Contect1:
Tel: +91 22 4005 2628 Fax:+91 22 2839 2628
Email: info@iisecurity.in
Contect2:
Please Visit click here to view details
Contect3:
Please Visit click here
Details of course
Certified Professional Hacker™ v2 |
| Certified Professional Hacker™ v2 - training to become a Professional Ethical Hacker |
The Certified Professional Hacker v2 is a revolution in the field of information security training. It goes far beyond the usual courses that talk about the same old port scanning and vulnerability assessments. It goes deep down into the depths of networking, systems, and actual exploitation. Here are some of the things you'll find in the CPH v2, which you would be hard-pressed to find in other certified ethical hacking courses.
|
| Why should you attend this course? |
| You've heard of courses that claim to make you an ethical hacker, but what's the definition of a 'hacker'? A 'hacker' is someone who goes into the depths of any system, and tries to understand how things actually work, not just someone who runs a bunch of scripts from the Internet to try and break into systems. One of the greatest USPs of the CPH course is that it is built by experts who do penetration testing on a regular basis. Led by K. K. Mookhey, who is the founder of one of India's leading information security firms - Network Intelligence. He has authored books on Linux Security and Metasploit Framework, and numerous articles on securityfocus.com, and other sites. He has presented at prestigious conferences such as Blackhat USA, Interop, IT Underground, and others. Read his full profile here. Also, since it is build by practitioners in the field, it also happens to be regularly updated with the latest tools, techniques, and real-world scenarios. In fact, the lab setup for the course itself is the single-most important reason to attend the course. Where else can you actually launch attacks, see the packet flows, analyze them, tweak your attacks, and get to break into systems that have been set up to create levels of challenges and hone your skills. |
| Who should attend this course? |
| Anyone looking to build a career in information security, or if you're someone who's already in this field, but want to learn the Professional concepts of hacking, then this is the course for you. It simply will not get more practical and more hands-on than this. Instead of burdening you with huge amount of courseware, and hundreds of tools, the CPH course focuses on the real-world practical tools and techniques of hacking. |
| Course Contents |
Session One: Getting the basics right
|
Session Two - Network Cartography
|
Session Three - Exploitation
|
Session Four - Advanced Exploitation
|
Session Five - Black-belt Hacking
|
Session Six - Social Engineering
|
Session Seven - Cryptography
|
Session Eight - Honeypots
|
Session Nine - Esoteric Hacking
|
Session Ten - Password Cracking
|
Session Eleven - Trojans and Backdoors |
Session Twelve - Viruses and Worms
|
Session Thirteen - Phishing |
Session Fourteen – Exploit Writing
|
Session Fifteen - Privacy on the Internet |
Session Sixteen - Spying Technologies |
Session Seventeen - Credit Card Frauds |
Session Eighteen - Software Piracy and Warez |
Session Nineteen – Securing Laptop Computers |
Session Twenty - Data Loss Prevention |
Session Twenty One - Physical Security |
Session Twenty Two - Basics of Digital Forensics
|
Hands-on Exercises The CPH course comes with a custom-built lab specially designed to clear up concepts, reinforce techniques, and make you comfortable with the tools of the trade. Here are the hands-on exercises you'll get to do:
|