Вы находитесь на странице: 1из 13

CertStore (The Certification Store)

A complete certification online and offline store where you can accomplish
any of IT certification and Training. CertStore is master and specialized to
deliver the IT training programs and certifications to its global students and
participants.
CertStore is a ISO (International Standard Organization) Certified and
Approved by Govt. Of India.
History:
Delivering its certification and training across to the global interested
students and participants. The CertStore was founded in 2010 with a positive
mindset and objective to deliver the IT training programs and certifications to
the maximum students and participants in Asia and across the globe.
CertStore is a platform of 100+ IT professionals who are experts and globally
certified in their respective domains. CertStore having 50+ Authorizations and
Endorsements including EC-Council, CompTia, Microsoft, Cisco, D-Link, NIIT,
Exin, Google and many more
Why we are a Fastest Growing Leading IT Company:
6+ years of working
50+ Authorizations and Endorsements
100+ Globally Certified and International Instructors
500+ Courses
50,000+ Students are Certified
100% Satisfaction Guaranteed
100% Quality Delivered

The Certified Ethical Hacker V.9 program is the pinnacle of the most desired
information security training program any information security professional will
ever want to be in. To master the hacking technologies, you will need to
become one, but an ethical one! The accredited course provides the
advanced hacking tools and techniques used by hackers and information
security professionals alike to break into an organization. As we put it, To
beat a hacker, you need to think like a hacker. This course will immerse you
into the Hacker Mindset so that you will be able to defend against future
attacks. The security mindset in any organization must not be limited to the
silos of a certain vendor, technologies or pieces of equipment.
This ethical hacking course puts you in the drivers seat of a hands-on
environment with a systematic process. Here, you will be exposed to an
entirely different way of achieving optimal information security posture in their
organization; by hacking it! You will scan, test, hack and secure your own
systems. You will be taught the five phases of ethical hacking and the ways to
approach your target and succeed at breaking in every time! The five
phases include Reconnaissance, Gaining Access, Enumeration, Maintaining
Access, and covering your tracks.

This is the world's most advanced ethical hacking


course with 18 of the most current security
domains any ethical hacker will ever want to know
when they are planning to beef up the information
security posture of their organization. In 18
comprehensive modules, the course covers 270
attack technologies, commonly used by hackers.

Real life Scenario


Our security experts have designed over 140 labs which mimic real time scenarios in the
course to help you live through an attack as if it were real and provide you with access to
over 2200 commonly used hacking tools to immerse you into the hacker world.
As a picture tells a thousand words, our developers have all this and more for you in over
1685 graphically rich, specially designed slides to help you grasp complex security concepts
in depth which will be presented to you in 5 day hands on class by our Certified Instructor.
The goal of this course is to help you master an ethical hacking methodology that can be
used in a penetration testing or ethical hacking situation. You walk out the door with ethical
hacking skills that are highly in demand, as well as the internationally recognized Certified
Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hacker
exam 312-50.
In short, you walk out the door with advanced hacking skills that are highly in demand, as
well as the internationally recognized Certified Ethical Hacker certification!

CEH V9 Endorsements

Focus on New Attack Vectors


o

Emphasis on Cloud Computing Technology

CEHv9 focuses on various threats and hacking attacks to the emerging cloud

Covers wide-ranging countermeasures to combat cloud computing attacks

Provides a detailed pen testing methodology for cloud systems to identify threat

Emphasis on Mobile Platforms and Tablet Computers

CEHv9 focuses on the latest hacking attacks targeted to mobile platform and tablet
computers and covers countermeasures to secure mobile infrastructure

Coverage of latest development in mobile and web technologies

New Vulnerabilities Are Addressed


o

Heartbleed CVE-2014-0160

Heartbleed makes the SSL layer used by millions of websites and thousands of cloud

Detailed coverage and labs in Module 18: Cryptography.

Shellshock CVE-2014-6271

Shellshock exposes vulnerability in Bash, the widely-used shell for Unix-based


operating systems such as Linux and OS X.

Detailed coverage and labs in Module 11: Hacking Webservers

Poodle CVE-2014-3566

POODLE lets attackers decrypt SSLv3 connections and hijack the cookie session that
identifies you to a service, allowing them to control your account without needing
your password.

Case study in Module 18: Cryptography

Hacking Using Mobile Phones

CEHv9 focuses on performing hacking (Foot printing, scanning, enumeration, system


hacking, sniffing, DDoS attack, etc.) using mobile phones

Courseware covers latest mobile hacking tools in all the modules

Coverage of latest Trojan, Virus, Backdoors

Courseware covers Information Security Controls and Information Security Laws and
Standards

Labs on Hacking Mobile Platforms and Cloud Computing

More than 40 percent new labs are added from Version 8

More than 1500 new/updated tools

CEHv9 program focuses on addressing security issues to the latest operating systems like
Windows 8.1

It also focuses on addressing the existing threats to operating environments dominated by


Windows 7, Windows 8, and other operating systems (backward compatibility)

The hacking tools and techniques in each of these five phases are provided
in detail in an encyclopaedic approach to help you identify when an attack
has been used against your own targets. Why then is this training called the
Certified Ethical Hacker Course? This is because by using the same
techniques as the bad guys, you can assess the security posture of an
organization with the same approach these malicious hackers use, identify
weaknesses and fix the problems before they are identified by the enemy,
causing what could potentially be a catastrophic damage to your respective
organization.
We live in an age where attacks are all susceptible and come from anyplace
at any time and we never know how skilled, well-funded, or persistent the
threat will be. Throughout the CEH course, you will be immersed in a hacker's
mindset, evaluating not just logical, but physical security. Exploring every
possible point of entry to find the weakest link in an organization. From the
end user, the secretary, the CEO, miss-configurations, vulnerable times during
migrations even information left in the dumpster.

Who is it For ?
The Certified Ethical Hacking training course will significantly benefit security
officers, auditors, security professionals, site administrators, and anyone who is
concerned about the integrity of the network infrastructure.

Duration:
15-30 Days (10:00 AM - 06:00 PM)

Pre-Requisite:
Basic Knowledge of Computer and Internet

C|EH V9 Course Fee:


30,000.00 INR or
(Included all taxes and registrations)

Exam Details:
Number of Questions: 125
Test Duration: 4 Hours
Test Format: Multiple Choice
Test Delivery: CERTSTORE, ECC EXAM, VUE
Exam Prefix: 312-50 (ECC EXAM), 312-50 (VUE)

CEH V9 Offer:
Current Offer/Discount:
Please register before 30th June 2016 and Get "100% FREE ECSA or CCNA"
Training

What is Included with the CEH V9 Course:


Global EC-Council CEH V9 Certification
Global training certification
EC-Council Study Material
EC-Council Digital Kit
EC-Council Official Training
EC-Council Exam Voucher
Certified Global/International Instructors

Benefits with Us:


EC-Council C|EH T-shirt- NEW
100% Hands-On- NEW
i-lab Access (if applicable) worth 250$ USD- NEW
Exam Re-Take voucher worth 500$ USD- NEW
24*7 Lab access and support- NEW
Free lifetime membership validity- NEW
Workshop Invitation and pass- NEW
Global blog and forum access- NEW
Free Exam and Lab Preparation- New
Free Mock Test- New
Highly Interactive and Technology Classrooms- New
100% Satisfaction or money back guaranteed- New

Free CEH Skill Assessment:

To register your seat kindly pay by the following methods:


Cash Deposit
You can deposit cash to our bank accounts.
Cheque/Demand Draft
You can make a cheque or demand draft (DD) in favour of
"CertStore Solution"
Online Transfer/NEFT/RTGS
You can also transfer funds online through NEFT or RTGS.
Paypal Transfer
You can also pay via pal by using our pay pal email account
"info@certstore.in"

CertStore Solution- Transforming Your Career


(Leading IT certifications and training company)
Address: Office No.47, Ground Floor, Lakshmi Nagar,
New Delhi 110092, Near Nathu Sweets
For General Inquiries:
Telephone/Fax: 011-43019304
Mobile: +91-80109439-04
For Business Related Inquiries:
Mobile: +91-80109439-00
For Marketing Related Inquiries:
Mobile: +91-80109439-01
Global Web: www.certstore.in
E-Mail: info@certstore.in

Thank You...

Вам также может понравиться