Docstoc

Ankit Fadia Certified Ethical Hacker _AFCEH_ II

Document Sample
Ankit Fadia Certified Ethical Hacker _AFCEH_ II Powered By Docstoc
					Ankit Fadia Certified Ethical Hacker (AFCEH) II

confidential

About Ankit……..
Ankit Fadia, 21 years old, is an independent computer security and digital intelligence consultant . He has authored six internationally best-selling books on numerous topics related to Computer Security that have been widely appreciated by both professionals and industry leaders the world over. His books have sold a record 250,000 copies across the globe, have been translated into Japanese, Korean, Portuguese and Polish and are also being used as reference textbooks in some of the most prestigious academic institutions in Asia and North America.

confidential

About Ankit……….
In November 2001, Fadia was consulted by a classified intelligence agency for breaking an encrypted message sent by one of Osama Bin Laden’s men. Since then Fadia has been involved in numerous classified projects pertaining to International Security and Computer Networks. He handles the Asia Operations of the classified intelligence agency. Fadia provides customized cyber security training and consulting solutions to clients all across Asia, Australia, North America and the Middle East including Google, Citibank, Shell, Volvo, Thai Airways, UOB Bank, PT Cisco Systems, Bank of Thailand, Bangkok Public Bank, Amari Hotels, BlueScope Steel, Jumeirah International, Wipro, Singapore Health Promotion Board, Infosys, Satyam, Schering Ltd and many other organizations in the government, police and corporate sectors.

confidential

Ankit’s Training Portfolio
Financial & Banking Sector: TA Securities (Malaysia), Bank of Maharashtra, United Overseas Bank of Singapore, Bangkok Bank Public Co. Ltd, Citibank Taiwan, Monetary Authority of Singapore, Bank of Thailand, GHL Systems Berhad, PT Bank Rabobank International Indonesia and Australian bank officials. Software Sector: Wipro Technologies, Infosys, Symphony Services, Satyam Corporation, CMC Limited (TATA), PT Cisco Systems Indonesia. Internet Services Sector: Google, Sify (Satyam). Government Sector: Singapore Police, Inland Revenue Authority (Singapore), Inland Revenue Board (Malaysia), Ministry of Defence (Singapore), NISER (Malaysia), Ministry of National Development (Singapore, Ministry of Home Affairs (Singapore), Monetary Authority of Singapore, Multimedia Super Corridor (Malaysia), Indian Police, Central Forensics Laboratory, Kerela Police, Andhra Pradesh Police Department, APFSL, Pune Police.

confidential

Ankit’s Training Portfolio
Transportation Sector: Singapore SMRT Corporation, Thai Airways International. Industrial Goods Sector: The Siam Chemicals (Thailand), BlueScope Steel (Malaysia) Sdn Bhd, Shell Information Technology International (Malaysia) and PT Indah Kiat Pulp & Paper TBK (Malaysia). Automobiles Sector: Volvo Malaysia Sdn Bhd. Education Sector: Institute of Defence and Strategic Studies (IDSS, Singapore), Indian School of Business (Hyderabad,India) Singapore Management University, Indian Institute of Technology (IIT: Mumbai, Delhi and Kharagpur branches), BITS Pilani, Ministry of Education (Singapore), Multimedia University. Services Sector: Amari Hotels and Resorts (Thailand), Jumeirah International Luxury & Corporate Hotels.

confidential

Ankit’s Training Portfolio
Healthcare Sector: Schering (Bangkok) Ltd, Compakar eHealth Tech Sdn.Bhd (Malaysia), Health Promotion Board (Singapore). International Conferences: Young Entrepreneurs Organization (Dubai), Asia Technological Initiative (Singapore), HACK (Singapore, Australia and Malaysia), Junior Chamber International (New Delhi), CAN 2005 (Malaysia), Hacking (Malaysia, Thailand and India) and InfoSec World (Singapore). Business Leaders: Young Entrepreneurs Organization (Asia-Pacific, Dubai University, Singapore, Malaysia, Indonesia, Dubai, Bangalore, Chennai, Mumbai, Kolkata and Delhi), Young Presidents Organization (Malaysia, Bangalore, Mumbai and Kolkata) and Young Leaders Forum (Kolkata).

confidential

What is the AFCEH program?
An ANKIT FADIA CERTIFIED ETHCAL HACKER is a computer security program on the science of ethical hacking, to discover loopholes in target systems and to setup security systems to counter the computer criminals. Professionals who undergo this training and certification program will have the necessary knowledge required to administer security solutions to companies and individuals by making computer networks secure. Want to be recognized for your computer security expertise? Want to be considered amongst the best security gurus in the world? Want to climb up the career ladder and improve your global job prospects? Want to be trained and certified by world renowned author and computer security guru? Want to become an ANKIT FADIA CERTIFIED ETHICAL HACKER? If your answer to any of the above questions is a yes, then you have come to the RIGHT PLACE!
confidential

AFCEH – Ver.1 Key Milestones
• Started in March 2006. 5 batches conducted, 3000 students trained in more than 90 cities. • Participants included students, industry and government Airtel, Reliance, MTNL, BSNL, ICICI Bank, Tata, DSP Merlyn Lynch, Indian Army, Airforce and State Police Departments. • 27,000 Hours of Video Lectures and 18,000 Text Books used. • AFCEH helped thousands of Participants added credibility to their resume and managed to receive better jobs. • In Jan 2007, AFCEH was started in China, Singapore and Malaysia.

confidential

AFCEH – Ver.1 Key Milestones

• Toppers of each batch were interviewed and given the opportunity to work with Ankit Fadia on projects like research, consulting, writing books, teaching assistantships and others. • In April 2007, a special conference style package of the AFCEH course was made available for corporate called Ankit Fadia Computer Security (AFCS).

confidential

AFCEH Ver.1 Success Stories
Name: Jaya Bhattacharjee (26 years old) City: Kolkata Claim to Fame: After topping the AFCEH exam, Jaya was selected for a project, then carried out research and co authored a book on the topic of Encryption with Mr. Ankit Fadia that was released at a national press conference in February 2007. Her Thoughts: The AFCEH course gave me the opportunity to gain invaluable knowledge in the field of Computer Security in a systematic manner. Everybody will gain a lot from this course. Even if a person does not know anything about the subject will also be able to understand the concepts if he/she is sincere. I had a wonderful experience writing the book and it gave me a well deserved recognition among my friends, relatives, peers and colleagues. It gives me immense happiness when I see the books lined up in all the bookshops across India like in Kolkata, Bangalore and others!
confidential

AFCEH Ver.1 Success Stories
Name: Manu Zacharia (30 years old) City: New Jersey, USA (Cochin in India) Claim to Fame: Like Jaya, even Manu co-authored a book on the topic of Intrusion Detection with Mr. Ankit Fadia that was released at a national press conference in February 2007. This book will soon be released internationally. He was also selected to be the teaching assistant of the course. His Thoughts: I would like to express how much I enjoyed the AFCEH course (Batch 1) and working with Ankit Fadia. The course is taught in a friendly, easy to grasp manner. Beginners and experts alike will benefit from the concise way that the course is structured. The course takes you from an absolute beginner to a knowledgeable expert in a very short amount of time. Everything is written in plain English, & is easy to understand. I wouldrecommend this course to any one who wants to gain insight into the mindset of the hacker community and to protect and defend themselves against the attacks. The quality of the course is very high as was the delivery and presentation. Excellent content, good books and easy to learn. Well done.
confidential

AFCEH Ver.1 Success Stories
Name: Vaibhav Kaushal (19 years old) City: Hazaribagh, Jharkhand Claim to Fame: After topping the AFCEH exam, Vaibhav was selected for a project, then carried out research and co-authored a book on the topic of OS Hacking with Mr. Ankit Fadia. This book is likely to be launched in the market SOON. His Thoughts: I do not have words good enough to express how much I liked the course. The course helped me gain better knowledge about many areas of the computer security and the practical ways to protect computers from being attacked by other people. What I liked about the course was that I had the opportunity to communicate with so many people with special knowledge in various fields. We helped each other learn a lot on the mailing lists of the AFCEH course group on Yahoo! In fact I was feeling a bit nostalgic after we had completed the course ended.

confidential

Why is there a need for the new AFCEH 2.0? Computer Security is a very dynamic industry. Every single day thousands of new viruses, worms and security vulnerabilities are discovered on the Internet. It is very important for computer security professionals to remain updated, educated and aware of the latest developments in this dynamic industry. This is why it was important to release version 2.0 of the AFCEH program. This new, updated and improved version of the highly successful AFCEH program contains NEW comprehensive training material, content, lectures and books on the latest tools, techniques and methods being used in the field of computer security. AFCEH 2.0 will not only allow participants to update their knowledge, but will also teach them newly discovered techniques that were previously not known while AFCEH 1.0 was being developed.
confidential

What is new in AFCEH 2.0?
• The KEYWORDS that succinctly describe AFCEH 2.0 are: NEW UPDATED MORE

confidential

What is new in AFCEH 2.0?

• More than 90% of the topics in the video lectures will have a NEW, UPDATED data and content. • A NEW book titled Intrusion Detection will be given out to participants as a text book. • The following Attachment. NEW topics will be taught: See

confidential

TABLE OF CONTENTS FOR AFCEH
Introduction To Information Security And Ethical Hacking Importance of Security Can Hacking be Ethical? Threat Vulnerability Target of Evaluation Attack Exploit CIA Triad – Elements of Security Modes Operandi of Hackers Reconnaissance Scanning Gaining Access Maintaining Access Covering Tracks Classification of Hacker Black Hats White Hats Grey Hats TCP/IP Concepts in brief OSI Layer and TCP /IP Architecture Common Protocols used and their working 3 Way Handshakes .FOOT PRINTING Whois DNS lookup / Nslookup Network Range Traceroute Sam Spade NeoTrace Visual Route SmartWhoIs SCANNING Ping and related ICMP concepts. Port Scanning Tool – Pinger Tool – WS_PingProPack Tool – NetScan Tools Tool – Hping Tool – icmpenum Detecting Ping Sweeps Tool –IDS like ISA Server or Snort Port Scanning TCP Connect Scanning TCP SYN Scanning SYN/ACK Scanning TCP FIN Scanning TCP NULL Scanning TCP XMAS Scanning Detecting Port Scanning Tool – nmap Tool – SuperScan Tool – Cheops DNS Mining Tools – Perl script for DNS Mining – blindcrawl.pl ENUMERATION NetBIOS Null Session NetBIOS Null Session Countermeasures Tool - NBTScan Tool – DumpSec Tool – NetBIOS Auditing Tool SNMP Enumeration Tool – SNMP Util Tool – enum

confidential

TABLE OF CONTENTS FOR AFCEH
SYSTEM HACKING Password Attacks Password Guessing Dictionary attack Brute Force Attack Hybrid Attack Social Engineering Shoulder Surfing Dumpster Diving Tool – Legion Rainbow Tables Password Sniffing Tool – LOphtcrack Previlege Escalation Tool – John The Ripper Password Cracking Countermeasures Keystroke Loggers Hardware Keylogger Rootkits Rootkit counter measures How to cover your tracks Disabling auditing Clearing the event log Steganography Other methods of hiding files Attrib NTFS Alternate Data Stream Buffer Overflows Protection against buffer overflow Metasploit Hacking using USB TROJAN AND BACKDOORS Introduction Working of Trojans Types of Trojans Remote Access Trojans Password Sending Trojans Keyloggers Destructive Trojans DoS Attack Trojans Proxy / Wingate Trojans FTP Trojans Software Detection Killers How Trojans are transmitted Tool – SubSeven or BackOrifice Tool – Netbus EXE Binders or Wrappers XSS (Cross Site Scripting) Reverse Cross Site Request (RCSR) SNIFFERS What is packet or network sniffing? Tool – Ethereal / Wireshark Tool – Snort Tool – tcpdump Tool – Windump Man in the middle attack ARP Spoofing

confidential

TABLE OF CONTENTS FOR AFCEH
DENIAL OF SERVICE ATTACKS Introduction Types of DoS Attacks Bandwidth attacks Protocol attacks, and Logic attacks DDOS Tool – SSPing Tool – Etherape Land Exploit Tool – Trinoo Preventing DoS Attacks SQL INJECTION Introduction OLE DB Errors Input Validation Attacks Tools used for SQL Injection How to Prevent SQL Injection WIRELESS NETWORKS Introduction Various Wireless standards WEP Wireless DoS Wireless Sniffing Tool - Airsnort Tool – AiroPeek Wireless IDS VIRUSES Introduction How viruses work? Types of viruses Protection of against viruses GOOGLE HACKING ENCRYPTION MISC Firefox as Pen Testing Tool Some scripts (perl scripts or other scripts) which is commonly used during pen testing like lbd (load balancing detector)

confidential

About The Program

•

18-hour program spread over 30 days • Live Video Lectures and Interactive Q&A Sessions of 4 hours over Video Conference. • 14 hours free Internet access @ RW for accessing 11 hours of self-pace self-learning Video on demand content, Hacking demonstration on Video & 2 hours of Online Exam. Ankit Fadia’s 6 international bestsellers worth Rs. 1545/- to be given absolutely free. Certification on successful completion of online certification exams.

•

•

confidential

How To Enroll @ Reliance World

confidential

Click Here to access the course

confidential

Click Here to register the course

confidential

confidential

Click Here to Enter for Video Lessons the course

confidential

confidential

confidential

From Ankit Fadia moments Batch 4. Our S.P. Mr Milind Bharambe and A.S.P Mr Sunil Kolhe successfully completed this course with enthusiasm.”
confidential

In ROM only Sangli has done Ankit Fadia Corporate Batch. Director Of M/s B.G Chitale Dairy Mr Vishwas Chitale and also other computer profession’s successfully completed this course with enthusiasm.” Our S.P. Mr Milind Bharambe also participated in this course
confidential

About The Program
Program Price – Rs. 6499/The Price Includes - Cost Of Video Conferencing - Access Cost for Video-On-Demand - On Line Examination Fee - PLUS - 6 of Ankit’s International Best Selling books on Hacking & counter measures

confidential

About The Program

For Admission Contact Mahesh Ojha ( Web Lead ) 09373445444.

confidential


				
DOCUMENT INFO
Shared By:
Categories:
Stats:
views:2695
posted:11/9/2009
language:English
pages:30