5
IN ASSOCIATION WITH 9 th – 13 th MARCH 2015, SOUTHERN SUN HYDE PARK HOTEL, JOHANNESBURG, SOUTH AFRICA Accredited Training Provider By Services SETA Accreditation No: 2287 Reserve your seat today to avoid disappointment! This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. CEHv8 focuses on the latest hacking attacks targeted to mobile platform and tablet computers and covers countermeasures to secure mobile infrastructure. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 350CEHv8. COURSE DESCRIPTION The most advanced course in the world that covers cutting edge of hacking technology. EC-Council researchers go deep underground covertly to extract advanced attacks and exploits and work to analyze how hackers operate and present them to defense community. Who Should Attend? This class is a must for networking professionals, IT Managers and decision- makers that need to understand the security solutions that exist today. Companies and organizations interested in developing greater e-commerce capability need people who know information security. Tel: +27 (0) 11 341 1000, Fax: +27 (0)11 325 0873 Email: [email protected], Website: www.amc-intsa.com

Certified Ethical Hacker v8 - March 2015

Embed Size (px)

DESCRIPTION

Certified Ethical Hacker v8 - March 2015

Citation preview

Page 1: Certified Ethical Hacker v8 - March 2015

IN ASSOCIATION WITH

9th – 13th MARCH 2015, SOUTHERN SUN HYDE PARK HOTEL, JOHANNESBURG, SOUTH AFRICA

Accredited Training Provider By Services SETA

Accreditation No: 2287

Reserve your seat today to

avoid disappointment!

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack

and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical

experience with the current essential security systems. Students will begin by understanding how perimeter defenses

work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then

learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about

Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. CEHv8

focuses on the latest hacking attacks targeted to mobile platform and tablet computers and covers

countermeasures to secure mobile infrastructure. When a student leaves this intensive 5 day class they will have

hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical

Hacker exam 350CEHv8.

COURSE DESCRIPTION

The most advanced course in the world that covers cutting edge of hacking technology. EC-Council researchers go deep underground covertly to extract advanced attacks and exploits and work to analyze how hackers operate and present them to defense community.

Who Should Attend? This class is a must for networking professionals, IT Managers and decision-makers that need to understand the security solutions that exist today. Companies and organizations interested in developing greater e-commerce capability need people who know

information security.

Tel: +27 (0) 11 341 1000, Fax: +27 (0)11 325 0873

Email: [email protected], Website: www.amc-intsa.com

Page 2: Certified Ethical Hacker v8 - March 2015

9th – 13th MARCH 2015, SOUTHERN SUN HYDE PARK HOTEL, JOHANNESBURG, SOUTH AFRICA

LEGAL AGREEMENT Ethical Hacking and Countermeasures course mission is to educate, introduce and demonstrate hacking tools for penetration testing purposes only. Prior to attending this course, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system, and to indemnify EC-Council with respect to the use or misuse of these tools, regardless of intent. Not anyone can be a student — the Accredited Training Centers (ATC) will make sure the applicants work for legitimate companies.

What is ‘Hacking’?

Hacking is an act of penetrating computer systems to gain knowledge about the system and how it works. This is considered illegal since it is like breaking

into someone’s house.

Reserve your seat today to

avoid disappointment!

Why is this training important for you?

The most advanced course in the world that covers cutting edge of

hacking technology. EC-Council researchers go deep underground

covertly to extract advanced attacks and exploits and work to

analyze how hackers operate and present them to defense

community .The researches report and update advanced hacking

tools every day on the member’s portal and on

www.hackerjournals.com

The CEH class deals with real life scenario and real threats by real

life experts in the field.

Learn real life ethical hacking methodology beyond automated

vulnerability scans and simple information security tests.

Gain global recognition as being a certified member of a globally

recognized institution and attain the skills of a professional ethical

hacker/ penetration tester.

Play with real life tools that are used by the hacking underground.

The courseware is over 4,410 pages, covering 63 modules with

over 60 GB of real life underground tools that are not found in any

other training course anywhere in the world plus evaluation copies

for Core Impact and Immunity in classes and security software that

can be taken home!!!

Get your hands dirty with actual hands on labs under the guidance

of some of the best information security professionals in this space.

Unlike other classes that provide courseware that is tightly coupled

with the presentation and somewhat useless outside of that

environment, EC-Council has always sought to provide reference

material that continues to be valuable long after the course has

concluded.

EXAMINATION Certification is achieved by taking the C|EH examination (Version 8) on day five of the training. Number of Questions: 125 Passing Score: 70% Test Duration: 4 Hours Test Format: Multiple-Choice

Tel: +27 (0) 11 341 1000, Fax: +27 (0)11 325 0873

Email: [email protected], Website: www.amc-intsa.com

Accredited Training Provider By Services SETA

Accreditation No: 2287

Page 3: Certified Ethical Hacker v8 - March 2015

CERTIFIED ETHICAL HACKER

5 DAY COURSE

THE WORLD’S MOST ADVANCED ETHICAL HACKING AND PENETRATION TESTING PROGRAMME: CERTIFIED ETHICAL HACKER (CEH)

This is the world’s most advanced ethical hacking course with 26 in class modules out of a total 63 modules on everything any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization.

The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hacker exam 350CEHv8 CEH by EC-Council: Certified Ethical Hacker and Penetration Testing To beat a hacker, you need to think like one! This is exactly what this class will teach you. It is the pinnacle of the most desired information security training program any information security professional will ever want to be in.

The definition of an Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods as a Hacker. Hacking is a felony in the United States and most other countries. When it is done by request and under a contract between an Ethical Hacker and an organization, it is legal. The most important point is that an Ethical Hacker has authorization to probe the target. This class will immerse the students into a hands-on environment where they will be shown how to conduct ethical hacking. They will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! They will scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own

networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, Virus Creation and others. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking

Group Discount Available!

This class immerses students in hands-on ethical hacking. You will be exposed to achieving optimal information security in your organization by

infiltrating systems and understanding deficiencies as seen from the other side.

Accredited Training Provider By Services SETA

Accreditation No: 2287

9th – 13th MARCH 2015, SOUTHERN SUN HYDE PARK HOTEL, JOHANNESBURG, SOUTH AFRICA

Page 4: Certified Ethical Hacker v8 - March 2015

COURSE STRUCTURE

Some of the hacking concepts you will learn to master during this hands on hacking course

01. The Need for Security Analysis

02. Advanced Googling

03. TCP/IP Packet Analysis

04. Advanced Sniffing Techniques

05. Vulnerability Analysis with Nessus

06. Advanced Wireless Testing

07. Designing a DMZ

08. Snort Analysis

09. Log Analysis

10. Advanced Exploits and Tools

11. Pen Testing Methodologies

12. Customers and Legal Agreements

13. Rules of Engagement

14. Penetration Testing Planning and Scheduling

15. Pre Penetration Testing Checklist

16. Information Gathering

17. Vulnerability Analysis

18. External Penetration Testing

19. Internal Network Penetration Testing

20. Routers and Switches Penetration Testing

21. Firewall Penetration Testing

26. Social Engineering Penetration Testing

27. Stolen Laptop, PDAs and Cell phones Penetration

Testing

28. Application Penetration Testing

29. Physical Security Penetration Testing

30. Database Penetration testing

31. VoIP Penetration Testing

32. VPN Penetration Testing

33. War Dialing

34. Virus and Trojan Detection

35. Log Management Penetration Testing

36. File Integrity Checking

37. Blue Tooth and Hand held Device Penetration

Testing

38. Telecommunication and Broadband Communication

Penetration Testing

39. Email Security Penetration Testing

40. Security Patches Penetration Testing

41. Data Leakage Penetration Testing

42. Penetration Testing Deliverables and Conclusion

43. Penetration Testing Report and Documentation

Writing

44.Penetration Testing Report Analysis

46. Ethics of a Licensed Penetration Tester

47. Standards and Compliance

Registration Form Thank you for your interest in the course. To register, please provide the following information

THE CEH PROGRAM : ETHICAL HACKING AND COUNTERMEASURERS The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will

fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.

9th – 13th MARCH 2015, SOUTHERN SUN HYDE PARK HOTEL, JOHANNESBURG, SOUTH

AFRICA

Page 5: Certified Ethical Hacker v8 - March 2015

IN ASSOCIATION WITH

DELEGATE(S) INFORMATION

1. Dr. /Mr. /Mrs. /Miss: Email:

Department: Mobile:

Position:

2. Dr. /Mr. /Mrs. /Miss: Email:

Department: Mobile:

Position:

3. Dr. /Mr. /Mrs. /Miss: Email:

Department: Mobile:

Position:

4. Dr. /Mr. /Mrs. /Miss: Email:

Department: Mobile:

Position:

REGISTER ME / US FOR THE FOLLOWING (PLEASE TICK)

5 Day Course = R28,980.00 excluding VAT (This includes examination fees as well as EC Council CEH certification)

AUTHORIZATION – THIS BOOKING IS INVALID WITHOUT A SIGNATURE

Signatory must be authorized to sign on behalf of contracting organization

Name:

Organization:

VAT No.

Telephone: Facsimile:

Physical Address: Code:

Signature:

Bank Transfer: Standard Bank, Branch – Hyde Park, Code – 00660534, Account No. 022307893, Swift Code – SBZAZAJJ.

Credit Card MasterCard VISA Diners Club AMEX

Card No.: Expiry Date: /

Cardholder’s Name: Signature:

ID Number: CV No.

Authorization Code: Date:

TERMS AND CONDITIONS Accepted applications to attend the AMC International conference or training course (“Event”) are in every case subject to these terms and conditions: Payment Terms – Payment is due in full upon completion and return of the registration form. Due to limited conference space we advise early registration and payment by credit card to avoid disappointment. AMC International reserves the right to admit or refuse admission to delegates who have not shown proof of payment of conference fees or not agreed to sign an indemnity form. Speakers - Views of Speakers at any Conference or Training Course – are their own and do not necessarily reflect the views of AMC International, its employees, agents or contractors. Delegate Substitutions – Provided the fee has been paid in full, within the time frame as per our terms and conditions, substitutions at no extra charge can be made up to 10 working days, before the start of the Event. (Send notification for any such changes in writing for the attention of the Customer Services Manager at [email protected]). Delegate Cancellations – must be received by AMC International in writing and must be addressed to the Customer Services Manager at [email protected],

Cancellations received 10 working days before Event start-date, entitle the cancelling delegate to a full credit of amounts (credit to attend future event – not refund monies) paid to date of cancellation which may only be redeemed against the cost of any future AMC International Event, within one year from date of such cancellation;

Any cancellations received less than 10 working days before the Event start-date, do not entitle the cancelling delegate to any refund or credit note and the full fee must be paid;

Non attendance without written cancellation to the Customer Services Manager, is treated as a cancellation with no entitlement to any refund or credit.

Speaker Changes – Occasionally it is necessary for reasons beyond our control to alter the content and timing of the program or the identity of the speakers.

If AMC International cancels an Event, delegate payments at the date of cancellation will be credited to a AMC International Event (such credit is available for up to one year from the date of cancellation). If AMC International postpones an Event, delegate payments at the postponement date will be credited towards the rescheduled Event. If the delegate is unable to attend the rescheduled Event, the delegate will receive a full credit of amounts paid up to the date of postponement which may only be redeemed against the cost of any future AMC International Event (and such credit will be available for one year from the date of postponement). No cash refunds whatsoever are available for cancellations or postponements.

Indemnity – AMC International is absolved from and indemnified against any loss or damage as a result of substitution, alteration or cancellation/postponement of an Event arising from any cause whatsoever, including, without limitation, any fortuitous event, Act of God, unforeseen occurrence or any other event that renders performance of the Event impracticable or impossible. A “fortuitous event” includes, but is not limited to, war, fire, flood, riot, industrial action, extreme weather or other emergency. Warranty of Authority – The signatory warrants that he/she has the authority to sign this Application and agrees to be personally liable to AMC International for payments falling due pursuant thereto should such warranty be breached

METHOD OF PAYMENT (PLEASE TICK)

Tel: +27 (0) 11 341 1000 Fax: +27 (0)11 325 0873 Email: [email protected] Website: www.amc-intsa.com/events

Southern Sun Hotel, Hyde Park

1st Road, Hyde Park, Johannesburg 2024 Tel: 27-11-341-8080

www.southernsun.com

9th – 13th MARCH 2015, SOUTHERN SUN HYDE PARK HOTEL, JOHANNESBURG, SOUTH

AFRICA