Page: 1 Designed & Executed By: TM S I v8 RAINNVESTIGATOR Cyber Security Training Presents T CCE TechBharat Certified Cyber Expert TechBharat Certified Cyber Expert EC-Council Computer Hacking Forensic Investigator
Course DesCription: Certified Professional in Cyber Security (CCE) program is 6 month duration course. All the modules are given bellow. Certification will be given in Association with Tech Bharat Consulting, New Delhi, India. target audience: The course will significantly benefit Network engineers, IT Professionals, Web Developers, Students, System Administrators, Law Professionals, Banking & finance Sector Professionals. prerequisites No prerequisites required. Basic knowledge of networking will be preferable. Duration 6 months CertifiCation Summer Internship Certificate will provided by TechBharat Consulting and ACT IIT Kharagpur Course Fee 30,000 INR
Special Features 100 % PLACEMENT ASSISTANCE will be provided. Learning Kit will be provided to all the enrolled students consisting of Reference Book, Tool Kits, Cloud Campus Subscription and 24X7 Customer Support. Flexibility will be provided in terms of opting batch dates. The lectures would be provided by faculty with years of experience in the Corporate Sector. Certification: The Participants for the Summer Training Programs will be awarded with the Summer Training Certificates. Globally Accepted Certifications will be awarded on successful completion of the Summer Training Program. TechBharat Provide Online Certificate Verification facilities for Corporate and Employers. Group Discounts Also Available. In a group of 4 Students Benefits: * 100% Placement assistance from TechBharat. * Personal interaction with highly experienced faculty. * Hands on Practice Sessions. * Hands on demonstration of latest hacking tools & techniques note: Internship Prorgams available for B.Tech Students. All the Particiapnts will get Inetrnship Letter. Registration open for upcoming batches (Limited Seats Available)
Course outline: TB CCE Certification Bootcamp 1. Introduction to Ethical Hacking 2. Footprinting and Reconnaissance 3. Scanning Networks 4. Enumeration 5. System Hacking 6. Trojans and Backdoors 7. Viruses and Worms 8. Sniffers 9. Social Engineering 10. Denial of Service 11. Session Hijacking 12. Hacking Webservers 13. Hacking Web Applications 14. SQL Injection 15. Hacking Wireless Networks 16. Evading IDS, Firewalls and Honeypots 17. Buffer Overflows 18. Cryptography 19. Penetration Testing 20. Need for Security Analysis 21. TCP IP Packet Analysis 22. Penetration Testing Methodologies 23. Customers and Legal Agreements 24. Rules of Engagement 25. Penetration Testing Planning and Scheduling 26. Pre-penetration Testing Steps 27. Information Gathering 28. Vulnerability Analysis 29. External Penetration Testing 30. Internal Network Penetration Testing 31. Firewall Penetration Testing 32. IDS Penetration Testing 33. Password Cracking Penetration Testing
34. Password Cracking Penetration Testing 35. Social Engineering Penetration Testing 36. Web Application Penetration Testing 37. SQL Penetration Testing 38. Penetration Testing Reports and Post Testing Actions 39. Router and Switches Penetration Testing 40. Wireless Network Penetration Testing 41. Denial-of-Service Penetration Testing 42. Stolen Laptop, PDAs and Cell Phones Penetration Testing 43. Source Code Penetration Testing 44. Physical Security Penetration Testing 45. Surveillance Camera Penetration Testing 46. Database Penetration Testing 47. VoIP Penetration Testing 48. VPN Penetration Testing 49. Cloud Penetration Testing 50. Virtual Machine Penetration Testing 51. War Dialing 52. Virus and Trojan Detection 53. Log Management Penetration Testing 54. File Integrity Checking 55. Mobile Devices Penetration Testing 56. Telecommunicationand Broadband Communication Penetration Testing 57. Email Security Penetration Testing 58. Security Patches Penetration Testing 59. Data Leakage Penetration Testing 60. SAP Penetration Testing 61. Standards and Compliance 62. Information System Security Principles 63. Information System Incident Handling and Response 64. Information System Auditing and Certification
TechBharat Consulting Page: 06 TechBharat Consulting 2nd Floor, D-12/199, Above Spyker Showroom, Sector-8, Rohini, New Delhi-1 1 0 08 5 Contact : +91 --- 9 9 1 1 0 3, 0 8 1 1 8 471 --- 0 6 9 8 9 EC-Council www.techbharat.org www.hackerhunt.org Computer Hacorensitor