CEH training fortifies the abilities to guard against the weaknesses and vulnera - Chennai

Monday, 18 November 2013

Item details

City: Chennai, Tamil Nadu
Offer type: Offer

Contacts

Contact name Ms.Aruna
Phone 9884033369

Item description

We cordially invite you to attend EC-Council’s Certified Ethical Hacker (CEH) v8 Certification program conducted in Chennai.
CEH v8 certification is a classroom training course that is designed with a blended model with experienced instructors

Course Title:
EC-Council’s Certified Ethical Hacker (C| EH) training certifies a security professional as an Ethical Hacker and Penetration Tester.
CEH training fortifies the abilities to guard against the weaknesses and vulnerabilities of network infrastructure and illegal hacking.

CEH training becomes imperative with the increasing security threats to computer networks and web servers and there is a great need to make networks "hacker-proof".
The best way to do this is by understanding the methods employed by hackers to intrude into systems.

Training Delivery
The course is delivered in accordance with an accredited course syllabus and certification process.


Course Prerequisite
·  1 year of experience managing Windows/Unix/Linux systems or equivalent knowledge and skills
·  Good Understanding of TCP/IP concepts.
·  Software Professionals with basic knowledge of networking services / operating systems.
Target Audience
·  Security officers / professionals
·  IT Auditors
·  Website / Network / System administrators
·  BPO Poeples
·  BE Freshers / IT Admin Job seekers

Course Content
CEH v8 course curriculum consists of instructor-led training , self-study and comprehensive practice
We will provide the details of the modules to the students beginning of the class.
Module 01: Introduction to Ethical Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: System Hacking
Module 06: Trojans and Backdoors
Module 07: Viruses and Worms
Module 08: Sniffers
Module 09: Social Engineering
Module 10: Denial of Service
Module 11: Session Hijacking
Module 12: Hacking Webservers
Module 13: Hacking Web Applications
Module 14: SQL Injection
Module 15: Hacking Wireless Networks
Module 16: Hacking Mobile Platforms
Module 17: Evading IDS, Firewalls, and Honeypots
Module 18: Buffer Overflow
Module 19: Cryptography
Module 20: Penetration Testing


Kind Regards,
Zybeak Technologies,
C 43, Second Avenue,
Anna Nagar, Chennai-40.
044- 6565 8585 & 98840 33369
www.zybeak.com