Monday, July 25, 2011

Certified Professional Hacker NxG


Certified Professional Hacker NxG
The Certified Professional Hacker NxG is a revolution in the field of information security training. It goes far beyond the usual courses that talk about the same old port scanning and vulnerability assessments. It goes deep down into the depths of networking, systems, web applications and actual exploitation. Here are top 5 reasons why the CPH NxG is the ideal choice in comparison to other ethical hacking courses.
  1. Training executed completely by practitioners and led by our Principal Consultant and well-renowned information security expert – K. K. Mookhey
  2. Coverage of the latest trends in information security – Advanced Persistent Threats, SCADA Hacking(analysis of Stuxnet), and Mobile Hacking
  3. Heavy focus on practical aspects and usage of tools and toolkits such as Backtrack, Metasploit, Burp Suite, Kismet, Air-crack Ng,
  4. Case studies and real-life examples to explain key concepts
  5. The entire training program is designed by our Principal Consultant Mr. K K Mookhey, and we can assure you that it is aimed specifically to make you an expert in ethical hacking and a much sought-after security analyst.
Why should you attend this course?
You've heard of courses that claim to make you an ethical hacker, but what's the definition of a 'hacker'? A 'hacker' is someone who goes into the depths of any system, and tries to understand how things actually work, not just someone who runs a bunch of scripts from the Internet to try and break into systems.

One of the greatest USPs of the CPH course is that it is built by experts who do penetration testing on a regular basis. Led by K. K. Mookhey, who is the founder of one of India's leading information security firms - Network Intelligence. He has authored books on Linux Security and Metasploit Framework, and numerous articles on securityfocus.com, and other sites. He has presented at prestigious conferences such as Blackhat USA, Interop, IT Underground, and others. Read hisfull profile here.
Also, since it is built by practitioners in the field, it also happens to be regularly updated with the latest tools, techniques, and real-world scenarios.

In fact, the lab setup for the course itself is the single-most important reason to attend the course. Where else can you actually launch attacks, see the packet flows, analyze them, tweak your attacks, and get to break into systems that have been set up to create levels of challenges and hone your skills.
Who should attend this course?
Anyone looking to build a career in information security, or if you're someone who's already in this field, but want to learn the professional concepts of hacking, then this is the course for you. It simply will not get more practical and more hands-on than this. Instead of burdening you with a huge amount of courseware, and hundreds of tools, the CPH course focuses on the real-world practical tools and techniques of hacking.
What is the CPH NxG Mailing List?
The CPH Mailing List is a members-only, by-invitation mailing list, where all Certified Professional Hackers discuss the latest happenings in the information security world, and exchange news about tools and techniques. Membership to this list is available only to those members who successfully complete the CPH course and clear the test.
How do I get certified?
On the 5th day of the training, there will be a 60 question multiple-choice test. You may refer to the notes during the test. Scoring more than 60% on the test and practical exam assures you of the CPH NxG certificate.

Course Contents
Session One: Getting the basics right
  • Module 1: TCP/IP Fundamentals
  • Module 2: Operating System Fundamentals
  • Module 3: Web Application & Database Fundamentals
  • Module 4: Introduction to Ethical Hacking
  • Module 5: Advanced Persistent Threats
Session Two - Network Cartography
  • Module 6: Footprinting
  • Module 7: Advanced Google Hacking
  • Module 8: Nmapping the network
  • Module 9: Fingerprinting
Session Three - Exploitation
  • Module 10: Hacking networks
  • Module 11: Hacking servers
  • Module 12: Hacking databases
  • Module 13: Password Cracking – Online, Offline Attacks
Session Four - Advanced Exploitation
  • Module 14: Hacking WLANs
  • Module 15: Evading IDS, Firewalls
  • Module 16: Web Application Hacking
  • Module 17: Advanced Web Hacking
  • Module 18: Hacking Web Browsers (Firefox, IE)
Session Five - Black-belt Hacking
  • Module 19: Buffer overflows
  • Module 20: Metasploiting the universe
  • Module 21: Reverse Engineering
  • Module 22: Covert Hacking
Session Six - Social Engineering
  • Module 23: What is Social Engineering?
  • Module 24: Common Types of Attacks
  • Module 25: Online Social Engineering
Session Seven - Cryptography

  • Module 26: Introduction to Cryptography
  • Module 27: Encryption and Decryption
  • Module 28: Cryptographic Algorithms
  • Module 29: Digital Signature
  • Module 30: Cryptography Tools
  • Module 31: Cryptography Attacks
Session Eight - Honeypots
  • Module 32: What is a Honeypot?
  • Module 33: The Honeynet Project
  • Module 34: Types of Honeypots
  • Module 35: Detecting Honey Pots
Session Nine - Esoteric Hacking
  • Module 36: Hacking Mobile Phones, PDA and Handheld Devices
  • Module 37: SCADA Hacking – Stuxnet Analysis
  • Module 38: Cloud Security Hacking
  • Module 39: VoIP Hacking
  • Module 40: Botnets & Backdooring
Session Ten - Real World Hacking
  • Module 41: Web-Shell Upload
  • Module 42: Pass-The-Hash
  • Module 43: Token Impersonation
  • Module 44: Xp_cmdshell
  • Module 45: BlindSQL version enumeration
  • Module 46: LFI to RCE attacks
Session Eleven - Introduction to Digital Forensics

No comments:

Post a Comment