CCSE V2.0 – Cerified Cyber Security Expert
Learn Ethical Hacking In India
CCSE is widely recognized career oriented course on Advanced Ethical Hacking, Application Security, Web Application Assessment & Penetration Testing, Cyber Crime Investigation & forensics. The interactive environment at TechDefence Labs will definitely ensures the motive of learning “how to hack” & “how to secure”.
noreply@techdefence.com
Who should attend?
The course will significantly benefit Students, IT Professionals, Web Developers, Network engineers, System Administrators, Law Professionals, Banking & finance Sector Professionals.
Course Duration: 80 Hours
Training Fees: 12, 000 INR
Training Package Includes:
• Course Material(Books)
• Examination fees
• CCSE V2.0 Certification Fee
• CCSE Tool Kit fee(10 DVD Sets)
Training Centers:
Hyderabad - 9032119825 New Delhi - 9911030818 Ahmedabad - 8000038655, 40047405 Jaipur - 9772200143 Nashik - 9175189658
Course Highlights & Benefits:
• Hands on Demonstration of Latest Hacking Techniques & tools.
• Hands on investigation Demonstration of various cases solved by Sunny Vaghela.
• Personal Interaction with highly experienced faculty.
• Hands on Practice Sessions
• 100% Placement Assistance from TechDefence.
Key Points of TechDefence:
• We have rich experience working on cases & training for Crime Branch, Ahmedabad, Nashik, Rajkot, Surat & Hyderabad.
• Conducted more than 200 workshops & seminars for Students & Professionals across globe.
• We helped Top Investigating Agencies to solve Cyber Terrorism Cases like Ahmedabad & Mumbai Blasts Cases.
• We do not use third party tools. We have developed our Crypters, Trojans, Scripts etc.
• Our Director & Trainer is supported by Ministry of Home Affairs, Malaysia & Border Security Force.
Session 1: Cyber Ethics – Hacking introduction.
Session 2: Basic Networking Terminologies
Session 3: Information Gathering and foot-printing
Session 4: Scanning and Enumeration
Session 5: Trojans and Backdoors
Session 6: Virus and Worms
Session 7: Sniffers and keyloggers
Session 8: Phishing and its preventions
Session 9: System Hacking and Security
Session 10: Social Engineering and Honey pots
Session 11: Bots, Botnets and DoS
Session 12: Cryptography
Session 13: Google Hacking Databases
Session 14: SQL injection 1
Session 15: SQL injection 2
Session 16: Proxy servers and VPN’s
Session 17: Cross site Scripting ( XSS )
Session 18: Local File Inclusion / Remote File Inclusion ( LFI / RFI )
Session 19: Secure Coding practises
Session 20: Information Disclosure vulnerabilities
Session 21: Session Hijacking ( Side jacking )
Session 22: Hacking web servers
Session 23: Vulnerability Assessment and Penetration Testing ( VAPT )
Session 24: Assembly language basics
Session 25: Buffer Overflow attacks 1
Session 26: Buffer Overflow attacks 2
Session 27: Exploit writing
Session 28: Metasploit framework
Session 29: Reverse Engineering
Session 30: Firewalls, IDS and Evading IDS
Session 31: Wireless hacking
Session 32: Mobile and VOIP hacking
Session 33: Bluetooth hacking
Session 34: Cyber crime investigation and IT ACT 2000
Session 35: Case studies of various cases solved by Techdefence
Session 36: Cyber Forensics
Session 37: Enterprise Information Security Management
Session 38: Project work 1
Session 39: Project work 2
Session 40: Online Examination
Posted By Jigar soni
|