Training
We offer education and Cyber Security Training to IT managers on various aspects of policy development, systems implementation, secure coding
Cyber Security Training and education of all levels and classes of staff, from C level through to IT and general staff can be the most critical and often under valued part of your businesses IT policy.Staff can be an easily exploited vulnerability in your organisation which has been demonstrated time and again. Social Engineering is widely regarded as one of the most widely used exploits in a hackers tool kit. It is quick to deploy, and extremely effective.
|
Hesperus Indosec believes that without awareness training being deployed to all levels of staff in an organisation a significant gap exists in the info sec policy that will likely be exploited for dramatic effect, or it will create a very large headache. Our awareness training involves practical examples and case studies from our own experiences and draws on other common tactics. It is fun, engaging and incredibly valuable.
|
Courses
Ethical Hacking and Countermeasures to Become a Certified Ethical Hacker (v9)
Most Advanced Hacking Course
The Certified Ethical Hacker program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”. This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment.
A Snapshot of
What is New in CEH Version 9 Course
Focus on New Attack Vectors
Most Advanced Hacking Course
The Certified Ethical Hacker program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”. This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment.
A Snapshot of
What is New in CEH Version 9 Course
Focus on New Attack Vectors
- Emphasis on Cloud Computing Technology
- CEHv9 focuses on various threats and hacking attacks to the emerging cloud computing technology
- Covers wide-ranging countermeasures to combat cloud computing attacks
- Provides a detailed pen testing methodology for cloud systems to identify threats in advance
- Emphasis on Mobile Platforms and Tablet Computers
- CEHv9 focuses on the latest hacking attacks targeted to mobile platform and tablet computers and covers countermeasures to secure mobile infrastructure
- Coverage of latest development in mobile and web technologies
- Heartbleed CVE-2014-0160
- Heartbleed makes the SSL layer used by millions of websites and thousands of cloud providers vulnerable.
- Detailed coverage and labs in Module 18: Cryptography.
- Shellshock CVE-2014-6271
- Shellshock exposes vulnerability in Bash, the widely-used shell for Unix-based operating systems such as Linux and OS X.
- Detailed coverage and labs in Module 11: Hacking Web servers
- Poodle CVE-2014-3566
- POODLE lets attackers decrypt SSLv3 connections and hijack the cookie session that identifies you to a service, allowing them to control your account without needing your password.
- Case study in Module 18: Cryptography
- Hacking Using Mobile Phones
- CEHv9 focuses on performing hacking (Foot printing, scanning, enumeration, system hacking, sniffing, DDoS attack,etc.) using mobile phones
- Courseware covers latest mobile hacking tools in all the modules
- Coverage of latest Trojan, Virus, Backdoors
- Courseware covers Information Security Controls and Information Security Laws and Standards
- Labs on Hacking Mobile Platforms and Cloud Computing
- More than 40 percent new labs are added from Version 8
- More than 1500 new/updated tools
- CEHv9 program focuses on addressing security issues to the latest operating systems like Windows 8.1 It also focuses on addressing the existing threats to operating environments dominated by Windows 7, Windows 8, and other operating systems (backward compatibility)
Who is it for
The Certified Ethical Hacking training course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
Duration: 5 Days
Exam Info
Number of Questions: 125
Passing Score: 70%
Test Duration: 4 Hours
Test Format: Multiple Choice
Test Delivery: ECC EXAM, VUE
Certified Secure Computer User Certification
Course Description:
The purpose of the CSCU training program is to provide students with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learnt from the class helps students take the necessary steps to mitigate their security exposure.
What Will You Learn:
The purpose of the CSCU training program is to provide students with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learnt from the class helps students take the necessary steps to mitigate their security exposure.
What Will You Learn:
Who Should Attend:
This course is specifically designed for todays' computer users who uses the internet and the www extensively to work, study and play.
Age Requirements and Policies Concerning Minors
The age requirement for attending the training or attempting the exam is restricted to any candidate that is at least 13 years old.
If the candidate is under the age of 13, they are not eligible to attend the official training or eligible to attempt the certification exam unless they provide the accredited training center/EC-Council a written consent of their parent/legal guardian and a supporting letter from their institution of higher learning. Only applicants from nationally accredited institution of higher learning shall be considered.
Disclaimer
EC-Council reserves the right to impose additional restriction to comply with the policy. Failure to act in accordance with this clause shall render the authorized training center in violation of their agreement with EC-Council. EC-Council reserves the right to revoke the certification of any person in breach of this requirement.
Certified Security Analyst
An Introduction to the Advanced Penetration Information Security:
This course is the intermediate level of an advanced level which demonstrates the investigative approach to the ethical hacking. While in the basic level Certified Ethical Hacker (CEH) Certification, we learn about the hacking tools and techniques, the intermediate level prepares us to extensively analyze the results of the hacking tools. It helps us in carrying out the assessments required to effectively find out and mitigate the risks to infrastructure.
This certification adds value to the Information Security Professionals by giving them a practically oriented approach to the penetration testing. A successful completion of this Certification makes you eligible to appear for the most coveted and advanced certification for security professionals, the Licensed Penetration Tester (LPT) Certification.
Advanced Penetration Testing and Security Analysis:This program introduces us to the intricacies of the hacking tools and technologies. It teaches the Information Security Professionals to traverse beyond merely running the tools, to practically provide the countermeasures, detection and protection measures for the vulnerabilities that they locate using the available tools. This course about Security Analysis gives you a applied as well as legal perspective of designing, securing and testing the network architecture to make it impermeable for the external malicious crackers and hackers. Most interesting part of the program is where they learn how to eliminate the risks altogether, with the courseware providing a bird-eye’s view of the networking environment.
This course is the intermediate level of an advanced level which demonstrates the investigative approach to the ethical hacking. While in the basic level Certified Ethical Hacker (CEH) Certification, we learn about the hacking tools and techniques, the intermediate level prepares us to extensively analyze the results of the hacking tools. It helps us in carrying out the assessments required to effectively find out and mitigate the risks to infrastructure.
This certification adds value to the Information Security Professionals by giving them a practically oriented approach to the penetration testing. A successful completion of this Certification makes you eligible to appear for the most coveted and advanced certification for security professionals, the Licensed Penetration Tester (LPT) Certification.
Advanced Penetration Testing and Security Analysis:This program introduces us to the intricacies of the hacking tools and technologies. It teaches the Information Security Professionals to traverse beyond merely running the tools, to practically provide the countermeasures, detection and protection measures for the vulnerabilities that they locate using the available tools. This course about Security Analysis gives you a applied as well as legal perspective of designing, securing and testing the network architecture to make it impermeable for the external malicious crackers and hackers. Most interesting part of the program is where they learn how to eliminate the risks altogether, with the courseware providing a bird-eye’s view of the networking environment.
Whats New in ECSA V9
ECSA Pen test Course - Skills Based Competency
The ECSAV9 penetration testing course is designed to enhance the skills based competency of a penetration tester. This course is intensively hands-on and a tremendous amount of emphasis is placed on the practical competency of the student.
Who is it For
Who Should Attend:
Ethical Hackers, Penetration Testers Network server administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment professionals.
Certification Exam:
The ECSA exam aims to test a candidate’s knowledge and application of critical penetration testing methodologies.
The exam requires a candidate to perform real-world penetration testing over EC-Council’s secure cyber range and to produce a penetration test report which clearly document the vulnerabilities found. This report will be graded by our professionals. Candidates that successfully submit an acceptable report will proceed on to a multiple choice exam that tests a candidates knowledge.
Candidates that successfully submit an acceptable report and the pass the multiple choice exam will be awarded the ECSA credential.
Computer Hacking Forensic Investigator
Computer forensics include the application of computer investigation and analysis techniques in the interests of determining potential legal evidence
Computer Forensics
CHFIv8 presents detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enables students to acquire necessary hands-on experience on various forensic investigation techniques and standard forensic tools necessary to successfully carryout a computer forensic investigation leading to prosecution of perpetrators.
Computer forensics include the application of computer investigation and analysis techniques in the interests of determining potential legal evidence
Computer Forensics
CHFIv8 presents detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enables students to acquire necessary hands-on experience on various forensic investigation techniques and standard forensic tools necessary to successfully carryout a computer forensic investigation leading to prosecution of perpetrators.
Certification
CHFI v8 Program certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The C|HFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.
CHFI v8 Program certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The C|HFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.
A CHFI v8 certified professional will be able to understand:
Duration: 5 Days
The process of investigating cyber-crime, laws involved, and the details in obtaining a search warrant.
Different types of digital evidence, rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category
Roles of first responder, first responder toolkit, securing and evaluating electronic crime scene,conducting preliminary interviews, documenting electronic crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence, reporting the crime scene
Duration: 5 Days
The process of investigating cyber-crime, laws involved, and the details in obtaining a search warrant.
Different types of digital evidence, rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category
Roles of first responder, first responder toolkit, securing and evaluating electronic crime scene,conducting preliminary interviews, documenting electronic crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence, reporting the crime scene
- How to recover deleted files and deleted partitions in Windows, Mac OS X, and Linux
- The process involved in forensic investigation using Access Data FTK and Encase Steganography and its techniques, Steganalysis, and image file forensics
- Password Cracking Concepts, tools, types of password attacks and how to investigate password protected file breach
- Different types of log capturing techniques, log management, time synchronization, log capturing tools
- How to investigate logs, network traffic, wireless attacks, and web attacks
- How to track e-mails and investigate e-mail crimes and many more.
Courses
Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks.
Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. Computer forensic investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information.
Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks.
Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. Computer forensic investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information.
The CHFI course will give participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute. Many of today’s top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the “cyber-criminal.” It is no longer a matter of “will your organization be comprised (hacked)?” but, rather, “when?” Today’s battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminal, then this is the course for you.
Training
Computer forensics training teaches that computer forensics investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. Computer Hacking Forensic investigators (CHFI) can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information. Securing and analyzing electronic evidence is a central theme in an ever-increasing number of conflict situations and criminal cases.
Computer forensics training teaches that computer forensics investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. Computer Hacking Forensic investigators (CHFI) can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information. Securing and analyzing electronic evidence is a central theme in an ever-increasing number of conflict situations and criminal cases.
EC-Council Certified Security Specialist (ECSS) allows students to enhance their skills in three different areas namely information security, network security, and computer forensics.
Information security plays a vital role in most of the organizations. Information security is a state of affairs where information, information processing, and communication are protected against the confidentiality, integrity, and availability of information and information processing. In communications, information security also covers trustworthy authentication of messages that cover identification of the parties, verifying, and recording the approval and authorization of the information, non-alteration of the data, and the non-repudiation of the communication or stored data.
Network security plays a vital role in most of the organizations. It is the process of preventing and detecting the unauthorized use of your computer. It protects the networks and their services from the unauthorized modification, destruction, or disclosure. Network security provides assurance that a network performs its critical functions correctly and there are no harmful side effects.
Who Should Attend
This course will benefit the students who are interested in learning fundamentals of information security, network security, and computer forensics.
Exam Info
The ECSS exam will be conducted on the last day of training. Students need to pass the online EC- Council Exam to receive the ECSS certification.
Number of Questions: 50·
Passing Score: 70
Test Duration: 2 Hours
Test Format: Multiple Choice
The age requirement for attending the training or attempting the exam is restricted to any candidate that is at least 18 years old.
If the candidate is under the age of 18, they are not eligible to attend the official training or eligible to attempt the certification exam unless they provide the accredited training center/
EC-Council a written consent of their parent/legal guardian and a supporting letter from their institution of higher learning. Only applicants from nationally accredited institution of higher learning shall be considered.
If the candidate is under the age of 18, they are not eligible to attend the official training or eligible to attempt the certification exam unless they provide the accredited training center/
EC-Council a written consent of their parent/legal guardian and a supporting letter from their institution of higher learning. Only applicants from nationally accredited institution of higher learning shall be considered.
The EC-Council Licensed Penetration Tester (Master) Credential
To earn the prestigious EC-Council LPT (Master) Credential, you must successfully pass our most challenging practical exam available. The LPT(Master) practical exam is the capstone to EC-Council’s entire information security track; from the Certified Ethical Hacker Program (CEH) to the EC-Council Certified Security Analyst (ECSA) Program. It all culminates with the ultimate test of your career as a penetration tester – the Licensed Penetration Tester practical exam.
You will need to demonstrate a mastery of the skills required to conduct a full black box penetration test of a network provided to you by EC-Council on our cyber range. You will follow the entire process taught to you through Ethical Hacking and Security Assessment, taking you from reconnaissance, through scanning, enumeration, gaining access, maintaining access, then exploiting vulnerabilities that you will have to seek out in a network that only a true professional will be able to break. All toolsets are provided to you, you bring the skill.
A Real Time Performance Based Assessment
The LPT (Master) exam is developed with collaboration from SMEs and practitioners around the world after a thorough job role, job task, and skills-gap analysis.
The exam environment simulates a complex network of a multi-national organization in real time. This virtual cyber range, much like an actual network, has multiple networks with different militarized and de-militarized zones. Like any organization, the target of evaluation in the LPT (Master) practical exam is segmented into many departments, has various users and groups from information workers, to admins, to executives, various operating systems, patch levels, proprietary as well as open source applications, and security controls.
Benefits of Penetration testing certification
EC-Council's prestigious endorsement as a licensed penetration testing professional, allows successful candidates to practise penetration testing and consulting internationally.
Industry acceptance as a legal and ethical security professional.
Access to proprietary EC-Council software, templates, and penetration testing methodologies.
License to practice and conduct security testing in organizations accredited by EC-Council.
Acquire knowledge from experienced hands-on Licensed Penetration Tester methodologies and latest penetration testing practices.
Disclaimer
EC-Council reserves the right to impose additional restriction to comply with the policy. Failure to act in accordance with this clause shall render the authorized training center in violation of their agreement with EC-Council. EC-Council reserves the right to revoke the certification of any person in breach of this requirement.