Invitation
CEH Training
With
NEW VERSION (V.6) - UPDATED
Course Description:
This class will
immerse the student into an interactive environment where they will be shown
how to scan, test, hack and secure their own systems. The lab intensive
environment gives each student in-depth knowledge and practical experience with
the current essential security systems. Students will begin by understanding
how perimeter defenses work and then be lead into scanning and attacking their
own networks, no real network is harmed. Students then learn how intruders
escalate privileges and what steps can be taken to secure a system. Students
will also learn about Intrusion Detection, Policy Creation, Social Engineering,
DDoS Attacks, Buffer Overflows and Virus creation. When a student leaves this
intensive 5 day class they will have hands on understanding and experience in
Ethical Hacking.
Course Mission:
Ethical Hacking and
Countermeasures course mission is to educate, introduce and demonstrate hacking
tools for penetration testing purposes only.
Who
Should Attend
This
course will significantly benefit security officers, auditors, security
professionals, site administrators, and anyone who is concerned about the
integrity of the network infrastructure.
Benefit
For company who
sent their employee, you can make Security Standard Policy; your IT will know
the weakness of your system and protect it
For employee or
professional, this training will give you value add for your knowledge and
career path
For consultant,
this training will give you add service to your client
Certification
The Certified Ethical Hacker
certification exam 312-50 will be conducted on the last day of training.
Students need to pass the online Prometric exam to receive CEH
certification.
Legal Agreement
Ethical Hacking and
Countermeasures course mission is to educate, introduce and demonstrate hacking
tools for penetration testing purposes only. Prior to attending this course, you
will be asked to sign an agreement stating that you will not use the newly
acquired skills for illegal or malicious attacks and you will not use such
tools in an attempt to compromise any computer system, and to indemnify
EC-Council with respect to the use or misuse of these tools, regardless of
intent.
Duration
:
Full
Day Training - 5 days (9:00 – 5:00)
Date
: 29
June – 3 July 2009
Venue
: Informatics
Building 3rd Floor, Jl. Prof. Dr. Satrio No. 296, Karet – Kuningan, Jakarta
Selatan
Fee
: USD
1.399 USD 1.300 (Native Trainer)
Trainer
:
Dr. Desmond
Alexander
More than 12 years
experience in IT Security and he holder the IT certifications i.e. CEH,
CISSP, CISA, ISO 17799 Security Auditor, MCSE, GIAC, CEH, CWNA, CHFI,
CCNA, CCNP, CCIE, GIAC-CPT, MCDRS, CSSS, LPT, WME and many more. He has also as
CEO of FORESEC, the consulting company who offer the services in training,
consulting and certifications. Key projects included security
assessments, security architecture, business and systems analysis, and software
design.
Price Include
:
+ 5 Original Books
+ 5 DVD tools
+ Exam Voucher
+ Meeting Packages (Coffee Break and Lunch)
+ Souvenir
+ Certificate of Certified Ethical Hacker (if passed exam)
+ Member Portal Privilege Login (if passed
exam)
Module Description
Module 1 :
Introduction to Ethical Hacking
Module 2 : Hacking
Laws
Module 3 :
Footprinting
Module 4 : Google
Hacking
Module 5 : Scanning
Module 6 :
Enumeration
Module 7 : System
Hacking
Module 8 : Trojans
and Backdoors
Module 9 : Viruses
and Worms
Module 10: Sniffers
Module 11: Social
Engineering
Module 12: Phishing
Module 13: Hacking
Email accounts
Module 14: Denial‐of‐Service
Module 15: Session
Hijacking
Module 16: Hacking
Web Servers
Module 17: Web
Application Vulnerabilities
Module 18: We‐Based
Password Cracking Techniques
Module 19: SQL
Injection
Module 20: Hacking
Wireless Networks
Module 21: Physical
Security
Module 22: Linux
Hacking
Module 23: Evading
IDS, Firewalls and detecting Honey Pots
Module 24: Buffer
overflows
Module 25:
Cryptography
Module 26:
Penetration Testing
Module 27: Covert
Hacking
Module 28: Writing
Virus Code
Module 29: Assembly
Language Tutorial
Module 30: Exploit
Writing
Module 31: Smashing
the stack for Fun and Profit
Module 32: Windows
Based Buffer Overflow Exploit Writing
Module 33: Reverse
Engineering
Module 34: MAC OS X
Hacking
Module 35: Hacking
Routers, cable Modems and Firewalls
Module 36: Hacking
Mobile Phones, PDA and Handheld devices
Module 37:
Bluetooth Hacking
Module 38: VoIP
Hacking
Module 39: RFID
Hacking
Module 40: Spamming
Module 41: Hacking
USB Devices
Module 42: Hacking
Database Servers
Module 43: Cyber Warfare
Hacking, Al‐Qaida and Terrorism
Module 44: Internet
Content Filtering Techniques
Module 45: Privacy
on the internet
Module 46: Securing
Laptop Computers
Module 47: Spying
Technologies
Module 48:
Corporate Espionage – Hacking Using Insiders
Module 49: Creating
Security Policies
Module 50: Software
Piracy and Warez
Module 51: Hacking
and Cheating Online Games
Module 52: Hacking
RSS and Atom
Module 53: Hacking
Web Browsers (Firefox, IE)
Module 54: Proxy
Server Technologies
Module 55: Data
Loss Prevention
Module 56: Hacking
Global Positioning System (GPS)
Module 57: Computer
Forensic and Incident Handling
Module 58: Credit
Card Frauds
Module 59: How to
Steal Passwords
Module 60: Firewall
Technologies
Module 61: Threat
and Countermeasures
Module 62: Case Studies
Module 63: Botnets
Module 64: Economic
Espionage
Module 65: Patch
Management
Module 66: Security
Convergence
Module 67:
Identifying the Terrorist
We
are offer special price for corporate training.
Best Regards
Franky MaInformatics Professional Dev. CenterOperations Div.Office: +62 21
5260388Mobile: +62 856 7888 415
[Non-text portions of this message have been removed]