Learn Hacking,ethical Hacking Course,ceh Delhi,hacking
LEVEL 1: Network and System Admin Expert
LEVEL 1: Network and System Admin Expert
A key way attacker"s gain access to a company's resources is through a network connected to the Internet. A company wants to try to prevent as many attacks as possible; but in cases where it cannot prevent an attack, it must detect it in a timely manner. Therefore, an understanding of how networks and the related protocols like TCP/IP work is critical to being able to analyze network traffic and determine hostile traffic. It is just as important to know how to protect against these attacks using devices such as routers and firewalls. These essentials, and more, will be covered to provide a firm foundation for the consecutive days training. Prerequisite of Level 1: Candidates should have sound understanding about Computers and internetwork needs. Recommended for Final year Btech student or pass out, Graduates who want to may career in Information Security.
Course content:
1. Network Fundamentals
2. TCP/IP and IP addressing
3. Router and switch Configuration.
4. Routing Protocols.
5. IPV6 implementation
6. Access list.
7. Wireless Networking.
8. Firewall security concept.
9. Types of Firewall
10. Port Filtering
11. System admin of Windows 2003 and 2008 Server.
12. System admin of Linux O/S
Course duration of Level 1 : 70 Hours
LEVEL 2: Desktop and Server O/S Security
Prerequisite of Level 2: Should have undergone Level 1 training or equivalent knowledge of CCNA training .Recommended for Final year Btech student or pass out, Graduates who want to may career in Information Security.
(1) Windows O/S Security
Windows is the most widely-used and hacked operating system on the planet, and Internet Explorer is every hacker's "favorite" browser. The simple days of Windows 98 desktops and Windows NT 4.0 domains are long gone, replaced by the complexities of Active Directory, Group Policy, PKI, BitLocker, etc. This section will help you to quickly master the world of Windows security while showing you the tools you can use to simplify and automate your work. You will complete the day with a solid grounding in Windows security, including the important new features in Windows 2003, 2008, Vista, Windows 7.
a. The O/S Security Infrastructure.
b. Permissions and User Rights
c. Security Policies and templates.
d. Service packs, patches and Backup
e. Securing Network Services
f. Auditing and automation.
(2)Linux O/S Security:
Based on industry consensus standards, this course provides step-by-step guidance on improving the security of any Linux system. The course combines practical "how to" instructions with background information for Linux beginners and security advice and "best practices" for administrators of all levels of expertise.
a. Linux O/S security.
b. Linux Security Tools
c. Maintain, Monitoring and Auditing Linux.
Course duration of Level 2 : 50 Hours
LEVEL 3: Network Penetration Testing and Ethical hacking
Find Security Flaws before the Bad Guys Do
Security vulnerabilities, such as weak configurations, unpatched systems, and botched architectures, continue to plague organizations. Enterprises need people who can find these flaws in a professional manner to help eradicate them from our infrastructures. Lots of people claim to have penetration testing, ethical hacking, and security assessment skills, but precious few can apply these skills in a methodical regimen of professional testing to help make an organization more secure. This class covers the ingredients for successful network penetration testing to help attendees improve their enterprise's security stance.
We address detailed pre-test planning, including setting up an effective penetration testing infrastructure and establishing ground rules with the target organization to avoid surprises and misunderstanding. Then, we discuss a time-tested methodology for penetration and ethical hacking across the network, evaluating the security of network services and the operating systems behind them.
Attendees will learn how to perform detailed reconnaissance, learning about a target's infrastructure by mining blogs, search engines, and social networking sites. We'll then turn our attention to scanning, experimenting with numerous tools in hands-on exercises. Our exploitation phase will include the use of exploitation frameworks, stand-alone exploits, and other valuable tactics, all with hands-on exercises in our lab environment.
Prerequisite of Level 3: Should have undergone Level 1and Level 3 training or equivalent knowledge of CCNA , MCSE security, Linux security training .Recommended for Final year Btech student or pass out, Graduates who want to may career in Information Security.
Course duration of Level 3 : 80 Hours
1. Introduction to Ethical Hacking
2. Hacking Laws
3. Foot printing
4. Scanning
5. Google hacking
6. Email Hacking
7. Enumeration
8. System Hacking
9. Trojans and Backdoors
10. Virus and worms
11. Sniffers
12. Social Engineering
13. Phishing and Identify Theft
14. Denial of Service Attacks
15. Session Hijacking
16. Hacking Web Servers
17. Web Application Vulnerabilities
18. Web-based Password Cracking Techniques
19. SQL Injection
20. Hacking Wireless Networks
21. Physical Security
22. Linux Hacking
23. Evading IDS, Firewalls, and Honeypots
24. Buffer Overflows
25. Cryptography
26. Penetration Testing
27. Computer Forensics
28. Cyber Crime
29. Case studies and Trainers Secrets
30. Hackers Meet.
JCSA Special topics
1. Hacking Routers and Firewall
2. Hacking Mobile phones and PDA
3. Bluetooth Hacking
4. Hacking USB Devices
5. Securing Laptops
6. Credit Card Fraud
7. Yahoo booters
8. Crawlers
9. Remote File Inclusion
10. Local File Inclusion
11. Backdoor Shells
12. Trojan Writing in C, C++
13. PHP Injection
by: Mohit Yadav --JODO INSTITUTE ---9891773445
Ceh,learn Ethical Hacking,hacking Workshop,learn Hacking. Hacking Workshop,learn Hacking, Ceh,learn Ethical Hacking No More Blemish Face - Learn How You Can Get rid of Your Scary Face Mcse 70-291 Exam Nowaday Easy Scholarships For College - An Easy Way to Get Scholarship Money For Free In the Bible versus the Quran: He Learned to Hunt; He Ate People Distance Learning: Is It Really Appropriate For You? How To Learn Simple php Learning The Consequences Of The Various Eating Disorders Money To Help You Go To College: Obama Grants Effective Leadership Skills - Leaders Learn Best on the Job If You Want More GACE Test Points, Just Bust GACE Study Guide Myths! TExES Exam Takers React to Shocking TExES Exam Study Guide Report