Ethical Hacking Training and Workshop in Vellore
About :
This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work and then be lead into scanning and attacking their own networks, no real networks is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system.
Prerequisites:
Anyone who is concerned about the integrity of the network infrastructure and significantly benefit Security officers, auditors, security Professionals, site administrators.
Our Training Method :
Train in a ready-to-learn comfortable environment
Interact with Cyber Security Specialist & Security expert instructors
Get hands-on labs, industry oriented experience
Results-oriented course content
Highest Pass Rates
Choose from Day, Evening & Weekend Classes to meet your busy schedule.
Real time Placement assistance on successful completion of the course.
Modules :
-Introduction to Ethical Hacking-Foot printing and Reconnaissance
-Scanning Networks
-Enumeration
-System Hacking
-Malware Threats
-Evading IDS, Firewalls and Honey pots
-Sniffing
-Social Engineering
-Denial of Service
-Session Hijacking
-Hacking web server's
-Hacking web applications
-SQL Injection
-Hacking Wireless Networks
-Hacking Mobile Platforms
-Cloud Computing
-Cryptography
Session and Training Schedule:
Weekdays (30 days) – 5 days/week
2 Hours/day - 1 Hour Theory, 1 Hour Practical
Weekends (4 weeks) – 2 days/week
4 Hours/day - 2 Hours Theory, 2 hours Practical
Our Institute Location:
Redback IT Solutions Private Limited,
#AL 24 TNHB PHASE III,
Sathuvacheri,( Near Vallalar Water Tank)
Vellore. 632602
Contact :
Training Coordinator
+91 8189985551
CCNP Certification in Vellore
CCNP Certification:
CCNP Certification Introduction.
The CCNP (Cisco Certified Network Professional)
Certification is one of the important certifications from Cisco that a
networking professional must have to move ahead in their career. The CCNP certification training is
now in great demand in the IT industry and over the recent years it has become
a global standard for many successful IT companies.
This certification from CISCO is accepted all over the world as
the best in the field of networking. It is perfect for people who wish to excel
in this field, for those who are ready to advance their skills or those who
have been trying to get into top positions in their networking career. The CCNP
certification also equips the network engineer to work independently on complex
network solutions.
CCNP Training Details
The all new CCNP Training offered by Redback Academy has 2 modules 1) CCNP ROUTE 2) CCNP Switch which validate the
ability to plan, implement, verify and troubleshoot local and wide-area
enterprise networks. The course covers topics like EIGRP, OSPF, BGP, IPv6,
VPNs, L2 / L3 Switching, VLAN, VTP, HSRP, VRRP, GLBP, VOIP, Wireless,
Troubleshooting methods.
The CCNP
training is given
by proven Senior Network / WAN Engineers possessing several years of field
experience.
CCNP
Course Details
ROUTE - (300-101)
Introduction to Router
and Routing Protocols:
ü Static
Routing, Dynamic Routing, Default Routing
ü IP
Addressing, Summarization (Auto and Manual)
Enhanced Interior
Gateway Routing Protocol
ü EIGRP
Features, EIGRP Update Process
ü Configuration
and Verification of EIGRP Tables
ü EQUAL
and UNEQUAL Metric Route Load Sharing
ü Summarization,
EIGRP Metric Tuning
ü Manipulating
Hello and Hold Timer, Static Neighbor configuration
ü Static
Neighbor configuration
ü Passive
Interfaces, Authentication
ü Neighbor
ship over WAN, EIGRP Stub features
ü Default
Route with EIGRP
ü Route
Filtering by using ACL, IP Prefix-list and Route-Map
OPEN SHORTEST PATH
FIRST
ü OSPF
Link State Features, Packet Types
ü OSPF
Neighbors and Adjacencies on LAN and WAN
ü LSA
TYPES, OSPF Metric Calculation and Tuning
ü OSPF
Network Types (Point-to-Point, BMA, NBMA)
ü OSPF
Configuration and Verification, Route Filtering
ü Route
Summarization, Default Route in OSPF
ü Special
Areas (Stub, Totally Stubby, NSSA, Totally NSSA)
ü OSPF
Virtual Link with Authentication / No Authentication
ü Manipulating
Hello and Dead Intervals
Route Redistribution
ü Redistribution
Concepts and Process
ü Redistributing
into EIGRP / OSPF / RIP
Advance
Redistribution:
ü PBR
function and configuration
ü Redistribution
with Route-Map / Distribute-list
ü Issues
with Multiple Redistribution Points
ü IP
Service Level Agreement
Border Gateway
Protocol
ü Basics
of Internet Routing and Addressing
ü Internet
Route Aggregation, BGP ASNs (Public and Private ASNs)
ü BGP
ASNs (Public and Private ASNs)
ü Single
Homed, Dual Homed
ü Single
Multi homed, Dual Multi homed
ü Internal
BGP: Next-hop Issue with IBGP
ü Split-Horizon,
IBGP Mesh
ü Clearing
BGP Peers (Inbound and Outbound Filtering)
ü IBGP
Neighbors with Loopback Address
ü External
BGP: EBGP Neighbors with Loopback Address
ü BGP
Update Messages and BGP States
ü Effect
of Auto Summarization in BGP
ü BGP
Path Attributes: Weight, Local Preference, As-path Pre-pend
ü Origin
Codes, Multi Exit Discriminator
ü BGP
Route Filtering and BGP PATH Selection Process
IP Version 6
Addressing
ü IPV6
Address Representation, Types of IPV6 Addresses
ü Global
Route Aggregation, Static IPV6 Address Configuration
ü Stateful
DHCP, Stateless Auto Configuration
ü Multicast
and other Special IPV6 Addresses, DAD
ü IPV6
Routing Protocols and IGP Redistribution
ü IPV4
and IPV6 Co-existence: Dual Stack / Tunneling / NAT-PT
ü Static
Point-to-Point IPV6 Tunneling
ü Dynamic
Multipoint IPV6 Tunnel:
ü Auto
and Manual 6 to 4 Tunnel, ISATAP Tunnel
Routing over Branch
Internet Connection
ü Broadband
Internet Access
ü DSL
Concepts, DSL types, PPPoE / PPPoA
ü Virtual
Private Network:
ü Site-to-Site
VPN
ü IPSEC
Tunnel, GRE Tunnel
SWITCH - (300-115)
Enterprise Campus Network Design
ü Hierarchical Network Design
ü Multi Layer Switch Operation, Types of Multi
Layer Switch
ü Switching Tables: CAM / TCAM
ü Switch Port Cables and Connectors
ü Switch Port Configuration: Port Speed & Port
Duplex Mode
ü VLAN and TRUNKS: VLAN Membership and Deployment
ü Trunk Encapsulation (ISL/Dotlq), DTP
ü VLAN Trunking Protocol: VTP Domain / Modes /
Advertisement
ü VTP Version and VTP Pruning
Aggregating Switch Link
ü Switch Port Aggregating with Ether Channel
ü Ether Channel Load Balancing
ü Ether Channel Negotiation Protocol (PAgP, LACP)
Spanning Tree Protocol
ü STP Concept, BPDU (CBPDU, TCN BPDU)
ü STP States, STP Timers
ü Types of STP: CST/PVST /PVST+
ü STP Root Bridge Placement and Configuration
ü STP Customization, Modifying STP Timers
ü PORTFAST / UPLINKFAST / BACKBONEFAST
ü Protecting STP: ROOTGUARD/ BPDUGUARD/
LOOPGUARD/UDLD
Advance Spanning Tree Protocol
ü Rapid Spanning Tree Protocol:
ü BPDU & Convergence in RSTP
ü Multiple Spanning Tree Protocol:
ü MST Region, Instances with MST
ü Type of Interfaces in MLS, Inter VLAN Routing in
MLS
ü Multi Layer Switching with CEF, DHCP within a
MLS
ü Routing Configuration in MLS
Layer 3 High Availability
ü HSRP / VRRP / GLBP
ü Supervisor and Route Processor Redundancy
ü Configuring Redundancy Modes & Supervisor
Synchronization
ü Non Stop Forwarding
Wireless LAN
ü WLAN Basics and WLAN Standards
ü WLAN Architecture and Functions
ü Light Weight Access Point Operation
Securing Switched Network
ü Port Security / 802.1x Authentication, Port
Based Authentication
ü Mitigating Spoofing Attacks, DHCP Snooping, IP
Source Guard
ü Dynamic ARP Inspection, VLAN ACL, Securing VLAN
Trunk,
ü VLAN Hopping, Private-VLAN Concept
TSHOOT - (300-135)
ü Introduction to Network Maintenance
ü Introduction to Troubleshooting Process
ü Maintenance & Troubleshooting
ü Basic & Adv. Cisco Catalyst Switch Troubleshooting
ü Introduction to Troubleshooting Routing
Protocols
ü Security Troubleshooting
ü IP Services Troubleshooting
ü IP Communications Troubleshooting
ü Network Monitoring tools PRTG, SolarWinds
ü Packet Analyzing & Sniffing tools Wirelshark
Our Institute Location:
Redback IT Solutions Private Limited,
#AL 24 TNHB PHASE III,
Sathuvacheri,( Near Vallalar Water Tank)
Vellore. 632602
Contact :
Training Coordinator
+91 8189985551
Think twice before you ignore "HACKERS"
Ethical Hacking Course
With the technological advances, hacking is no longer restricted to only MNCs or government infrastructure. According to zone-h.org website, more than a score of websites are attacked/defaced every day. Redback brings you the most cherished and appreciated training program which will help you to secure your systems from the evils of unethical hackers.
This Course acts as the foundation stone in your career to be
a Penetration Tester and providing security to networks and websites. With all
the latest Hacking tools and real-time Ethical hacking training techniques will gives you a practical approach and simulated
environment to test the attacks and assess the vulnerabilities.
Course Features
·
Live
Classes : 4.5 hrs / week
There
will be 4.5 hours of corporate faculty led interactive sessions per week for
learning this course. If you miss a session you can attend it in a differnt
batch. The recording of the session will be uploaded on the platform for
reviewing later on.
·
Corporate
Faculty
We
believe in bringing the best faculty for you, our trainers come from corporate
with tons of experience in their respective field which they share with you.
·
Virtual
Lab : Real time assessment
A
student can practice the skill in a fully interactive, virtual enviroment. It
includes MCQ's and practice questions with real time assessment and feedbacks.
·
Help
By Experts
Practicing
is the best way to master any skill and its natural to get stuck when you
practice. We ackknowledge that and prvide you round the clock help. Experts
respond to your query at the earliest and guide you through.
Course Module:
ü INTRODUCTION
ü BASICS OF SYSTEM
ADMINISTRATION
ü BASICS OF NETWORK
ADMINSTATION
ü EXPERTIZING
ANONYMIZING
ü SUPERIOR MALWARE
RESEARCH
ü WINDOWS HACKING
ü LINUX SECURITY
ü PASSWORD HACKING
ü SQL INJECTION
ü EMAIL HACKING OR
PHISHING
ü SNIFFING
ü SESSION HIJACKING
ü WEB APPLICATION
ATTACKS
ü WEBSITE
DEFACEMENT & DOMAIN HACKING
ü MIXED HACKING
ü SOCIAL
ENGINEERING
ü PHYSICAL SECUIRTY
ü COMPUTER FORENSIC
ü VOIP &
WIRELESS HACKING
ü VULNERABLILITY
DISCOVERY
ü PENETRATION
TESTING
ü HACKING WITH
METASPLOIT
ü FIREWALLS AND
ANTIVIRUSES
ü IDS & IPS
SECURITY
ü HONEYPOT HACKING
ü SECURING SYSTEM
& NETWORKS
Course Prerequisites :There
is no prerequisite for the this Course. Whether you are a student with or
without computer science background or working professionally in the security
domain, this training lays the foundation of IT Security concepts which
enable you to move ahead both in the field of your research or profession.
Career Prospects:
This Course prepares you for the globally accepted Certification
from Redback Council, which makes you eligible to work in the following
domains:
ü
Security Analyst
ü
Network Security
ü
Cyber Defender
ü
Penetration Tester
ü
Information Security
ü
Network Defense Technician
ü
Cyber Security Consultant
ü
Information Assurance Analyst
ü
Cyber Assessment Specialist
ü
Lead Cyber Threat Analyst
ü
IT Risk Analyst
Duration: 1 Month
Our Institute Location:
Redback IT
Solutions Private Limited,
#AL 24 TNHB PHASE
III,
Sathuvacheri,(
Near Vallalar Water Tank)
Vellore. 632602
Contact :
Training
Coordinator
+91 8189985551
Tuesday, 9 February 2016
Posted by Sivapriya