Ankit Fadia™ Certified Ethical Hacker 5.0
Learn the latest computer security tools & techniques of Ethical Hacking from world-renowned Computer Security Guru Ankit Fadia™ and open various career opportunities for yourself.
New, advanced Program Contents
Ankit Fadia™ Certified Ethical Hacker (AFCEH) 5.0 is a one-of-its-kind certification program in Ethical Hacking that aims at training and certifying a whole new generation of world-class Ethical Hackers in the field of computer security.
AFCEH 5.0 updates you on the most dangerous computer security vulnerabilities and teaches you newly discovered techniques to safeguard computer systems.
The program contains new and comprehensive training material, content, lectures and books on the latest tools, techniques and methods being used in the field of computer security.
Program Format
This program will be taught on a blended e-learning format, utilizing Video-on-Demand and Video Conferencing at Reliance World.
Program Duration
1 Month
Program Fee
Rs. 6999 including taxes
Free Books
Register for AFCEH 5.0 and get eight international Bestsellers on Computer Security worth Rs. 1900 absolutely free and Fadia's favorite tools & scripts.
Free downloadable copy of Matriux Operating System
Get a free downloadable copy of Matriux Operating System which is a fully featured security distribution consisting of a bunch of powerful, open source and free tools that can be used for various purposes including, but not limited to, penetration testing, ethical hacking, system and network administration, cyber forensics investigations, security testing, vulnerability analysis, and much more.
Program Contents
1. Planning an Attack
IP Addresses
Enumerating Remote Systems
Hiding Your IP Address
Tracing an IP Address
2. Preparing an Attack
Network Reconnaissance
Port Scanning
Daemon Banner Grabbing and Port
Enumeration
ICMP Scanning
Firewall Enumeration
OS Detection
Sniffing
3. Hacking Windows
Introduction
Passwords
The Look and Feel
Security Checklists
4. Network Hacking
5. Email Hacking
Introduction
Tracing Emails
Email Forging
The Post Office Protocol (POP)
Mailbombing
Cracking Email Accounts
Securing Email
6. Instant Messenger Hacking
7. Web Hacking
8. Input Validation Attacks
9. Buffer Overflows
10. Intellectual Property Thefts
Introduction & Case Studies
Trojans
Sniffers
Keyloggers
Spyware Software
Traditional Data Hiding Techniques
11. Social Engineering Attacks
12. Password Cracking Decrypted
13. TCP/IP: A Mammoth Description
14. Identity Attacks
Introduction
Proxy Servers
IP Spoofing
Onion Routing
15. Computer Forensics
16. DOS Attacks
17. Cryptography, Firewalls and Error Messages
18. Batch File Programming
19. Viruses Torn Apart
20. Wireless Hacking
21 .Windows Vista Security Analysis
22. USB Hacking
23. System Hacking
24. UNIX Security Loopholes
25. Investigating Cyber Crimes
26. Intrusion Detection Systems ![](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_scKj1UNGCEtpIaxQ2kvlzRBfgqvnjnjYAjmjU7HXC_QbC6lI2t0UsQHrEi3C1ajfrgFDh4Q7JqmrnCq0igP1qtjn9FDYZC0fa08A=s0-d)
27. Browser Security ![](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_scKj1UNGCEtpIaxQ2kvlzRBfgqvnjnjYAjmjU7HXC_QbC6lI2t0UsQHrEi3C1ajfrgFDh4Q7JqmrnCq0igP1qtjn9FDYZC0fa08A=s0-d)
28. Windows 7 Security Loopholes ![](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_scKj1UNGCEtpIaxQ2kvlzRBfgqvnjnjYAjmjU7HXC_QbC6lI2t0UsQHrEi3C1ajfrgFDh4Q7JqmrnCq0igP1qtjn9FDYZC0fa08A=s0-d)
29. Wireless Security ![](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_scKj1UNGCEtpIaxQ2kvlzRBfgqvnjnjYAjmjU7HXC_QbC6lI2t0UsQHrEi3C1ajfrgFDh4Q7JqmrnCq0igP1qtjn9FDYZC0fa08A=s0-d)
30. Bluetooth Security: Hacking Mobile Phones ![](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_scKj1UNGCEtpIaxQ2kvlzRBfgqvnjnjYAjmjU7HXC_QbC6lI2t0UsQHrEi3C1ajfrgFDh4Q7JqmrnCq0igP1qtjn9FDYZC0fa08A=s0-d)
31. Latest Information Gathering Techniques ![](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_scKj1UNGCEtpIaxQ2kvlzRBfgqvnjnjYAjmjU7HXC_QbC6lI2t0UsQHrEi3C1ajfrgFDh4Q7JqmrnCq0igP1qtjn9FDYZC0fa08A=s0-d)
32. Latest Security Vulnerabilities ![](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_scKj1UNGCEtpIaxQ2kvlzRBfgqvnjnjYAjmjU7HXC_QbC6lI2t0UsQHrEi3C1ajfrgFDh4Q7JqmrnCq0igP1qtjn9FDYZC0fa08A=s0-d)
33. 2010 Security Updates ![](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_scKj1UNGCEtpIaxQ2kvlzRBfgqvnjnjYAjmjU7HXC_QbC6lI2t0UsQHrEi3C1ajfrgFDh4Q7JqmrnCq0igP1qtjn9FDYZC0fa08A=s0-d)
34. Intrusion Detection Systems ![](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_scKj1UNGCEtpIaxQ2kvlzRBfgqvnjnjYAjmjU7HXC_QbC6lI2t0UsQHrEi3C1ajfrgFDh4Q7JqmrnCq0igP1qtjn9FDYZC0fa08A=s0-d)
35. Intrusion Prevention Systems ![](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_scKj1UNGCEtpIaxQ2kvlzRBfgqvnjnjYAjmjU7HXC_QbC6lI2t0UsQHrEi3C1ajfrgFDh4Q7JqmrnCq0igP1qtjn9FDYZC0fa08A=s0-d)
36. Software Hacking![](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_scKj1UNGCEtpIaxQ2kvlzRBfgqvnjnjYAjmjU7HXC_QbC6lI2t0UsQHrEi3C1ajfrgFDh4Q7JqmrnCq0igP1qtjn9FDYZC0fa08A=s0-d)
37. Protecting CDs and DVDs![](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_scKj1UNGCEtpIaxQ2kvlzRBfgqvnjnjYAjmjU7HXC_QbC6lI2t0UsQHrEi3C1ajfrgFDh4Q7JqmrnCq0igP1qtjn9FDYZC0fa08A=s0-d)
AFCEH 5.0 also contains new secrets, tips and tricks on all the above mentioned topics like scanning, network reconnaissance, windows hacking, password cracking, email hacking, DOS attacks, social engineering and many others.
Program Schedule
| |||
Module | Contents | Date | Timings | 1 | Live video lecture by Ankit FadiaTM Interactive Q&A Session. Distribution of Ankit FadiaTM books | Thursday, 29th Jul 2010 | 6:00–8:00 PM | 2* | Video-on-Demand Hacking Demonstration on Video | To be taken between 30th Jul & 29th Aug 2010 | 18 Hours | 3 | Live Video Lecture by ANKIT FADIATM Interactive Q&A session | Thursday, 26th Aug 2010 | 6:00–8:00 PM | 4 | Online Examination | Monday,30th Aug 2010 | Anytime between 12.00 noon to closing time of Reliance World store. |
|
* Module 2 is self-paced. You need not complete this in one sitting. You may choose to take this module in multiple sittings anytime during the specified period, subject to availability of terminals at Reliance World.
| |||
For more information on AFCEH 5.0, walk into your nearest Reliance World.