Hackers are here. Where are you?
Why let hackers invade your network when you can first invade their minds?
Catch a thief by thinking like a thief.
Learn the “defense in depth” approach of protecting your information asset.
Be a CERTIFIED ETHICAL HACKER
A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker to protect your information assets.
COURSE DESCRIPTION:This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.
ATTENDEES: This course is for IT security officers, IT auditors, IT security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
DURATION OF THE COURSE: 5 Days
WHEN: May 8,15,22, 29 & June 5, 2010
TIME: 8:30 AM to 5:30 PM
VENUE: 1601 Cityland 10 Tower 2 H.V Dela Costa St. Salcedo Villge, Makati City
SECURITY INVESTMENT INCLUDES: All original Courseware and Certificate from EC-COUNCIL plus... Sumptuous Lunch & Snacks!!!
CERTIFICATION: The Certified Ethical Hacker exam 312-50 may be taken on the last day of the training (optional). Students need to pass the online Prometric exam to receive CEH certification.
LEGAL AGREEMENT: Ethical Hacking and Countermeasures course mission is to educate, introduce and demonstrate hacking tools for penetration testing purposes only. Prior to attending this course, you will be asked to sign a Corporate Undertaking stating that you abide by the Code of Ethics of EC-Council and will not use the newly acquired skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system, and to indemnify EC-Council and Bitshield Security Consulting, Inc. with respect to the use or misuse of these tools, regardless of intent.
Not anyone can be a student — Bitshield Security Consulting, Inc. will screen the applicants and will make sure that he/she works for legitimate companies.
For more inquiries, you may call 840-2612
Look for Janine
Course Outline Version 6 Ethical Hacking and Countermeasures
CEHv6 Curriculum consists of instructor-led training and self-study. The Instructor will provide the details of self-study modules to the students beginning of the class.
Module 1: Introduction to Ethical Hacking
Module 2: Hacking Laws
Module 3: Footprinting
Module 4: Google Hacking
Module 5: Scanning
Module 6: Enumeration
Module 7: System Hacking
Module 8: Trojans and Backdoors
Module 9: Viruses and Worms
Module 10: Sniffers
Module 11: Social Engineering
Module 12: Phishing
Module 13: Hacking Email Accounts
Module 14: Denial-of-Service
Module 15: Session Hijacking
Module 16: Hacking Web Servers
Module 17: Web Application Vulnerabilities
Module 18: Web-Based Password Cracking Techniques
Module 19: SQL Injection
Module 20: Hacking Wireless Networks
Module 21: Physical Security
Module 22: Linux Hacking
Module 23: Evading IDS, Firewalls and Detecting Honey Pots
Module 24: Buffer Overflows
Module 25: Cryptography
Module 26: Penetration Testing
Module 27: Covert Hacking
Module 28: Writing Virus Codes
Module 29: Assembly Language Tutorial
Module 30: Exploit Writing
Module 31: Smashing the Stack for Fun and Profit
Module 32: Windows Based Buffer Overflow Exploit Writing
Module 33: Reverse Engineering
Module 34: MAC OS X Hacking
Module 35: Hacking Routers, cable Modems and Firewalls
Module 36: Hacking Mobile Phones, PDA and Handheld Devices
Module 37: Bluetooth Hacking
Module 38: VoIP Hacking
Module 39: RFID Hacking
Module 40: Spamming
Module 42: Hacking Database Servers
Module 43: Cyber Warfare- Hacking, Al-Qaida and Terrorism
Module 44: Internet Content Filtering Techniques
Module 45: Privacy on the Internet
Module 46: Securing Laptop Computers
Module 47: Spying Technologies
Module 48: Corporate Espionage- Hacking Using Insiders
Module 49: Creating Security Policies
Module 50: Software Piracy and Warez
Module 51: Hacking and Cheating Online Games
Module 52: Hacking RSS and Atom
Module 53: Hacking Web Browsers (Firefox, IE)
Module 54: Proxy Server Technologies
Module 55: Data Loss Prevention
Module 56: Hacking Global Positioning System (GPS)
Module 57: Computer Forensics and Incident Handling
Module 58: Credit Card Frauds
Module 59: How to Steal Passwords
Module 60: Firewall Technologies
Module 61: Threats and Countermeasures
Module 62: Case Studies
Module 63: Botnets
Module 64: Economic Espionage
Module 65: Patch Management
Module 66: Security Convergence
Module 67: Identifying the Terrorist