The Confederation of Indian Industry (CII), through long, deep and sustained engagement with Africa, plays a catalytic role in strengthening India – Africa ties, especially in the world of business.
CII started its Africa - focussed initiatives more than 25 years ago, and today is linked with 78 counterpart organizations in 37 African countries to facilitate exchange of information between Indian and African industry. CII also has ties with investment promotion agencies in Africa.
A Presentation on Registry forensics from one of my lectures. Thanks to Harlan Carvy and Jolanta Thomassen for wonderful researches in the field. The work is based on their researches
The Confederation of Indian Industry (CII), through long, deep and sustained engagement with Africa, plays a catalytic role in strengthening India – Africa ties, especially in the world of business.
CII started its Africa - focussed initiatives more than 25 years ago, and today is linked with 78 counterpart organizations in 37 African countries to facilitate exchange of information between Indian and African industry. CII also has ties with investment promotion agencies in Africa.
A Presentation on Registry forensics from one of my lectures. Thanks to Harlan Carvy and Jolanta Thomassen for wonderful researches in the field. The work is based on their researches
This talk was delivered for the National Defense University of Malaysia (Universiti Pertahanan Malaysia), Malaysia, in their academic staffs induction course program, delivered on 9th August 2023. The title is Regenerating learning experience with AI.
Virtual Reality VR is a computer technology that generates realistic images, sounds and other sensations that simulate a users physical presence in a virtual or imaginary environment. The proposed system nurtures personal traits of an individual which plays a major role in every sector. The system helps to improve an individuals social, personal, and language skills as well as cures phobia of standing in front of audience. With advancement in technology, we are developing a system on Unreal Engine for creation of various environments as well as 3ds Max for creating Virtual Objects which are been placed. The learner is supposed to be in an environment where he she is been judged while appearing for various rounds. Further, video is captured and uploaded on the system and trainers does the evaluation. Trainers are supposed to suggest area of improvement by commenting on the parameters defined. Regular usage of software enhances skills of the user. The proposed system is a VR based verbal non verbal interactive system for enhancing communication skills based on predefined and planned of greeting scenario. Results in each stage are compared and analyzed to get the clear idea of where the person is lacking. The outcome of this practice test leads to improvement in individuals personality, difficulties raised in each environment results in upgradation of selfdom. Tejas Sayankar | Insiyah Kanchwala | Nikita Mahajan | Sayali Mahajan ""Communication Skills Improving Assistance"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23748.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/23748/communication-skills-improving-assistance/tejas-sayankar
In our dynamic session at Diet Ernakulam, we explored the transformative possibilities of integrating Artificial Intelligence (AI) in educational settings. The talk aimed to empower primary school educators with insights and practical strategies to leverage AI for an enriched learning experience. This talk marks the beginning of an ongoing conversation. The journey of integrating AI in classrooms is an evolving one, and we look forward to continued collaboration, exploration, and innovation in the intersection of education and technology.
Artificial Intelligence (AI) Tools in Scientific Research .pptxTutors India
One of the most cutting-edge technologies of the present is considered to be artificial intelligence and machine learning. By steps are followed, facilitating wise decision-making, and creating business strategies, artificial intelligence and machine learning solutions are assisting organizations in becoming successful.
You may automate procedures, improve customer relationships, use improved analytics, and future-proof your business processes with the help of Tutorsindia artificial intelligence and machine learning services, ensuring that you remain relevant to the changing market and client needs. Making the greatest use of your data will enable you to gain new insights and tap into new business revenue streams by leveraging our AI & ML solutions and guidance.
For More Details:https://www.tutorsindia.com/our-services/development/coding-and-algorithm/artificial-intelligence-ml/
More Info:
https://www.tutorsindia.com/
https://www.tutorsindia.com/order-now/
https://www.tutorsindia.com/pricing/
Contact us
IND: +91 8754446690
UK: +44-1143520021
CONTENT DEVELOPMENT Lead your customers and engage them with your marketing c...tanishverma4010
The attention span of the average consumer has decreased markedly, and thus content plays a central role in translating the brand’s vision and task. Well-written content is essential to strike the right chord. The appropriate content marketing comprises of different components such as creating brand awareness, lead generation, and relationship building with customers. At Makclan Digital, we take a novel approach to content creation and marketing to reach and engage with your audience. Every brand has a distinct feel and it must be expressed in a way that entices your audience. Content acts as the voice to your brand and it needs to be curated very carefully.
My presentation and workshop together with Rosa Leonor Ulloa Cazarez, and the ICDE OER Advocacy Committee at the 31 Encuentro Internacional de Educación a Distanci University of Guadalajara, Mexicao on “The Role of Artificial Intelligence (AI) related to Open Educational Resources (OER)”, on November 27th 2023
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
This talk was delivered for the National Defense University of Malaysia (Universiti Pertahanan Malaysia), Malaysia, in their academic staffs induction course program, delivered on 9th August 2023. The title is Regenerating learning experience with AI.
Virtual Reality VR is a computer technology that generates realistic images, sounds and other sensations that simulate a users physical presence in a virtual or imaginary environment. The proposed system nurtures personal traits of an individual which plays a major role in every sector. The system helps to improve an individuals social, personal, and language skills as well as cures phobia of standing in front of audience. With advancement in technology, we are developing a system on Unreal Engine for creation of various environments as well as 3ds Max for creating Virtual Objects which are been placed. The learner is supposed to be in an environment where he she is been judged while appearing for various rounds. Further, video is captured and uploaded on the system and trainers does the evaluation. Trainers are supposed to suggest area of improvement by commenting on the parameters defined. Regular usage of software enhances skills of the user. The proposed system is a VR based verbal non verbal interactive system for enhancing communication skills based on predefined and planned of greeting scenario. Results in each stage are compared and analyzed to get the clear idea of where the person is lacking. The outcome of this practice test leads to improvement in individuals personality, difficulties raised in each environment results in upgradation of selfdom. Tejas Sayankar | Insiyah Kanchwala | Nikita Mahajan | Sayali Mahajan ""Communication Skills Improving Assistance"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23748.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/23748/communication-skills-improving-assistance/tejas-sayankar
In our dynamic session at Diet Ernakulam, we explored the transformative possibilities of integrating Artificial Intelligence (AI) in educational settings. The talk aimed to empower primary school educators with insights and practical strategies to leverage AI for an enriched learning experience. This talk marks the beginning of an ongoing conversation. The journey of integrating AI in classrooms is an evolving one, and we look forward to continued collaboration, exploration, and innovation in the intersection of education and technology.
Artificial Intelligence (AI) Tools in Scientific Research .pptxTutors India
One of the most cutting-edge technologies of the present is considered to be artificial intelligence and machine learning. By steps are followed, facilitating wise decision-making, and creating business strategies, artificial intelligence and machine learning solutions are assisting organizations in becoming successful.
You may automate procedures, improve customer relationships, use improved analytics, and future-proof your business processes with the help of Tutorsindia artificial intelligence and machine learning services, ensuring that you remain relevant to the changing market and client needs. Making the greatest use of your data will enable you to gain new insights and tap into new business revenue streams by leveraging our AI & ML solutions and guidance.
For More Details:https://www.tutorsindia.com/our-services/development/coding-and-algorithm/artificial-intelligence-ml/
More Info:
https://www.tutorsindia.com/
https://www.tutorsindia.com/order-now/
https://www.tutorsindia.com/pricing/
Contact us
IND: +91 8754446690
UK: +44-1143520021
CONTENT DEVELOPMENT Lead your customers and engage them with your marketing c...tanishverma4010
The attention span of the average consumer has decreased markedly, and thus content plays a central role in translating the brand’s vision and task. Well-written content is essential to strike the right chord. The appropriate content marketing comprises of different components such as creating brand awareness, lead generation, and relationship building with customers. At Makclan Digital, we take a novel approach to content creation and marketing to reach and engage with your audience. Every brand has a distinct feel and it must be expressed in a way that entices your audience. Content acts as the voice to your brand and it needs to be curated very carefully.
My presentation and workshop together with Rosa Leonor Ulloa Cazarez, and the ICDE OER Advocacy Committee at the 31 Encuentro Internacional de Educación a Distanci University of Guadalajara, Mexicao on “The Role of Artificial Intelligence (AI) related to Open Educational Resources (OER)”, on November 27th 2023
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
2. About Ankit……..
Ankit Fadia, 21 years old, is an independent
computer security and digital intelligence consultant .
He has authored six internationally best-selling books on numerous
topics related to Computer Security that have been widely
appreciated by both professionals and industry leaders the world
over.
His books have sold a record 250,000 copies across the globe, have
been translated into Japanese, Korean, Portuguese and Polish and
are also being used as reference textbooks in some of the most
prestigious academic institutions in Asia and North America.
confidential
3. About Ankit……….
In November 2001, Fadia was consulted by a classified intelligence
agency for breaking an encrypted message sent by one of Osama Bin
Laden’s men.
Since then Fadia has been involved in numerous classified projects
pertaining to International Security and Computer Networks. He handles
the Asia Operations of the classified intelligence agency.
Fadia provides customized cyber security training and consulting
solutions to clients all across Asia, Australia, North America and the
Middle East including Google, Citibank, Shell, Volvo, Thai Airways,
UOB Bank, PT Cisco Systems, Bank of Thailand, Bangkok Public
Bank, Amari Hotels, BlueScope Steel, Jumeirah International, Wipro,
Singapore Health Promotion Board, Infosys, Satyam, Schering Ltd
and many other organizations in the government, police and corporate
sectors.
confidential
4. Ankit’s Training Portfolio
Financial & Banking Sector:
TA Securities (Malaysia), Bank of Maharashtra, United Overseas
Bank of Singapore, Bangkok Bank Public Co. Ltd, Citibank Taiwan,
Monetary Authority of Singapore, Bank of Thailand, GHL Systems
Berhad, PT Bank Rabobank International Indonesia and Australian
bank officials.
Software Sector:
Wipro Technologies, Infosys, Symphony Services, Satyam
Corporation, CMC Limited (TATA), PT Cisco Systems Indonesia.
Internet Services Sector:
Google, Sify (Satyam).
Government Sector:
Singapore Police, Inland Revenue Authority (Singapore), Inland
Revenue Board (Malaysia), Ministry of Defence (Singapore),
NISER (Malaysia), Ministry of National Development (Singapore,
Ministry of Home Affairs (Singapore), Monetary Authority of
Singapore, Multimedia Super Corridor (Malaysia), Indian Police,
Central Forensics Laboratory, Kerela Police, Andhra Pradesh Police
Department, APFSL, Pune Police.
confidential
5. Ankit’s Training Portfolio
Transportation Sector:
Singapore SMRT Corporation, Thai Airways International.
Industrial Goods Sector:
The Siam Chemicals (Thailand), BlueScope Steel (Malaysia) Sdn Bhd, Shell
Information Technology International (Malaysia) and PT Indah Kiat Pulp &
Paper TBK (Malaysia).
Automobiles Sector:
Volvo Malaysia Sdn Bhd.
Education Sector:
Institute of Defence and Strategic Studies (IDSS, Singapore), Indian School
of Business (Hyderabad,India) Singapore Management University, Indian
Institute of Technology (IIT: Mumbai, Delhi and Kharagpur branches), BITS
Pilani, Ministry of Education (Singapore), Multimedia University.
Services Sector:
Amari Hotels and Resorts (Thailand), Jumeirah International Luxury &
Corporate Hotels.
confidential
6. Ankit’s Training Portfolio
Healthcare Sector:
Schering (Bangkok) Ltd, Compakar eHealth Tech Sdn.Bhd (Malaysia),
Health Promotion Board (Singapore).
International Conferences:
Young Entrepreneurs Organization (Dubai), Asia Technological Initiative
(Singapore), HACK (Singapore, Australia and Malaysia), Junior Chamber
International (New Delhi), CAN 2005 (Malaysia), Hacking (Malaysia,
Thailand and India) and InfoSec World (Singapore).
Business Leaders:
Young Entrepreneurs Organization (Asia-Pacific, Dubai University,
Singapore, Malaysia, Indonesia, Dubai, Bangalore, Chennai, Mumbai,
Kolkata and Delhi), Young Presidents Organization (Malaysia, Bangalore,
Mumbai and Kolkata) and Young Leaders Forum (Kolkata).
confidential
7. What is the AFCEH program?
An ANKIT FADIA CERTIFIED ETHCAL HACKER is a
computer security program on the science of ethical hacking,
to discover loopholes in target systems and to setup security
systems to counter the computer criminals. Professionals who
undergo this training and certification program will have the
necessary knowledge required to administer security solutions
to companies and individuals by making computer networks
secure. Want to be recognized for your computer security
expertise? Want to be considered amongst the best security
gurus in the world? Want to climb up the career ladder and
improve your global job prospects? Want to be trained and
certified by world renowned author and computer security
guru? Want to become an ANKIT FADIA CERTIFIED
ETHICAL HACKER? If your answer to any of the above
questions is a yes, then you have come to the RIGHT PLACE!
confidential
8. AFCEH – Ver.1 Key Milestones
• Started in March 2006. 5 batches conducted, 3000 students
trained in more than 90 cities.
• Participants included students, industry and government -
Airtel, Reliance, MTNL, BSNL, ICICI Bank, Tata, DSP Merlyn
Lynch, Indian Army, Airforce and State Police Departments.
• 27,000 Hours of Video Lectures and 18,000 Text Books used.
• AFCEH helped thousands of Participants added credibility to
their resume and managed to receive better jobs.
• In Jan 2007, AFCEH was started in China, Singapore and
Malaysia.
confidential
9. AFCEH – Ver.1 Key Milestones
• Toppers of each batch were interviewed and given the
opportunity to work with Ankit Fadia on projects like
research, consulting, writing books, teaching
assistantships and others.
• In April 2007, a special conference style package of the
AFCEH course was made available for corporate called
Ankit Fadia Computer Security (AFCS).
confidential
10. AFCEH Ver.1 Success Stories
Name: Jaya Bhattacharjee (26 years old)
City: Kolkata
Claim to Fame: After topping the AFCEH exam, Jaya was
selected for a project, then carried out research and co
authored a book on the topic of Encryption with Mr. Ankit
Fadia that was released at a national press conference in
February 2007.
Her Thoughts: The AFCEH course gave me the
opportunity to gain invaluable knowledge in the field of
Computer Security in a systematic manner. Everybody will
gain a lot from this course. Even if a person does not know
anything about the subject will also be able to understand
the concepts if he/she is sincere. I had a wonderful
experience writing the book and it gave me a well
deserved recognition among my friends, relatives, peers
and colleagues. It gives me immense happiness when I
see the books lined up in all the bookshops across India
like in Kolkata, Bangalore and others!
confidential
11. AFCEH Ver.1 Success Stories
Name: Manu Zacharia (30 years old)
City: New Jersey, USA (Cochin in India)
Claim to Fame: Like Jaya, even Manu co-authored a book on the
topic of Intrusion Detection with Mr. Ankit Fadia that was released at
a national press conference in February 2007. This book will soon
be released internationally. He was also selected to be the teaching
assistant of the course.
His Thoughts: I would like to express how much I enjoyed the
AFCEH course (Batch 1) and working with Ankit Fadia. The course
is taught in a friendly, easy to grasp manner. Beginners and experts
alike will benefit from the concise way that the course is structured.
The course takes you from an absolute beginner to a
knowledgeable expert in a very short amount of time. Everything is
written in plain English, & is easy to understand. I wouldrecommend
this course to any one who wants to gain insight into the mindset of
the hacker community and to protect and defend themselves
against the attacks. The quality of the course is very high as was
the delivery and presentation. Excellent content, good books and
easy to learn. Well done.
confidential
12. AFCEH Ver.1 Success Stories
Name: Vaibhav Kaushal (19 years old)
City: Hazaribagh, Jharkhand
Claim to Fame: After topping the AFCEH exam, Vaibhav was selected for a project, then
carried out research and co-authored a book on the topic of OS Hacking with Mr. Ankit
Fadia. This book is likely to be launched in the market SOON.
His Thoughts: I do not have words good enough to express how much I liked the
course. The course helped me gain better knowledge about many areas of the computer
security and the practical ways to protect computers from being attacked by other people.
What I liked about the course was that I had the opportunity to communicate with so
many people with special knowledge in various fields. We helped each other learn a lot
on the mailing lists of the AFCEH course group on Yahoo! In fact I was feeling a bit
nostalgic after we had completed the course ended.
confidential
13. Why is there a need for the new AFCEH 2.0?
Computer Security is a very dynamic industry. Every
single day thousands of new viruses, worms and security
vulnerabilities are discovered on the Internet. It is very
important for computer security professionals to remain
updated, educated and aware of the latest developments
in this dynamic industry. This is why it was important to
release version 2.0 of the AFCEH program. This new,
updated and improved version of the highly successful
AFCEH program contains NEW comprehensive training
material, content, lectures and books on the latest tools,
techniques and methods being used in the field of
computer security. AFCEH 2.0 will not only allow
participants to update their knowledge, but will also teach
them newly discovered techniques that were previously
not known while AFCEH 1.0 was being developed.
confidential
14. What is new in AFCEH 2.0?
• The KEYWORDS that succinctly describe AFCEH 2.0
are:
NEW
UPDATED
MORE
confidential
15. What is new in AFCEH 2.0?
• More than 90% of the topics in the video lectures will
have a NEW, UPDATED data and content.
• A NEW book titled Intrusion Detection will be given out to
participants as a text book.
• The following NEW topics will be taught: See
Attachment.
confidential
16. TABLE OF CONTENTS FOR AFCEH
Introduction To Information Security SCANNING
And Ethical Hacking Ping and related ICMP concepts.
Importance of Security Port Scanning
Can Hacking be Ethical? Tool – Pinger
Threat Tool – WS_PingProPack
Vulnerability Tool – NetScan Tools
Target of Evaluation Tool – Hping
Attack Tool – icmpenum
Exploit Detecting Ping Sweeps
CIA Triad – Elements of Security Tool –IDS like ISA Server or Snort
Modes Operandi of Hackers Port Scanning
Reconnaissance TCP Connect Scanning
Scanning TCP SYN Scanning
Gaining Access SYN/ACK Scanning
Maintaining Access TCP FIN Scanning
Covering Tracks TCP NULL Scanning
Classification of Hacker TCP XMAS Scanning
Black Hats Detecting Port Scanning
White Hats Tool – nmap
Grey Hats Tool – SuperScan
TCP/IP Concepts in brief Tool – Cheops
OSI Layer and TCP /IP Architecture DNS Mining
Common Protocols used and their working Tools – Perl script for DNS Mining – blindcrawl.pl
3 Way Handshakes
.FOOT PRINTING ENUMERATION
Whois
DNS lookup / Nslookup NetBIOS Null Session
Network Range NetBIOS Null Session Countermeasures
Traceroute Tool - NBTScan
Sam Spade Tool – DumpSec
NeoTrace Tool – NetBIOS Auditing Tool
Visual Route SNMP Enumeration
SmartWhoIs Tool – SNMP Util
Tool – enum
confidential
17. TABLE OF CONTENTS FOR AFCEH
SYSTEM HACKING TROJAN AND BACKDOORS
Password Attacks Introduction
Password Guessing
Working of Trojans
Dictionary attack
Types of Trojans
Brute Force Attack
Remote Access Trojans
Hybrid Attack
Password Sending Trojans
Social Engineering
Keyloggers
Shoulder Surfing
Destructive Trojans
Dumpster Diving
Tool – Legion DoS Attack Trojans
Rainbow Tables Proxy / Wingate Trojans
Password Sniffing FTP Trojans
Tool – LOphtcrack Software Detection Killers
Previlege Escalation
How Trojans are transmitted
Tool – John The Ripper
Tool – SubSeven or BackOrifice
Password Cracking Countermeasures
Tool – Netbus
Keystroke Loggers
EXE Binders or Wrappers
Hardware Keylogger
XSS (Cross Site Scripting)
Rootkits
Reverse Cross Site Request (RCSR)
Rootkit counter measures
SNIFFERS
How to cover your tracks
Disabling auditing
Clearing the event log What is packet or network sniffing?
Steganography Tool – Ethereal / Wireshark
Other methods of hiding files Tool – Snort
Attrib
Tool – tcpdump
NTFS Alternate Data Stream
Tool – Windump
Buffer Overflows
Man in the middle attack
Protection against buffer overflow
ARP Spoofing
Metasploit
Hacking using USB
confidential
18. TABLE OF CONTENTS FOR AFCEH
DENIAL OF SERVICE ATTACKS
VIRUSES
Introduction
Introduction
Types of DoS Attacks
How viruses work?
Bandwidth attacks
Types of viruses
Protocol attacks, and
Logic attacks Protection of against viruses
DDOS
Tool – SSPing GOOGLE HACKING
Tool – Etherape
Land Exploit
ENCRYPTION
Tool – Trinoo
Preventing DoS Attacks
MISC
SQL INJECTION
Firefox as Pen Testing Tool
Some scripts (perl scripts or other scripts) which is commonly
Introduction
used during pen testing like lbd (load balancing detector)
OLE DB Errors
Input Validation Attacks
Tools used for SQL Injection
How to Prevent SQL Injection
WIRELESS NETWORKS
Introduction
Various Wireless standards
WEP
Wireless DoS
Wireless Sniffing
Tool - Airsnort
Tool – AiroPeek
Wireless IDS
confidential
19. About The Program
18-hour program spread over 30 days
•
• Live Video Lectures and Interactive Q&A Sessions of 4
hours over Video Conference.
• 14 hours free Internet access @ RW for accessing 11
hours of self-pace self-learning Video on demand content,
Hacking demonstration on Video & 2 hours of Online
Exam.
Ankit Fadia’s 6 international bestsellers worth Rs. 1545/- to
•
be given absolutely free.
Certification on successful completion of online certification
•
exams.
confidential
27. From Ankit Fadia moments Batch 4. Our S.P. Mr Milind Bharambe
and A.S.P Mr Sunil Kolhe successfully completed this course with enthusiasm.”
confidential
28. In ROM only Sangli has done Ankit Fadia Corporate Batch. Director Of M/s B.G
Chitale Dairy Mr Vishwas Chitale and also other computer profession’s
successfully completed this course with enthusiasm.” Our S.P. Mr Milind
Bharambe also participated in this course
confidential
29. About The Program
Program Price – Rs. 6499/-
The Price Includes
- Cost Of Video Conferencing
- Access Cost for Video-On-Demand
- On Line Examination Fee
- PLUS
- 6 of Ankit’s International Best Selling books on Hacking & counter
measures
confidential
30. About The Program
For Admission Contact
Mahesh Ojha ( Web Lead )
09373445444.
confidential