One person allowed with this ticket. Course Kit Included.
Sale Date Ended
Single Day Entry One Person. Course kit Not included.
Sale Date Ended
Three people allowed with this ticket.
Sale Date Ended
A Hands-on Workshop on hacking methodology from basic to Advanced level. Simplified concepts with practical demonstration would be the key approach. This workshop covers all the majour modules for ethical hacking.
Duration: 16 hrs
Instructor Led Offline Training
Freebies with the Course
- Course document
- Tools kit
- Course Videos
Students and Professionals who are willing to learn and passionate about Hacking and Security. Security professionals or beginners looking to enrich their skillset from a career perspective.
Conducted more than 30+ different training sessions on various topics related to Cyber Security, Ethical Hacking, Linux and Network Security to an audience comprising Students, Corporate Executives, Entrepreneurs and Technical Specialists. He possesses an in-depth knowledge and insight into today's security risks and tomorrow’s potential threats.
Real Time Experience from last 16 years:
Consultant for Karbonn Mobiles, Saipem SPA - Dubai, Ultra Drytech Engineers-Mumbai,Telesys IT Solutions, Dubai.,Satyam Infoway ltd (Sify) ,Embee Software Pvt ltd.
Check out his Video: https://youtu.be/QEgnSX8mNWo
The Ethical Hacker Training introduces you to to the techniques used by malicious, black hat hackers with attention getting lectures and hands-on lab exercises. While these hacking skills can be used for malicious purposes, this class teaches you how to use the same hacking techniques to perform a white-hat, ethical hack, on your organization. You leave with the ability to quantitatively assess and measure threats to information assets; and discover where your organization is most vulnerable to hacking in this network security training course.
1.Introduction to Ethical Hacking
Types of hackers, Need to Know Cyber Laws
Network scanning techniques and scanning countermeasures
System hacking methodology, steganography,steganalysis attacks, and covering tracks
4.Trojans and Backdoors
Different types of Trojans, Trojan analysis, and Trojan countermeasures
Social Engineering techniques, identify theft,and social engineering countermeasures
6.Denial of Service
DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
Session hijacking techniques and countermeasures
8.Hacking Webservers & Applications
Different types of webserver attacks, Different types of web application attacks, web application hacking methodology and countermeasures
Attacks and injection detection tools
10.Hacking Wireless Networks
Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi-fi security tools
11.Hacking Mobile Platforms
Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines and tools
12.Evading IDS, Firewalls, and Honeypots
Firewall, IDS and honeypot evasion techniques,evasion tools, and countermeasures
Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap
• 2014 US State of Cybercrime survey says that hackers are now more technologically advanced than those trying to stop them.
• India needs 4.7 lakh Cyber security professionals by 2015 for protection of IT Infrastructure in the country as well as to serve the export market.
• Information Security is today the top paying certification for 2014.
Please write to email@example.com if you have questions.
Visit our Page: www.bhcin.com
Give us a Call: +91-810-500-0116/9035565475
Note: All entries are accepted with online payments. On spot entries will not be entertained.