Page 5 of 13 FirstFirst ... 2345678 ... LastLast
Results 41 to 50 of 127
  1. #41
    Elite Member Engineering's Avatar
    Join Date
    Jan 2009
    Gender
    Female
    Posts
    1,565
    Blog Entries
    1

    CEH Training Fee: P/ 55,000.00 + VAT

    Ethical Hacking 1 Fee: P/ 14,000.00 + VAT

    Ethical Hacking 2 Fee: P/ 14,000.00 + VAT
    wla pa labot ang CEH Exam EC0-350?
    sakit2 jud sa bulsah..

    tigum2 sah tingali ko..unsa sunod next batch maam?

  2. #42
    bro and sis.. onsa man minimum requirements needed if kaya nato ni nga training?...

  3. #43
    Quote Originally Posted by Engineering View Post
    wla pa labot ang CEH Exam EC0-350?
    sakit2 jud sa bulsah..
    CEH Training Fee is inclusive of the following:
    Original Courseware from EC-Council, Exam Fee, Certificate of Completion & Meals.

    Quote Originally Posted by Engineering View Post

    tigum2 sah tingali ko..unsa sunod next batch maam?
    Sir, we will post it here the schedule of our 2nd Batch CEH Training there in CEBU...

    or else contact me via
    Email:marites@bitshieldconsulting.com
    YM:marites_norca23
    Office No.632 840 2612
    TeleFax:632 893 8527
    Mobile No. 0908 1233693

    Thanks.

  4. #44
    Quote Originally Posted by mandix View Post
    bro and sis.. onsa man minimum requirements needed if kaya nato ni nga training?...
    CERTIFIED ETHICAL HACKER CEH PREREQUISITES
    • Administrating Windows
    • TCP/IP
    • NetBIOS
    • Windows File Sharing
    • DNS, WINS and DHCP
    • NTFS and File Permissions
    • Linux - Configuring IP address
    • Linux - Configuring Routing

  5. #45

  6. #46

    Default certified ethical hacker

    Hackers are here. Where are you?
    Why let hackers invade your network when you can first invade their minds?
    Catch a thief by thinking like a thief.
    Learn the “defense in depth” approach of protecting your information asset.
    Be a CERTIFIED ETHICAL HACKER
    A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker to protect your information assets.
    - EC-Council www.eccouncil.org
    COURSE DESCRIPTION:This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.
    ATTENDEES: This course is for IT security officers, IT auditors, IT security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
    DURATION OF THE COURSE: 5 Days
    WHEN: May 8,15,22, 29 & June 5, 2010
    TIME: 8:30 AM to 5:30 PM
    VENUE: 1601 Cityland 10 Tower 2 H.V Dela Costa St. Salcedo Villge, Makati City
    SECURITY INVESTMENT INCLUDES: All original Courseware and Certificate from EC-COUNCIL plus... Sumptuous Lunch & Snacks!!!
    CERTIFICATION: The Certified Ethical Hacker exam 312-50 may be taken on the last day of the training (optional). Students need to pass the online Prometric exam to receive CEH certification.
    LEGAL AGREEMENT: Ethical Hacking and Countermeasures course mission is to educate, introduce and demonstrate hacking tools for penetration testing purposes only. Prior to attending this course, you will be asked to sign a Corporate Undertaking stating that you abide by the Code of Ethics of EC-Council and will not use the newly acquired skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system, and to indemnify EC-Council and Bitshield Security Consulting, Inc. with respect to the use or misuse of these tools, regardless of intent.
    Not anyone can be a student — Bitshield Security Consulting, Inc. will screen the applicants and will make sure that he/she works for legitimate companies.
    For more inquiries, you may call 840-2612
    Look for Janine
    Course Outline Version 6 Ethical Hacking and Countermeasures
    CEHv6 Curriculum consists of instructor-led training and self-study. The Instructor will provide the details of self-study modules to the students beginning of the class.
    Module 1: Introduction to Ethical Hacking
    Module 2: Hacking Laws
    Module 3: Footprinting
    Module 4: Google Hacking
    Module 5: Scanning
    Module 6: Enumeration
    Module 7: System Hacking
    Module 8: Trojans and Backdoors
    Module 9: Viruses and Worms
    Module 10: Sniffers
    Module 11: Social Engineering
    Module 12: Phishing
    Module 13: Hacking Email Accounts
    Module 14: Denial-of-Service
    Module 15: Session Hijacking
    Module 16: Hacking Web Servers
    Module 17: Web Application Vulnerabilities
    Module 18: Web-Based Password Cracking Techniques
    Module 19: SQL Injection
    Module 20: Hacking Wireless Networks
    Module 21: Physical Security
    Module 22: Linux Hacking
    Module 23: Evading IDS, Firewalls and Detecting Honey Pots
    Module 24: Buffer Overflows
    Module 25: Cryptography
    Module 26: Penetration Testing
    Module 27: Covert Hacking
    Module 28: Writing Virus Codes
    Module 29: Assembly Language Tutorial
    Module 30: Exploit Writing
    Module 31: Smashing the Stack for Fun and Profit
    Module 32: Windows Based Buffer Overflow Exploit Writing
    Module 33: Reverse Engineering
    Module 34: MAC OS X Hacking
    Module 35: Hacking Routers, cable Modems and Firewalls
    Module 36: Hacking Mobile Phones, PDA and Handheld Devices
    Module 37: Bluetooth Hacking
    Module 38: VoIP Hacking
    Module 39: RFID Hacking
    Module 40: Spamming
    Module 42: Hacking Database Servers
    Module 43: Cyber Warfare- Hacking, Al-Qaida and Terrorism
    Module 44: Internet Content Filtering Techniques
    Module 45: Privacy on the Internet
    Module 46: Securing Laptop Computers
    Module 47: Spying Technologies
    Module 48: Corporate Espionage- Hacking Using Insiders
    Module 49: Creating Security Policies
    Module 50: Software Piracy and Warez
    Module 51: Hacking and Cheating Online Games
    Module 52: Hacking RSS and Atom
    Module 53: Hacking Web Browsers (Firefox, IE)
    Module 54: Proxy Server Technologies
    Module 55: Data Loss Prevention
    Module 56: Hacking Global Positioning System (GPS)
    Module 57: Computer Forensics and Incident Handling
    Module 58: Credit Card Frauds
    Module 59: How to Steal Passwords
    Module 60: Firewall Technologies
    Module 61: Threats and Countermeasures
    Module 62: Case Studies
    Module 63: Botnets
    Module 64: Economic Espionage
    Module 65: Patch Management
    Module 66: Security Convergence
    Module 67: Identifying the Terrorist


  7. #47
    good stuff...
    i hope you've got good speakers/presenters...

  8. #48
    nindot lagi na unsay mga required nga skills para mo apil sa training?

  9. #49
    read the whole freakin' thread

    and if you had to ask that, you're probably not qualified

  10. #50
    unsa mana nga training thesia? gamit tami na ug tools like metasploit framework? lels

  11.    Advertisement

Page 5 of 13 FirstFirst ... 2345678 ... LastLast

Similar Threads

 
  1. Replies: 12
    Last Post: 08-03-2011, 10:38 AM
  2. Certified Ethical Hacker Plus
    By Ronald in forum Networking & Internet
    Replies: 5
    Last Post: 10-20-2010, 06:37 PM
  3. Certified Ethical Hacker Plus
    By Ronald in forum Networking & Internet
    Replies: 4
    Last Post: 10-04-2010, 03:33 PM
  4. Any1 want to catch a hacker?
    By muzikfreakah in forum Websites & Multimedia
    Replies: 116
    Last Post: 07-27-2006, 08:58 AM
  5. gloryhunter <--- How to Catch a Fake Hacker
    By rvyne in forum Websites & Multimedia
    Replies: 170
    Last Post: 05-30-2005, 07:02 PM

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
about us
We are the first Cebu Online Media.

iSTORYA.NET is Cebu's Biggest, Southern Philippines' Most Active, and the Philippines' Strongest Online Community!
follow us
#top