securium890

About This Presentation
Title:

securium890

Description:

If you are thinking about having a career in the domain of cybersecurity then you should enroll in our Ethical Hacking Course that will help you to become an expert in the industry. – PowerPoint PPT presentation

Number of Views:4
Slides: 15
Provided by: securium890

less

Transcript and Presenter's Notes

Title: securium890


1
CERTIFIED ETHICAL HACKER
EC Councils CEH Online Course is one of the most
prominent courses in the cyber security domain.
This certification is from EC Council which is
acknowledged all around the world. So, if you
are thinking of entering the world of the cyber
security domain and pass out their CEHv11 Course
then we, at Securium Solutions have covered
everything for you. It helps you get a good
knowledge of hacking tools, practices, and
techniques followed by hackers.
2
Table of Contents
Course Highlights Course Description Exam
Information Training Objectives Course Content
About Us Contact Us
support_at_securiumsolutions.org
www.securiumsolutions.org
3
Course Highlights
Hand Made Session Notes from the Trainer
Training Cum Internship Offer after a Mock Test.
Exclusive Dedicated Trainer Support. 6 Months of
Free Access to labs for Practice. 5 Various Sets
of Mock Tests to Clear CEHv11 Course Exam.
Industry Insights Indulged Exclusive Approach
(IIIEA) Course designed for both professional s
and beginners The course has been created as per
the latest updates and versions. Course
Description When it comes to the CEHv11 Course,
it will help you get in-depth know-how of ethical
hacking phases, countermeasures, and different
attack vectors, and more. It will help you learn
more about the process followed by hackers and
act accordingly to protect any kind of security
compromise. You will learn how to defend
yourself from attacks that can cause system
vulnerabilities and weaknesses. The CEH v11
Online Training will help you keep your
organization safe and also strengthen security to
reduce any kind of attack and threats. If you
are looking to pursue a CEH Online Course at your
convenience then you can consider Securium
Solutions. We will cover all the aspects to help
you learn how you will be able to create a
systematic process that takes care of all the
ethical hacking domains and procedures. CEH
Online Course will help you avail an opportunity
to learn the skills to accomplish CEHv11
credential and execute the work of ethical
hackers. A few of the benefits of the CEHv11
course are given below
support_at_securiumsolutions.org
www.securiumsolutions.org
4
Enhance Your Career With the assistance of the
respective course, you get to have a great career
in the field of Information security. So, if you
have an interest in the security domain, opt for
CEH v11 certification. IT Security Pursuing EC
Councils CEH v11 certification help you boost
your IT career by enhancing your IT security
understanding. It helps you gain proper knowledge
of different techniques followed by
hackers Better Package After your complete your
CEH v11 certification the chances of gaining a
better package and opportunities are a lot
higher. Build Community With the assistance of
CEH v11 certification, you can build a
strongglobal community. You can also enhance
your networking opportunities and even get your
start-up in place. Assess Cyber Risks This
course helps you enhance your understanding of
assessing different cyber risks and
vulnerabilities that can exploit an IT
infrastructure. Exam Information Below
mentioned are the exam details for EC-Council CEH
Online Course. Number of Questions 125 Test
Format Multiple Choice Test Duration 4
Hours Certification Name 312-50 (ECC EXAM),
312-50 (VUE) Test Delivery ECC EXAM, VUE
support_at_securiumsolutions.org
www.securiumsolutions.org
5
Training Objectives
Successful completion of the certification
training empowers you with across the board
understanding of Information security
standards, laws, and controls, System hacking
procedures to assess system and network
vulnerabilities. Different types of
malware System auditing for malware analysis,
malware attacks, and countermeasures. Different
forms of countermeasures, and footprinting
tools Network scanning countermeasures Network
scanning techniques, Enumeration countermeasures
and Enumeration techniques Vulnerability analysis
to acknowledge the loopholes in the security of
an organizations communication infrastructure,
network, and end systems. Session hijacking
techniques Web Server attacks methodology to
assess vulnerabilities and countermeasures.
Assessing network vulnerabilities and
countermeasures with packet sniffing techniques
Social engineering techniques Acknowledging theft
attacks to social engineering countermeasures and
audit human-level vulnerabilities. DoS/DDoS
attack techniques Tools to DoS/DDoS
countermeasures. Penetration testing,
vulnerability know-how, and penetration testing
roadmap. Threats to IoT and OT platforms and
defending IoT and OT devices. Web application
attacks, vulnerabilities, and countermeasures.
SQL injection vulnerabilities, attacks, and
countermeasures. Wireless encryption, hacking
tools, hacking methodology, and security tools.
Mobile platform vulnerability exploitations,
security guidelines and tools. Cloud computing
concepts and security techniques and
tools. Cryptography ciphers, cryptography
attacks, Public Key Infrastructure (PKI), and
cryptanalysis tools.
support_at_securiumsolutions.org
www.securiumsolutions.org
6
Course Content
Pursuing the CEH Online Course by EC Council,
helps you enhance your understanding of security
fundamentals quite significantly. With the help,
of the respective course, you get to enhance your
skills when it comes to acknowledging
vulnerabilities in the companys network
infrastructure. They also learn to work on
different solutions that can counter all kinds of
cyberattacks. Take a look at the CEH v11 Online
Training outline below Module01 - Introduction
to Ethical Hacking Lesson 01 - Information
Security Overview Lesson 02 - Information
Security Threats and Attack Vectors Lesson 03 -
Hacking Concepts Lesson 04 - Ethical Hacking
Concepts Lesson 05 - Information Security
Controls Lesson 06 - Penetration Testing
Concepts Lesson 07 - Information Security Laws
and Standards Module02 - Footprinting and
Reconnaissance Lesson 01 - Footprinting
Concepts Lesson 02 - Footprinting through Search
Engines Lesson 03 - Footprinting through Web
Services Lesson 04 - Footprinting through Social
Networking Sites Lesson 05 - Website
Footprinting Lesson 06 - Email Footprinting
Lesson 07 - Competitive Intelligence Lesson 08 -
Whois Footprinting Lesson 09 - DNS Footprinting
Lesson 10 - Network Footprinting Lesson 11 -
Footprinting through Social Engineering Lesson
12 - Footprinting Tools Lesson 13 -
Countermeasures Lesson 14 - Footprinting Pen
Testing
support_at_securiumsolutions.org
www.securiumsolutions.org
7
Module03 - Scanning Networks Lesson 01 - Network
Scanning Concepts Lesson 02 - Scanning
Tools Lesson 03 - Scanning Techniques Lesson 04 -
Scanning Beyond IDS and Firewall Lesson 05 -
Banner Grabbing Lesson 06 - Draw Network Diagrams
Lesson 07 - Scanning Pen Testing Module04 -
Enumeration Lesson 01 - Enumeration Concepts
Lesson 02 - NetBIOS Enumeration Lesson 03 - SNMP
Enumeration Lesson 04 - LDAP Enumeration Lesson
05 - NTP Enumeration Lesson 06 - SMTP Enumeration
and DNS Enumeration Lesson 07 - Other
Enumeration Techniques Lesson 08 - Enumeration
Countermeasures Lesson 09 - Enumeration Pen
Testing Module05 - Vulnerability Analysis Lesson
01 - Vulnerability Assessment Concepts Lesson 02
- Vulnerability Assessment Solutions Lesson 03 -
Vulnerability Scoring Systems Lesson 04 -
Vulnerability Assessment Tools Lesson 05 -
Vulnerability Assessment Reports
support_at_securiumsolutions.org
www.securiumsolutions.org
8
Module06 - System Hacking Lesson 01 - System
Hacking Concepts Lesson 02 - Cracking Passwords
Lesson 03 - Escalating Privileges Lesson 04 -
Executing Applications Lesson 05 - Hiding
Files Lesson 06 - Covering Tracks Lesson 07 -
Penetration Testing Module07 - Malware
Threats Lesson 01 - Malware Concepts Lesson 02 -
Trojan Concepts Lesson 03 - Virus and Worm
Concepts Lesson 04 - Malware Analysis Lesson 05
- Countermeasures Lesson 06 - Anti-Malware
Software Lesson 07 - Malware Penetration
Testing Module08 - Sniffing Lesson 01 - Sniffing
Concepts Lesson 02 - Sniffing Technique MAC
Attacks Lesson 03 - Sniffing Technique DHCP
Attacks Lesson 04 - Sniffing Technique ARP
Poisoning Lesson 05 - Sniffing Technique
Spoofing Attacks Lesson 06 - Sniffing Technique
DNS Poisoning Lesson 07 - Sniffing Tools Lesson
08 - Countermeasures Lesson 09 - Sniffing
Detection Techniques Lesson 10 - Sniffing Pen
Testing
support_at_securiumsolutions.org
www.securiumsolutions.org
9
Module09 - Social Engineering Lesson 01 - Social
Engineering Concepts Lesson 02 - Social
Engineering Techniques Lesson 03 - Insider
Threats Lesson 04 - Impersonation on Social
Networking Sites Lesson 05 - Identity
Theft Lesson 06 - Countermeasures Lesson 07 -
Social Engineering Penetration Testing Module10
- Denial-of-Service Lesson 01 - DoS/DDoS
Concepts Lesson 02 - DoS/DDoS Attack Techniques
Lesson 03 - Botnets Lesson 04 - DDoS Case Study
Lesson 05 - DoS/DDoS Attack Tools Lesson 06 -
Countermeasures Lesson 07 - DoS/DDoS Protection
Tools Lesson 08 - DoS/DDoS Attack Penetration
Testing Module11 - Session Hijacking Lesson 01 -
Session Hijacking Concepts Lesson 02 -
Application Level Session Hijacking Lesson 03 -
Network Level Session Hijacking Lesson 04 -
Session Hijacking Tools Lesson 05 -
Countermeasures Lesson 06 - Penetration Testing
support_at_securiumsolutions.org
www.securiumsolutions.org
10
Module12 - Evading IDS, Firewalls, and
Honeypots Lesson 01 - IDS, Firewall and Honeypot
Concepts Lesson 02 - IDS, Firewall and Honeypot
Solutions Lesson 03 - Evading IDS Lesson 04 -
Evading Firewalls Lesson 05 - IDS/Firewall
Evading Tools Lesson 06 - Detecting
Honeypots Lesson 07 - IDS/Firewall Evasion
Countermeasures Lesson 08 - Penetration
Testing Module13 - Hacking Web Servers Lesson 01
- Web Server Concepts Lesson 02 - Web Server
Attacks Lesson 03 - Web Server Attack Methodology
Lesson 04 - Web Server Attack Tools Lesson 05 -
Countermeasures Lesson 06 - Patch Management
Lesson 07 - Web Server Security Tools Lesson 08
- Web Server Pen Testing Module14 - Hacking Web
Applications Lesson 01 - Web App Concepts Lesson
02 - Web App Threats Lesson 03 - Hacking
Methodology Lesson 04 - Web Application Hacking
Tools Lesson 05 - Countermeasures Lesson 06 -
Web App Security Testing Tools Lesson 07 - Web
App Pen Testing
support_at_securiumsolutions.org
www.securiumsolutions.org
11
Module15 - SQL Injection Lesson 01 - SQL
Injection Concepts Lesson 02 - Types of SQL
Injection Lesson 03 - SQL Injection Methodology
Lesson 04 - SQL Injection Tools Lesson 05 -
Evasion Techniques Lesson 06 -
Countermeasures Module16 - Hacking Wireless
Networks Lesson 01 - Wireless Concepts Lesson 02
- Wireless Encryption Lesson 03 - Wireless
Threats Lesson 04 - Wireless Hacking Methodology
Lesson 05 - Wireless Hacking Tools Lesson 06 -
Bluetooth Hacking Lesson 07 - Countermeasures
Lesson 08 - Wireless Security Tools Lesson 09 -
Wi-Fi Pen Testing Module17 - Hacking Mobile
Platforms Lesson 01 - Mobile Platform Attack
Vectors Lesson 02 - Hacking Android OS Lesson 03
- Hacking iOS Lesson 04 - Mobile Spyware Lesson
05 - Mobile Device Management Lesson 06 - Mobile
Security Guidelines and Tools Lesson 07 - Mobile
Pen Testing
support_at_securiumsolutions.org
www.securiumsolutions.org
12
Module18 - IoT Hacking Lesson 01- IoT Concepts
Lesson 02- IoT Attacks Lesson 03- IoT Hacking
Methodology Lesson 04- IoT Hacking Tools Lesson
05- Countermeasures Lesson 06- IoT Pen
Testing Module19 - Cloud Computing Lesson 01 -
Cloud Computing Concepts Lesson 02 - Cloud
Computing Threats Lesson 03 - Cloud Computing
Attacks Lesson 04 - Cloud Security Lesson 05 -
Cloud Security Tools Lesson 06 - Cloud
Penetration Testing
Module20 - Cryptography Lesson 01 - Cryptography
Concepts Lesson 02 - Encryption Algorithms
Lesson 03 - Cryptography Tools Lesson 04 - Public
Key Infrastructure (PKI) Lesson 05 - Email
Encryption Lesson 06 - Disk Encryption Lesson 07
- Cryptanalysis Lesson 08 - Countermeasures
support_at_securiumsolutions.org
www.securiumsolutions.org
13
ABOUT US
Overview
Securium solutions is the eminent medium that
provides cyber security online training courses.
Our courses run under the true mentorship of
digitalization that is circulated by pre-planned
modules to not merely teach but educate by
advanced means. Spot the difference in its
approach to derive its value. Within a
professional frame, our cyber security
certifications online are not just for a defining
point till a specific accreditation. These
modules are correlated to basics which never
change with advanced mechanisms. Nonetheless,
our courses keep this course fragmentation at
the rooted specification that doesnt reform even
after a century. We provide online training in
disciplines such as Cyber Security, Cloud
Computing, Project Management, Digital
Marketing, and Data Science among others, where
technologies and best practices are
changingrapidly and demand for qualified
candidates significantly exceeds supply. We have
deployed training to millions of professionals
and companies so they can have upgraded skills
and become certified to know the worth of their
organization.
support_at_securiumsolutions.org
www.securiumsolutions.org
14
CONTACT US
Securium Solutions Head of communications ADDRES
S (INDIA) B-28, 1st Floor, Sector-01, Noida,
Uttar Pradesh 201301 ADDRESS (US) 1847 Solera
Dr, Columbus, OH 43229 PHONE NUMBER (US) 1 (201)
549-9007 PHONE NUMBER (INDIA) 91 - 120 -
4310543 MOBILE NUMBER (INDIA) 91 - 931 062 -
4042 (WhatsApp) SKYPE securiumsolutions EMAIL
info_at_securiumsolutions.org, support_at_securiumsoluti
ons.org WEB www.securiumsolutions.org
support_at_securiumsolutions.org
www.securiumsolutions.org
Write a Comment
User Comments (0)