All our consultants are senior professional with tremendous exposure to Information Security and Governance Risk & Compliance. With over a decade of experience in training & consulting, they help bring a lot of practical and industry relevant examples with case studies to the classroom which improves the overall learning experience. Our professional hold industry acclaimed accreditation such as : Phd , M.S , CISSP, CHFI, CISA, CISM, CEH, ISO 27001 LI / LA, CCNP, CWNA , MCSE & ITIL.
infySEC IS Lab is an extreme Online Virtual Remote Lab provided to participants where they can work from any place at any point of time without restriction. ISLab provides login privilege to Certified Ethical Cracker participants where they can work in our Virtual Remote Server and start doing their Labs.
Our ISLab was created in such a concept called “Learn with Fun” where each participant will face gaming-like structured online hacking program called 'Live Hacking Zone' which contains many Levels relevant to the topics covered on the program. Each participant has to cross levels to face CEC exam, Hence CEc will only deliver equipped candidates. Participant have to cross multiple Levels starting with easy to toughest level. Each participant can track other participants activity live which helps each participants to get involved into Live Hacking Zone competition, Prepare to be SHOCKED, ENTERTAINED and EDUCATED all at the same time.
The content of infySEC syllabuses is regularly updated to ensure that it remains relevant and reflects the latest thinking in par with the scenario of current technology . However, as part of the latest review, the documents themselves have been given a fresh design.
FLOW OF CERTIFIED ETHICAL CRACKING COURSE
|1||Introduction to Ethical Cracking|
|3||Enumeration (Reconnaissance - Active)|
|5||System Hacking Methodology|
|7||Virus and Worms|
|9||Denial of Service|
|10||Session Hijacking Techniques|
|11||Servers Attacks - Web Server, File Server|
|13||SQL Injection Attacks|
|14||Wireless Networks Attacks|
|15||IDS, IPS, Firewalls and Honeypots|
|16||Cloud Computing Techniques|
|19||Vulnerability Assessment and Penetration Testing|
|20||Ethical Hacking As a Career||In detailed discussion on Information Security Industry growth and its present career opportunities|
CEC Course fee
CEC User Friendly DVDs
We provide DVDs functional in both Windows based and LINUX based environment.
It is mandatory that you get proper written permission from your organization before using our course software, tools and techniques on your company networks and systems for any sorts of testing or services you lend. If you are planning for any kind beneficiary security testing inside your organization, it is advised to intimate your network and computer operations teams in written form before you start any testing.If you are planning for any kind beneficiary security testing for your clients, it is advised to sign an Non Disclosure agreement from the respective stakeholders in written form before you start any testing.
In Depth HandBook Guide
Each page in course HandBook has been carefully designed with intense care and necessary relevant screenshots included for participant easy understanding.Also this handbook will not be available in local market or book publishing houses.
Participant will be facing CEC V2.0 Online Exam on completion of IS Lab , Live HACKING Zone.
CEC Course Certificate
You will receive a infySEC Certificate of Completion upon successful completion of our CEC training program.
What Is needed To participate during Training Period ?
Mode of registration.
1. Online Payment
2. Cash payment in training office.