdoors

7: Viruses and Worms Types of Viruses Virus Analysis Working of Viruses Online Malware Testing Computer Worms Writing a Simple Virus Program Malware Analysis Procedure 8: Phishing & Its Prevention What is phishing, and what are phishing scams How to detect phishing pages Detecting Phishing Crimes What is spear phishing What is advance-fee fraud? Phishing Awareness How to Prevent and avoid phishing scams 9: Sniffers How a Sniffer Works Types of Sniffing: MAC Flooding ARP Poisoning MAC Spoofing Packet Sniffing Sniffing Prevention Techniques

10: Social Engineering Methods What is Social Engineering Phases in a Social Engineering Attack Types of Social Engineering Insider Attack SET Through Impersonation on Social Networking Sites Social Engineering Countermeasures Social Engineering Pen Testing 11: Denial of Service What is a Denial of Service Attack? How Distributed Denial of Service Attacks Work DoS Attack Techniques Botnet Propagation Technique DDoS Attack DDoS Attack Countermeasures Denial of Service (DoS) Attack Penetration Testing 12: Session Hijacking Why Session Hijacking is Successful Brute Forcing Attack Types of Session Hijacking Man-in-the-Middle Attack Session Fixation Attack Modes of IPSec Session Hijacking Pen Testing

13: Malware Reversing The primary types of malware How to create a safe malware analysis environment Identify obfuscation methods Malware analysis shortcuts How to use scriptable debuggers How to capture and analyze stealth malware Analysis of several pieces of advanced malware from real-world intrusions 14: Web Applications Penetration Testing Introduction to Web Applications Web Application Architecture SQL Injection Attacks File Injection Attack Cross-Site Scripting (XSS) Attacks Cross-Site Request Forgery (CSRF) Attack Improper Error Handling Hacking Web Servers Analyze Web Applications Password Attacks Authorization Attack How to Defend Against Web Application Attacks 15: SQL Injection SQL Injection Attacks Types of SQL Injection SQL Injection Black Box Pen Testing Blind SQL Injection Understanding SQL Query SQL Injection Methodology Bypass Website Logins Using SQL Injection Database, Table, and Column Enumeration SQL Injection Detection Tools

16: Hacking Wireless Networks Types of Wireless Networks Wi-Fi Authentication Modes Types of Wireless Encryption How WEP Works How WPA2 Works How to Break WPA/WPA2 Encryption Rogue Access Point Attack HoneySpot Access Point Attack Wi-Fi Discovery Tool Wi-Fi Packet Sniffer MITM Attack Using Aircrack-ng WPA Cracking Tool 17: Evading IDS, Firewalls, and Honeypots How IDS Works Types of Intrusion Detection Systems Types of Firewall Types of Honeypots Insertion Attack IP Address Spoofing Bypassing Firewall through IDS Penetration Testing 18: Cryptography Types of Cryptography Advanced Encryption Standard Data Encryption Standard Cryptography Tools SSL (Secure Sockets Layer) Digital Signature Online MD5 Decryption Tool

19: Information Disclosure Vulnerabilities Introduction Setting up the correct Chmod Protecting the sensitive server files Preventing the data loss 20: Hacking Web Servers Understanding IIS and apache How to use PHP and ASP backdoors Implementing web server security What are local root exploits? Implementing web server security Patch Management 21: CSRF, Click Jacking & Privilege Escalation Vulnerabilities Introduction to csrf Building proof of concept code Protections against csrf Click Jacking & Protections 22: Reverse Engineering Introduction to Reverse Engineering Windows Memory Management System Application Debuggers & Disassemblers Assembly Language Basics Application Debuggers & Disassemblers Application Cracking, Patching & Keygenning

23: LFI / RFI Introduction to LFI / RFI Getting hands on commands Finding out LFI / RFI Vulnerabilities Hacking Linux with Metasploit Demonstration & Prevention 24: Network Vulnerability Scanning Introduction to Network Vulnerability Scanning Scanning Policies Vulnerability Assessment using Nessus & Open VAS Report Generation Patch Critical Loopholes System Hardening Secure System Configuration 25: Metasploit Framework Various Interfaces of Metasploit Framework Metasploit Framework Architecture Vulnerability Analysis Exploitation on Various Platforms Evade Anti-Virus & Firewalls Metasploit Scripting Configure Nmap with Metasploit Framework 26: Penetration Testing Penetration Testing Methodologies Penetration Testing Planning and Scheduling Penetration Testing Checklist External Penetration Testing Internal Network Penetration Testing Denial of Service Penetration Testing

Security Penetration Testing Database Penetration Testing Penetration Testing Report Analysis 27: Kali Linux Hacking Kali Linux Hacking Hacking With Kali Linux Wifi Hacking - WEP - Kali Linux Aircrack-ng suite Penetration Testing with Kali Linux Client Side Attack with kali Linux Server Side Attack with kali Linux Kali Linux Social Engineering 28: Demonstration of Live Cases and Case Studies ------------------------------------------------------------------------------------------------------------------------------------ Get in touch with us Regarding our Services. Contact Information Address (Corporate Office) A1-202 LGF, Sushant Lok-2 Sec-55 Golf Course Road Gurgaon India Phone Landline Number + 91 01244264797 Training Wing: +91-7042099319+91-7042125284 Email Training@cybertronns.com Website www.cybertronns.com