Registration

Registration Form

Ethical Hacking Summer/Winter Training in Patna

Summer & Winter Training on CYBER SECURITY & ETHICAL HACKING v9

The CEH, or Certified Ethical Hacker certification presented by EC-Council, has been one of the most popular cybersecurity certifications one can obtain for many years now. The course is unique in that it aims to immerse you into the hacker mindset so that you will be able to defend against malicious attacks, from the standpoint of an equally (or greater) skilled, but completely ethical hacker.

What is new with the CEH v9?
The CEH v9 focuses on new attack vectors. It has an updated emphasis on cloud computing technology and ensures that its certification holders are well versed in countermeasures to combat cloud computing attacks.
Additionally, the CEH v9 is different from CEH v8 by placing a deeper emphasis on mobile platforms and table computers. This is directly in line with the latest developments in mobile and web technologies, and addresses the rising popularity of use of these devices- even for hacking. For the first time ever, the CEH v9 focuses on performing hacking techniques using mobile phones and tablets, and covers the latest mobile hacking tools in all the modules presented.

Summer & Winter Training on CYBER SECURITY & ETHICAL HACKING v9

COURSE CONTENT

MODULE: DESKTOP AND SERVER SECURITY
• Unit 1: Desktop & Server Security
• Unit 2: Windows 8 Introduction and Security
• Unit 3: Linux Security
MODULE: WEB SECURITY
• Unit 1: LAN Security
• Unit 2: Firewall Security
• Unit 3: Internet Security
MODULE: VAPT
• Unit 1: Introduction
• Unit 2: Vulnerability Assessment
• Unit 3: Penetration Testing
MODULE: NETWORK SECURITY
• Unit 1: Virtual Private Network Security
• Unit 2: Wireless LAN
• Unit 3: Router Security
• Unit 4: Intrusion Detection and Prevention
• Unit 5: Access Control
MODULE: PROTECTION FROM INTRUSIONS
• Unit 1: Malwares
• Unit 2: Network Intrusions
• Unit 3: Art of Googling
MODULE: DATA SECURITY
• Unit 1: Introduction
• Unit 2: Data Backup
• Unit 3: Cryptography
• Unit 4: Steganography
• Unit 5: Physical Security
MODULE: CYBER FORENSICS
• Unit 1: Cyber Crime
• Unit 2: Cyber Forensics
• Unit 3: Catching Criminals
• Unit 4: Mobile Forensics
MODULE: COMMUNICATION SECURITY
• Unit 1: Mobile Security
• Unit 2: VOIP
• Unit 3: Email Security
• Unit 3: Mobile Forensics
MODULE: ISMS
• Unit 1: Security Auditing
• Unit 2: Lead Auditor: It (La-27001)