Invitation
CEH Training

With
NEW VERSION (V.6) - UPDATED

 

Course Description:

This class will
immerse the student into an interactive environment where they will be shown
how to scan, test, hack and secure their own systems. The lab intensive
environment gives each student in-depth knowledge and practical experience with
the current essential security systems. Students will begin by understanding
how perimeter defenses work and then be lead into scanning and attacking their
own networks, no real network is harmed. Students then learn how intruders
escalate privileges and what steps can be taken to secure a system. Students
will also learn about Intrusion Detection, Policy Creation, Social Engineering,
DDoS Attacks, Buffer Overflows and Virus creation. When a student leaves this
intensive 5 day class they will have hands on understanding and experience in
Ethical Hacking.

 

Course Mission:

Ethical Hacking and
Countermeasures course mission is to educate, introduce and demonstrate hacking
tools for penetration testing purposes only.


Who
Should Attend

This
course will significantly benefit security officers, auditors, security
professionals, site administrators, and anyone who is concerned about the
integrity of the network infrastructure. 



Benefit

For company who
sent their employee, you can make Security Standard Policy; your IT will know
the weakness of your system and protect it 

For employee or
professional, this training will give you value add for your knowledge and
career path

For consultant,
this training will give you add service to your client  

 

Certification

The Certified Ethical Hacker
certification exam 312-50 will be conducted on the last day of training.
Students need to pass the online Prometric exam to receive CEH
certification.  

 

Legal Agreement

Ethical Hacking and
Countermeasures course mission is to educate, introduce and demonstrate hacking
tools for penetration testing purposes only. Prior to attending this course, you
will be asked to sign an agreement stating that you will not use the newly
acquired skills for illegal or malicious attacks and you will not use such
tools in an attempt to compromise any computer system, and to indemnify
EC-Council with respect to the use or misuse of these tools, regardless of
intent.

 

Duration             
:
Full
Day Training - 5 days (9:00 – 5:00)

Date                     
: 29
June – 3 July 2009

Venue                 
: Informatics
Building 3rd Floor, Jl. Prof. Dr. Satrio No. 296, Karet – Kuningan, Jakarta 
Selatan 

Fee                       
: USD
1.399  USD 1.300 (Native Trainer) 

Trainer                
: 

Dr.  Desmond
Alexander

More than 12 years
experience in IT Security and he holder the IT certifications i.e. CEH,
 CISSP, CISA, ISO 17799 Security Auditor, MCSE, GIAC, CEH, CWNA, CHFI,
CCNA, CCNP, CCIE, GIAC-CPT, MCDRS, CSSS, LPT, WME and many more. He has also as
CEO of FORESEC, the consulting company who offer the services in training,
consulting and certifications.  Key projects included security
assessments, security architecture, business and systems analysis, and software
design. 

 





Price  Include 
            :





+ 5 Original Books
+ 5 DVD tools
+ Exam Voucher

+ Meeting Packages (Coffee Break and Lunch)

+ Souvenir

+ Certificate of Certified Ethical Hacker (if passed exam)

+ Member Portal Privilege Login (if passed
exam) 

 

 

Module Description 

 

Module 1 :
Introduction to Ethical Hacking

Module 2 : Hacking
Laws

Module 3 :
Footprinting

Module 4 : Google
Hacking

Module 5 : Scanning

Module 6 :
Enumeration

Module 7 : System
Hacking

Module 8 : Trojans
and Backdoors

Module 9 : Viruses
and Worms

Module 10: Sniffers

Module 11: Social
Engineering

Module 12: Phishing

Module 13: Hacking
Email accounts

Module 14: Denial‐of‐Service

Module 15: Session
Hijacking

Module 16: Hacking
Web Servers

Module 17: Web
Application Vulnerabilities

Module 18: We‐Based
Password Cracking Techniques

Module 19: SQL
Injection

Module 20: Hacking
Wireless Networks

Module 21: Physical
Security

Module 22: Linux
Hacking

Module 23: Evading
IDS, Firewalls and detecting Honey Pots

Module 24: Buffer
overflows

Module 25:
Cryptography

Module 26:
Penetration Testing

Module 27: Covert
Hacking

Module 28: Writing
Virus Code

Module 29: Assembly
Language Tutorial

Module 30: Exploit
Writing

Module 31: Smashing
the stack for Fun and Profit

Module 32: Windows
Based Buffer Overflow Exploit Writing

Module 33: Reverse
Engineering

Module 34: MAC OS X
Hacking

Module 35: Hacking
Routers, cable Modems and Firewalls

Module 36: Hacking
Mobile Phones, PDA and Handheld devices

Module 37:
Bluetooth Hacking

Module 38: VoIP
Hacking

Module 39: RFID
Hacking

Module 40: Spamming

Module 41: Hacking
USB Devices

Module 42: Hacking
Database Servers

Module 43: Cyber Warfare
Hacking, Al‐Qaida and Terrorism

Module 44: Internet
Content Filtering Techniques

Module 45: Privacy
on the internet

Module 46: Securing
Laptop Computers

Module 47: Spying
Technologies

Module 48:
Corporate Espionage – Hacking Using Insiders

Module 49: Creating
Security Policies

Module 50: Software
Piracy and Warez

Module 51: Hacking
and Cheating Online Games

Module 52: Hacking
RSS and Atom

Module 53: Hacking
Web Browsers (Firefox, IE)

Module 54: Proxy
Server Technologies

Module 55: Data
Loss Prevention

Module 56: Hacking
Global Positioning System (GPS)

Module 57: Computer
Forensic and Incident Handling

Module 58: Credit
Card Frauds

Module 59: How to
Steal Passwords

Module 60: Firewall
Technologies

Module 61: Threat
and Countermeasures

Module 62: Case Studies

Module 63: Botnets

Module 64: Economic
Espionage

Module 65: Patch
Management

Module 66: Security
Convergence

Module 67:
Identifying the Terrorist

 

We
are offer special price for corporate training.

 

Best Regards 


Franky MaInformatics Professional Dev. CenterOperations Div.Office: +62 21 
5260388Mobile: +62 856 7888 415




      

[Non-text portions of this message have been removed]

Kirim email ke