Certified Professional Hacker™ v2

Posted: June 15, 2011 in Uncategorized

Certified Professional Hacker™ v2
Certified Professional Hacker™ v2 – training to become a Professional Ethical Hacker
The Certified Professional Hacker v2 is a revolution in the field of information security training. It goes far beyond the usual courses that talk about the same old port scanning and vulnerability assessments. It goes deep down into the depths of networking, systems, and actual exploitation. Here are some of the things you’ll find in the CPH v2, which you would be hard-pressed to find in other certified ethical hacking courses.

    • In-depth study of the TCP/IP protocol stack – the founding blocks for any good hacker
    • Buffer overflows and format string exploits – actual exploitation of buffer overflows, use of IDA Pro, Disassemblers and other advanced tools
    • Writing exploits using Metasploit – the most powerful advanced hacking platform available, and its full utilization
    • In-depth study of the OWASP Top Ten and Web 2.0 hacking – Advanced SQL injection and blind SQL injection, not just XSS, but also CSRF
  • Bluejacking, hacking 2-factor authentication, IPS and UTM technologies
Why should you attend this course?
You’ve heard of courses that claim to make you an ethical hacker, but what’s the definition of a ‘hacker’? A ‘hacker’ is someone who goes into the depths of any system, and tries to understand how things actually work, not just someone who runs a bunch of scripts from the Internet to try and break into systems.

One of the greatest USPs of the CPH course is that it is built by experts who do penetration testing on a regular basis. Led by K. K. Mookhey, who is the founder of one of India’s leading information security firms – Network Intelligence. He has authored books on Linux Security and Metasploit Framework, and numerous articles on securityfocus.com, and other sites. He has presented at prestigious conferences such as Blackhat USA, Interop, IT Underground, and others. Read his full profile here. Also, since it is build by practitioners in the field, it also happens to be regularly updated with the latest tools, techniques, and real-world scenarios.

In fact, the lab setup for the course itself is the single-most important reason to attend the course. Where else can you actually launch attacks, see the packet flows, analyze them, tweak your attacks, and get to break into systems that have been set up to create levels of challenges and hone your skills.

Who should attend this course?
Anyone looking to build a career in information security, or if you’re someone who’s already in this field, but want to learn the Professional concepts of hacking, then this is the course for you. It simply will not get more practical and more hands-on than this. Instead of burdening you with huge amount of courseware, and hundreds of tools, the CPH course focuses on the real-world practical tools and techniques of hacking.
Course Contents
Session One: Getting the basics right
  • Module 1: TCP/IP Fundamentals
  • Module 2: System Fundamentals
  • Module 3: Firewall Technologies
  • Module 4: Programming & Database Fundamentals
Session Two – Network Cartography
  • Module 5: Advanced Google Hacking
  • Module 6: Fingerprinting
  • Module 7: Nmapping the network
  • Module 8: Footprinting
Session Three – Exploitation
  • Module 9: Hacking networks
  • Module 10: Hacking servers
  • Module 11: Hacking databases
  • Module 12: Backdooring
Session Four – Advanced Exploitation
  • Module 13: Hacking WLANs
  • Module 14: Evading IDS, Firewalls and Detecting Honey Pots
  • Module 15: Web Application Hacking
  • Module 16: Advanced Web Hacking
  • Module 17: Hacking Web Browsers (Firefox, IE)
Session Five – Black-belt Hacking
  • Module 18: Buffer overflows
  • Module 19: Metasploiting the universe
  • Module 20: Reverse Engineering
  • Module 21: Covert Hacking
Session Six – Social Engineering
  • Module 22: What is Social Engineering?
  • Module 23: Common Types of Attacks
  • Module 24: Social Engineering by Phone
  • Module 25: Dumpster Diving
  • Module 26: Online Social Engineering
  • Module 27: Reverse Social Engineering
  • Module 28: Policies and Procedures
  • Module 29: Employee Education
Session Seven – Cryptography
  • Module 30: Introduction to Cryptography
  • Module 31: Encryption and Decryption
  • Module 32: Cryptographic Algorithms
    • Module 32.1: DES
    • Module 32.2: RC4
    • Module 32.3: RC6
    • Module 32.4: Blowfish
    • Module 32.5: MD5
    • Module 32.6: SHA
  • Module 33: Government Access Key – GAK
  • Module 34: Digital Signature
  • Module 35: Cryptography Tools
  • Module 36: Code Breaking Methodologies
  • Module 37: Cryptography Attacks
Session Eight – Honeypots
  • Module 38: What is Honeypot?
  • Module 39: Honey net Project
  • Module 40: Types of Honey Pot
  • Module 41: Honey Pot Replacement
  • Module 42: Various Open Source and Commercial Honey Pots
Session Nine – Esoteric Hacking
  • Module 43: RFID Hacking
  • Module 44: Hacking Mobile Phones, PDA and Handheld Devices
  • Module 45: VoIP Hacking
  • Module 46: Cyber Warfare
  • Module 47: Hacking E-mails Accounts
  • Module 48: Corporate Espionage
  • Module 49: Botnets
  • Module 50: Bluetooth Hacking
  • Module 51: Hacking USB Devices
  • Module 52: Spamming
Session Ten – Password Cracking
  • Module 53: How to Steal Passwords
  • Module 54: Hashing Algorithm
  • Module 55: Active Brute Forcing
  • Module 56: Passive Brute Forcing
  • Module 57: Web-Based Password Cracking Techniques
Session Eleven – Trojans and Backdoors
Session Twelve – Viruses and Worms
  • Module 58: Writing Virus Codes
Session Thirteen – Phishing
Session Fourteen – Exploit Writing
  • Module 59: Assembly Language Tutorial
  • Module 60: Exploit Writing Module
Session Fifteen – Privacy on the Internet
Session Sixteen – Spying Technologies
Session Seventeen – Credit Card Frauds
Session Eighteen – Software Piracy and Warez
Session Nineteen – Securing Laptop Computers
Session Twenty – Data Loss Prevention
Session Twenty One – Physical Security
Session Twenty Two – Basics of Digital Forensics
  • Module 61: Hacking Incidents
  • Module 62: Defining the Forensics Process
  • Module 63: Digital Forensics Essentials – 6 A’s
  • Module 64: Investigation Guidelines
  • Module 65: Disk Based Forensics v/s Network Based Forensics
  • Module 66: Chain of Custody
Hands-on Exercises

The CPH course comes with a custom-built lab specially designed to clear up concepts, reinforce techniques, and make you comfortable with the tools of the trade. Here are the hands-on exercises you’ll get to do:

  • Exercise 1: In-depth exploration of TCP/IP using Wireshark
  • Exercise 2: Analysis of tcpdump output to determine attacks
  • Exercise 3: In-depth usage of Nmap
  • Exercise 4: Cracking WLANs
  • Exercise 5: Hacking Oracle
  • Exercise 6: Building your own exploit
  • Exercise 7: Metasploit
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s