Upload
marco-maquena
View
15
Download
0
Tags:
Embed Size (px)
DESCRIPTION
Certified Ethical Hacker v8 - March 2015
Citation preview
IN ASSOCIATION WITH
9th – 13th MARCH 2015, SOUTHERN SUN HYDE PARK HOTEL, JOHANNESBURG, SOUTH AFRICA
Accredited Training Provider By Services SETA
Accreditation No: 2287
Reserve your seat today to
avoid disappointment!
This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack
and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical
experience with the current essential security systems. Students will begin by understanding how perimeter defenses
work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then
learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about
Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. CEHv8
focuses on the latest hacking attacks targeted to mobile platform and tablet computers and covers
countermeasures to secure mobile infrastructure. When a student leaves this intensive 5 day class they will have
hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical
Hacker exam 350CEHv8.
COURSE DESCRIPTION
The most advanced course in the world that covers cutting edge of hacking technology. EC-Council researchers go deep underground covertly to extract advanced attacks and exploits and work to analyze how hackers operate and present them to defense community.
Who Should Attend? This class is a must for networking professionals, IT Managers and decision-makers that need to understand the security solutions that exist today. Companies and organizations interested in developing greater e-commerce capability need people who know
information security.
Tel: +27 (0) 11 341 1000, Fax: +27 (0)11 325 0873
Email: [email protected], Website: www.amc-intsa.com
9th – 13th MARCH 2015, SOUTHERN SUN HYDE PARK HOTEL, JOHANNESBURG, SOUTH AFRICA
LEGAL AGREEMENT Ethical Hacking and Countermeasures course mission is to educate, introduce and demonstrate hacking tools for penetration testing purposes only. Prior to attending this course, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system, and to indemnify EC-Council with respect to the use or misuse of these tools, regardless of intent. Not anyone can be a student — the Accredited Training Centers (ATC) will make sure the applicants work for legitimate companies.
What is ‘Hacking’?
Hacking is an act of penetrating computer systems to gain knowledge about the system and how it works. This is considered illegal since it is like breaking
into someone’s house.
Reserve your seat today to
avoid disappointment!
Why is this training important for you?
The most advanced course in the world that covers cutting edge of
hacking technology. EC-Council researchers go deep underground
covertly to extract advanced attacks and exploits and work to
analyze how hackers operate and present them to defense
community .The researches report and update advanced hacking
tools every day on the member’s portal and on
www.hackerjournals.com
The CEH class deals with real life scenario and real threats by real
life experts in the field.
Learn real life ethical hacking methodology beyond automated
vulnerability scans and simple information security tests.
Gain global recognition as being a certified member of a globally
recognized institution and attain the skills of a professional ethical
hacker/ penetration tester.
Play with real life tools that are used by the hacking underground.
The courseware is over 4,410 pages, covering 63 modules with
over 60 GB of real life underground tools that are not found in any
other training course anywhere in the world plus evaluation copies
for Core Impact and Immunity in classes and security software that
can be taken home!!!
Get your hands dirty with actual hands on labs under the guidance
of some of the best information security professionals in this space.
Unlike other classes that provide courseware that is tightly coupled
with the presentation and somewhat useless outside of that
environment, EC-Council has always sought to provide reference
material that continues to be valuable long after the course has
concluded.
EXAMINATION Certification is achieved by taking the C|EH examination (Version 8) on day five of the training. Number of Questions: 125 Passing Score: 70% Test Duration: 4 Hours Test Format: Multiple-Choice
Tel: +27 (0) 11 341 1000, Fax: +27 (0)11 325 0873
Email: [email protected], Website: www.amc-intsa.com
Accredited Training Provider By Services SETA
Accreditation No: 2287
CERTIFIED ETHICAL HACKER
5 DAY COURSE
THE WORLD’S MOST ADVANCED ETHICAL HACKING AND PENETRATION TESTING PROGRAMME: CERTIFIED ETHICAL HACKER (CEH)
This is the world’s most advanced ethical hacking course with 26 in class modules out of a total 63 modules on everything any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization.
The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hacker exam 350CEHv8 CEH by EC-Council: Certified Ethical Hacker and Penetration Testing To beat a hacker, you need to think like one! This is exactly what this class will teach you. It is the pinnacle of the most desired information security training program any information security professional will ever want to be in.
The definition of an Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods as a Hacker. Hacking is a felony in the United States and most other countries. When it is done by request and under a contract between an Ethical Hacker and an organization, it is legal. The most important point is that an Ethical Hacker has authorization to probe the target. This class will immerse the students into a hands-on environment where they will be shown how to conduct ethical hacking. They will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! They will scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own
networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, Virus Creation and others. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking
Group Discount Available!
This class immerses students in hands-on ethical hacking. You will be exposed to achieving optimal information security in your organization by
infiltrating systems and understanding deficiencies as seen from the other side.
Accredited Training Provider By Services SETA
Accreditation No: 2287
9th – 13th MARCH 2015, SOUTHERN SUN HYDE PARK HOTEL, JOHANNESBURG, SOUTH AFRICA
COURSE STRUCTURE
Some of the hacking concepts you will learn to master during this hands on hacking course
01. The Need for Security Analysis
02. Advanced Googling
03. TCP/IP Packet Analysis
04. Advanced Sniffing Techniques
05. Vulnerability Analysis with Nessus
06. Advanced Wireless Testing
07. Designing a DMZ
08. Snort Analysis
09. Log Analysis
10. Advanced Exploits and Tools
11. Pen Testing Methodologies
12. Customers and Legal Agreements
13. Rules of Engagement
14. Penetration Testing Planning and Scheduling
15. Pre Penetration Testing Checklist
16. Information Gathering
17. Vulnerability Analysis
18. External Penetration Testing
19. Internal Network Penetration Testing
20. Routers and Switches Penetration Testing
21. Firewall Penetration Testing
26. Social Engineering Penetration Testing
27. Stolen Laptop, PDAs and Cell phones Penetration
Testing
28. Application Penetration Testing
29. Physical Security Penetration Testing
30. Database Penetration testing
31. VoIP Penetration Testing
32. VPN Penetration Testing
33. War Dialing
34. Virus and Trojan Detection
35. Log Management Penetration Testing
36. File Integrity Checking
37. Blue Tooth and Hand held Device Penetration
Testing
38. Telecommunication and Broadband Communication
Penetration Testing
39. Email Security Penetration Testing
40. Security Patches Penetration Testing
41. Data Leakage Penetration Testing
42. Penetration Testing Deliverables and Conclusion
43. Penetration Testing Report and Documentation
Writing
44.Penetration Testing Report Analysis
46. Ethics of a Licensed Penetration Tester
47. Standards and Compliance
Registration Form Thank you for your interest in the course. To register, please provide the following information
THE CEH PROGRAM : ETHICAL HACKING AND COUNTERMEASURERS The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will
fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.
9th – 13th MARCH 2015, SOUTHERN SUN HYDE PARK HOTEL, JOHANNESBURG, SOUTH
AFRICA
IN ASSOCIATION WITH
DELEGATE(S) INFORMATION
1. Dr. /Mr. /Mrs. /Miss: Email:
Department: Mobile:
Position:
2. Dr. /Mr. /Mrs. /Miss: Email:
Department: Mobile:
Position:
3. Dr. /Mr. /Mrs. /Miss: Email:
Department: Mobile:
Position:
4. Dr. /Mr. /Mrs. /Miss: Email:
Department: Mobile:
Position:
REGISTER ME / US FOR THE FOLLOWING (PLEASE TICK)
5 Day Course = R28,980.00 excluding VAT (This includes examination fees as well as EC Council CEH certification)
AUTHORIZATION – THIS BOOKING IS INVALID WITHOUT A SIGNATURE
Signatory must be authorized to sign on behalf of contracting organization
Name:
Organization:
VAT No.
Telephone: Facsimile:
Physical Address: Code:
Signature:
Bank Transfer: Standard Bank, Branch – Hyde Park, Code – 00660534, Account No. 022307893, Swift Code – SBZAZAJJ.
Credit Card MasterCard VISA Diners Club AMEX
Card No.: Expiry Date: /
Cardholder’s Name: Signature:
ID Number: CV No.
Authorization Code: Date:
TERMS AND CONDITIONS Accepted applications to attend the AMC International conference or training course (“Event”) are in every case subject to these terms and conditions: Payment Terms – Payment is due in full upon completion and return of the registration form. Due to limited conference space we advise early registration and payment by credit card to avoid disappointment. AMC International reserves the right to admit or refuse admission to delegates who have not shown proof of payment of conference fees or not agreed to sign an indemnity form. Speakers - Views of Speakers at any Conference or Training Course – are their own and do not necessarily reflect the views of AMC International, its employees, agents or contractors. Delegate Substitutions – Provided the fee has been paid in full, within the time frame as per our terms and conditions, substitutions at no extra charge can be made up to 10 working days, before the start of the Event. (Send notification for any such changes in writing for the attention of the Customer Services Manager at [email protected]). Delegate Cancellations – must be received by AMC International in writing and must be addressed to the Customer Services Manager at [email protected],
Cancellations received 10 working days before Event start-date, entitle the cancelling delegate to a full credit of amounts (credit to attend future event – not refund monies) paid to date of cancellation which may only be redeemed against the cost of any future AMC International Event, within one year from date of such cancellation;
Any cancellations received less than 10 working days before the Event start-date, do not entitle the cancelling delegate to any refund or credit note and the full fee must be paid;
Non attendance without written cancellation to the Customer Services Manager, is treated as a cancellation with no entitlement to any refund or credit.
Speaker Changes – Occasionally it is necessary for reasons beyond our control to alter the content and timing of the program or the identity of the speakers.
If AMC International cancels an Event, delegate payments at the date of cancellation will be credited to a AMC International Event (such credit is available for up to one year from the date of cancellation). If AMC International postpones an Event, delegate payments at the postponement date will be credited towards the rescheduled Event. If the delegate is unable to attend the rescheduled Event, the delegate will receive a full credit of amounts paid up to the date of postponement which may only be redeemed against the cost of any future AMC International Event (and such credit will be available for one year from the date of postponement). No cash refunds whatsoever are available for cancellations or postponements.
Indemnity – AMC International is absolved from and indemnified against any loss or damage as a result of substitution, alteration or cancellation/postponement of an Event arising from any cause whatsoever, including, without limitation, any fortuitous event, Act of God, unforeseen occurrence or any other event that renders performance of the Event impracticable or impossible. A “fortuitous event” includes, but is not limited to, war, fire, flood, riot, industrial action, extreme weather or other emergency. Warranty of Authority – The signatory warrants that he/she has the authority to sign this Application and agrees to be personally liable to AMC International for payments falling due pursuant thereto should such warranty be breached
METHOD OF PAYMENT (PLEASE TICK)
Tel: +27 (0) 11 341 1000 Fax: +27 (0)11 325 0873 Email: [email protected] Website: www.amc-intsa.com/events
Southern Sun Hotel, Hyde Park
1st Road, Hyde Park, Johannesburg 2024 Tel: 27-11-341-8080
www.southernsun.com
9th – 13th MARCH 2015, SOUTHERN SUN HYDE PARK HOTEL, JOHANNESBURG, SOUTH
AFRICA