Thursday, 4 August 2011

Ethical hacking

 

About Ethical hacking

An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. To test a security system, ethical hackers use the same methods as their less principled counterparts, but report problems instead of taking advantage of them. Ethical hacking is also known as penetration testing, intrusion testing and red teaming. An ethical hacker
It is sometimes called a white hat, a term that comes from old Western movies, where the "good guy" wore a white hat and the "bad guy" wore a black hat. One of the first examples of ethical hackers at work was in the 1970s, when the United States government used groups of experts called red teams to hack its own computer systems. According to Ed Skoudis, Vice President of Security Strategy for Predictive Systems' Global Integrity consulting practice, ethical hacking has continued to grow in an otherwise lackluster IT industry, and is becoming increasingly common outside the government and technology sectors where it began. Many large companies, such as IBM, maintain employee teams of ethical hackers.
In a similar but distinct category, a hacktivist is more of a vigilante: detecting, sometimes reporting (and sometimes exploiting) security vulnerabilities as a form of social activism.

                The AFCEGH program was launched in India in March 2006. In January 2007, AFCEGH was launched in China, Singapore & Malaysia and in April 2007. Computer Security (AFCS) was designed for the corporate world. Besides spreading Cyber Security knowledge, AFCEH has enabled most participants to improve their career opportunities, obtains their dream job and change their lives forever.



Certified Ethical Hackers 
It is a one-of-its-kind certification program in Ethical Hacking that aims at training and certifying a whole new generation of world-class Ethical Hacker in the field of computer security.

AFCEH 5.0 teaches you critical computer security skills and the latest tools & techniques being used in the field. The program contains new, updated and improved training material that is personally researched and developed.

Using a blended e-learning format that combines the advantages of Video-on-Demand and Video Conferencing technologies, AFCEH 5.0 brings participants up-to-date on the most dangerous computer security vulnerabilities, newly discovered techniques to safeguard computer system, catch computer criminals and investigate cyber crimes. AFCEH 5.0 also uses technical data and real-life case studies to prepare you to solve real computer security problems.


Program Contents
Ø      Planning an attack

                                                         I.            IP Addresses

                                                         II.           Enumerating Remote Systems

                                                         III.          Hiding Your IP Address

                                                         IV.          Tracing an IP address



Ø      Preparing an Attack

                                                 I.            Network Reconnaissance

                                                 II.           Port Scanning

                                                 III.          Daemon Banner Grabbing and Port

                                                 IV.          Enumeration

                                                 V.           ICMP Scanning

                                                 VI.         Firewall Enumeration

                                                 VII.        OS Detection

                                                 VIII.       Sniffing



Ø     Hacking Window

                                                     I.            Introduction

                                                  II.            Passwords

                                              III.            The Look and Feel

                                             IV.            Security Checklists

    

Ø      Network Hacking

Ø      Email Hacking

Ø      Instant Messenger Hacking

Ø      Web Hacking

Ø      Input Validation Attacks

Ø      Buffer Overflows

Ø      Intellectual Property Thefts

Ø      Social Engineering Attack

Ø      Password Cracking Decrypted

Ø      TCP/IP: A Mammoth Description

Ø      Identity Attacks

Ø      DOS Attacks

Ø      Cryptography, Firewalls and Error Messages

Ø      Batch File Programming

Ø      Wireless Hacking

Ø      USB Hacking

Ø      System Hacking

Ø      Investigating cyber crimes

Ø      Browser Security

Ø      Wireless Security

Ø      Bluetooth Security: Hacking Mobile Phones

Ø      Latest Information Gathering Techniques

Ø      Intrusion Detection Security

Ø      Intrusion Prevention Security

Ø      Window7 Loopholes

Ø      Software Hacking


Key Benefits
Ø      Learn and interact with “Expert” –one of the most respected authorities on computer security in the world.

Ø      Invaluable experience of solving international cyber crimes with classified intelligence and investigation agencies

Ø      Improve your job prospects and get an edge over your colleagues.

Eligibility
The program is designed for experienced computer security specialists as well as for beginners in the field. In the past batches, AFCEH has successfully trained college students, school students, corporate representatives, industry experts, police, government officials and Cyber Security veterans.

Career Opportunities

The starting salary range for Ethical Hackers in India is between Rs 25,000-30,000 pm and outside of India US $50,000-90,000 pa. In the past, AFCEH has immensely helped participants to add value to their resume, made them more employable and given them better careers.
 




0 comments:

Post a Comment

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Grants for single moms