Your SlideShare is downloading. ×
Afceh 2.0 Final
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Afceh 2.0 Final

5,467

Published on

Ankit fadia certified Ethical hacking course with reliance for admission contact mahesh ojha 09373445444.mail me at relianceworld@aol.in

Ankit fadia certified Ethical hacking course with reliance for admission contact mahesh ojha 09373445444.mail me at relianceworld@aol.in

Published in: Technology, Economy & Finance
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
5,467
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
280
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Ankit Fadia Certified Ethical Hacker (AFCEH) II confidential
  • 2. About Ankit…….. Ankit Fadia, 21 years old, is an independent computer security and digital intelligence consultant . He has authored six internationally best-selling books on numerous topics related to Computer Security that have been widely appreciated by both professionals and industry leaders the world over. His books have sold a record 250,000 copies across the globe, have been translated into Japanese, Korean, Portuguese and Polish and are also being used as reference textbooks in some of the most prestigious academic institutions in Asia and North America. confidential
  • 3. About Ankit………. In November 2001, Fadia was consulted by a classified intelligence agency for breaking an encrypted message sent by one of Osama Bin Laden’s men. Since then Fadia has been involved in numerous classified projects pertaining to International Security and Computer Networks. He handles the Asia Operations of the classified intelligence agency. Fadia provides customized cyber security training and consulting solutions to clients all across Asia, Australia, North America and the Middle East including Google, Citibank, Shell, Volvo, Thai Airways, UOB Bank, PT Cisco Systems, Bank of Thailand, Bangkok Public Bank, Amari Hotels, BlueScope Steel, Jumeirah International, Wipro, Singapore Health Promotion Board, Infosys, Satyam, Schering Ltd and many other organizations in the government, police and corporate sectors. confidential
  • 4. Ankit’s Training Portfolio Financial & Banking Sector: TA Securities (Malaysia), Bank of Maharashtra, United Overseas Bank of Singapore, Bangkok Bank Public Co. Ltd, Citibank Taiwan, Monetary Authority of Singapore, Bank of Thailand, GHL Systems Berhad, PT Bank Rabobank International Indonesia and Australian bank officials. Software Sector: Wipro Technologies, Infosys, Symphony Services, Satyam Corporation, CMC Limited (TATA), PT Cisco Systems Indonesia. Internet Services Sector: Google, Sify (Satyam). Government Sector: Singapore Police, Inland Revenue Authority (Singapore), Inland Revenue Board (Malaysia), Ministry of Defence (Singapore), NISER (Malaysia), Ministry of National Development (Singapore, Ministry of Home Affairs (Singapore), Monetary Authority of Singapore, Multimedia Super Corridor (Malaysia), Indian Police, Central Forensics Laboratory, Kerela Police, Andhra Pradesh Police Department, APFSL, Pune Police. confidential
  • 5. Ankit’s Training Portfolio Transportation Sector: Singapore SMRT Corporation, Thai Airways International. Industrial Goods Sector: The Siam Chemicals (Thailand), BlueScope Steel (Malaysia) Sdn Bhd, Shell Information Technology International (Malaysia) and PT Indah Kiat Pulp & Paper TBK (Malaysia). Automobiles Sector: Volvo Malaysia Sdn Bhd. Education Sector: Institute of Defence and Strategic Studies (IDSS, Singapore), Indian School of Business (Hyderabad,India) Singapore Management University, Indian Institute of Technology (IIT: Mumbai, Delhi and Kharagpur branches), BITS Pilani, Ministry of Education (Singapore), Multimedia University. Services Sector: Amari Hotels and Resorts (Thailand), Jumeirah International Luxury & Corporate Hotels. confidential
  • 6. Ankit’s Training Portfolio Healthcare Sector: Schering (Bangkok) Ltd, Compakar eHealth Tech Sdn.Bhd (Malaysia), Health Promotion Board (Singapore). International Conferences: Young Entrepreneurs Organization (Dubai), Asia Technological Initiative (Singapore), HACK (Singapore, Australia and Malaysia), Junior Chamber International (New Delhi), CAN 2005 (Malaysia), Hacking (Malaysia, Thailand and India) and InfoSec World (Singapore). Business Leaders: Young Entrepreneurs Organization (Asia-Pacific, Dubai University, Singapore, Malaysia, Indonesia, Dubai, Bangalore, Chennai, Mumbai, Kolkata and Delhi), Young Presidents Organization (Malaysia, Bangalore, Mumbai and Kolkata) and Young Leaders Forum (Kolkata). confidential
  • 7. What is the AFCEH program? An ANKIT FADIA CERTIFIED ETHCAL HACKER is a computer security program on the science of ethical hacking, to discover loopholes in target systems and to setup security systems to counter the computer criminals. Professionals who undergo this training and certification program will have the necessary knowledge required to administer security solutions to companies and individuals by making computer networks secure. Want to be recognized for your computer security expertise? Want to be considered amongst the best security gurus in the world? Want to climb up the career ladder and improve your global job prospects? Want to be trained and certified by world renowned author and computer security guru? Want to become an ANKIT FADIA CERTIFIED ETHICAL HACKER? If your answer to any of the above questions is a yes, then you have come to the RIGHT PLACE! confidential
  • 8. AFCEH – Ver.1 Key Milestones • Started in March 2006. 5 batches conducted, 3000 students trained in more than 90 cities. • Participants included students, industry and government - Airtel, Reliance, MTNL, BSNL, ICICI Bank, Tata, DSP Merlyn Lynch, Indian Army, Airforce and State Police Departments. • 27,000 Hours of Video Lectures and 18,000 Text Books used. • AFCEH helped thousands of Participants added credibility to their resume and managed to receive better jobs. • In Jan 2007, AFCEH was started in China, Singapore and Malaysia. confidential
  • 9. AFCEH – Ver.1 Key Milestones • Toppers of each batch were interviewed and given the opportunity to work with Ankit Fadia on projects like research, consulting, writing books, teaching assistantships and others. • In April 2007, a special conference style package of the AFCEH course was made available for corporate called Ankit Fadia Computer Security (AFCS). confidential
  • 10. AFCEH Ver.1 Success Stories Name: Jaya Bhattacharjee (26 years old) City: Kolkata Claim to Fame: After topping the AFCEH exam, Jaya was selected for a project, then carried out research and co authored a book on the topic of Encryption with Mr. Ankit Fadia that was released at a national press conference in February 2007. Her Thoughts: The AFCEH course gave me the opportunity to gain invaluable knowledge in the field of Computer Security in a systematic manner. Everybody will gain a lot from this course. Even if a person does not know anything about the subject will also be able to understand the concepts if he/she is sincere. I had a wonderful experience writing the book and it gave me a well deserved recognition among my friends, relatives, peers and colleagues. It gives me immense happiness when I see the books lined up in all the bookshops across India like in Kolkata, Bangalore and others! confidential
  • 11. AFCEH Ver.1 Success Stories Name: Manu Zacharia (30 years old) City: New Jersey, USA (Cochin in India) Claim to Fame: Like Jaya, even Manu co-authored a book on the topic of Intrusion Detection with Mr. Ankit Fadia that was released at a national press conference in February 2007. This book will soon be released internationally. He was also selected to be the teaching assistant of the course. His Thoughts: I would like to express how much I enjoyed the AFCEH course (Batch 1) and working with Ankit Fadia. The course is taught in a friendly, easy to grasp manner. Beginners and experts alike will benefit from the concise way that the course is structured. The course takes you from an absolute beginner to a knowledgeable expert in a very short amount of time. Everything is written in plain English, & is easy to understand. I wouldrecommend this course to any one who wants to gain insight into the mindset of the hacker community and to protect and defend themselves against the attacks. The quality of the course is very high as was the delivery and presentation. Excellent content, good books and easy to learn. Well done. confidential
  • 12. AFCEH Ver.1 Success Stories Name: Vaibhav Kaushal (19 years old) City: Hazaribagh, Jharkhand Claim to Fame: After topping the AFCEH exam, Vaibhav was selected for a project, then carried out research and co-authored a book on the topic of OS Hacking with Mr. Ankit Fadia. This book is likely to be launched in the market SOON. His Thoughts: I do not have words good enough to express how much I liked the course. The course helped me gain better knowledge about many areas of the computer security and the practical ways to protect computers from being attacked by other people. What I liked about the course was that I had the opportunity to communicate with so many people with special knowledge in various fields. We helped each other learn a lot on the mailing lists of the AFCEH course group on Yahoo! In fact I was feeling a bit nostalgic after we had completed the course ended. confidential
  • 13. Why is there a need for the new AFCEH 2.0? Computer Security is a very dynamic industry. Every single day thousands of new viruses, worms and security vulnerabilities are discovered on the Internet. It is very important for computer security professionals to remain updated, educated and aware of the latest developments in this dynamic industry. This is why it was important to release version 2.0 of the AFCEH program. This new, updated and improved version of the highly successful AFCEH program contains NEW comprehensive training material, content, lectures and books on the latest tools, techniques and methods being used in the field of computer security. AFCEH 2.0 will not only allow participants to update their knowledge, but will also teach them newly discovered techniques that were previously not known while AFCEH 1.0 was being developed. confidential
  • 14. What is new in AFCEH 2.0? • The KEYWORDS that succinctly describe AFCEH 2.0 are: NEW UPDATED MORE confidential
  • 15. What is new in AFCEH 2.0? • More than 90% of the topics in the video lectures will have a NEW, UPDATED data and content. • A NEW book titled Intrusion Detection will be given out to participants as a text book. • The following NEW topics will be taught: See Attachment. confidential
  • 16. TABLE OF CONTENTS FOR AFCEH Introduction To Information Security SCANNING And Ethical Hacking Ping and related ICMP concepts. Importance of Security Port Scanning Can Hacking be Ethical? Tool – Pinger Threat Tool – WS_PingProPack Vulnerability Tool – NetScan Tools Target of Evaluation Tool – Hping Attack Tool – icmpenum Exploit Detecting Ping Sweeps CIA Triad – Elements of Security Tool –IDS like ISA Server or Snort Modes Operandi of Hackers Port Scanning Reconnaissance TCP Connect Scanning Scanning TCP SYN Scanning Gaining Access SYN/ACK Scanning Maintaining Access TCP FIN Scanning Covering Tracks TCP NULL Scanning Classification of Hacker TCP XMAS Scanning Black Hats Detecting Port Scanning White Hats Tool – nmap Grey Hats Tool – SuperScan TCP/IP Concepts in brief Tool – Cheops OSI Layer and TCP /IP Architecture DNS Mining Common Protocols used and their working Tools – Perl script for DNS Mining – blindcrawl.pl 3 Way Handshakes .FOOT PRINTING ENUMERATION Whois DNS lookup / Nslookup NetBIOS Null Session Network Range NetBIOS Null Session Countermeasures Traceroute Tool - NBTScan Sam Spade Tool – DumpSec NeoTrace Tool – NetBIOS Auditing Tool Visual Route SNMP Enumeration SmartWhoIs Tool – SNMP Util Tool – enum confidential
  • 17. TABLE OF CONTENTS FOR AFCEH SYSTEM HACKING TROJAN AND BACKDOORS Password Attacks Introduction Password Guessing Working of Trojans Dictionary attack Types of Trojans Brute Force Attack Remote Access Trojans Hybrid Attack Password Sending Trojans Social Engineering Keyloggers Shoulder Surfing Destructive Trojans Dumpster Diving Tool – Legion DoS Attack Trojans Rainbow Tables Proxy / Wingate Trojans Password Sniffing FTP Trojans Tool – LOphtcrack Software Detection Killers Previlege Escalation How Trojans are transmitted Tool – John The Ripper Tool – SubSeven or BackOrifice Password Cracking Countermeasures Tool – Netbus Keystroke Loggers EXE Binders or Wrappers Hardware Keylogger XSS (Cross Site Scripting) Rootkits Reverse Cross Site Request (RCSR) Rootkit counter measures SNIFFERS How to cover your tracks Disabling auditing Clearing the event log What is packet or network sniffing? Steganography Tool – Ethereal / Wireshark Other methods of hiding files Tool – Snort Attrib Tool – tcpdump NTFS Alternate Data Stream Tool – Windump Buffer Overflows Man in the middle attack Protection against buffer overflow ARP Spoofing Metasploit Hacking using USB confidential
  • 18. TABLE OF CONTENTS FOR AFCEH DENIAL OF SERVICE ATTACKS VIRUSES Introduction Introduction Types of DoS Attacks How viruses work? Bandwidth attacks Types of viruses Protocol attacks, and Logic attacks Protection of against viruses DDOS Tool – SSPing GOOGLE HACKING Tool – Etherape Land Exploit ENCRYPTION Tool – Trinoo Preventing DoS Attacks MISC SQL INJECTION Firefox as Pen Testing Tool Some scripts (perl scripts or other scripts) which is commonly Introduction used during pen testing like lbd (load balancing detector) OLE DB Errors Input Validation Attacks Tools used for SQL Injection How to Prevent SQL Injection WIRELESS NETWORKS Introduction Various Wireless standards WEP Wireless DoS Wireless Sniffing Tool - Airsnort Tool – AiroPeek Wireless IDS confidential
  • 19. About The Program 18-hour program spread over 30 days • • Live Video Lectures and Interactive Q&A Sessions of 4 hours over Video Conference. • 14 hours free Internet access @ RW for accessing 11 hours of self-pace self-learning Video on demand content, Hacking demonstration on Video & 2 hours of Online Exam. Ankit Fadia’s 6 international bestsellers worth Rs. 1545/- to • be given absolutely free. Certification on successful completion of online certification • exams. confidential
  • 20. How To Enroll @ Reliance World confidential
  • 21. Click Here to access the course confidential
  • 22. Click Here to register the course confidential
  • 23. confidential
  • 24. Click Here to Enter for Video Lessons the course confidential
  • 25. confidential
  • 26. confidential
  • 27. From Ankit Fadia moments Batch 4. Our S.P. Mr Milind Bharambe and A.S.P Mr Sunil Kolhe successfully completed this course with enthusiasm.” confidential
  • 28. In ROM only Sangli has done Ankit Fadia Corporate Batch. Director Of M/s B.G Chitale Dairy Mr Vishwas Chitale and also other computer profession’s successfully completed this course with enthusiasm.” Our S.P. Mr Milind Bharambe also participated in this course confidential
  • 29. About The Program Program Price – Rs. 6499/- The Price Includes - Cost Of Video Conferencing - Access Cost for Video-On-Demand - On Line Examination Fee - PLUS - 6 of Ankit’s International Best Selling books on Hacking & counter measures confidential
  • 30. About The Program For Admission Contact Mahesh Ojha ( Web Lead ) 09373445444. confidential

×