View
242
Download
7
Category
Preview:
Citation preview
Certified Information Security and Ethical Hacker
CYBER THREAT IS...One Of The Most Dangerous Threats Surpassing Terrorism To The World.Develop Your Knowledge Base By Getting The Right Training With Respect To Security Fundamentals.
www.pristineinfosolutions.com
CISEH
About Us
Pristine InfoSolutions is one of the leading cyber security services andinformation security training provider headquartered in Mumbai,having branches all over India.
Pristine InfoSolutions Career Development and Training Department is one of the most trusted and by far the largest source for information security training and ethical hacking courses in India.Over the years we have trained many engineers, professionals and corporates in different cities across the country and produced highly skilled pool of IT professionals to counter global industry challenges in the field of Information Security.
The company is inspired by the guiding principle and vision of educating one and all about the nuances of cyber crime and the risks involved. We deliver trainings, workshops, seminars and services on 'Cyber Security', 'Computer Forensics' and also provides 'Cyber Investigation Support' on request basis.
The company's research development programs and training helps youth to achieve real-world skills to compete better in today's scenario.We have a diverse client base and our ability to tailor our services to the needs of publ ic , pr iva te , government and international clients is fundamental to our approach. We have served many reputed organizations like Indian Railways, HCL, Accenture, Wipro, Capgemini, Trend Micro, etc.
http://siliconindian.com/si_freemag/india-edition_sep_14_issue1.pdf(51st page in pdf, Page no. 100 in hard copy).
Currently the Company offers: A) Cyber support services: 1) Cyber crime investigation and computer forensics 2) Penetration & Vulnerability testing 3) Cyber detectives
B) Training services: 4) Corporate training 5) UG/PG students training 6) School students training
Apart from this the Company also encompasses:1. Pristine training centre (for professionals and students).2. Pristine summer camp in cyber security and computer forensic (for school & Jr. college students). 3. Pristine Digital Lab (Lab for computer forensic).4. Pristine Customized Solutions (Research & Development).5. Pristine Distance learning (Correspondence course).
Work Domains
P ristine InfoSolutions has been awarded as the India's top cyber securitycompany of the year 2014 by SiliconIndia.Also got featured in Silicon India Magazine:
Achievements
1st
500+
20000+
150+
India's top cyber securitycompany of the year 2014.
Corporate and educationalclients.
Students trained includingcorporate & college workshops
Website’s been patched,made hack proof.
CISEHCISEH
1 2www.pristineinfosolutions.com www.pristineinfosolutions.com
Pristine InfoSolutions has been featured in various print media and TV news channels to impart expertise on the
issues of Cyber Security. Recently, Pristine InfoSolutions was interviewed by NDTV on the issue of Xiaomi smartphone data compromise. Show recording available on: https://www.youtube.com/watch?v=xvlKnOFEfXU
CISEHCertified InformationSecurity and Ethical Hacker
CISEH is a comprehensive Ethical Hacking and Information Security training program focusing on latest security threats, advanced attacks and practical real time demonstration of the latest Hacking Techniques, methodologies, tools, tricks, and security measures required to meet the standards of highly skilled security professionals.
This is the most advanced Ethical Hacking and Information Security certification course offered by Pristine InfoSolutions and is a highly technical training module which covers all aspects of defense as well as attacks in the Cyber World. CISEH focuses on the latest hacking attacks and covers countermeasures to secure IT infrastructure.
The course content of CISEH meets the rigorous requirements of several government and industry standards for infosec education and training. Unlike others, this training will immerse students in interactive sessions with hands-on hacking and securing the cyber space so that they can gain experience in Ethical Hacking and Information Security.
Why CISEH Certification ?
With increasing use of the internet and concerns about its security, especially when it comes to things like consumer information or private details, there is considerable need for computer experts to work in ethical hacking field.
Organizations today recognize the strong need for information security; hence an ethical hacker or security expert is usually employed by companies to penetrate into networks and/or computer systems, using the same methods as a hacker, for the purpose of finding and fixing network and computer security vulnerabilities.
Whether you are a Fresher or an Experienced Professional , CISEH will distinguish yourself from the crowd to become most in-demand IT Security Professional.
How CISEH course beats other competitor’s offerings ?
Advanced hacking technologies
Complete hands-on hacking and countermeasures
Security auditing techniques and standard practices
Utilities from underground hacking communities
24x7 lab availability to practice hacking concepts
Live cyber crime investigation projects
Cyber Law Acts and pratices
A premier international certification of CISEH
Updated courseware and latest tools and techniques
Unlike the other programs, CISEH is the only comprehensive training program available in market that covers all major attack paths plaguing modern information system security to help you understand the correlation among various threats.
Competitor’sCISEHCISEH Features
CISEH program provides you an industry standard that helps establish your career as an information security expert.
COURSE DESCRIPTION
CISEHCISEH
3 4www.pristineinfosolutions.com www.pristineinfosolutions.com
2014
2013
2012
2011
2010
2009
2014
2013
2012
2011
2010
2009
0
0
10
10
20
20
30
30
40
40
50
50
60
60
70
70
80
80
90
90
100
100
Cyber Attacks vs Demand for IT Security
IT Security Professionals vs IT Professionals Jobs
IT Security Jobs
Cyber Attacks
IT Professionals Jobs
IT Security demand in the Market
Ethical Hacker Salary (India)
So
urc
e:
ww
w.p
aysc
ale
.co
m
The average salary for an Ethical Hacker is Rs 344,964 per year.
Information Security Industryin the Indian Market
The information security industry is going at a current worldwide growth rate of 21%. Frost & Sullivan have estimated that there are 2.28 million information security professionals worldwide which is expected to increase to nearly 4.2 million by 2015. The need for information security for security compliance in India is mandatory for all companies with an IT backbone. The requirement for such personnel is especially high with organisations in the IT/ITES space.
CerticationThe Certified Information Security and Ethical Hacker exam will be conducted after completion of the training which will assess and evaluate practical skills of a student. This CISEH certification will provide testament of your practical hacking skills in a real world environment. Students need to pass the online exam to receive CISEH certification.
This Information Security and Ethical Hacking Training is targeted towards those who are looking to build career in IT Security, IT Security Officers, IT Auditors, Network Security Administrator, System Administrator and anyone who is concerned about the integrity of the Network Infrastructure.
“
”
CISEHCISEH
5 6www.pristineinfosolutions.com www.pristineinfosolutions.com
Unlike others, CISEH is a program which ensures that each candidate is e x p o s e d t o t h e b e s t practices in the domain of ethical hacking and is aware of the compliance r e q u i r e m e n t s o f t h e industry.
75%
Ÿ Key issues plaguing the information security world, incident management process, and penetration testing.
Ÿ Various types of footprinting, footprinting tools, and countermeasures.
Ÿ Network scanning techniques and scanning countermeasures.
Ÿ Enumeration techniques and enumeration countermeasures.
Ÿ System hacking methodology, steganography, steganalysis attacks, and covering tracks.
Ÿ Different types of Trojans, Trojan analysis, and Trojan countermeasures.
Ÿ Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures.
Ÿ Packet sniffing techniques and how to defend against sniffing.
Ÿ Social Engineering techniques, identify theft, and social engineering countermeasures.
Ÿ DoS/DDoS attack techniques, botnets, DDoS attack tools, DoS/DDoS countermeasures.
Ÿ Hacking into Websites and portals.
Ÿ Different types of webserver attacks, attack methodology, and countermeasures.
Ÿ Different types of web application attacks, web application hacking methodology, and countermeasures.
Ÿ SQL injection attacks and injection detection tools.
Ÿ Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi-fi security tools.
Ÿ Mobile applications vulnerability and spying tricks.
Ÿ Various types of buffer overflows, how to mutate a buffer overflow exploit, buffer overflow detection tools, and countermeasures.
Ÿ Cyber Crime Investigation Process and procedure.
Ÿ Earning money online through internet.
Ÿ Working of web and domain industry.
Ÿ Indian Cyber Law and IT Act, 2000.
What will you learn ?
CISEH, the most sought-after informationsecurity certification is designed to reinforcethe skills of the new generation of cyber sleuths.
75%
25%
Distinguish Yourself fromother IT Professionals andstand out in a crowd. Be a CISEH.Theory Practicals
CISEHCISEH
7 8www.pristineinfosolutions.com www.pristineinfosolutions.com
COURSE CONTENT
CISEHCISEH
9 10www.pristineinfosolutions.com www.pristineinfosolutions.com
Computer Security - Basics:Ÿ IntroductionŸ Hacker & CrackerŸ Attacker & VictimŸ Types of Security Ÿ File Securing TechniquesŸ ASCII Code - making a folder invisible
Foot-Printing:Ÿ IntroductionŸ Types of Foot-printing Ÿ MethodsŸ Using Search-Engine
Network Security:Ÿ IANA, Allotment of IP AddressŸ IPv4 & Ipv6Ÿ IP Address – Basic, DetectingŸ Ping & Ping SweepŸ Tools (Ping Sweeping)Ÿ Nmap, SuperScanŸ Trace RouterŸ Detecting Victim's OSŸ Detecting FirewallŸ Countermeasures
Port-Scanning:Ÿ Type of PortsŸ Virtual Port numbersŸ Detecting Open PortsŸ Tools to carry out Port ScanningŸ Anti-Port scanning toolsŸ Port ManagerŸ Countermeasures
Domain Name and DNS:Ÿ ICANN, Registrar, Registry, RegistrantŸ Top Level DomainsŸ Lifecycle of gTLDŸ Whois infoŸ Domain and Hosting PanelsŸ Global DNS resolution
Identity Attacks:Ÿ IntroductionŸ Staying AnonymousŸ Web ProxyŸ IP ProxyŸ Proxy BouncingŸ Tor browserŸ Add ons
Email Security:Ÿ Email ThreatsŸ Hacking Mailing ClientsŸ Email SpoofingŸ Email SpammingŸ E-bomber toolsŸ Email HeadersŸ Spamhaus ProjectŸ Mx ToolboxŸ Finding details of recipientŸ Countermeasures
Phishing:Ÿ IntroductionŸ Creating Phishing pagesŸ Anti-phishing toolŸ Bank Account hackingŸ Countermeasures
Sql-Injection:Ÿ IntroductionŸ Software based SQLiŸ Script based & manuallyŸ Database Hacking
Website Hacking:Ÿ Finding Loop holes using Google
dorksŸ Finding Control panel of WebsitesŸ Breaking control panelŸ Defacing WebsiteŸ Shell uploading introduction & working
Mobile-Hacking:Ÿ RAT Ÿ MetasploitŸ Call-spoofingŸ Root & Jail breaking basicsŸ Hacking apps data Ÿ Countermeasures
Intellectual Property Theft:Ÿ IntroductionŸ Types of MalwareŸ Trojan attack & countermeasureŸ Case studyŸ Keylogger working & countermeasureŸ Testing FUDŸ NSA Prism Monitoring System studyŸ Steganography and SteganalysisŸ Steganography tools
Password Cracking & Prevention:Ÿ IntroductionŸ Password Cracking TechniquesŸ Dictionary Based AttackŸ Brute force AttackŸ Cracking .xls, .pdf, .zip & .rar file
passwordŸ Cracking web based passwordŸ Countermeasures for usersŸ Countermeasures for System
Administrators
Sniffing:Ÿ IntroductionŸ Basic SniffingŸ Windows based sniffing
Other types of Attack:Ÿ IntroductionŸ Input Validation AttackŸ Buffer Overflow AttackŸ Batch file scriptingŸ DoS & DDoS AttacksŸ Honeypots introduction & working
Chatting Messenger:Ÿ IntroductionŸ Instant Messenger threatsŸ Hacking using Google Hangout &
Yahoo MessengerŸ Stealing recipient's IP AddressŸ Case studyŸ Countermeasures
Case-studies:Ÿ IntroductionŸ 419 scamŸ Spamming email IDŸ Spamvertised domainŸ Phishing websites Ÿ Malware websitesŸ Inappropriate content on websiteŸ Whois inaccuracyŸ Privacy Protected domainsŸ Cyber StalkingŸ Fake profilesŸ Child PornographyŸ Credit Card Frauds
Cyber Law and Consulting:Ÿ IntroductionŸ What is Cyber LawŸ Cyber SpaceŸ Types of CrimesŸ IT Act, 2000 & 2008 amendmentŸ CERT-IN & AOŸ Trademark & Copyright InfringementŸ Central Acts & State Acts
Earning Money online:Ÿ Blogs & websiteŸ Adsense & AdwordsŸ SEO & Traffic GeneratorsŸ Alexa & Google PR ImprovementŸ Affiliate MarketingŸ Increasing likes & followers on
Social Media sites
Ethical Hacking as a CareerLearning from experiences of others and their own, today, many organizations are recruiting ethical hackers into their IT teams to protect network security. Others are hiring ethical hacking companies to conduct audits and suggest xes.
Defence organizations, Forensic laboratories, Detective companies, Investigation services and Law enforcement agencies offer roles that challenge the expertise of ethical hackers, from time to time. Those with a taste for adventure and prociency in infomartion secutity and vulnerability assessment can venture into this domain.
Job OpportunitiesWith internet use mounting worldwide and cyber crimes increased as well, ethical hackers have become an integral workforce of any IT security industry today. However, currently there is a huge gap between the demand and supply as far as ethical hackers are concerned. Hence, scope for a fresher is lucrative not only in India but globally.IT rms are the main recruiters of ethical hackers. However, it is not limited only to IT companies but such experts are also required by nancial service providers, airlines, retail chains, hotels and several government agencies.
Job Prole
Internet Security and Networking are the two fastest-growing industries where ethical hackers can nd employment in ethical hacking and information security.
The kinds of jobs available are that of Network Security Systems Manager, Network Security Administrator, Systems/Applications, Security Executive, Web Security Administrator, Web Security Manager etc.
CISEHCISEH
11 12www.pristineinfosolutions.com www.pristineinfosolutions.com
www.rizwanonline.com
He is the Founder, CTO and principal consultant of Pristine InfoSolutions and is responsible for setting company’s strategic direction and overseeing the business operations.
With an aim to secure the Cyber World from unethical Hackers, Rizwan has been imparting practical knowledge of Ethical
RSecurity Researcher and Cyber Crime Consultant actively involved in providing Ethical Hacking and Information Securitytraining and services.
izwan Shaikh is one of the India'srenowned Ethical Hacker, Information
About Trainer Testimonials
“CISEH has excellent topics with good explanation. Overall excellent teaching method. Trainer's knowledge & teaching style is excellent.” -Rizvi Sayed IT Security Dept UAE govt.
“ Excellent course, the certification boosted my career and an helped me in a better work profile. I learned lot of new things which will definitely build my future career.” -Tushar Khanvilkar Network Security Engineer HCL Comnet Ltd.
“The course has given me comprehensive knowledge of cyber security and I learnt many hacking techniques.”- -Mayur Mathkar Software Developer Tata Consultancy Services.
“One of the best training on Information Security conducted for our employees. Accept our sincere appreciation for the outstanding security training you gave to our company.” -Divyanshu Gahriya Chairman DiGa TechnoArts Pvt. Ltd.
“Awesome course. A must course for everyone in terms of Internet Security. It is helpful to all, not only for IT Professional.” -Sachin Hankare Risk/Fraud Management Ex. Paymate India Pvt. Ltd.
“Nice to meet Rizwan sir, he is inspiration for knowledge sharing & creating awareness about security of virtual world.” -Subhash Konda Senior Software Engineer Ness Technology Pvt. Ltd.
Hacking, Information Security and Cyber Forensics to the budding technical workforce of the country. Rizwan has delivered numerous workshops, seminars, talks and conferences at various colleges, institutions and has been assisting corporates in creating awareness about Information Security and Cyber Crimes.
Rizwan Shaikh is regularly invited by Engineering Colleges, Organizations, Corporates and Government agencies to speak and distribute knowledge about Cyber Security.
CISEHCISEH
13 14www.pristineinfosolutions.com www.pristineinfosolutions.com
We have a diverse client base and our ability to tailor our services to the needs of public, private, government and international clients are fundamental to our approach.
We have delivered numerous training sessions, workshops, seminars and conferences at various colleges, institutions and have being regularly invited by Engineering Colleges, Organizations, Corporates and Government agencies to speak and distribute knowledge about Cyber Security.A glimpse of training sessions, workshops and seminars delivered by us includes:
Thakur College of Engineering and Technology, Mumbai
VESIT, Mumbai
Thadomal ShahaniEngineering College, Mumbai
BIGCE, Solapur
St. Paul Institute of Professional Studies, Indore
VACOE, Ahmednagar
Atharva College of Engineering, Mumbai
Saraswati Engineering College, Mumbai
Terna Engineering College, Mumbai
LAIT, Badlapur
SIES Graduate School of Technology, Mumbai
College of Engineering, Munnar
SVKM's NMIMS, Shirpur
Tatva Engineering college, Ahmedabad
Guru Tegh Bahadur Institute of Technology, Delhi
RJ College, Mumbai
Engineering Colleges
Other Institutions
Directors, CEO’s, Management, Auditors.
35%
73%
65%
27%
CISEH TRAINED CISEH TRAINED
IT Professionals, IT Managers, IT Administrators,
Network Administrators, Security Officers.
Viva School of MCA, Mumbai
DRIEMS, Karjat
UV College, Ganpat University, Gujarat
and many more...
Our Clients | Meet our prestigious clients
CISEHCISEH
15 16www.pristineinfosolutions.com www.pristineinfosolutions.com
SNG College, Mumbai
CISEHCISEH
15 16www.pristineinfosolutions.com www.pristineinfosolutions.com
Corporate Ofce (Mumbai)Pristine InfoSolutions F-87, Dreams The Mall, LBS Marg,Bhandup (West), Mumbai - 400078, India.
Tel: 022 - 21663052Direct: +91 - 9022912236
E-mail: contact@pristineinfo.comwww.pristineinfo.com
Branch Ofce (BKC)Pristine InfoSolutionsOfce no. 201, Bldg no. 11,Motilal Nehru Nagar, Beside Trade Center,Bandra Kurla Complex, Bandra (East),Mumbai - 400 051, India.
Direct: +91 - 8976786021
E-mail: bkc@pristineinfo.com
Ahmedabad OfcePristine InfoSolutions 404, Akik Tower, Judge's Bunglow Road,Beside Pakwan Restaurant,Bodakdev, Ahmedabad - 380015,Gujarat, India.
Direct: +91 - 9033023344
E-mail: contact@pristineinfo.inwww.pristineinfo.in
Indore OfcePristine InfoSolutions205-206 Shree Classic Arch,Anand Bazar Main Road, Old Palasia,Indore - 452001,Madhya Pradesh, India.
Direct: +91-9406668441
E-mail: contact@pristineinfosol.comwww.pristineinfosol.com
Branch Ofce (Kalyan)Pristine InfoSolutionsOfce no.1, 2nd Floor, Sarvoday Mall, Opp. Phool Market,Kalyan (West) - 421301,Thane, Maharashtra, India.
Direct: +91 - 8976786054
E-mail: kalyan@pristineinfo.com
Branch Ofce (Navi Mumbai)Pristine InfoSolutions F-118, 1st Floor, Haware Fantasia Business Park,Sector 30 A, Opp. Vashi Railway Station,Vashi, Navi Mumbai - 400703,Maharashtra, India.
Direct: +91 - 9029252538
E-mail: vashi@pristineinfo.com
Pune OfcePristine InfoSolutionsOfce no. 23, 3rd oor, Ankur Chambers,Opp. Prakash Departmental Store,Dagdu Sheth Temple road, Shivaji roadPune - 411002, Maharashtra, India.
Direct: +91 - 7276044411
E-mail: contact@pristineinfo.co.inwww.pristineinfo.co.in
Jaipur OfcePristine InfoSolutions360-A, 2nd Floor,Next to Paliwal Jewellers, Tonk Road,Himmat Nagar, Gopal Pura Mode,Jaipur, Rajasthan - 302018, India.
Direct: +91-8094442111
E-mail: contact@pristineinfosol.inwww.pristineinfosol.in
Recommended