Cyber Security and Ethical Hacking - Dice Analytics

Dice presents a complete training on Cybersecurity & Ethical Hacking.

 

The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. Since the introduction of CEH in 2003, it is recognized as a standard within the information security community. CEH v11 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today. The Five Phases of Ethical Hacking and the original core mission of CEH remain valid and relevant today: “To beat a hacker, you need to think like a hacker.”

 

70% Hands-on

30% Theory

Training Completion Certificate*

View Course Outline Register Now

Schedule

Starting

25 March, 23

Duration

8 Weeks

Class Days

Saturday & Sunday
11 AM to 4 PM

Remaining Seats

Limited Seats Available.

Meet The Trainer!

qodef-fullwidth-slider

Jahanzaib Awan

Cyber Security Operations Engineer at Careem

A Senior Cyber Security Engineer with proven expertise in designing and deploying secure infrastructures on cloud/premises, security controls and cyber operations side. Implementing security measures and auditing the effectiveness of security controls. A respectable record of recommending security improvements, evaluating and identifying vulnerabilities and improving overall system efficiencies for the diverse nature of clients. Adept at leading Information Security Management Programs and staying ahead of current risks.

Tools

Course Outline

Week 1

Information security concepts
Threads, attacks, IoCs, Cyber kill chain
Open Source Intelligence gathering
Recon through search engines

Week 2

Scanning techniques
Network Pentesting
Scanning with Angry IP scanner, Nmap
Online Scanning tools
Open Source scanning tools
Different Network Protocols
Services associated with Protocols
NetBIOS, smtp, snmp, dns
Enumeration within the network
Discussion on real life examples

Week 3

What is VAPT
VAPT Phases
VAPT Industrial best security practice
VAPT Assessment tools and reports
Techniques to gain access to system
Privilege Escalation
Practical with Nessus
Manual testing with Nmap (advanced usage)
Windows binary backdooring
System Pwning with exploits

Week 4

Mobile OS Architecture
Mobile Security
MDM and Spywares
Types of Malwares
Malware Analysis
Malware Protection
Endpoint Security
Mobile Security testing
Securing Mobile Devices
Creating Malware with Msfvenom
Hacking system with Malware

Week 5

What are web servers
Risks related to Web servers
Web Servers attack defence
Hacking web server using different techniques
Web application attacks
OWASP framework
Attacks and Prevention
Tools for Web security
Sql injection
Types of SQLi
Mitigation of SQLi
OS Command Injection
LFI and RFI
XSS attacks
Burpsuite Intro and usage
Dumping data using Sqlmap

Week 6

Social Engineering conecpts
Identity and Access management
Social Engineering countermeasures
Social Engineering in real life
Cloud Architecture
Cloud Threats
Cloud Security

Week 7

DOS and DDOS
DOS Techniques
Detecting and Mitigating DOS attack
Analyzing DOS attack
Crashing systems with DOS
Firewall types
Firewall deployement Models
Industry practice for firewall and Discussion
Different HoneyBots

Week 8

Sniffing concepts
Types of sniffing
Defence against sniffing
Session Hijacking on OSI Layers
Application level session hijacking
FAQ

Pricing

  • Individual Price
    • PKR 30,000 Per Person
    • Total charges for complete Workshop
    • Book a seat
  • Group of 2
  • Group of 3

Reserve your Seat

You can reserve your seat  by filling the form below

 

     
    Are you a: 
    StudentWorking Professional

     

     

     

    Frequently Asked Questions

    Who should attend the course?

    • Fresh Graduates with the passion to pursue their career in Cyber Security.
    • Industry Professionals who want to change their domain.
    • Security Managers and Risk managers who want to enhance their cyber security skills

    What if I miss any of the lectures?

    Don’t worry! We have got you covered. You shall be shared recorded lectures after each session, in case you want to revise your concepts or miss the lecture due to some personal or professional commitment.

    What is the timing of the course?

    Duration: 8 weeks
    Timings: Saturday & Sunday 11 AM to 4 PM

    Can I get a job after this course?

    Since our instructors are industry experts so they do train the students about practical world and also recommend the shinning students in industry for relevant positions.

    Can I rejoin this workshop/training?

    Yes, you can rejoin the training within the span of an year of your registration. Please note following conditions in case you’re rejoining.
    1) There are only 5 seats specified for rejoiners in each iteration.
    2) These seats will be served on first come first basis.
    3) If you have not submitted your complete fee, you may not be able to rejoin. Your registration would be canceled.

    How much hands-on will be performed in this course?

    Since our courses are led by Industry Experts so it is made sure that content covered in course is designed with hand on knowledge of more than 50% along with supporting theory.

    How integrative classes would be?

    Classes will be interactive throughout & LIVE on Zoom. You would be able to ask questions & share views with the Technical Assistant, Trainer & class other participants.

    What are the PC requirements?

    For this professional course, you need to have a PC with minimum 4GB RAM and ideally 8GB RAM.

    Will I get a certificate after this course?

    Yes, you will be awarded with a course completion certificate by Dice Analytics. We also keenly conduct an annual convocation for the appreciation and recognition of our students.

    \