ASCEH 2 – Azure Skynet Certified Ethical Hacker Level 2 is an advanced level ethical hacking training program. Post ASCEH 1, ASCEH 2 digs deeper into the concepts and offers advanced knowledge on the subject. ASCEH 2 is a stepping stone towards penetration testing. Any information security aspirant can attempt for Azure Skynet’s CEH Certification Program after the successful completion of this training program.
Azure Skynet is renowned as the best cyber security courses training institute in Gurgaon. Manish Bhardwaj is a very experienced and a certified trainer who has the knack to get each student clear ethical hacking Certifications easily.
Pre-Requisites:
Knowledge of ASCEH Level-1 course content or equivalent .
Take Away Kit:
- Participants clearing final exam with more than 70% marks will be awarded with ASCEH (Azure Skynet Certified Ethical Hacker) Level-2 certificate.
- Each participant will get a participation certificate and a training completion letter.
- Each participant will get a toolkit consisting of tools used during training, cookbook, videos and other software (30+GB).
- Candidates will be provided with Azure Skynet Cyber Security Reference Book.
WHY AZURE SKYNET ?
- Hands On Practical Sessions
- 24×7 Lab Facility Available
- New & Advance Training Methodology
- Project Development in Industrial Environment
- Tie-up with the most prestigious IITs
To apply for the training program, kindly fill the enquiry form else mail us at [email protected] or call/whatsapp at 7840042113.
- Track
- Days
- Duration
- Hours
- Training Fee(INR)
(Exclusive of 18% GST)
- Regular Track
- Mon-Fri
- 30 Days
- 2 hrs/day
- 25,000
- Weekends
- Sat-Sun
- 6 Weekends
- 3 hrs/day
- 25,000
Introduction:
Introduction to Linux
Useful Commands of Linux
Backtrack/ Kali Linux
Virtual Machine/ VMware
Lab Setup
Recong-ng
OpenVAS
Network Attack:
Wireshark
Packet Analysis
Network Sniffing
Traffic Filtering
Netcat
Nmap
DNS Poisoning
ARP Attack
Denial of Service
Cloud Computing
Introduction
Cloud Development Models
Security Benefits
Threats
Different Types of Attacks
Cloud Security
Cryptography:
Types of Encryption & Hashes
Crypto Analysis
Insecure Storage
Buffer Overflow:
Introduction
Fuzzing
Memory Analysis
Finding Bad characters
Exploitation
METASPLOIT FRAMEWORK
Metasploit Fundamentals
Different types of Payload
Auxiliary Modules
Post Exploitation
Armitage
Client-Side Attacks
Web App Pentesting:
Programming of Websites
Burp Suit
Advance SQL Injection
Bypassing WAF
Advance XSS
Nessus
Nexpose
Report Writing
INTERNET OF THINGS:
Introduction
IoT Communication Model
Threats
Countermeasures
Password Attack:
Types of Attack
Hydra
Ncrack
John The Ripper
Crunch
Medusa
Rainbow Crack
Pwdump & Fgdump
Wireless Security-2:
War Driving
Rouge Access Point Attack
802.1x Radius Cracking
Ad-Hoc Association
Evil Twin
Blue Jacking
IV Attack
MDK3
PSK Cracking
Downgrade Attack
CYBER FORENSICS INTRODUCTION:
Introduction to Cyber Forensics
Cyber Forensics Methodology
Different types of File System
Chain of Custody
Various Forensics tools
Azure Skynet
M-4, 1st Floor, Old DLF Colony, Sector 14, Gurgaon, Haryana, India.
+91 7905152264
0124-4275997