10
Certified Information Security and Ethical Hacker CYBER THREAT IS...One Of The Most Dangerous Threats Surpassing Terrorism To The World. Develop Your Knowledge Base By Getting The Right Training With Respect To Security Fundamentals. www.pristineinfosolutions.com CISEH

Certified Information Security and Ethical Hacker - … Course Content.pdf · Information Security and Ethical Hacker ... The Certified Information Security and Ethical Hacker exam

Embed Size (px)

Citation preview

Page 1: Certified Information Security and Ethical Hacker - … Course Content.pdf · Information Security and Ethical Hacker ... The Certified Information Security and Ethical Hacker exam

Certified Information Security and Ethical Hacker

CYBER THREAT IS...One Of The Most Dangerous Threats Surpassing Terrorism To The World.Develop Your Knowledge Base By Getting The Right Training With Respect To Security Fundamentals.

www.pristineinfosolutions.com

CISEH

Page 2: Certified Information Security and Ethical Hacker - … Course Content.pdf · Information Security and Ethical Hacker ... The Certified Information Security and Ethical Hacker exam

About Us

Pristine InfoSolutions is one of the leading cyber security services andinformation security training provider headquartered in Mumbai,having branches all over India.

Pristine InfoSolutions Career Development and Training Department is one of the most trusted and by far the largest source for information security training and ethical hacking courses in India.Over the years we have trained many engineers, professionals and corporates in different cities across the country and produced highly skilled pool of IT professionals to counter global industry challenges in the field of Information Security.

The company is inspired by the guiding principle and vision of educating one and all about the nuances of cyber crime and the risks involved. We deliver trainings, workshops, seminars and services on 'Cyber Security', 'Computer Forensics' and also provides 'Cyber Investigation Support' on request basis.

The company's research development programs and training helps youth to achieve real-world skills to compete better in today's scenario.We have a diverse client base and our ability to tailor our services to the needs of publ ic , pr iva te , government and international clients is fundamental to our approach. We have served many reputed organizations like Indian Railways, HCL, Accenture, Wipro, Capgemini, Trend Micro, etc.

http://siliconindian.com/si_freemag/india-edition_sep_14_issue1.pdf(51st page in pdf, Page no. 100 in hard copy).

Currently the Company offers: A) Cyber support services: 1) Cyber crime investigation and computer forensics 2) Penetration & Vulnerability testing 3) Cyber detectives

B) Training services: 4) Corporate training 5) UG/PG students training 6) School students training

Apart from this the Company also encompasses:1. Pristine training centre (for professionals and students).2. Pristine summer camp in cyber security and computer forensic (for school & Jr. college students). 3. Pristine Digital Lab (Lab for computer forensic).4. Pristine Customized Solutions (Research & Development).5. Pristine Distance learning (Correspondence course).

Work Domains

P ristine InfoSolutions has been awarded as the India's top cyber securitycompany of the year 2014 by SiliconIndia.Also got featured in Silicon India Magazine:

Achievements

1st

500+

20000+

150+

India's top cyber securitycompany of the year 2014.

Corporate and educationalclients.

Students trained includingcorporate & college workshops

Website’s been patched,made hack proof.

CISEHCISEH

1 2www.pristineinfosolutions.com www.pristineinfosolutions.com

Pristine InfoSolutions has been featured in various print media and TV news channels to impart expertise on the

issues of Cyber Security. Recently, Pristine InfoSolutions was interviewed by NDTV on the issue of Xiaomi smartphone data compromise. Show recording available on: https://www.youtube.com/watch?v=xvlKnOFEfXU

Page 3: Certified Information Security and Ethical Hacker - … Course Content.pdf · Information Security and Ethical Hacker ... The Certified Information Security and Ethical Hacker exam

CISEHCertified InformationSecurity and Ethical Hacker

CISEH is a comprehensive Ethical Hacking and Information Security training program focusing on latest security threats, advanced attacks and practical real time demonstration of the latest Hacking Techniques, methodologies, tools, tricks, and security measures required to meet the standards of highly skilled security professionals.

This is the most advanced Ethical Hacking and Information Security certification course offered by Pristine InfoSolutions and is a highly technical training module which covers all aspects of defense as well as attacks in the Cyber World. CISEH focuses on the latest hacking attacks and covers countermeasures to secure IT infrastructure.

The course content of CISEH meets the rigorous requirements of several government and industry standards for infosec education and training. Unlike others, this training will immerse students in interactive sessions with hands-on hacking and securing the cyber space so that they can gain experience in Ethical Hacking and Information Security.

Why CISEH Certification ?

With increasing use of the internet and concerns about its security, especially when it comes to things like consumer information or private details, there is considerable need for computer experts to work in ethical hacking field.

Organizations today recognize the strong need for information security; hence an ethical hacker or security expert is usually employed by companies to penetrate into networks and/or computer systems, using the same methods as a hacker, for the purpose of finding and fixing network and computer security vulnerabilities.

Whether you are a Fresher or an Experienced Professional , CISEH will distinguish yourself from the crowd to become most in-demand IT Security Professional.

How CISEH course beats other competitor’s offerings ?

Advanced hacking technologies

Complete hands-on hacking and countermeasures

Security auditing techniques and standard practices

Utilities from underground hacking communities

24x7 lab availability to practice hacking concepts

Live cyber crime investigation projects

Cyber Law Acts and pratices

A premier international certification of CISEH

Updated courseware and latest tools and techniques

Unlike the other programs, CISEH is the only comprehensive training program available in market that covers all major attack paths plaguing modern information system security to help you understand the correlation among various threats.

Competitor’sCISEHCISEH Features

CISEH program provides you an industry standard that helps establish your career as an information security expert.

COURSE DESCRIPTION

CISEHCISEH

3 4www.pristineinfosolutions.com www.pristineinfosolutions.com

Page 4: Certified Information Security and Ethical Hacker - … Course Content.pdf · Information Security and Ethical Hacker ... The Certified Information Security and Ethical Hacker exam

2014

2013

2012

2011

2010

2009

2014

2013

2012

2011

2010

2009

0

0

10

10

20

20

30

30

40

40

50

50

60

60

70

70

80

80

90

90

100

100

Cyber Attacks vs Demand for IT Security

COURSE SPECIFICATIONS

IT Security Professionals vs IT Professionals Jobs

IT Security Jobs

Cyber Attacks

IT Professionals Jobs

IT Security demand in the Market

Ethical Hacker Salary (India)

So

urc

e:

ww

w.p

aysc

ale

.co

m

The average salary for an Ethical Hacker is Rs 344,964 per year.

Information Security Industryin the Indian Market

The information security industry is going at a current worldwide growth rate of 21%. Frost & Sullivan have estimated that there are 2.28 million information security professionals worldwide which is expected to increase to nearly 4.2 million by 2015. The need for information security for security compliance in India is mandatory for all companies with an IT backbone. The requirement for such personnel is especially high with organisations in the IT/ITES space.

CerticationThe Certified Information Security and Ethical Hacker exam will be conducted after completion of the training which will assess and evaluate practical skills of a student. This CISEH certification will provide testament of your practical hacking skills in a real world environment. Students need to pass the online exam to receive CISEH certification.

This Information Security and Ethical Hacking Training is targeted towards those who are looking to build career in IT Security, IT Security Officers, IT Auditors, Network Security Administrator, System Administrator and anyone who is concerned about the integrity of the Network Infrastructure.

Duration 50 Hours

BatchesRegular /Weekends

Fees 14000 /-`Includes- Service Tax, Training, Online Examination, Study Material and Toolkit.

CISEHCISEH

5 6www.pristineinfosolutions.com www.pristineinfosolutions.com

Unlike others, CISEH is a program which ensures that each candidate is e x p o s e d t o t h e b e s t practices in the domain of ethical hacking and is aware of the compliance r e q u i r e m e n t s o f t h e industry.

Page 5: Certified Information Security and Ethical Hacker - … Course Content.pdf · Information Security and Ethical Hacker ... The Certified Information Security and Ethical Hacker exam

75%

Ÿ Key issues plaguing the information security world, incident management process, and penetration testing.

Ÿ Various types of footprinting, footprinting tools, and countermeasures.

Ÿ Network scanning techniques and scanning countermeasures.

Ÿ Enumeration techniques and enumeration countermeasures.

Ÿ System hacking methodology, steganography, steganalysis attacks, and covering tracks.

Ÿ Different types of Trojans, Trojan analysis, and Trojan countermeasures.

Ÿ Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures.

Ÿ Packet sniffing techniques and how to defend against sniffing.

Ÿ Social Engineering techniques, identify theft, and social engineering countermeasures.

Ÿ DoS/DDoS attack techniques, botnets, DDoS attack tools, DoS/DDoS countermeasures.

Ÿ Hacking into Websites and portals.

Ÿ Different types of webserver attacks, attack methodology, and countermeasures.

Ÿ Different types of web application attacks, web application hacking methodology, and countermeasures.

Ÿ SQL injection attacks and injection detection tools.

Ÿ Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi-fi security tools.

Ÿ Mobile applications vulnerability and spying tricks.

Ÿ Various types of buffer overflows, how to mutate a buffer overflow exploit, buffer overflow detection tools, and countermeasures.

Ÿ Cyber Crime Investigation Process and procedure.

Ÿ Earning money online through internet.

Ÿ Working of web and domain industry.

Ÿ Indian Cyber Law and IT Act, 2000.

What will you learn ?

CISEH, the most sought-after informationsecurity certification is designed to reinforcethe skills of the new generation of cyber sleuths.

75%

25%

Distinguish Yourself fromother IT Professionals andstand out in a crowd. Be a CISEH.Theory Practicals

CISEHCISEH

7 8www.pristineinfosolutions.com www.pristineinfosolutions.com

Page 6: Certified Information Security and Ethical Hacker - … Course Content.pdf · Information Security and Ethical Hacker ... The Certified Information Security and Ethical Hacker exam

COURSE CONTENT

Duration: 50 hours

Computer Security - Basics:Ÿ IntroductionŸ Hacker & CrackerŸ Attacker & VictimŸ Types of SecurityŸ File Securing TechniquesŸ ASCII Code - making a folder invisible

Network Security:Ÿ IANA, Allotment of IP AddressŸ IPv4 & Ipv6Ÿ IP Address – Basic, DetectingŸ Ping & Ping SweepŸ Tools (Ping Sweeping)Ÿ Nmap, SuperScanŸ Foot-Printing TechniquesŸ Trace RouterŸ Detecting Victim's OSŸ Detecting FirewallŸ Countermeasures

Domain Name and DNS:Ÿ ICANNŸ Registrar, Registry, RegistrantŸ Top Level DomainsŸ Lifecycle of gTLDŸ Whois infoŸ Domain and Hosting PanelsŸ Counterfeit / Gibberish domain

reportingŸ DNS Delegation

Email Security:Ÿ Email ThreatsŸ Hacking Mailing Clients (Outlook &

Thunderbird)Ÿ Mail PassViewŸ Email Forging (Sending Fake mails)Ÿ SpammingŸ B3y0nd e-bomberŸ Email HeadersŸ 419 scamŸ SpamhausŸ Mx ToolboxŸ Finding details of recipientŸ Countermeasures

Chatting Messenger:Ÿ IntroductionŸ Instant Messenger threatsŸ Hacking using Google Hangout &

Yahoo MessengerŸ Stealing recipients IP AddressŸ Case studyŸ CountermeasuresŸ

Port Scanning:Ÿ Type of PortsŸ Virtual Port numbersŸ Detecting Open PortsŸ Tools to carry out Port ScanningŸ Anti-Port scanning toolsŸ Curr-Port ManagerŸ Countermeasures

Intellectual Property Theft:Ÿ IntroductionŸ Types of MalwareŸ Trojan attack & countermeasureŸ Case studyŸ Keylogger working & countermeasureŸ Testing FUDŸ NSA Prism Monitoring System studyŸ Steganography and SteganalysisŸ Using S-Tools & Camouflage

Identity Attacks:Ÿ IntroductionŸ Staying AnonymousŸ Proxy ServersŸ Proxy BouncingŸ IP ProxyŸ Top level AnonymityŸ Tor browser

Password Cracking & Prevention:Ÿ IntroductionŸ Password Cracking TechniquesŸ Dictionary Based AttackŸ Brute force AttackŸ Cracking Word file, PDF, zip & rar

passwordsŸ Cracking Facebook and Gmail

passwordsŸ Countermeasures for usersŸ Countermeasures for System

Administrators

Mobile Phone & online Apps Hacking:

Ÿ Hacking chatting apps (WeChat & Whatsapp)

Ÿ Hacking online database portals (YellowPages & JustDial)

Ÿ Spying through cell phoneŸ Call SpoofingŸ SMS Spamming

Other types of Attack:Ÿ Input Validation AttackŸ Buffer Overflow AttackŸ Batch file scriptingŸ DOS & DDOS AttacksŸ HoneyPots, 0dayŸ Social Engineering Attacks

Website Hacking:Ÿ Hacking & finding Loop holes using

GoogleŸ Finding Control panel of WebsitesŸ Breaking CpanelŸ Defacing WebsiteŸ Database Hacking, SQL Injection

AttackŸ Web Jacking

CISEHCISEH

9 10www.pristineinfosolutions.com www.pristineinfosolutions.com

Page 7: Certified Information Security and Ethical Hacker - … Course Content.pdf · Information Security and Ethical Hacker ... The Certified Information Security and Ethical Hacker exam

Advance Hacking:Ÿ Opening blocked websiteŸ Phishing TechniqueŸ Social networking account hacking

(Facebook)Ÿ Google DorksŸ Finding vulnerabilities on websitesŸ Bank Account hacking / illegal Money

TransferŸ PhishtTankŸ Recording activities on computerŸ Making own Virus

Internet Abuse Complaint & Reporting:

Ÿ 419 scamŸ Spamming email IDŸ Spamvertised domainŸ Base64Ÿ Phishing websitesŸ Malware websitesŸ Inappropriate content on websiteŸ Whois inaccuracyŸ Privacy Protected domainsŸ Cyber StalkingŸ Fake profilesŸ Child PornographyŸ Credit Card Frauds

Cyber Law and Consulting:Ÿ What is Cyber LawŸ Cyber SpaceŸ Problems in Cyber LawŸ Types of CrimesŸ IT Act, 2000Ÿ CERT-IND & AOŸ Trademark & Copyright InfringementŸ Central Acts & State Acts

Earning Money Online:Ÿ Blogs & WebsitesŸ Adsense & AdwordsŸ SEO & traffic generatorsŸ Alexa & Google PR improvementŸ Affiliate Marketing

Ethical Hacking as a CareerLearning from experiences of others and their own, today, many organizations are recruiting ethical hackers into their IT teams to protect network security. Others are hiring ethical hacking companies to conduct audits and suggest xes.

Defence organizations, Forensic laboratories, Detective companies, Investigation services and Law enforcement agencies offer roles that challenge the expertise of ethical hackers, from time to time. Those with a taste for adventure and prociency in infomartion secutity and vulnerability assessment can venture into this domain.

Job OpportunitiesWith internet use mounting worldwide and cyber crimes increased as well, ethical hackers have become an integral workforce of any IT security industry today. However, currently there is a huge gap between the demand and supply as far as ethical hackers are concerned. Hence, scope for a fresher is lucrative not only in India but globally.IT rms are the main recruiters of ethical hackers. However, it is not limited only to IT companies but such experts are also required by nancial service providers, airlines, retail chains, hotels and several government agencies.

Job Prole

Internet Security and Networking are the two fastest-growing industries where ethical hackers can nd employment in ethical hacking and information security.

The kinds of jobs available are that of Network Security Systems Manager, Network Security Administrator, Systems/Applications, Security Executive, Web Security Administrator, Web Security Manager etc.

CISEHCISEH

11 12www.pristineinfosolutions.com www.pristineinfosolutions.com

Page 8: Certified Information Security and Ethical Hacker - … Course Content.pdf · Information Security and Ethical Hacker ... The Certified Information Security and Ethical Hacker exam

www.rizwanonline.com

He is the Founder, CTO and principal consultant of Pristine InfoSolutions and is responsible for setting company’s strategic direction and overseeing the business operations.

With an aim to secure the Cyber World from unethical Hackers, Rizwan has been imparting practical knowledge of Ethical

RSecurity Researcher and Cyber Crime Consultant actively involved in providing Ethical Hacking and Information Securitytraining and services.

izwan Shaikh is one of the India'srenowned Ethical Hacker, Information

About Trainer Testimonials

“CISEH has excellent topics with good explanation. Overall excellent teaching method. Trainer's knowledge & teaching style is excellent.” -Rizvi Sayed IT Security Dept UAE govt.

“ Excellent course, the certification boosted my career and an helped me in a better work profile. I learned lot of new things which will definitely build my future career.” -Tushar Khanvilkar Network Security Engineer HCL Comnet Ltd.

“The course has given me comprehensive knowledge of cyber security and I learnt many hacking techniques.”- -Mayur Mathkar Software Developer Tata Consultancy Services.

“One of the best training on Information Security conducted for our employees. Accept our sincere appreciation for the outstanding security training you gave to our company.” -Divyanshu Gahriya Chairman DiGa TechnoArts Pvt. Ltd.

“Awesome course. A must course for everyone in terms of Internet Security. It is helpful to all, not only for IT Professional.” -Sachin Hankare Risk/Fraud Management Ex. Paymate India Pvt. Ltd.

“Nice to meet Rizwan sir, he is inspiration for knowledge sharing & creating awareness about security of virtual world.” -Subhash Konda Senior Software Engineer Ness Technology Pvt. Ltd.

Hacking, Information Security and Cyber Forensics to the budding technical workforce of the country. Rizwan has delivered numerous workshops, seminars, talks and conferences at various colleges, institutions and has been assisting corporates in creating awareness about Information Security and Cyber Crimes.

Rizwan Shaikh is regularly invited by Engineering Colleges, Organizations, Corporates and Government agencies to speak and distribute knowledge about Cyber Security.

CISEHCISEH

13 14www.pristineinfosolutions.com www.pristineinfosolutions.com

Page 9: Certified Information Security and Ethical Hacker - … Course Content.pdf · Information Security and Ethical Hacker ... The Certified Information Security and Ethical Hacker exam

We have a diverse client base and our ability to tailor our services to the needs of public, private, government and international clients are fundamental to our approach.

We have delivered numerous training sessions, workshops, seminars and conferences at various colleges, institutions and have being regularly invited by Engineering Colleges, Organizations, Corporates and Government agencies to speak and distribute knowledge about Cyber Security.A glimpse of training sessions, workshops and seminars delivered by us includes:

Thakur College of Engineering and Technology, Mumbai

VESIT, Mumbai

Thadomal ShahaniEngineering College, Mumbai

BIGCE, Solapur

St. Paul Institute of Professional Studies, Indore

VACOE, Ahmednagar

Atharva College of Engineering, Mumbai

Saraswati Engineering College, Mumbai

Terna Engineering College, Mumbai

LAIT, Badlapur

SIES Graduate School of Technology, Mumbai

College of Engineering, Munnar

SVKM's NMIMS, Shirpur

Tatva Engineering college, Ahmedabad

Guru Tegh Bahadur Institute of Technology, Delhi

RJ College, Mumbai

Engineering Colleges

Other Institutions

Directors, CEO’s, Management, Auditors.

35%

73%

65%

27%

CISEH TRAINED CISEH TRAINED

IT Professionals, IT Managers, IT Administrators,

Network Administrators, Security Officers.

Viva School of MCA, Mumbai

DRIEMS, Karjat

UV College, Ganpat University, Gujarat

and many more...

Our Clients | Meet our prestigious clients

CISEHCISEH

15 16www.pristineinfosolutions.com www.pristineinfosolutions.com

SNG College, Mumbai

Page 10: Certified Information Security and Ethical Hacker - … Course Content.pdf · Information Security and Ethical Hacker ... The Certified Information Security and Ethical Hacker exam

17 17www.pristineinfosolutions.com www.pristineinfosolutions.com

CISEH CISEH

Corporate Ofce (Mumbai)Pristine InfoSolutions F-87, Dreams The Mall, LBS Marg,Bhandup (West), Mumbai - 400078, India.

Tel: 022 - 21663052Direct: +91 - 9022912236

E-mail: [email protected]

Branch Ofce (BKC)Pristine InfoSolutionsOfce no. 308, Bldg no. 11, Motilal Nehru Nagar,Beside Trade Center,Bandra Kurla Complex,Bandra (East), Mumbai - 400 051, India.

Tel: 022 - 26549992Direct: +91 - 8655063331

E-mail: [email protected]

Ahmedabad OfcePristine InfoSolutions LL 25-34, Rudra Square, Near Gormoh Rest,Judges Bunglow Cross Road, Bodakdev,Ahmedabad, Gujarat - 380054, India.

Direct: +91 - 9033023344

E-mail: [email protected]

Indore OfcePristine InfoSolutions205-206 Shree Classic Arch,Anand Bazar Main Road, Old Palasia,Indore - 452001, Madhya Pradesh, India.

Tel: 0731 - 4230679

E-mail: [email protected]

Canada OfcePristine InfoSolutions 1970 Keele Street, Toronto, M6m3y1,Canada.

Direct: +1 6478767867

E-mail: [email protected]

Branch Ofce (Kalyan)Pristine InfoSolutionsOfce no.1, 2nd Floor, Sarvoday Mall,Opp. Phool Market, Kalyan (West) - 421301,Thane, Maharashtra, India.

Direct: +91 - 9029220345

E-mail: [email protected]