panel_start Description panel_end
“To beat a hacker, you need to think like a hackerâ€Â.
Organizations must secure their IT infrastructure and networks. Just as corporations employ auditors to routinely examine financial records, so should corporations audit security policy. Just as accountants perform bookkeeping audits, ethical hackers perform security audits. Without security audits and compliance controls, no real security exists.
This ethical hacking training will immerse the participants into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab’s intensive environment gives each participant in-depth knowledge and practical experience with the current essential security systems.
Participants will begin by understanding how perimeter defenses work and then will be led into scanning and attacking their own networks (no real network is harmed). During thisethical hacking course, students learn how intruders escalate privileges and what steps can be taken to secure a system.
panel_start Highlights panel_end
- Hands-on workshop with certified EC-Council instructors
- Program is designed as per curriculum to qualify for EC Council Exam, after Completing the course participants can appear for exam and can become a CEH (Certified Ethical Hacker) from EC Council
- Immediately apply concepts learned in practical sessions for better retention
- We will assist you in passing the Exam.
panel_start Benefit to Organizations panel_end
- To build a computer system that prevents hackers’ access and safeguard system and information from malicious attack
- To manage adequate preventive measures in order to avoid security breaches
- To safeguard user or customer information available in business transactions and visits
- To test networks at regular intervals
- To create security awareness at all levels in a business
- Improve your knowledge of risks and vulnerabilities
- Learn how to think like a hacker
panel_start Course Outline panel_end
- Introduction to Ethical Hacking
- Footprinting and Reconnaissance
- Scanning Networks
- Enumeration
- System Hacking
- Trojans and Backdoors
- Viruses and Worms
- Sniffing
- Social Engineering
- Denial of Service
- Session Hijacking
- Hacking Webservers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- Evading IDS, Firewalls and Honeypots
- Buffer Overflows
- Cryptography
- Penetration Testing
panel_start What you will Learn panel_end
- Key issues plaguing the information security world, incident management process, and penetration testing
- Various types of foot printing, foot printing tools, and countermeasures
- Network scanning techniques and scanning countermeasures
- Enumeration techniques and enumeration countermeasures
- System hacking methodology, steganography, steganalysis attacks, and covering tracks
- Different types of Trojans, Trojan analysis, and Trojan countermeasures
- Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
- Packet sniffing techniques and how to defend against sniffing
- Social Engineering techniques, identify theft, and social engineering countermeasures
- DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures Session hijacking techniques and countermeasures
- Different types of web application attacks, web application hacking methodology, and countermeasures
- SQL injection attacks and injection detection tools
- Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi-fi security tools
- Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools
- Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures
- Various types of buffer overflows, how to mutate a buffer overflow exploit, buffer overflow detection tools, and countermeasures
- Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
- Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap
panel_start Certificate panel_end
Some of the participants who qualified CEH Exam in last batch
Mr Vivek Jaiswal
panel_start Target Audience panel_end
Target Audience
- Ethical hacker
- System Administrators
- Network Administrators and Engineers
- Webmanagers
- Auditors
- Security Professionals in general.
panel_start How to Register panel_end
Timings: 9:30 am – 5:00 pm, Registration begins at 9:00 am
How to Register:
- Fees: Rs. 7,500/- + 18% GST Per Person (Certification Exam fee will be Separate)
- Please write to register@princetonacademy.co.in / Call or WhatsApp on 022 67256200
- Mention the name of participant, company, contact details.
- Fees include lunch, tea, course material, participation certificate etc