How to Hack - The Ethical Way

How to Hack - The Ethical Way

 

  • Two Day Entry Pass

    One person allowed with this ticket. Course Kit Included.

    Sale Date Ended

    INR 5000
    Sold Out
  • One Day Entry Pass

    Single Day Entry One Person. Course kit Not included.

    Sale Date Ended

    INR 2000
    Sold Out
  • Group Entry Two Day

    Three people allowed with this ticket.

    Sale Date Ended

    INR 13500
    Sold Out

Invite friends

Contact Us

Page Views : 773

About The Event

A Hands-on Workshop on hacking methodology from basic to Advanced level. Simplified concepts with practical demonstration would be the key approach.  This workshop covers all the majour modules for ethical hacking. 

 

Duration: 16 hrs

Instructor Led Offline Training 

                                                                                                  

Registrants can bring down their Laptops for Practical Use.

 

Freebies with the Course
- Course document
- Tools kit
- Course Videos
- Certificate

 


Targeted Learners
Students and Professionals who are willing to learn and passionate about Hacking and Security. Security professionals or beginners looking to enrich their skillset from a career perspective. 

 

 

TrainerSpeaker Background


Jose Vincent

Conducted more than 30+ different training sessions on various topics related to Cyber Security, Ethical Hacking, Linux and Network Security to an audience comprising Students, Corporate Executives, Entrepreneurs and Technical Specialists. He possesses an in-depth knowledge and insight into today's security risks and tomorrow’s potential threats.

 

Real Time Experience from last 16 years:
Consultant for Karbonn Mobiles, Saipem SPA - Dubai, Ultra Drytech Engineers-Mumbai,Telesys IT Solutions, Dubai.,Satyam Infoway ltd (Sify) ,Embee Software Pvt ltd.

 

Check out his Videohttps://youtu.be/QEgnSX8mNWo

 

Introduction
The Ethical Hacker Training introduces you to to the techniques used by malicious, black hat hackers with attention getting lectures and hands-on lab exercises. While these hacking skills can be used for malicious purposes, this class teaches you how to use the same hacking techniques to perform a white-hat, ethical hack, on your organization. You leave with the ability to quantitatively assess and measure threats to information assets; and discover where your organization is most vulnerable to hacking in this network security training course.



Course Outline

1.Introduction to Ethical Hacking
   Types of hackers, Need to Know Cyber Laws

 

2.Scanning Networks
   Network scanning techniques and scanning countermeasures

 

3.System Hacking
   System hacking methodology, steganography,steganalysis attacks, and covering tracks

 

4.Trojans and Backdoors
   Different types of Trojans, Trojan analysis, and Trojan countermeasures

 

5.Social Engineering
   Social Engineering techniques, identify theft,and social engineering countermeasures

 

6.Denial of Service
   DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures

 

7.Session Hijacking
   Session hijacking techniques and countermeasures

 

8.Hacking Webservers & Applications
   Different types of webserver attacks, Different types of web application attacks, web application hacking methodology and countermeasures

 

9.SQL Injection
   Attacks and injection detection tools

 

10.Hacking Wireless Networks
    Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi-fi security tools

 

11.Hacking Mobile Platforms
     Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines and tools

 

12.Evading IDS, Firewalls, and Honeypots
     Firewall, IDS and honeypot evasion techniques,evasion tools, and countermeasures

 

13.Cryptography
     Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools

 

14.Penetration Testing
     Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap

 


Statistics

• 2014 US State of Cybercrime survey says that hackers are now more technologically advanced than those trying to stop them.
• India needs 4.7 lakh Cyber security professionals by 2015 for protection of IT Infrastructure in the country as well as to serve the export market.
• Information Security is today the top paying certification for 2014.

Please write to support@bhcin.com if you have questions.
Visit our Page: www.bhcin.com
Give us a Call: +91-810-500-0116/9035565475

Note: All entries are accepted with online payments. On spot entries will not be entertained.