DIS (Data and Internet Security) Consultants
CERTIFIED ETHICAL HACKER

 

Course Content

Register Now



course content


DIS Content

Module 01: Introduction to Ethical Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: System Hacking
Module 06: Trojans and Backdoors
Module 07: Viruses and Worms
Module 08: Sniffers
Module 09: Social Engineering
Module 10: Denial of Service
Module 11: Session Hijacking
Module 12: Hacking Webservers
Module 13: Hacking Web Applications
Module 14: SQL Injection
Module 15: Hacking Wireless Networks
Module 16: Evading IDS, Firewalls, and Honeypots
Module 17: Buffer Overflow
Module 18: Cryptography
Module 19: Penetration Testing

DIS Content

  • The Need for Security Analysis
  • Advanced Googling
  • TCP/IP Packet Analysis
  • Advanced Sniffing Techniques
  • Vulnerability Analysis with Nessus
  • Advanced Wireless Testing
  • Designing a DMZ
  • Snort Analysis
  • Log Analysis
  • Advanced Exploits and Tools
  • Pen Testing Methodologies
  • Customers and Legal Agreements
  • Rules of Engagement
  • Penetration Testing Planning and Scheduling
  • Pre Penetration Testing Checklist
  • Information Gathering
  • Vulnerability Analysis
  • External Penetration Testing
  • Internal Network Penetration Testing
  • Routers and Switches Penetration Testing
  • Firewall Penetration Testing
  • IDS Penetration Testing
  • Wireless Network Penetration Testing
  • Denial of Service Penetration Testing
  • Password Cracking Penetration Testing
  • Social Engineering Penetration Testing
  • Stolen Laptop, PDAs and Cell phones Penetration Testing
  • Application Penetration Testing
  • Physical Security Penetration Testing
  • Database Penetration testing
  • VoIP Penetration Testing
  • VPN Penetration Testing
  • War Dialing
  • Virus and Trojan Detection
  • Log Management Penetration Testing
  • File Integrity Checking
  • Blue Tooth and Hand held Device Penetration Testing
  • Telecommunication and Broadband Communication Penetration Testing
  • Email Security Penetration Testing
  • Security Patches Penetration Testing
  • Data Leakage Penetration Testing
  • Penetration Testing Deliverables and Conclusion
  • Penetration Testing Report and Documentation Writing
  • Penetration Testing Report Analysis
  • Post Testing Actions
  • Ethics of a Licensed Penetration Tester
  • Standards and Compliance
  • benefits
    correct symbol Training by best security expert or well experienced trainers.

    correct symbolInternational BYTE CODE Training Certification and Global Certification from DIS (Data and Internet Security) Consultants + 2 years free membership of BYTE CODE

    correct symbol Training under the interactive and lab intensive environment equips the professionals with in-depth knowledge, practical experience of network security and exposure to latest hacking technologies.

    correct symbolThe course tools and programs are preloaded on the iLabs machine that comes with DIS Ethical Hacking and hence saves productive time and effort.

    correct symbolThe professionals can validate their potentials of being an expert in security systems.

    correct symbolLearning from the experienced and leading experts, the participants are exposed to the real-life hacking techniques.

    correct symbolA Certified Ethical Hacker is always in demand by government organizations, private firms, banks, financial institutions, military establishments, etc.

    • Why is this training important for you

      • The most advanced course in the world that covers cutting edge of hacking technology. DIS (Data and Internet Security) Consultants researchers go deep underground covertly to extract advanced attacks and exploits and work to analyze how hackers operate and present them to defense community .The researches report and update advanced hacking tools every day on the member’s portal and on www.hackerjournals.com
      • The DIS Ethical Hacking class deals with real life scenario and real threats by real life experts in the field.
      • Learn real life ethical hacking methodology beyond automated vulnerability scans and simple information security tests.
      • Gain global recognition as being a certified member of a globally recognized institution and attain the skills of a professional ethical hacker/ penetration tester.
      • Play with real life tools that are used by the hacking underground. The courseware is over 1,655 pages, covering 19 modules with over 20 GB of real life underground tools that are not found in any other training course anywhere in the world plus evaluation copies for Core Impact and Immunity in classes and security software that can be taken home!!!
      • Get your hands dirty with actual hands on labs under the guidance of some of the best information security professionals in this space.
      • Unlike other classes that provide courseware that is tightly coupled with the presentation and somewhat useless outside of that environment, DIS (Data and Internet Security) Consultants has always sought to provide reference material that continues to be valuable long after the course has concluded.
    • Who should attend DIS Ethical Hacking training ?

      This course is beneficial to cyber security officials, system auditors, security analyst, site administrators, army officials, cyber crimr department official and anyone who wants to go into IT security.

    ceh Our Package includes:
    correct symbolAirport pick & drop

    correct symbolOfficial Training by certified instructors

    correct symbolHead-2-Head training by Certified Subject matter experts

    correct symbolHighly interactive lectures, group exercises, and review sessions

    correct symbolIntensive Hands-on Training

    correct symbol2 years membership of bytecode international training group

    correct symbolChance to become country representative for bytecode

    correct symbolCertification Exam Fees Included.

    correct symbolIndividual study environment

    correct symbolTraining Environment

    correct symbolPractical live hacking

    correct symbolConcept based training

    correct symbol24/7 High speed internet connectivity

    correct symbolLimited candidates in class

    correct symbolSingle & Shared rooms, food( breakfast, lunch and dinner)

    correct symbolPost training support after training & certification

    To confirm/register your seat please send us a complete refundable deposit as a registration fee of 500$ USD by any of the following methods:


    »  NEFT/RTGS to:
    hdfc logo
    Acc. Name : "Bytecode Cyber Security Pvt Ltd"
    Account No. : 00922560003606
    IFSC Code : HDFC0000092
    Swift Code : HDFCINBB
    »  Cash/Cheque/Demand Draft Deposit to:
    hdfc logo
    Acc. Name : "Bytecode Cyber Security Pvt Ltd"
    Account No. : 00922560003606
    Branch :Greater Kailash - 1,Delhi
    IFSC Code : HDFC0000092
    Swift Code : HDFCINBB
    paypal logo
    Paypal Transfer :
    Our paypal account id is :
    register@bytecode.in
    (Paypal payments will payable a surcharge of 4%.)
    credit card logo
    Credit/Debit cards & Net Banking payments

    paypal
    western union
    Send Money to: Mohit Kumar Yadav,

    You can go to any WESTERN UNION location,
    deposit the money ,
    fills up a "TO SEND MONEY FORM"
    and receive an 10 digit numeric code called as
    MTCN (MONEY TRANSFER CONTROL NUMBER)
    .After the transaction, email the MTCN to info@bytecode.in.
    You can find the nearest WESTERN UNION outlet HERE.


    You can also send money via moneygram.
    Click here for money gram process.

    Note: Pay the rest amount by cash, card or students Cheque on arrival at the center.

              All of the online payments will payable a surcharge of $4 USD.


    Once you done the payment, please send us a scanned copy of NEFT/RTGS/Cash/Cheque/DD receipt and please forward a scanned copy of your passport and visa to our concern department at deposit@bytecode.in



    Newsletter

    Drop us your email address and stay connected with us

     

    footer

    Other Top Links

    Enquire Now
    Close
    Workshop Programs