InfySEC CERTIFIED ETHICAL CRACKER Course

InfySEC CERTIFIED ETHICAL CRACKER Course

 

  • Weekend Batch - 5 Days: from 10th to 24th Dec 2011

    Sale Date Ended

    INR 14000
    Sold Out

Invite friends

Contact Us

Page Views : 999

About The Event

"InfySEC Certified Ethical Cracker Course"

Date : 10th, 11th, 17th, 18th & 24th Dec 2011
Timing : 10:00A.M to 5:00P.M

What if?

  • What if your computer got hacked and you still not aware of that?
  • What if your organization's network was cracked and your customer data is now with your competitors?
  • What if an attacker can see your confidential data but your administrator was not aware of the attack happened?
  • What if your organization's customer credit card and financial details are now for sale in internet by the attacker?

About CEC Course :

"infySEC’s Certified Ethical Cracker Course is one of the most Advanced Ethical Hacking Course which delivers in-depth knowledge of real time attack vectors and defensive methods. This course has been designed by group of globally recognized Information Security Professionals to meet the participant and organization expectations. For easy understanding for the participants, LIVE practical demonstration has been added for all necessary topics."

"This course delivers comprehensive deep understanding of how attacker’s works in dark and methodology they follow to deface a network. In other hand, how the Information Security Professionals working in an organization identifies these methodologies and deface attackers."

Benefits of CEC

  • LIVE practical demonstration on intense step by step attack vectors for all necessary topics.
  • LIVE practical demonstration on identifying attacks and also defense.
  • How to create code our own hacking and security tools.
  • LIVE practical demonstration on effective usage of the tools.
  • LIVE practical demonstration on Information Security Professional working in an organization identifies the attacks and how they respond.
  • LIVE demonstration on how attacks, vulnerabilities and defensive method can be done Network layer to Application layer.
  • LIVE Attack vectors demonstration covering various Operating system including Windows, LINUX, etc.
  • LIVE demonstration on how data can be recovered from the infected system and restore business systems.
  • How Virus and worm works practically ? and how to prevent them?
  • Deep Dive sessions on how attacks happens and defensive methods in all the layers
  • How network packets can be sniffed and data can be changed on the fly in various networks.

IS Lab Access:

"infySEC IS Lab is an extreme Online Virtual Remote Lab provided to participants where they can work from any place at any point of time without restriction. ISLab provides login privilege to Certified Ethical Cracker participants where they can work in our Virtual Remote Server and start doing their Labs."

"Our ISLab was created in such a concept called “Learn with Fun” where each participant will face gaming-like structured online hacking program called 'Live Hacking Zone' which contains many Levels relevant to the topics covered on the program. Each participant has to cross levels to face CEC exam, Hence CEc will only deliver equipped candidates. Participant have to cross multiple Levels starting with easy to toughest level. Each participant can track other participants activity live which helps each participants to get involved into Live Hacking Zone competition, Prepare to be SHOCKED, ENTERTAINED and EDUCATED all at the same time."

Prerequisites:

  • Should know how to use Web Browsers
  • Basic HTML familiarity
  • Basic networking will be helpful

Who Should Attend :

  • Site Administrators
  • Systems Administrators
  • Network Administrators
  • Wireless Administrators
  • Blackberry Administrators
  • Webhosting Server Administrators
  • Web Developers and Designers
  • Research Analysts
  • IT professionals
  • Law professionas
  • Finance Sector Professionals
  • Banking Professionals
  • Students
  • Institution Professors & faculties
  • Auditors
  • Anyone who are anxious about the network infrastructure and data integrity
  • Anyone who is seeking a break through Career into information security

FLOW OF CERTIFIED ETHICAL CRACKING COURSE

Flow of Certified Ethical Cracking Course

 

Topics :

The content of infySEC syllabuses is regularly updated to ensure that it remains relevant and reflects the latest thinking in par with the scenario of current technology . However, as part of the latest review, the documents themselves have been given a fresh design.

Certified Ethical Cracker Topics:
 
S.No: Topics
1 Introduction
2 Footprinting
3 Enumeration
4 Scanning
5 Trojan & Backdoors
6 Viruses and worms
7 Google Dorking
8 Buffer Overflows
9 Sniffers
10 Social Engineering
11 Denial Of Service
12 Cryptography
13 Email Attacks
14 Phishing
15 Session Hijacking
16 Webservers attacks
17 Web Browsers Attacks
18 Web based password cracking
19 SQL Injection
20 Parameter Manipulation
21 Cross Site Scripting
22 Physical Security
23 Botnets
24 Penetration Testing
25 Reverse Engineering
26 Wireless Attacks
27 Linux Attacks
28 Credit Card Frauds
29 Threats and Countermeasures
30 Next Generation Attacks
31 Ethical Hacking as a Career

Deliverables:
CEC User Friendly DVDs:

We provide DVDs functional in both Windows based and LINUX based environment.

It is mandatory that you get proper written permission from your organization before using our course software, tools and techniques on your company networks and systems for any sorts of testing or services you lend. If you are planning for any kind beneficiary security testing inside your organization, it is advised to intimate your network and computer operations teams in written form before you start any testing.If you are planning for any kind beneficiary security testing for your clients, it is advised to sign an Non Disclosure agreement from the respective stakeholders in written form before you start any testing.

In Depth HandBook Guide: Each page in course HandBook has been carefully designed with intense care and necessary relevant screenshots included for participant easy understanding.Also this handbook will not be available in local market or book publishing houses.

Online Exam: Participant will be facing CEC V2.0 Online Exam on completion of IS Lab , Live HACKING Zone.

CEC Course Certificate: You will receive a infySEC Certificate of Completion upon successful completion of our CEC training program.

What Is needed To participate during Training Period?

  • One passport size photo during registration
  • Photocopy of your ID card during registration
  • Participant have to bring their own WiFi enabled laptop,High Speed WiFi Internet facility will be provided

 

For more details, visit:

Venue Map