Certified Ethical Hacker
-
I attended the session conducted by MIEL in the month of January 2011in Gurgaon. I am a B Tech final year student and at that time, Mr. Ghanshyam Bhagtani was the instructor. I amazed with the over all knowledge of the trainer as well as the service in terms of co-ordination provided by MIEL. Now I am planning to go ahead with ECSA LPT because MIEL agve me a new way towards Information Security.
Thanks MIEL
← | →
Certificate
In New Delhi
Description
-
Type
Certificate
-
Location
New delhi
-
Duration
5 Days
Well organized DVD-ROM content; a repository of approximately 20GB of latest hacking and security tools and more than 1000 minutes of videos demonstrating hacking techniques. Exclusive section for countermeasures against different attacks with detailed explanation of how to implement these countermeasures in real time environment. The new version has complete section dedicated for penetration testing. It illustrates how to implement learned concepts to test network system security. Suitable for: security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
Facilities
Location
Start date
Start date
Reviews
-
I attended the session conducted by MIEL in the month of January 2011in Gurgaon. I am a B Tech final year student and at that time, Mr. Ghanshyam Bhagtani was the instructor. I amazed with the over all knowledge of the trainer as well as the service in terms of co-ordination provided by MIEL. Now I am planning to go ahead with ECSA LPT because MIEL agve me a new way towards Information Security.
Thanks MIEL
← | →
Course rating
Recommended
Centre rating
Anonymus xyz
Teachers and trainers (2)
MIEL Instructor MIEL Instructor
MIEL Instructor
Mr. Ghanshyam Bhagtani
Instructor
The Global Award for BEST Authorised Training Centre (MIEL) The BEST INSTRUCTOR (Mr. Ghanshyam Bhagtani)
Course programme
1. Introduction to Ethical Hacking 2. Footprinting and Reconnaissance 3. Scanning Networks 4. Enumeration 5. System Hacking 6. Trojans and Backdoors 7. Viruses and Worms 8. Sniffers 9. Social Engineering 10. Denial of Service 11. Session Hijacking 12. Hacking Webservers 13. Hacking Web Applications 14. SQL Injection 15. Hacking Wireless Networks 16. Evading IDS, Firewalls and Honeypots 17. Buffer Overflows 18. Cryptography 19. Penetration Testing
Certified Ethical Hacker