ASCEH 1 – Azure Skynet Certified Ethical Hacker Level 1 is a practical oriented training program designed to help students take the first foot forward in the field of Cyber Security. Ethical Hacking course Level 1 allows the student to recognize the threats and vulnerabilities of the network and equip them with the skills to deal with it.
Azure Skynet is the best ethical hacking course training institute in India and its training programs deliver the skills and knowledge of advanced hacking tools and techniques but ethically. Ethical Hacking course is the most desired training program for any information security professional. Ethical Hacking Course Level 1 with Ethical Hacking Course Level 2 together makes any information security aspirant prepared for CEH Certifications.
Pre-Requisites:
Basic knowledge of computers & internet technologies with a curious mind.
Take Away Kit:
- Participants clearing final exam with more than 70% marks will be awarded with ASCEH (Azure Skynet Certified Ethical Hacker) Level-1 certificate.
- Each participant will get a participation certificate and a training completion letter.
- Each participant will get a toolkit containing tools used during the training.
- Candidates will be provided with Azure Skynet Cyber Security Reference Book.
WHY AZURE SKYNET ?
- Hands On Practical Sessions
- 24×7 Lab Facility Available
- New & Advance Training Methodology
- Project Development in Industrial Environment
- Tie-up with the most prestigious IITs
To apply for the training program, kindly fill the enquiry form else mail us at [email protected] or call/whatsapp at 7840042113.
- Track
- Days
- Duration
- Hours
- Training Fee(INR)
(Exclusive of 18% GST)
- Regular Track
- Mon-Fri
- 30 Days
- 2 hrs/day
- 15,000
- Weekends
- Sat-Sun
- 6 Weekends
- 3 hrs/day
- 15,000
Introduction:
Introduction
Need of Cyber Security
Ethical Face of Hacking
Cyber Laws & Indian IT Acts
Networking:
Introduction
IP Address (IPv4 & IPv6)
Subnets
NAT
OSI Layer
DHCP
Ports
Proxy Servers
Router
Switches
Footprinting & Scanning:
Introduction
Information Gathering
Whois Information
Banner Grabbing
Web Server Details
Reverse IP
People Search
Port Scanning
Enumeration
Google Hacking Database:
Find Vulnerabilities Using Google
Google Dorks
Security Countermeasures
System Hacking:
OS Bypassing
Passive Online Attack
Active Online Attack
Offline Attack
Non-Technical Attacks
Default Passwords
Mobile Security:
Introduction to mobile platforms
Understanding of Android OS
Understanding of iOS
Bring Your Own Device (BYOD)
Mobile Platform Attack Vectors
Rooting & Jailbreaking
Mobile Security Guidelines
MALWARE:
Introduction to Malware
Virus
Worms
Trojan
Creating Virus
Creating Worms
Evade/Bypass Antivirus & Firewalls
Countermeasures
Wireless Security-1:
Introduction to Wireless Technology
MAC Filtering
Packet Encryption
Authentication Types
Types of Attacks
Security Countermeasures
Web Application VAPT:
Introduction to Vulnerability Assesment
Web Architecture
Server
HTML Basics
PHP Basics
Web Security Misconceptions
OWASP Top 10 Attacks
Injection
Broken Authentication
Sensitive Data Exposure
XML External Entities (XXE)
Broken Access Control
Security Misconfiguration
Cross – Site Scripting
Insecure Deserialization
Using components with known vulnerabilities
Insufficient Logging & Monitoring
IDS, Firewalls, Honeypots:
Introduction to Firewalls
Types of Firewalls
IDS & its weakness
IPS & its weakness
Honeypots
Internet Security:
Phishing Attacks
IDN Homograph Attack
Social Engineering
Fake Emails
Tracing Fake Mails
Key Loggers
Email Encryption
Security Countermeasures
Cryptography-1:
Introduction to Cryptography
Crypto Techniques
Types of Encryption
Steganography
Azure Skynet
M-4, 1st Floor, Old DLF Colony, Sector 14, Gurgaon, Haryana, India.
+91 7905152264
0124-4275997