Certified Professional Hacker™ v2 - training

Certified Professional Hacker™ v2 - training to become a Professional Ethical Hacker
The Certified Professional Hacker v2 is a revolution in the field of information security training. It goes far beyond the usual courses that talk about the same old port scanning and vulnerability assessments. It goes deep down into the depths of networking, systems, and actual exploitation. Here are some of the things you'll find in the CPH v2, which you would be hard-pressed to find in other certified ethical hacking courses.

In-depth study of the TCP/IP protocol stack - the founding blocks for any good hacker

Buffer overflows and format string exploits - actual exploitation of buffer overflows, use of IDA Pro, Disassemblers and other advanced tools

Writing exploits using Metasploit - the most powerful advanced hacking platform available, and its full utilization

In-depth study of the OWASP Top Ten and Web 2.0 hacking - Advanced SQL injection and blind SQL injection, not just XSS, but also CSRF

Bluejacking, hacking 2-factor authentication, IPS and UTM technologies

Why should you attend this course?
You've heard of courses that claim to make you an ethical hacker, but what's the definition of a 'hacker'? A 'hacker' is someone who goes into the depths of any system, and tries to understand how things actually work, not just someone who runs a bunch of scripts from the Internet to try and break into systems.

One of the greatest USPs of the CPH course is that it is built by experts who do penetration testing on a regular basis. Led by K. K. Mookhey, who is the founder of one of India's leading information security firms - Network Intelligence. He has authored books on Linux Security and Metasploit Framework, and numerous articles on securityfocus.com, and other sites. He has presented at prestigious conferences such as Blackhat USA, Interop, IT Underground, and others. Read his full profile here. Also, since it is build by practitioners in the field, it also happens to be regularly updated with the latest tools, techniques, and real-world scenarios.

In fact, the lab setup for the course itself is the single-most important reason to attend the course. Where else can you actually launch attacks, see the packet flows, analyze them, tweak your attacks, and get to break into systems that have been set up to create levels of challenges and hone your skills.
Who should attend this course?
Anyone looking to build a career in information security, or if you're someone who's already in this field, but want to learn the Professional concepts of hacking, then this is the course for you. It simply will not get more practical and more hands-on than this. Instead of burdening you with huge amount of courseware, and hundreds of tools, the CPH course focuses on the real-world practical tools and techniques of hacking.
Course Contents
Session One: Getting the basics right

Module 1: TCP/IP Fundamentals
Module 2: System Fundamentals
Module 3: Firewall Technologies
Module 4: Programming & Database Fundamentals

Session Two - Network Cartography

Module 5: Advanced Google Hacking
Module 6: Fingerprinting
Module 7: Nmapping the network
Module 8: Footprinting

Session Three - Exploitation

Module 9: Hacking networks
Module 10: Hacking servers
Module 11: Hacking databases
Module 12: Backdooring

Session Four - Advanced Exploitation

Module 13: Hacking WLANs
Module 14: Evading IDS, Firewalls and Detecting Honey Pots
Module 15: Web Application Hacking
Module 16: Advanced Web Hacking
Module 17: Hacking Web Browsers (Firefox, IE)

Session Five - Black-belt Hacking

Module 18: Buffer overflows
Module 19: Metasploiting the universe
Module 20: Reverse Engineering
Module 21: Covert Hacking

Session Six - Social Engineering

Module 22: What is Social Engineering?
Module 23: Common Types of Attacks
Module 24: Social Engineering by Phone
Module 25: Dumpster Diving
Module 26: Online Social Engineering
Module 27: Reverse Social Engineering
Module 28: Policies and Procedures
Module 29: Employee Education

Session Seven - Cryptography

Module 30: Introduction to Cryptography
Module 31: Encryption and Decryption
Module 32: Cryptographic Algorithms
Module 32.1: DES
Module 32.2: RC4
Module 32.3: RC6
Module 32.4: Blowfish
Module 32.5: MD5
Module 32.6: SHA
Module 33: Government Access Key - GAK
Module 34: Digital Signature
Module 35: Cryptography Tools
Module 36: Code Breaking Methodologies
Module 37: Cryptography Attacks

Session Eight - Honeypots

Module 38: What is Honeypot?
Module 39: Honey net Project
Module 40: Types of Honey Pot
Module 41: Honey Pot Replacement
Module 42: Various Open Source and Commercial Honey Pots

Session Nine - Esoteric Hacking

Module 43: RFID Hacking
Module 44: Hacking Mobile Phones, PDA and Handheld Devices
Module 45: VoIP Hacking
Module 46: Cyber Warfare
Module 47: Hacking E-mails Accounts
Module 48: Corporate Espionage
Module 49: Botnets
Module 50: Bluetooth Hacking
Module 51: Hacking USB Devices
Module 52: Spamming

Session Ten - Password Cracking

Module 53: How to Steal Passwords
Module 54: Hashing Algorithm
Module 55: Active Brute Forcing
Module 56: Passive Brute Forcing
Module 57: Web-Based Password Cracking Techniques

Session Eleven - Trojans and Backdoors
Session Twelve - Viruses and Worms

Module 58: Writing Virus Codes

Session Thirteen - Phishing
Session Fourteen – Exploit Writing

Module 59: Assembly Language Tutorial
Module 60: Exploit Writing Module

Session Fifteen - Privacy on the Internet
Session Sixteen - Spying Technologies
Session Seventeen - Credit Card Frauds
Session Eighteen - Software Piracy and Warez
Session Nineteen – Securing Laptop Computers
Session Twenty - Data Loss Prevention
Session Twenty One - Physical Security
Session Twenty Two - Basics of Digital Forensics

Module 61: Hacking Incidents
Module 62: Defining the Forensics Process
Module 63: Digital Forensics Essentials – 6 A’s
Module 64: Investigation Guidelines
Module 65: Disk Based Forensics v/s Network Based Forensics
Module 66: Chain of Custody

Hands-on Exercises

The CPH course comes with a custom-built lab specially designed to clear up concepts, reinforce techniques, and make you comfortable with the tools of the trade. Here are the hands-on exercises you'll get to do:

Exercise 1: In-depth exploration of TCP/IP using Wireshark
Exercise 2: Analysis of tcpdump output to determine attacks
Exercise 3: In-depth usage of Nmap
Exercise 4: Cracking WLANs
Exercise 5: Hacking Oracle
Exercise 6: Building your own exploit
Exercise 7: Metasploit

2 Comments

  1. I read your blog content and found this blog information is very useful about Hacking Services! As we know cell phones are boon for us and millions of people are using mobile phones and spend time each other but what will happen if some hack your mobile. Now its time to Hire a Phone Hacker for handle all accounts. who can resolve your problems.

    ReplyDelete

Back to Top