AN ISO 9001:2008 CERTIFIED COMPANY
E-mail: info@coreanonymous.com
Mob: +91-8511487333

Ethical Hacking And Cyber Security Courses


"We Will Open The World of knowledge for you!"

To beat a hacker, you need to think like one! This is exactly what this class will teach you. It is the pinnacle of the most desired information security training program any information security professional will ever want to be in To master the hacking technologies, you will need to become one.

  • Course Description:

    -Learn the "hacker" mindset
    -Learn about the tools of the trade
    -Expand career opportunities

    This class will allow the students to enter an environment where they will be shown the methods of scanning, testing, hacking and improving the security on the systems of their own. The in-depth environment of the lab where they learn gives each student comprehensive and efficient experiences with the crucial modern systems of security. Each one of the Students will begin by learning how the boundary security works and then will be advanced into scanning and attacking individual networks of their own, where no authentic networks are damaged.

    Duration:

    Duration- 1 Months

    Certification:

    The Core anonymous Certified Ethical Hacking(CCEH) exam may be taken on the last day of the training. Students need to pass the exam to receive CCEH certification.

    Legal Agreement:

    Ethical Hacking and Countermeasures course mission is to educate, introduce and demonstrate hacking tools for penetration testing purposes only. Prior to attending this course, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system.

    Course Outline:

    Core anonymous Certified Ethical Hacking(CCEH) Curriculum consists of instructor-led training. Instructor will provide the totally practical knowledge of Hacking modules During Training.

    • 1. Introduction of Ethical Hacking
    • 2. Footprinting
    • 3. Scanning Networks
    • 4. Keylogger & Phishing
    • 5. Desktop Phishing
    • 6. Proxy & VPN
    • 7. System Hacking
    • 8. Email hacking & Tracking.
    • 9. Password Stealing
    • 10. Dos & DDos Attack
    • 11. Viruses and Worms
    • 12. Trojan & backdoors
    • 13. Wireless hacking
    • 14. Stegnography
    • 15. Cryptography
    • 16. Session Hijacking
    • 17. Penetration Testing
    • 18. Data Recovery
    • 19. Authentication Bypass
    • 20. Cross Site Scripting
    • 21. SQL Injection
    • 22. Whatsapp Hacking
    • 23. Location Tracing
    • 24. Call Spoofing
    • 25. Mobile Hacking
  • Course Description:

    -Learn how to catch hackers
    -Learn about the forensic investigation

    The CCFI course will give participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute. Many of today’s top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the “cyber-criminal.” It is no longer a matter of “will your or-ganization be comprised (hacked)?” but, rather, “when?” Today’s battles between corporations, gov-ernments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminal, then this is the course for you.

    Duration:

    Duration- 2 Months

    Certification:

    The CCFI exam may be taken on the last day of the training. Students need to pass the exam to receive CCFI certification.

    Legal Agreement:

    Ethical Hacking and Countermeasures course mission is to educate, introduce and demonstrate hacking tools for penetration testing purposes only. Prior to attending this course, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system.

    Course Outline:

    CCFI Curriculum consists of instructor-led training. Instructor will provide the totally practical knowledge of Hacking modules During Training.

    • 1. Computer Forensics in Today’s World
    • 2. Law and Computer Forensics
    • 3. Computer Investigation Process
    • 4. First Responder Procedure
    • 5. Computer Security Incident Response Team (CSIRT)
    • 6. Computer Forensic Lab
    • 7. Understanding File Systems and Hard Disks
    • 8. Understanding Digital Media Devices
    • 9. Windows, Linux and Macintosh Boot Processes
    • 10. Windows Forensics
    • 11. Computer Forensic Tools
    • 12. Forensics Investigations Using FTK
    • 13. Forensics Investigations Using Encase
    • 14. Recovering Deleted Files and Deleted Partitions
    • 15. Image Files Forensics
    • 16. Network Forensics and Investigating Logs
    • 17. Investigating Wireless Attacks
    • 18. Investigating Web Attacks
    • 19. Router Forensics
    • 20. Investigating DoS Attacks
    • 21. Investigating Internet Crimes
    • 22. Tracking E-mails and Investigating E-mail Crimes
    • 23. Investigating Trademark and Copyright Infringement
    • 24. Investigating Sexually Harassment Incidents
    • 25. Investigating Child Pornography
  • Course Description:

    -Handle Penetration Testing
    -Checking Vulnerability Analysis
    -Identify Loopholes

    Core anonymous Certified Security Expert, CCSE an advanced ethical hacking training certification that complements the Convants Certified Ethical Hacking, CCEH certification by exploring the analytical phase of ethical hacking. While the Convants Certified Ethical Hacking certification exposes the learner to hacking tools and technologies, the Certified Security Analyst course takes it a step further by exploring how to analyze the outcome from these tools and technologies. Through groundbreaking network penetration testing training methods and techniques, this pen testing computer security certification helps students perform the intensive assessments required to effectively identify and mitigate risks to the information security of the infrastructure.

    Duration:

    Duration- 2 Months

    Certification:

    The CCSE exam may be taken on the last day of the training. Students need to pass the exam to receive CCSE certification.

    Legal Agreement:

    Ethical Hacking and Countermeasures course mission is to educate, introduce and demonstrate hacking tools for penetration testing purposes only. Prior to attending this course, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system.

    Course Outline:

    CCSE Curriculum consists of instructor-led training. Instructor will provide the totally practical knowledge of Hacking modules During Training.

    • 1. Need for Security Analyst
    • 2. Honeypot and Honeynets
    • 3. Firewall , IDS & IPS
    • 4. Network and Server Security
    • 5. WIFI Hacking and Security
    • 6. Browser Security
    • 7. OWASP (Top Ten Vulnerabilities)
    • 8. OWASP Testing Framework
    • 9. SANS 25 Vulnerabilities in Web applications
    • 10. Security Testing & Methodologies (OSSTM)
    • 11. BackTrack/KALI (Hackers Operating System)
    • 12. Introduction to Remote Exploits
    • 13. Metasploit framework
    • 11. BackTrack/KALI (Hackers Operating System)
    • 12. Introduction to Remote Exploits
    • 13. Metasploit framework
    • 14. Reverse Engineering
    • 15. Source Code Review
    • 16. Hacking the BioMetric Systems
    • 17. Vulnerability Assessment and Penetration Testing (VA/PT)
    • 18. Penetration Testing Report and Documentation Writing
    • A Corporate Level Efficiency Training:
    • 19. Personality Development
    • 20. Presentation Skills and Public Speaking
    • 21. Interview Skills
    • Introduction to Professional IT Security
      (Auditing and Consulting)
      :
    • 23. Information Security Management
    • 24. ISO 27001 and 27002
    • 25. PCI/DSS
    • 26. COBIT
    • 27. Managing Security Awareness
    • 28. Risk Assessment, Business Continuity
      and Disaster
    • 29. Security Architecture and Designs
    • 30. Demonstration on Internal Audits