Certified Ethical Hacker

[seminarRegisterBtn]
Description
Certificate
Target Audience
How to Register
Description

“To beat a hacker, you need to think like a hacker”.

Organizations must secure their IT infrastructure and networks. Just as corporations employ auditors to routinely examine financial records, so should corporations audit security policy. Just as accountants perform bookkeeping audits, ethical hackers perform security audits. Without security audits and compliance controls, no real security exists.

This ethical hacking training will immerse the participants into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab’s intensive environment gives each participant in-depth knowledge and practical experience with the current essential security systems.

Participants will begin by understanding how perimeter defenses work and then will be led into scanning and attacking their own networks (no real network is harmed). During this ethical hacking course, students learn how intruders escalate privileges and what steps can be taken to secure a system.

Highlights:

  • Hands-on workshop with certified EC-Council instructors
  • Program is designed as per curriculum to qualify for EC Council Exam, after Completing the course participants can appear for exam and can become a CEH (Certified Ethical Hacker) from EC Council
  • Immediately apply concepts learned in practical sessions for better retention
  • We will assist you in passing the Exam.

Benefit to Organizations:

  • To build a computer system that prevents hackers’ access and safeguard system and information from malicious attack
  • To manage adequate preventive measures in order to avoid security breaches
  • To safeguard user or customer information available in business transactions and visits
  • To test networks at regular intervals
  • To create security awareness at all levels in a business
  • Improve your knowledge of risks and vulnerabilities
  • Learn how to think like a hacker

Course Outline:

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Sniffing
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Webservers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • Evading IDS, Firewalls and Honeypots
  • Buffer Overflows
  • Cryptography
  • Penetration Testing

What you will Learn:

  • Key issues plaguing the information security world, incident management process, and penetration testing
  • Various types of foot printing, foot printing tools, and countermeasures
  • Network scanning techniques and scanning countermeasures
  • Enumeration techniques and enumeration countermeasures
  • System hacking methodology, steganography, steganalysis attacks, and covering tracks
  • Different types of Trojans, Trojan analysis, and Trojan countermeasures
  • Working of viruses, virus analysis, computer worms, malware analysis procedure, and   countermeasures
  • Packet sniffing techniques and how to defend against sniffing
  • Social Engineering techniques, identify theft, and social engineering countermeasures
  • DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures   Session hijacking techniques and countermeasures
  • Different types of web application attacks, web application hacking methodology, and countermeasures
  • SQL injection attacks and injection detection tools
  • Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi-fi security tools
  • Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools
  • Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures
  • Various types of buffer overflows, how to mutate a buffer overflow exploit, buffer overflow detection tools, and countermeasures
  • Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
  • Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap

Certificate

Some of the participants who qualified CEH Exam in last batch

Mr Vivek Jaiswal 

               Mr Suresh Gandhi

                     Mr Vikas Arora

Target Audience

Target Audience

  • Ethical hacker
  • System Administrators
  • Network Administrators and Engineers
  • Webmanagers
  • Auditors
  • Security Professionals in general.

How to Register

Timings: 9:30 am – 5:00 pm, Registration begins at 9:00 am

How to Register:

  • Fees: Rs. 24,950/- + 18% GST Per Person
  • Please write to register@princetonacademy.co.in / Call -022 67256200
  • Mention the name of participant, company, contact details.
  • Fees include lunch, tea, course material, participation certificate etc.

For more details via WhatsApp

Error: Contact form not found.

For more details via Email

Error: Contact form not found.


[seminarRegisterBtn]