Certified Ethical Hacker Version 7 - MIEL eSecurity Pvt. Ltd.
Certified Ethical Hacker Version 7 - MIEL eSecurity Pvt. Ltd.
Certified Ethical Hacker Version 7 - MIEL eSecurity Pvt. Ltd.
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Dear All,<br />
<strong>MIEL</strong> ACADEMY PROUDLY ANNOUNCES THE EXCLUSIVE LAUNCH<br />
OF EC-COUNCIL’S CEH v7.0 IN INDIA.<br />
<strong>Certified</strong> <strong>Ethical</strong> <strong>Hacker</strong> <strong>Version</strong> 7<br />
Dear Sir / Madam,<br />
Greetings from <strong>MIEL</strong>!<br />
<strong>MIEL</strong> e‐Security <strong>Pvt</strong>. <strong>Ltd</strong>. pleased to announce the first batch for <strong>Certified</strong> <strong>Ethical</strong> <strong>Hacker</strong> <strong>Version</strong> 7.<br />
COURSE DESCRIPTION<br />
REVOLUTIONARY PRODUCT<br />
The new version is a breakaway from earlier releases with more<br />
emphasis on techniques and methodologies, which attackers may<br />
use to carry out possible attacks against system/ networks.<br />
CEHv7 provides a comprehensive ethical hacking and network<br />
security‐training program to meet the standards of highly skilled<br />
security professionals. Hundreds of SMEs and authors have<br />
contributed towards the content presented in the CEHv7<br />
courseware. Latest tools and exploits uncovered from the<br />
underground community are featured in the new package.<br />
<strong>MIEL</strong> is pleased to offer a comprehensive 5 day <strong>Certified</strong> <strong>Ethical</strong> <strong>Hacker</strong> <strong>Version</strong> 7 (CEH) training program.<br />
Course includes how to scan, test, hack and secure own systems. The lab intensive environment gives indepth<br />
knowledge and practical experience with the current essential security systems. Begin by<br />
understanding how perimeter defenses work and then be lead into scanning and attacking own networks,<br />
no real network is harmed. Later learn how intruders escalate privileges and what steps can be taken to<br />
secure a system. Also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks,<br />
Buffer Overflows and Virus Creation.<br />
This course prepares you for EC‐Council <strong>Certified</strong> <strong>Ethical</strong> <strong>Hacker</strong> exam 312‐50.<br />
KEY FEATURES OF CEH v7<br />
• Well organized DVD‐ROM content; a repository of approximately 20GB of latest hacking and security<br />
tools and more than 1000 minutes of videos demonstrating hacking techniques.<br />
• Well organized content for a better understanding and learning experience.
• Concepts are well‐illustrated to create self‐explanatory slides.<br />
• Diagrammatic representation of concepts and attacks.<br />
• Industry standard key tools are featured in detail.<br />
• Exclusive section for countermeasures against different attacks with detailed explanation of how to<br />
implement these countermeasures in real time environment.<br />
• The new version has complete section dedicated for penetration testing. It illustrates how to<br />
implement learned concepts to test network system security.<br />
• A result oriented, descriptive and analytical lab manual; the labs showcased in the courseware are<br />
tested against latest Operating Systems with all the patches and hot fixes applied.<br />
WHO SHOULD ATTEND?<br />
This course will significantly benefit security officers, auditors, security professionals, site administrators,<br />
and anyone who is concerned about the integrity of the network infrastructure.<br />
COURSE OUTLINE v7<br />
1. Introduction to <strong>Ethical</strong> Hacking<br />
2. Footprinting and Reconnaissance<br />
3. Scanning Networks<br />
4. Enumeration<br />
5. System Hacking<br />
6. Trojans and Backdoors<br />
7. Viruses and Worms<br />
8. Sniffers<br />
9. Social Engineering<br />
10. Denial of Service<br />
11. Session Hijacking<br />
12. Hacking Webservers<br />
13. Hacking Web Applications<br />
14. SQL Injection<br />
15. Hacking Wireless Networks<br />
16. Evading IDS, Firewalls and Honeypots<br />
17. Buffer Overflows<br />
18. Cryptography<br />
19. Penetration Testing<br />
TRAINING DETAILS<br />
Duration:<br />
Batch Size:<br />
Course Reschedule<br />
Policy:<br />
Course Fees Refund<br />
Policy:<br />
Lead Instructor:<br />
5 Days<br />
20 Participants<br />
<strong>MIEL</strong> will strive to conduct the course as planned, but reserves all the rights to reschedule or<br />
cancel the course without assigning any reason.<br />
Full refund shall be given only if request for cancellation is received 7 working days prior to<br />
the commencement of the course. These rules are subject to change without notice.<br />
<strong>MIEL</strong> accredited instructor
You may confirm your participation by completing the Registration Form attached<br />
herewith and send it to the address mentioned on the form along with the payment. All<br />
Cheques or Demand Drafts to be drawn in favor of “<strong>MIEL</strong> e‐Security <strong>Pvt</strong>. <strong>Ltd</strong> ‐ Training”,<br />
payable at Mumbai.<br />
As seats are limited, we recommend that you register at the earliest.<br />
For Queries, please contact Ms. Pushpa Redkar at 022 30096956 /+91 9892149409 or<br />
email isti@mielesecurity.com or predkar@mielesecurity.com.<br />
Looking forward to your participation & awaiting your kind response.<br />
About <strong>MIEL</strong> e‐Security <strong>Pvt</strong>. <strong>Ltd</strong>.<br />
<strong>MIEL</strong> e‐Security <strong>Pvt</strong>. <strong>Ltd</strong>. is an ISO 27001:2005 certified company, headquartered in<br />
Mumbai, with offices across India and with a fully‐owned European subsidiary in the UK.<br />
<strong>MIEL</strong> offers its clients in over 15 countries across 4 continents, the benefit of Global reach<br />
with Local presence and is among the largest pure‐play Information Security Consulting<br />
Companies in India.<br />
<strong>MIEL</strong> has an impressive track record of providing services and solutions to some of the<br />
leading names in Banking and Finance, Insurance, Manufacturing, IT and IT Enabled<br />
Services, Healthcare, Shipping, Logistics and Government.<br />
One of the key components of <strong>MIEL</strong>'s services has been the high quality information<br />
security training programs, carried out through its Information Security Training Division.<br />
<strong>MIEL</strong> has, over the years, designed and delivered a very large number of public<br />
certification seminars and in‐house training programs covering a large number of<br />
individuals and companies across various verticals. In this, <strong>MIEL</strong> has partnerships with the<br />
leading Information Security organizations in the world. <strong>MIEL</strong>'s Training Clientele<br />
comprises of information security professionals spanning across 1000+ global<br />
organizations<br />
www.mielesecurity.com<br />
| Consulting | Technical Services | Managed Security Services | Training |<br />
| Products & Solutions | R&D ‐ <strong>MIEL</strong> Labs |<br />
MUMBAI | BANGALORE | PUNE | AHMEDABAD | LONDON<br />
<strong>MIEL</strong> Training Centre, AML Centre 1, 4th Floor, 8 Mahal Industrial Estate,<br />
Off Mahakali Caves Road, Andheri (E), Mumbai – 93.<br />
Tel # : +91 (22) 30096969/70/71 | FAX : +91 (22) 26878062 |<br />
Email : Corporate at isti@mielesecurity.com<br />
www.mielesecurity.com<br />
Remove from List:<br />
We do not send or support spam. You are receiving this information because you have been exclusively selected.<br />
However, If you do not wish to receive any email from us in future or to unsubscribe you must reply to this mail with<br />
"Remove from List" in the subject line and e‐mail for faster response and action.