LUCIDEUS CERTIFIED ETHICAL HACKER (LCEH) 80 HOURS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY

Similar documents
LUCIDEUS CERTIFIED CYBER SECURITY ANALYST (LCCSA)

LUCIDEUS CERTIFIED SECURITY ANALYST (LCSA) LEVEL 1 LEVEL 2 LEVEL 3 TRAINING

CYBERTRON NETWORK SOLUTIONS

Android & ios Application Vulnerability Assessment & Penetration Testing Training. 2-Day hands on workshop on VAPT of Android & ios Applications

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

CRYPTUS DIPLOMA IN IT SECURITY

Course Title: Course Description: Course Key Objective: Fee & Duration:

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Certified Cyber Security Expert V Web Application Development

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

Information Security. Training

Professional Penetration Testing Techniques and Vulnerability Assessment ...


Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Detailed Description about course module wise:

Certified Ethical Hacker Exam Version Comparison. Version Comparison

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

INFORMATION SECURITY TRAINING CATALOG (2015)

EC Council Certified Ethical Hacker V8

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

FSP-201: Ethical Hacking & IT Security

FORBIDDEN - Ethical Hacking Workshop Duration

[CEH]: Ethical Hacking and Countermeasures

CEH Version8 Course Outline

Ethical Hacking Course Layout

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

Ethical Hacking & Cyber Security Workshop

Certified Ethical Hacker (CEH)

EC-Council Certified Security Analyst (ECSA)

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Learn Ethical Hacking, Become a Pentester

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Loophole+ with Ethical Hacking and Penetration Testing

Audience. Pre-Requisites

2016 TÜBİTAK BİLGEM Cyber Security Institute

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Vulnerability Assessment and Penetration Testing

ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

INFORMATION SECURITY TRAINING CATALOG (2016)

Course Content: Session 1. Ethics & Hacking

Hackers are here. Where are you?

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

Penetration Testing with Kali Linux

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Hackers are here. Where are you?

Understanding Security Testing

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Sitefinity Security and Best Practices

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

SECURING YOUR ENTERPRISE MOBILITY

Application Security Testing

RMAR Technologies Pvt. Ltd.

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

The Top Web Application Attacks: Are you vulnerable?

SONDRA SCHNEIDER JOHN NUNES

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Build Your Own Security Lab

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Where every interaction matters.

Introduction to Cyber Security / Information Security

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

Security-as-a-Service (Sec-aaS) Framework. Service Introduction

Reducing Application Vulnerabilities by Security Engineering

Application Security Best Practices. Wally LEE Principal Consultant

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

Description: Objective: Attending students will learn:

Web application testing

Ethical Hacking as a Professional Penetration Testing Technique

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

June 2014 WMLUG Meeting Kali Linux

Networking: EC Council Network Security Administrator NSA

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

Analyze. Secure. Defend. Do you hold ECSA credential?

(WAPT) Web Application Penetration Testing

INFORMATION SECURITY TRAINING

Information Security Services

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Table of Contents. Page 2/13

Workshop Designed & Powered by TCIL IT, Chandigarh

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Passing PCI Compliance How to Address the Application Security Mandates

Transcription:

LUCIDEUS CERTIFIED ETHICAL HACKER (LCEH) 80 HOURS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY w w w. l u c i d e u s. c o m

Course Title LUCIDEUS CERTIFIED ETHICAL HACKER (LCEH) Course Description This is a Penetration Testing & Information Security Training Program. The training provides you an intensive session which will empower you with knowledge in a simplified and easily graspable manner. In the training, we teach our students how hackers break into the systems, network, mobiles and website so as to make them aware of the possible loopholes and therefore, making them proficient in reverse-penetration. By doing so, they are able to create a virtual wall between their data and the hackers. This training will enable you to carry out attacking as well as defensive methodologies which will help you and your organization to not only protect but also assess the safety and vulnerability ratio. Delivery Method Methods Duration No. of days Practical Theory Ratio Class Room Training (MON - FRI) 80 Hours 40 Days 7:3 Class Room Training (SUN) 80 Hours 12 Days 7:3 Course Objectives At the end of this course, participants will be able to: Understand and perform Information Gathering on Digital Foot Prints Understand Email attacks and will be able to protect their email accounts as well as social networking accounts from these attacks Analyze Malwares from a computer system and remove them manually Understand Web Application Attacks and will be able to patch them to produce a secure web application. Understand windows memory management and assembly language to perform basic Reverse Engineering Understand Enterprise Network Security Architecture Understand Exploitation Understand Wireless Security Understand Security Architecture of mobile Platforms 1

Target audience This course can be attended by security officers, auditors, security professionals, website administrators, anyone who is concerned about the security of their network infrastructure and everyone who want to have a promising career in cyber security Prerequisites Basic knowledge of computers and internet technologies. Hands-On The course includes practical hands-on exercises that enable you to test your acquired skills during the training and understand its usage in a live environment 2

Our Facilities 3

Introduction to Information Security Introduction Need of Information Security Ethical Side of Hacking Steganography Latest Test Cases Cyber Law & Indian IT Acts Conclusion 1 Hour Basics of Network & Web Technology Introduction IP Address NAT IP Subnets DHCP Server Ports DNS Proxy Servers Virtual Private Networks DNS Server OSI Model Web Architecture Server Configuration HTML Basics PHP Basics 4 Hours Information Gathering & Foot printing Digital Foot Print Information Gathering Who Is Information Web Server Details Reverse IP Mapping People Search Tools to perform Digital Foot printing 1 Hour 4

Email Security Phishing Attacks Desktop Phishing, Spear Phishing IDN Homograph Attack Social Engineering Fake Emails Identify Fake Emails Key Loggers Email Encryption Security Counter Measures 3 Hours Google Hacking Database Use Google to craft attacks Advanced operators of Google Find Vulnerabilities using Google Security Countermeasures 1 Hour IDS, Firewalls & Honey Pots Introduction to Firewalls Network Firewalls Web Application Firewalls Weakness in Firewalls Intrusion Detection Systems and weakness Intrusion Prevention Systems and weakness Honey Pots and Security Misconfiguration 2 Hours 5

Web Application Vulnerability Assessment & Penetration Testing Introduction to Web Architecture Web Security Generic Misconceptions Introduction to DBMS MySQL, MS SQL, Oracle, DB2 Introduction to SQL OWASP Top 10 Attacks o Sensitive Data Exposure o Insecure Direct Object References o SQL Injections Authentication Bypass Injection Blind Injections Error Based Injection Union Based Injection Stacked Query Injection Time Based Injection o Cross Site Scripting (XSS) o Broken Authentication and Session Management o CSRF o Missing Function Level Access Control o Invalidated Redirects and Forwards o Security Misconfiguration o Using Components with Known Vulnerabilities Brute Forcing Attack Heartbleed Attack Shell Shock / Bashbug HTTP Response Splitting Denial Of Service Attacks Vulnerability Analysis using Burpsuite Arbitrary File Upload Applications to Automate VAPT 15 Hours System Hacking OS Login Bypass Introduction to Authentication Mechanisms Tools to Defeat Authentication Malware Illustration Virus, Worms, Trojans Create Virus Create Trojans Evade Antivirus & Firewalls Scan System for Malicious Applications 4 Hours 6

Linux Basics Install and setup Introduction to Linux based Pentesting OS System Architecture Network Configuration Essential Commands 2 Hours Network Attacks Introduction to Network Attacks Man in the Middle Attack o ARP Poisoning o SSL Stripping 2 Hours Wireless Security Introduction to Wireless Technology MAC Filtering Packet Encryption Packet Sniffing Types of Authentication Types of Attacks o ARP Replay Attack o Fake Authentication Attack o De-Authentication Attack Security Countermeasures 4 Hours Mobile Security Introduction to Mobile Platforms Security Architecture of Mobile Platforms Introduction to VoIP VoIP Calls from any number to any number - Fake Calls Android Exploitation Framework 1 Hour 7

Network Attacks Introduction to Network Sniffing Packet Sniffing - Wireshark Packet Analysis Display & Capture Filters Network Attacks - Ettercap DNS Poisoning ARP Poisoning Denial of Service 4 Hours Reverse Engineering Introduction to Reverse Engineering Windows Memory Management System Assembly Language Basics Application Debuggers & Disassemblers Application Cracking, Patching & Keygenning 6 Hours Cryptography Introduction to Crypto Techniques Types of Encryptions & Hashes Crypto Analysis Insecure Cryptographic Storage 2 Hours Exploitation:1 Buffer Overflow Attacks Introduction to X86 Architecture Memory Analysis Shell Code Compilation Vanila Exploit Stack Overflow Egg Hunting 4 Hours 8

Network Vulnerability Scanning Introduction to Network Vulnerability Scanning Vulnerability Assessment using Nessus Scanning Policies Vulnerability Assessment using Open VAS Report Generation Patch Critical Loopholes System Hardening Secure System Configuration 6 Hours Exploitation:2 Metasploit Framework OS Detection Open Port & Service Detection Metasploit Framework Architecture Various Interfaces of Metasploit Framework Basic Terminologies Vulnerability Analysis Exploitation on Various Platforms Evade Anti-Virus & Firewalls Metasploit Scripting Create Custom API to test Window Security Configure Nmap with Metasploit Framework SET Ways to deliver Expolits 10 Hours WAF, IDS and IPS Setup Web Application Firewalls Configure Rulesets Setup Network IDS/IPS Writing Custom Rules Logs Analysis DMZ Configuration 2 Hours 9

Penetration Testing Ethics of a Penetration Tester Penetration Testing Methodologies Customers and Legal Agreements Penetration Testing Planning and Scheduling Pre Penetration Testing Checklist Scope Analysis External Penetration Testing Internal Network Penetration Testing Router Penetration Testing o Brute Force Attacks o Router Exploitation o Reset Framework Denial of Service Penetration Testing o Scalability Analysis o Load Balancer Testing Physical Security Penetration Testing o Input Output Device Access Policy Database Penetration Testing o Security Misconfigurations o Insecure Cryptographic Storage VoIP Penetration Testing VPN Penetration Testing & report generation Penetration Testing Report Analysis Penetration Testing Report and Documentation Writing Penetration Testing Deliverables and Conclusion 6 Hours Total Duration 80 Hours 10

Take Away Certification Participants clearing final exam with more than 70% marks will be awarded with LCEH (Lucideus Certified Ethical Hacker) Certificate. Each Participant will get a participation certificate and a training completion letter Lucideus Cyber Security Toolkit Each participant will get a toolkit containing tools used during the training, white papers, videos and other support software. Lucideus - Information Security Cook-Book Candidates will be provided with a Lucideus Information Security Cook Book containing tutorials of the contents of the training Fee Structure of the Training Course Training (INR) Tax (14%) (INR) Total (INR) LCEH Training 25000 LCEH Examination 5000 3090 618 33708 11

Our Milestones in Training and Skill Enhancement Lucideus is ISO 27001:2005 and ISO 9001:2008 certified organisation for providing IT Security training, consulting and VA-PT activities Lucideus has its Advanced Cyber Threat Analysts & Malware Research Lab at the computer science department of IIT Bombay Lucideus has got experience of more than 30,000 contact Hours of Information Security training to individuals Lucideus has trained over 60,000 individuals on various aspects of information security, ranging from engineering students to top management executives of fortune 100 companies Lucideus has conducted its courses / boot camps / training sessions in over 200 establishments Lucideus is the only private organization in India to offer courses on cyber security and IT skill enhancement, jointly with the government Lucideus Key Trainers Saket has been awarded the title of "Indian Ambassador of Cyber Security in Education" at the National Education Awards 2013. He along with his team have been conducting training and consultancy sessions across the globe. He has been invited to most of the elite institutions of India including IIT-Bombay, IIT-Delhi, and IIT-Guwahati etc., for conducting seminars or workshops on Ethical Hacking & Information Security. At a young age, he has already trained more than 5000 individuals across 100 plus Colleges, Corporate & Government Departments. Some of the organizations include IBM, Wipro, TCS, HCL, Intelligence Agencies, and Special Task Forces etc. Saket is also an advisor to reputed organizations, banks and e-commerce companies in designing safe cyber architecture for their web servers and networks. Vidit is a Microsoft Certified Technology Specialist and a Microsoft Certified Professional with high level of expertise in handling server side operations based on windows platform. He has constantly been engaged in conducting training sessions and has trained more than 5000 individuals from 100 plus academic institutions, corporate houses and government organizations such as various IIT's, CAIRN India, ISACA, RICOH, Nagarro, Naukri.com, CBI, and RBI etc. He is an ideal to many young students in India who take up security as their career objective and a motivation to those who see and understand IT Security and its needs. Rahul is a post-graduate with majors in Computer Science and has conducted, more than a hundred training sessions globally to his account. Being a cyber space researcher himself, Rahul can claim to have found critical vulnerabilities on website of Intel, Sony, HP, Discovery Networks, TED and many more. He is also listed in BlackBerry Hall of Fame for his contributions to the organization. A published author of two books on information security. He has been covered extensively by the global media and is one of the most followed Indian Information Security Expert on various social media platforms Aman is an avid security researcher with special interest in network exploitation and web application security analysis. He has an experience of over 3000 hours of training in the information security space and has trained over 5000 individuals personally till date. His student base ranges from personnel from the Indian Army, The Indian Navy, Intelligence Agencies, Special Task Forces, Criminal Investigation Departments of State Police, Enterprise IT teams and Engineering students among others. He has found multiple security flaws on websites like Google, Facebook, EA, MIT, National Geography, Blackberry among others. 12

Testimonials The vision of Lucideus stands out from generic security industry entrepreneurs as a powerful intellect, with clarity of thought. I hope we can stay in contact, and I am interested to learn more about Lucideus. Jim Noble Senior Advisor, USA Department of Homeland Security Former Global CIO, Merrill Lynch Former Chief IT Strategy Officer, British Petroleum You guys are dynamites. You ll do very well C P Gurnani CEO Tech Mahindra The course on cyber security was well attended by the CBI officers and we have received positive feedback on the training conducted. The content was useful and the methodology was effective and it has enhanced the skills and knowledge of our team. P V Hari Krishna Superintendent of Police The CBI Government of India Thank you for your though provoking interactive session on web security. It was extremely informative and provided valuable insights for comprehensive web security to our users. We look forward to build further relationship with your esteemed organization in areas of Cyber Security Brigadier J K Sethi Deputy Director General MISO, Dte General Information Systems Indian Army Ministry of Defence, Government of India I sincerely wish you and your team the very best in spreading security consciousness in the persons who are lucky to have come across your existence. I also want to acknowledge the excellent resources your organization possess to help bridge gaps in cyber combat-readiness requirements/services for the government and the legal agencies. Commander S Srivastava Secretary NESC Indian Navy Ministry of Defence, Government of India 13

Lucideus Advisors & Board Of Studies Dr. Dheeraj Sangi Dean, IIT Kanpur Mr. Felix Mohan ex CISO Bharti Airtel, ex IT Head Indian Navy Mr. Mahesh Mahajan ex EVP, TCS & Global Delivery Head, HCL Prof. N. K. Goyal President, CMAI Mr. Nandkumar Saravade ex Director, Cyber Security, Citi Bank India Dr. Rakesh Khandal Vice Chancellor, UPTU Mr. Sachin Shridhar ex IPS Officer, Chairman Lucideus Mr. Subu Goparaju- ex SVP, Global Head, Infosys Labs Dr. S. S. Goyal Director, Cisco, USA Dr. S. S. Mantha Chairman, AICTE Mr. Yogesh Kochar Director, Microsoft India Our Corporate Clients On WSPT and IT Risk Assessment Front Lucideus has worked with multiple fortune 500 companies in providing critical and timely support for their cyber security needs. On Training and IT Security Skill Enhancement Front. Lucideus has trained individuals and IT teams from leading banks, various cyber cells and top university across the globe Some of the clients of Lucideus include 3 of the top 5 IT Companies of the World 2 of the Largest Global Private Banks 2 of top 5 Oil and Gas Organizations of India 1 of top 5 Intelligence Agencies of the World World's 3rd Largest Railway Network 4 of the top 5 e-commerce Website of India Top 2 Financial institutions of India 4 of top 5 PSU Banks of India 6 Different Ministries of Government of India 14

Lucideus has been featured in 15

Lucideus Headquarters New Delhi C-17, Safdarjung Development Area, Hauz Khas, New Delhi - 110016 Lucideus Labs IIT Bombay 4th Floor, SINE KReSIT Building IIT Bombay, Powai Mumbai - 400076 Lucideus Regional Office Ahmedabad 205, 2nd Floor Shree Balaji Heights, C.G. Road Ahmedabad - 380001 Lucideus Regional Office Kolkata 390 A, Jodhpur Park, Kolkata - 700068 www.lucideus.com info@lucideustech.com +91 11 26569899. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation is strictly prohibited without the prior written consent of Lucideus. No part of this document may be reproduced in any form or by any means without the prior written authorization of Lucideus. While every precaution has been taken in the preparation of this document, Lucideus assumes no responsibility for errors or omissions.