Top Banner
BECOME ETHICAL HACKER www.hacktechmedia.com https://www.facebook.com/iamhacktechmedia / https://www.instagram.com/iamhacktechmedia/ PRO
16

BECOME ETHICAL HACKER - HACKTECHMEDIA€¦ · Module 17 –Exploit Writing & Buffer Overflow Module 18 –Cryptography & Steganography Module 19 –Firewalls & Honey pots Module 20

Jun 20, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: BECOME ETHICAL HACKER - HACKTECHMEDIA€¦ · Module 17 –Exploit Writing & Buffer Overflow Module 18 –Cryptography & Steganography Module 19 –Firewalls & Honey pots Module 20

BECOME

ETHICAL

HACKER

www.hacktechmedia.com

https://www.facebook.com/iamhacktechmedia/

https://www.instagram.com/iamhacktechmedia/

PRO

Page 2: BECOME ETHICAL HACKER - HACKTECHMEDIA€¦ · Module 17 –Exploit Writing & Buffer Overflow Module 18 –Cryptography & Steganography Module 19 –Firewalls & Honey pots Module 20

WHO WE ARE

• We provide a broad range of IT Training and services to a diversified Student base that includes corporations, institutions. Government bodies and individuals.

• Hacktech media established in 2013 previously name was hacker Blackbox from Navi Mumbai

• Growing business presence with over 1 Lakh Student India and International in over 25 countries with innobuzz knowledge solution best ethical hacking institute in India

• Multiple IT courses Targeting Customers who are looking for better opportunities in the field of Information Technology

• we are also provide web development and digital marketing services

The Hacktech media is one of India’s Leading Educational companies and Digital Marketing agency in field of information technology.

www.hacktechmedia.com

https://www.facebook.com/iamhacktechmedia/

https://www.instagram.com/iamhacktechmedia/

Page 3: BECOME ETHICAL HACKER - HACKTECHMEDIA€¦ · Module 17 –Exploit Writing & Buffer Overflow Module 18 –Cryptography & Steganography Module 19 –Firewalls & Honey pots Module 20

AboutCyber Security&EthicalHacking

Background: ADIS (Advanced Diploma on Information Security) certification is one of the

most recognized Indian Diploma certification in Information Security and Ethical

Hacking. The Program covers all aspects of Information Security and Ethical

Hacking, enabling one to become an Information Security Expert. Online

Security Breaches are happening at a very fast rate and experts are needed to

check and cure these. ITS (IT Security) Experts are in demand. According to

NASSCOM, the demand for ITS Experts will be 10 Lakh by 2010 in India. ITS is

a THE next big thing in IT and you should make the best of it.

ADISAdvanced Diploma on Information Security

www.hacktechmedia.com

https://www.facebook.com/iamhacktechmedia/

https://www.instagram.com/iamhacktechmedia/

Page 4: BECOME ETHICAL HACKER - HACKTECHMEDIA€¦ · Module 17 –Exploit Writing & Buffer Overflow Module 18 –Cryptography & Steganography Module 19 –Firewalls & Honey pots Module 20

Hackers

www.hacktechmedia.com

https://www.facebook.com/iamhacktechmedia/

https://www.instagram.com/iamhacktechmedia/

Page 5: BECOME ETHICAL HACKER - HACKTECHMEDIA€¦ · Module 17 –Exploit Writing & Buffer Overflow Module 18 –Cryptography & Steganography Module 19 –Firewalls & Honey pots Module 20

Training Duration: 200 Hours

Weekend & weekday classes available

Flexible time for working executives

Duration

www.hacktechmedia.com

https://www.facebook.com/iamhacktechmedia/

https://www.instagram.com/iamhacktechmedia/

Page 6: BECOME ETHICAL HACKER - HACKTECHMEDIA€¦ · Module 17 –Exploit Writing & Buffer Overflow Module 18 –Cryptography & Steganography Module 19 –Firewalls & Honey pots Module 20

Training Fee: Rs.60000 +GST

It includes below

• Online Examination Cost

• Digital Certificate,

• Books

• HACKING SOFTWER Kit

• Including Service Tax

FeeCondition apply*

www.hacktechmedia.com

https://www.facebook.com/iamhacktechmedia/

https://www.instagram.com/iamhacktechmedia/

Page 7: BECOME ETHICAL HACKER - HACKTECHMEDIA€¦ · Module 17 –Exploit Writing & Buffer Overflow Module 18 –Cryptography & Steganography Module 19 –Firewalls & Honey pots Module 20

1. Certificate in Information Security (CISE) Level 1

2. CISE Level 2 – Network Security

3. CISE Level 2 – Web Application Security

4. CISE Level 2 – Exploit Writing

5. CISE Level 2 – Cloud Security

Courses Covered

www.hacktechmedia.com

https://www.facebook.com/iamhacktechmedia/

https://www.instagram.com/iamhacktechmedia/

Page 8: BECOME ETHICAL HACKER - HACKTECHMEDIA€¦ · Module 17 –Exploit Writing & Buffer Overflow Module 18 –Cryptography & Steganography Module 19 –Firewalls & Honey pots Module 20

www.hacktechmedia.com

https://www.facebook.com/iamhacktechmedia/

https://www.instagram.com/iamhacktechmedia/

1.12 Months Diploma Certificate

2.5 Certifications

3. 6 Months Industrial Training Certificate

4.2 Projects and their Certificates

5. International Validity of the Certifications & the Diploma

6.12 Months Webinar Subscription Inclusive

7.100% Job Assistance

Features

Page 9: BECOME ETHICAL HACKER - HACKTECHMEDIA€¦ · Module 17 –Exploit Writing & Buffer Overflow Module 18 –Cryptography & Steganography Module 19 –Firewalls & Honey pots Module 20

www.hacktechmedia.com

https://www.facebook.com/iamhacktechmedia/

https://www.instagram.com/iamhacktechmedia/

Course Module

Advanced Diploma on Information Security

ADIS

Page 10: BECOME ETHICAL HACKER - HACKTECHMEDIA€¦ · Module 17 –Exploit Writing & Buffer Overflow Module 18 –Cryptography & Steganography Module 19 –Firewalls & Honey pots Module 20

www.hacktechmedia.com

https://www.facebook.com/iamhacktechmedia/

https://www.instagram.com/iamhacktechmedia/

Certified Information Security Expert Level 1 Modules

Module 1 – Introduction

Module 2 – Networking

Module 3 – Foot printing/Reconnaissance

Module 4 – Google Hacking

Module 5 – Scanning

Module 6 – System Hacking: Win7 and Linux

Module 7 – Android & iPhone Hacking

Module 8 – Malwares

Module 9 – SQL Injection

Module 10 – Cross Site Scripting

Module 11 – Sniffing

Module 12 – Social Engineering

Module 13 – Identity Theft Fraud

Module 14 – Denial of Service

Module 15 – Session Hijacking

Module 16 – Penetration Testing

Module 17 – Exploit Writing & Buffer Overflow

Module 18 – Cryptography & Steganography

Module 19 – Firewalls & Honey pots

Module 20 – IDS & IPS

Module 21 – Hacking Web Server

Module 22 – Wireless Hacking

Module 23 – Physical Security

Module 24 – Reverse Engineering

Module 25 – Email Hacking

Module 26 – Security Compliance and Auditing

Module 27 – Incident Handling & Computer forensics

Page 11: BECOME ETHICAL HACKER - HACKTECHMEDIA€¦ · Module 17 –Exploit Writing & Buffer Overflow Module 18 –Cryptography & Steganography Module 19 –Firewalls & Honey pots Module 20

www.hacktechmedia.com

https://www.facebook.com/iamhacktechmedia/

https://www.instagram.com/iamhacktechmedia/

Certified Information Security Expert WEB APP SECURITY Modules:-

1. Web Architectures

2. Web Application Introduction

3. PHP-Basics

4. Sessions & Cookies

5. XSS Attacks

6. Advanced SQLI

7. Cross Site Request Forgery

8. Session Hijacking

9. Web based DDOS Attacks

10. Cookie Poisoning

11. PHP Injection

12. Web Based Worms

13. Flash based Web Attacks

14. I-Frame based Web Attacks

15. Clickjacking

16.Attack frameworks: AttackAPI & BeEF

17 .Honeytokens

18 .OWASP Top 10

19 .Metasploit and Web Application

20 PHP Curl

21 .Automated Bots

22 Phishing 2.0

23 Brute forcing Web Applications

24 .Compliance Methodologies and Legalities

25 .Capture the Flag Exercise

Page 12: BECOME ETHICAL HACKER - HACKTECHMEDIA€¦ · Module 17 –Exploit Writing & Buffer Overflow Module 18 –Cryptography & Steganography Module 19 –Firewalls & Honey pots Module 20

www.hacktechmedia.com

https://www.facebook.com/iamhacktechmedia/

https://www.instagram.com/iamhacktechmedia/

Certified Information Security Expert NETWORK SECURITY Modules:-

1.

1. Network Topology2. Open Systems Interconnectivity Model3. TCP/IP In-depth4. WAP, NAT, DNS and ICMP5. Internet Routing6. Advanced Port Scanning7. Sniffing Attacks8. Masquerading Attacks9. Advanced DOS and DDOS10.Session Hijacking Attacks11.Network Operations Center - Security12.Network Traffic Analysis13.Network Vulnerability Assessment14.Network Penetration Testing15.Intrusion Detection System16.Snort 10117.OSSEC 10218.Intrusion Prevention System19.Firewalls (Installation, Configuration and Usage)20.OS Hardening for Networks - Linux and Windows

1. Cryptography - Introduction2. Symmetric Key Encryption3. Asymmetric Key Encryption4. Hash functions5. Trust models6. VLAN - Security7. VPN - Security8. Wireless Networks - Introduction9. Radio Frequency Essentials10.Wireless Security - Basics11.Wireless Threats12.13.Attacking Wireless Hotspot and Security 14.WEP Security 15.WPA/WPA2 Security 16.Secure Wireless Infrastructure Deployment 17.DNS Tunneling18.Network Forensic Methodology19.Network Evidence Acquisition20.OS Logs and Splunk

Page 13: BECOME ETHICAL HACKER - HACKTECHMEDIA€¦ · Module 17 –Exploit Writing & Buffer Overflow Module 18 –Cryptography & Steganography Module 19 –Firewalls & Honey pots Module 20

www.hacktechmedia.com

https://www.facebook.com/iamhacktechmedia/

https://www.instagram.com/iamhacktechmedia/

Certified Information Security Expert Exploit Writing Modules:-

1. Programming & Basics

2. Assembly language

3. Debugging

4. Stack Based Buffer Overflow

5. Understanding Windows Shellcode

6. Fuzzers

7. Heap Based Overflow

8. Exploiting /GS Canary Protected Programs

9. Exploiting SafeSEH Protected Programs

10. Denial of Service

11. Bypassing DEP & ASLR

12. Advanced Shellcoding (Win32 Egghunting, Connect-back, Staged,

Alphanumeric)

13. Encoders & Writing Custom Encoders

14. DLL Hijacking

15. Client Side Exploits

16. From Vulnerability to Exploit

17. Metasploit Framework

18. Binary payloads & Antivirus Evasion

19. Exploit to Metasploit

20. Capture The Flag Exercise

Page 14: BECOME ETHICAL HACKER - HACKTECHMEDIA€¦ · Module 17 –Exploit Writing & Buffer Overflow Module 18 –Cryptography & Steganography Module 19 –Firewalls & Honey pots Module 20

www.hacktechmedia.com

https://www.facebook.com/iamhacktechmedia/

https://www.instagram.com/iamhacktechmedia/

Certified Information Security Expert Level 2: Cloud Security Modules

1. Introduction to Cloud Computing

2. Features of Cloud Computing

3. Basic Concepts

4. Cloud Deployment Models

5. Cloud Computing Services

6. Cloud Computing Benefits

7. Cloud Computing Threats or Risks

8. Cloud Computing Attacks

9. Cloud Security Controls

10.Responsibilities in Cloud Security

11.Cloud Service Provider

12.Cloud Customer

13.Responsibilities of a Cloud Customer

14. Cloud Security Tools

Page 15: BECOME ETHICAL HACKER - HACKTECHMEDIA€¦ · Module 17 –Exploit Writing & Buffer Overflow Module 18 –Cryptography & Steganography Module 19 –Firewalls & Honey pots Module 20

Cloud campus

• Online training videos...• Only queries solution,• Online examination practical’s for practice before

examination...• Online webinars regarding any updating is there in the course.• Job openings in the industries so that you can directly go there

for interview.• Online interaction with other students India and abroad

we are giving Cloud Campus facility that is no other institute is providing in very reasonable FEE.Explainfeatures of Cloud Campus...

www.hacktechmedia.com

https://www.facebook.com/iamhacktechmedia/

https://www.instagram.com/iamhacktechmedia/

Page 16: BECOME ETHICAL HACKER - HACKTECHMEDIA€¦ · Module 17 –Exploit Writing & Buffer Overflow Module 18 –Cryptography & Steganography Module 19 –Firewalls & Honey pots Module 20

www.hacktechmedia.com

https://www.facebook.com/iamhacktechmedia/

https://www.instagram.com/iamhacktechmedia/