Certified Ethical Hacker

MIEL Academy

Price on request
Students that were interested in this course also looked at...
See all

Important information

  • Certificate
  • New delhi
  • Duration:
    5 Days
Description

Well organized DVD-ROM content; a repository of approximately 20GB of latest hacking and security tools and more than 1000 minutes of videos demonstrating hacking techniques. Exclusive section for countermeasures against different attacks with detailed explanation of how to implement these countermeasures in real time environment. The new version has complete section dedicated for penetration testing. It illustrates how to implement learned concepts to test network system security.
Suitable for: security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

Important information

Basic Knowledge of Information Security

Venues

Where and when

Starts Location
On request
New Delhi
110119, Delhi, India
See map

Opinions


24/03/2011
About the course I attended the session conducted by MIEL in the month of January 2011in Gurgaon. I am a B Tech final year student and at that time, Mr. Ghanshyam Bhagtani was the instructor. I amazed with the over all knowledge of the trainer as well as the service in terms of co-ordination provided by MIEL. Now I am planning to go ahead with ECSA LPT because MIEL agve me a new way towards Information Security. Thanks MIEL

Would you recommend this course? Yes.

Teachers and trainers (2)

MIEL Instructor MIEL Instructor
MIEL Instructor MIEL Instructor
MIEL Instructor

Mr. Ghanshyam Bhagtani
Mr. Ghanshyam Bhagtani
Instructor

The Global Award for BEST Authorised Training Centre (MIEL) The BEST INSTRUCTOR (Mr. Ghanshyam Bhagtani)

Course programme

1. Introduction to Ethical Hacking 2. Footprinting and Reconnaissance 3. Scanning Networks 4. Enumeration 5. System Hacking 6. Trojans and Backdoors 7. Viruses and Worms 8. Sniffers 9. Social Engineering 10. Denial of Service 11. Session Hijacking 12. Hacking Webservers 13. Hacking Web Applications 14. SQL Injection 15. Hacking Wireless Networks 16. Evading IDS, Firewalls and Honeypots 17. Buffer Overflows 18. Cryptography 19. Penetration Testing


Students that were interested in this course also looked at...
See all