CEH V9 Brochure | CEH V9 Certification

download CEH V9 Brochure | CEH V9 Certification

of 13

Transcript of CEH V9 Brochure | CEH V9 Certification

  • 7/26/2019 CEH V9 Brochure | CEH V9 Certification


  • 7/26/2019 CEH V9 Brochure | CEH V9 Certification


  • 7/26/2019 CEH V9 Brochure | CEH V9 Certification


  • 7/26/2019 CEH V9 Brochure | CEH V9 Certification


    CertStore (The Certification Store)

    A complete certification online and offline store where you can accomplish

    any of IT certification and Training. CertStore is master and specialized to

    deliver the IT training programs and certifications to its global students and


    CertStore is a ISO (International Standard Organization) Certifiedand

    Approved by Govt. Of India.


    Delivering its certification and training across to the global interested

    students and participants. The CertStore was founded in 2010 with a positive

    mindset and objectiveto deliver the IT training programs and certifications to

    the maximum students and participants in Asia and across the globe.

    CertStore is a platform of 100+ IT professionalswho are experts and globally

    certified in their respective domains. CertStore having 50+ Authorizations and

    Endorsementsincluding EC-Council, CompTia, Microsoft, Cisco, D-Link, NIIT,

    Exin, Google and many more

    Why we are a Fastest Growing Leading IT Company:

    6+ years of working

    50+ Authorizations and Endorsements

    100+ Globally Certified and International Instructors

    500+ Courses

    50,000+ Students are Certified100% Satisfaction Guaranteed

    100% Quality Delivered

  • 7/26/2019 CEH V9 Brochure | CEH V9 Certification


  • 7/26/2019 CEH V9 Brochure | CEH V9 Certification


    The Certified Ethical Hacker V.9 program is the pinnacle of the most desired

    information security training program any information security professional willever want to be in. To master the hacking technologies, you will need to

    become one, but an ethical one! The accredited course provides the

    advanced hacking tools and techniques used by hackers and information

    security professionals alike to break into an organization. As we put it, To

    beat a hacker, you need to think like a hacker. This course will immerse you

    into the Hacker Mindset so that you will be able to defend against future

    attacks. The security mindset in any organization must not be limited to the

    silos of a certain vendor, technologies or pieces of equipment.

    This ethical hacking course puts you in the drivers seat of a hands-on

    environment with a systematic process. Here, you will be exposed to an

    entirely different way of achieving optimal information security posture in their

    organization; by hacking it! You will scan, test, hack and secure your own

    systems. You will be taught the five phases of ethical hacking and the ways to

    approach your target and succeed at breaking in every time! The five

    phases include Reconnaissance, Gaining Access, Enumeration, Maintaining

    Access, and covering your tracks.

  • 7/26/2019 CEH V9 Brochure | CEH V9 Certification


  • 7/26/2019 CEH V9 Brochure | CEH V9 Certification


    Real life Scenario

    Our security experts have designed over 140 labs which mimic real time scenarios in the

    course to help you live through an attack as if it were real and provide you with access to

    over 2200 commonly used hacking tools to immerse you into the hacker world.

    As a picture tells a thousand words, our developers have all thisand more for you in over

    1685 graphically rich, specially designed slides to help you grasp complex security concepts

    in depth which will be presented to you in 5 day hands on class by our Certified Instructor.

    The goal of this course is to help you master an ethical hacking methodology that can be

    used in a penetration testing or ethical hacking situation. You walk out the door with ethical

    hacking skills that are highly in demand, as well as the internationally recognized Certified

    Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hackerexam 312-50.

    In short, you walk out the door with advanced hacking skills that are highly in demand, as

    well as the internationally recognized Certified Ethical Hacker certification!

    CEH V9 Endorsements

    This is the world's most advanced ethical hacking

    course with 18 of the most current security

    domains any ethical hacker will ever want to know

    when they are planning to beef up the information

    security posture of their organization. In 18

    comprehensive modules, the course covers 270

    attack technologies, commonly used by hackers.

  • 7/26/2019 CEH V9 Brochure | CEH V9 Certification


    Focus on New Attack Vectors

    o Emphasis on Cloud Computing Technology

    CEHv9 focuses on various threats and hacking attacks to the emerging cloud

    Covers wide-ranging countermeasures to combat cloud computing attacks

    Provides a detailed pen testing methodology for cloud systems to identify threat

    o Emphasis on Mobile Platforms and Tablet Computers

    CEHv9 focuses on the latest hacking attacks targeted to mobile platform and tablet

    computers and covers countermeasures to secure mobile infrastructure

    Coverage of latest development in mobile and web technologies

    New Vulnerabilities Are Addressed

    o Heartbleed CVE-2014-0160

    Heartbleed makes the SSL layer used by millions of websites and thousands of cloud

    Detailed coverage and labs in Module 18: Cryptography.

    o Shellshock CVE-2014-6271

    Shellshock exposes vulnerability in Bash, the widely-used shell for Unix-based

    operating systems such as Linux and OS X.

    Detailed coverage and labs in Module 11: Hacking Webservers

    o Poodle CVE-2014-3566

    POODLE lets attackers decrypt SSLv3 connections and hijack the cookie session that

    identifies you to a service, allowing them to control your account without needing

    your password.

    Case study in Module 18: Cryptography

    o Hacking Using Mobile Phones

    CEHv9 focuses on performing hacking (Foot printing, scanning, enumeration, system

    hacking, sniffing, DDoS attack, etc.) using mobile phones

    Courseware covers latest mobile hacking tools in all the modules

    o Coverage of latest Trojan, Virus, Backdoors


    Courseware covers Information Security Controls and Information Security Laws and


    o Labs on Hacking Mobile Platforms and Cloud Computing

    o More than 40 percent new labs are added from Version 8

    o More than 1500 new/updated tools

    o CEHv9 program focuses on addressing security issues to the latest operating systems like

    Windows 8.1

    o It also focuses on addressing the existing threats to operating environments dominated by

    Windows 7, Windows 8, and other operating systems (backward compatibility)

  • 7/26/2019 CEH V9 Brochure | CEH V9 Certification


    The hacking tools and techniques in each of these five phases are provided

    in detail in an encyclopaedic approach to help you identify when an attack

    has been used against your own targets. Why then is this training called the

    Certified Ethical Hacker Course? This is because by using the same

    techniques as the bad guys, you can assess the security posture of an

    organization with the same approach these malicious hackers use, identify

    weaknesses and fix the problems before they are identified by the enemy,

    causing what could potentially be a catastrophic damage to your respective


    We live in an age where attacks are all susceptible and come from anyplace

    at any time and we never know how skilled, well-funded, or persistent thethreat will be. Throughout the CEH course, you will be immersed in a hacker's

    mindset, evaluating not just logical, but physical security. Exploring every

    possible point of entry to find the weakest link in an organization. From the

    end user, the secretary, the CEO, miss-configurations, vulnerable times during

    migrations even information left in the dumpster.

  • 7/26/2019 CEH V9 Brochure | CEH V9 Certification


    Who is it For ?

    The Certified Ethical Hacking training course will significantly benefit security

    officers, auditors, security professionals, site administrators, and anyone who is

    concerned about the integrity of the network infrastructure.


    15-30 Days (10:00 AM - 06:00 PM)

    Pre-Requisite:Basic Knowledge of Computer and Internet

    C|EH V9 Course Fee:

    30,000.00 INR or

    (Included all taxes and registrations)

    Exam Details:Number of Questions: 125

    Test Duration: 4 Hours

    Test Format: Multiple Choice

    Test Delivery: CERTSTORE, ECC EXAM, VUE

    Exam Prefix: 312-50 (ECC EXAM), 312-50 (VUE)

    CEH V9 Offer:

    Current Offer/Discount:

    Please register before 30th June 2016 and Get "100% FREE ECSA or CCNA"


  • 7/26/2019 CEH V9 Brochure | CEH V9 Certification


    What is Included with the CEH V9 Course:

    Global EC-Council CEH V9 Certification

    Global training certification

    EC-Council Study Material

    EC-Council Digital Kit

    EC-Council Official Training

    EC-Council Exam Voucher

    Certified Global/International Instructors

    Benefits with Us:EC-Council C|EH T-shirt- NEW

    100% Hands-On- NEWi-lab Access (if applicable) worth 250$ USD- NEW

    Exam Re-Take voucher worth500$ USD- NEW

    24*7 Lab access and support- NEW

    Free lifetime membership validity- NEW

    Workshop Invitation and pass- NEW

    Global blog and forum access- NEW

    Free Exam and Lab Preparation- New

    Free Mock Test- New

    Highly Interactive and Technology Classrooms- New100% Satisfaction or money back guaranteed- New

    Free CEH Skill Assessment:

  • 7/26/2019 CEH V9 Brochure | CEH V9 Certification


    To register your seat kindly pay by the following methods:

    Cash DepositYou can deposit cash to our bank accounts.

    Cheque/Demand Draft

    You can make a cheque or demand draft (DD) in favour of

    "CertStore Solution"

    Online Transfer/NEFT/RTGS

    You can also transfer funds online through NEFT or RTGS.

    Paypal TransferYou can also pay via pal by using our pay pal email account

    "[email protected]"

    CertStore Solution- Transforming Your Career

    (Leading IT certifications and training company)

    Address: Office No.47, Ground Floor, Lakshmi Nagar,New Delhi 110092, Near Nathu Sweets

    For General Inquiries:



    For Business Related Inquiries:


    For Marketing Related Inquiries:Mobile:+91-80109439-01

    Global Web:www.certstore.in

    E-Mail: [email protected]

    Thank You...