Вы находитесь на странице: 1из 11

Student Introduction

Student Introduction
Introduction of Participants Name : Company Affiliation : Title / Function : Job Responsibility :

Introduction of Participants

Name :

Company Affiliation :

Title / Function :

Job Responsibility :

System security related experience :

Expectations :

Course Outline Chapter 1 - Introduction To Ethical Hacking Chapter 2 - Networking & Basics

Course Outline

Chapter 1 - Introduction To Ethical Hacking Chapter 2 - Networking & Basics Chapter 3 - Footprinting

Chapter 4 - Google Hacking

Chapter 5 - Scanning Chapter 6 - Windows Hacking Chapter 7 - Linux Hacking Chapter 8 - Trojans & Backdoors

Course Outline Chapter 9 - Virus & worms Chapter 10 - Proxy servers & Packet

Course Outline

Chapter 9 - Virus & worms Chapter 10 - Proxy servers & Packet Filtering Chapter 11 - Denial of service

Chapter 12 - Sniffers

Chapter 13 - Social Engineering Chapter 14 - Physical Security

Chapter 15 - Steganography Chapter 16 - Cryptography

Course Outline Chapter 17 - Wireless Hacking Chapter 18 - Firewalls & Honeypots Chapter 19

Course Outline

Chapter 17 - Wireless Hacking Chapter 18 - Firewalls & Honeypots Chapter 19 - IDS & IPS

Chapter 20 - Vulnerability Assessment

Chapter 21 - Penetration Testing Chapter 22 - Session Hijacking Chapter 23 - Hacking Web Server Chapter 24 - SQL Injection

Course Outline Chapter 25 - XSS Chapter 26 - Exploit Writing Chapter 27 - Buffer

Course Outline

Chapter 25 - XSS Chapter 26 - Exploit Writing Chapter 27 - Buffer Overflow

Chapter 28 - Reverse Engineering

Chapter 29 - Email Hacking Chapter 30 - Incident Handling & Response

Chapter 31 - Bluetooth Hacking Chapter 32 - Mobile Phone Hacking

Following Are Self Study Modules : Chapter 15 - Physical Security Chapter 30 - Incident

Following Are Self Study Modules:

Chapter 15 - Physical Security Chapter 30 - Incident handling & Response Chapter 31 - Bluetooth Hacking Chapter 32 - Mobile Phone Hacking

Homework • CISEv2 Curriculum consists of Instructor Led Training and Self Study. • The Instructor

Homework

CISEv2 Curriculum consists of Instructor Led Training and Self Study.

The Instructor will cover 28 Modules in the Classroom.

There will be Self study homework also from Module 1 to 32, There will lots of research work And Practicals in every module that the student needs to study these on their own.

It is mandatory to finish to all the Practicals and Research work

of the previous class before attending the next class in order to understand the topics and concepts properly.

Your instructor will provide details of additional modules marked for self-study (if any)

It is also recommended that’s students create their notes for each module covered in the classroom.

C.I.S.E Certification Program There are several levels of certification tracks under C I S E

C.I.S.E Certification Program

There are several levels of certification tracks under C I S E

Certified Information Security Expert (CISEv2) Level 1

You are here

Certified Information Security Expert Level 2

Exploit Writing & Advance Metasploit

Malware development

Reverse Engineering

Web Application Hacking

Network Security

CISEv2 Class Speed The CISEv2 class is extremely fast paced. Please be prepared for this.

CISEv2 Class Speed

The CISEv2 class is extremely fast paced.

Please be prepared for this.

The instructor WILL NOT be able to demonstrate all the tools.

NDA Document Please read the contents of the provided Innobuzz knowledge Solutions CISEv2 Program NDA

NDA Document

Please read the contents of the provided Innobuzz knowledge Solutions CISEv2 Program NDA document. Sign and hand it over to the instructor.

We will NOT start the class unless you sign this document.

Please approach the instructor if you are not presented with this document.