Page: Designed & Executed By: Presents Cyber Security Training

Similar documents
Hackers are here. Where are you?

EC-Council Certified Security Analyst (ECSA)

Hackers are here. Where are you?

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Analyze. Secure. Defend. Do you hold ECSA credential?

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

CRYPTUS DIPLOMA IN IT SECURITY

[CEH]: Ethical Hacking and Countermeasures

EC Council Certified Ethical Hacker V8

CEH Version8 Course Outline

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

EC-Council. Certified Ethical Hacker. Program Brochure

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Course Title: Course Description: Course Key Objective: Fee & Duration:

Toll Free: Official Web:

Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Detailed Description about course module wise:

CYBERTRON NETWORK SOLUTIONS

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

EC-Council. Program Brochure. EC-Council. Page 1

LINUX / INFORMATION SECURITY

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Certified Cyber Security Expert V Web Application Development

FSP-201: Ethical Hacking & IT Security

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Ethical Hacking & Cyber Security Workshop

Certified Security Analyst

Certified Cyber Security Analyst VS-1160

EC-Council Ethical Hacking and Countermeasures

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

SONDRA SCHNEIDER JOHN NUNES

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Networking: EC Council Network Security Administrator NSA

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

A Systems Engineering Approach to Developing Cyber Security Professionals

ETHICAL HACKING CYBER SECURITY

Introduction to Cyber Security / Information Security

Training Course ECSA/LPT

Designing Security for Microsoft SQL Server 2005

Preliminary Course Syllabus

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

CH EHC EC-Council Ethical Hacking and Countermeasures [v.9]

Certified Cyber Security Analyst VS-1160

The International Certification in IT Security Training Program. fcch. foresec certified computer hacking

RMAR Technologies Pvt. Ltd.

Course Title: Penetration Testing: Network Threat Testing, 1st Edition

CS Ethical Hacking Spring 2016

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

How To Protect Your Network From Attack From A Hacker On A University Server

Workshop Designed & Powered by TCIL IT, Chandigarh

INFORMATION SECURITY TRAINING

CIS 4204 Ethical Hacking Fall, 2014

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Understanding Security Testing

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

Jort Kollerie SonicWALL

13 Ways Through A Firewall

INFORMATION SECURITY TESTING

FORBIDDEN - Ethical Hacking Workshop Duration

Loophole+ with Ethical Hacking and Penetration Testing

Course Outline: Certified Ethical Hacker v8. Learning Method: Instructor-led Classroom Learning

Course Title: Penetration Testing: Security Analysis

Ethical Hacking Course Layout

CEH Certified Ethical Hacker More Than 100 Success Secrets: Over 100 Professional Security Testers Most Asked Questions and Resources

THE BUSINESS CASE FOR NETWORK SECURITY: ADVOCACY, GOVERNANCE, AND ROI

Ethical Hacking I Course of Study for HAC2

Ethical Hacking v7 40 H.

Critical Controls for Cyber Security.

Robotics Core School 1

Higher National Unit specification: general information

UVic Department of Electrical and Computer Engineering

Network/Internet Forensic and Intrusion Log Analysis

Network Incident Report

Course Title: Penetration Testing: Network & Perimeter Testing

Your company protected against cybercrime

13 Ways Through A Firewall What you don t know will hurt you

Computer Hacking Forensic Investigator v8

Description: Objective: Attending students will learn:

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

How To Perform An External Security Vulnerability Assessment Of An External Computer System

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Penetration Testing Service. By Comsec Information Security Consulting

Penetration Testing. Presented by

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Enterprise Computing Solutions

CNS-301-3I ~ Citrix NetScaler 11 Advanced Implementation

Learn Ethical Hacking, Become a Pentester

IT and Cyber Security Training Courses

CompTIA Security+ Certification Study Guide. (Exam SYO-301) Glen E. Clarke. Gravu Hill

CompTIA Security+ (Exam SY0-410)

Transcription:

Page: 1 Designed & Executed By: TM S I v8 RAINNVESTIGATOR Cyber Security Training Presents T CCE TechBharat Certified Cyber Expert TechBharat Certified Cyber Expert EC-Council Computer Hacking Forensic Investigator

Course DesCription: Certified Professional in Cyber Security (CCE) program is 6 month duration course. All the modules are given bellow. Certification will be given in Association with Tech Bharat Consulting, New Delhi, India. target audience: The course will significantly benefit Network engineers, IT Professionals, Web Developers, Students, System Administrators, Law Professionals, Banking & finance Sector Professionals. prerequisites No prerequisites required. Basic knowledge of networking will be preferable. Duration 6 months CertifiCation Summer Internship Certificate will provided by TechBharat Consulting and ACT IIT Kharagpur Course Fee 30,000 INR

Special Features 100 % PLACEMENT ASSISTANCE will be provided. Learning Kit will be provided to all the enrolled students consisting of Reference Book, Tool Kits, Cloud Campus Subscription and 24X7 Customer Support. Flexibility will be provided in terms of opting batch dates. The lectures would be provided by faculty with years of experience in the Corporate Sector. Certification: The Participants for the Summer Training Programs will be awarded with the Summer Training Certificates. Globally Accepted Certifications will be awarded on successful completion of the Summer Training Program. TechBharat Provide Online Certificate Verification facilities for Corporate and Employers. Group Discounts Also Available. In a group of 4 Students Benefits: * 100% Placement assistance from TechBharat. * Personal interaction with highly experienced faculty. * Hands on Practice Sessions. * Hands on demonstration of latest hacking tools & techniques note: Internship Prorgams available for B.Tech Students. All the Particiapnts will get Inetrnship Letter. Registration open for upcoming batches (Limited Seats Available)

Course outline: TB CCE Certification Bootcamp 1. Introduction to Ethical Hacking 2. Footprinting and Reconnaissance 3. Scanning Networks 4. Enumeration 5. System Hacking 6. Trojans and Backdoors 7. Viruses and Worms 8. Sniffers 9. Social Engineering 10. Denial of Service 11. Session Hijacking 12. Hacking Webservers 13. Hacking Web Applications 14. SQL Injection 15. Hacking Wireless Networks 16. Evading IDS, Firewalls and Honeypots 17. Buffer Overflows 18. Cryptography 19. Penetration Testing 20. Need for Security Analysis 21. TCP IP Packet Analysis 22. Penetration Testing Methodologies 23. Customers and Legal Agreements 24. Rules of Engagement 25. Penetration Testing Planning and Scheduling 26. Pre-penetration Testing Steps 27. Information Gathering 28. Vulnerability Analysis 29. External Penetration Testing 30. Internal Network Penetration Testing 31. Firewall Penetration Testing 32. IDS Penetration Testing 33. Password Cracking Penetration Testing

34. Password Cracking Penetration Testing 35. Social Engineering Penetration Testing 36. Web Application Penetration Testing 37. SQL Penetration Testing 38. Penetration Testing Reports and Post Testing Actions 39. Router and Switches Penetration Testing 40. Wireless Network Penetration Testing 41. Denial-of-Service Penetration Testing 42. Stolen Laptop, PDAs and Cell Phones Penetration Testing 43. Source Code Penetration Testing 44. Physical Security Penetration Testing 45. Surveillance Camera Penetration Testing 46. Database Penetration Testing 47. VoIP Penetration Testing 48. VPN Penetration Testing 49. Cloud Penetration Testing 50. Virtual Machine Penetration Testing 51. War Dialing 52. Virus and Trojan Detection 53. Log Management Penetration Testing 54. File Integrity Checking 55. Mobile Devices Penetration Testing 56. Telecommunicationand Broadband Communication Penetration Testing 57. Email Security Penetration Testing 58. Security Patches Penetration Testing 59. Data Leakage Penetration Testing 60. SAP Penetration Testing 61. Standards and Compliance 62. Information System Security Principles 63. Information System Incident Handling and Response 64. Information System Auditing and Certification

TechBharat Consulting Page: 06 TechBharat Consulting 2nd Floor, D-12/199, Above Spyker Showroom, Sector-8, Rohini, New Delhi-1 1 0 08 5 Contact : +91 --- 9 9 1 1 0 3, 0 8 1 1 8 471 --- 0 6 9 8 9 EC-Council www.techbharat.org www.hackerhunt.org Computer Hacorensitor