SlideShare uma empresa Scribd logo
1 de 30
Baixar para ler offline
Ankit Fadia Certified
Ethical Hacker (AFCEH)
          II




                         confidential
About Ankit……..

 Ankit Fadia, 21 years old, is an independent
 computer security and digital intelligence consultant .

 He has authored six internationally best-selling books on numerous
 topics related to Computer Security that have been widely
 appreciated by both professionals and industry leaders the world
 over.

 His books have sold a record 250,000 copies across the globe, have
 been translated into Japanese, Korean, Portuguese and Polish and
 are also being used as reference textbooks in some of the most
 prestigious academic institutions in Asia and North America.




                                                               confidential
About Ankit……….

   In November 2001, Fadia was consulted by a classified intelligence
   agency for breaking an encrypted message sent by one of Osama Bin
   Laden’s men.

   Since then Fadia has been involved in numerous classified projects
   pertaining to International Security and Computer Networks. He handles
   the Asia Operations of the classified intelligence agency.

   Fadia provides customized cyber security training and consulting
   solutions to clients all across Asia, Australia, North America and the
   Middle East including Google, Citibank, Shell, Volvo, Thai Airways,
   UOB Bank, PT Cisco Systems, Bank of Thailand, Bangkok Public
   Bank, Amari Hotels, BlueScope Steel, Jumeirah International, Wipro,
   Singapore Health Promotion Board, Infosys, Satyam, Schering Ltd
   and many other organizations in the government, police and corporate
   sectors.



                                                                       confidential
Ankit’s Training Portfolio

  Financial & Banking Sector:
     TA Securities (Malaysia), Bank of Maharashtra, United Overseas
     Bank of Singapore, Bangkok Bank Public Co. Ltd, Citibank Taiwan,
     Monetary Authority of Singapore, Bank of Thailand, GHL Systems
     Berhad, PT Bank Rabobank International Indonesia and Australian
     bank officials.
  Software Sector:
     Wipro Technologies, Infosys, Symphony Services, Satyam
     Corporation, CMC Limited (TATA), PT Cisco Systems Indonesia.
  Internet Services Sector:
     Google, Sify (Satyam).
  Government Sector:
     Singapore Police, Inland Revenue Authority (Singapore), Inland
     Revenue Board (Malaysia), Ministry of Defence (Singapore),
     NISER (Malaysia), Ministry of National Development (Singapore,
     Ministry of Home Affairs (Singapore), Monetary Authority of
     Singapore, Multimedia Super Corridor (Malaysia), Indian Police,
     Central Forensics Laboratory, Kerela Police, Andhra Pradesh Police
     Department, APFSL, Pune Police.




                                                                          confidential
Ankit’s Training Portfolio

 Transportation Sector:
     Singapore SMRT Corporation, Thai Airways International.
 Industrial Goods Sector:
     The Siam Chemicals (Thailand), BlueScope Steel (Malaysia) Sdn Bhd, Shell
     Information Technology International (Malaysia) and PT Indah Kiat Pulp &
     Paper TBK (Malaysia).
  Automobiles Sector:
     Volvo Malaysia Sdn Bhd.
 Education Sector:
     Institute of Defence and Strategic Studies (IDSS, Singapore), Indian School
     of Business (Hyderabad,India) Singapore Management University, Indian
     Institute of Technology (IIT: Mumbai, Delhi and Kharagpur branches), BITS
     Pilani, Ministry of Education (Singapore), Multimedia University.
  Services Sector:
     Amari Hotels and Resorts (Thailand), Jumeirah International Luxury &
     Corporate Hotels.




                                                                          confidential
Ankit’s Training Portfolio

  Healthcare Sector:
     Schering (Bangkok) Ltd, Compakar eHealth Tech Sdn.Bhd (Malaysia),
     Health Promotion Board (Singapore).
  International Conferences:
     Young Entrepreneurs Organization (Dubai), Asia Technological Initiative
     (Singapore), HACK (Singapore, Australia and Malaysia), Junior Chamber
     International (New Delhi), CAN 2005 (Malaysia), Hacking (Malaysia,
     Thailand and India) and InfoSec World (Singapore).
  Business Leaders:
     Young Entrepreneurs Organization (Asia-Pacific, Dubai University,
     Singapore, Malaysia, Indonesia, Dubai, Bangalore, Chennai, Mumbai,
     Kolkata and Delhi), Young Presidents Organization (Malaysia, Bangalore,
     Mumbai and Kolkata) and Young Leaders Forum (Kolkata).




                                                                       confidential
What is the AFCEH program?
  An ANKIT FADIA CERTIFIED ETHCAL HACKER is a
  computer security program on the science of ethical hacking,
  to discover loopholes in target systems and to setup security
  systems to counter the computer criminals. Professionals who
  undergo this training and certification program will have the
  necessary knowledge required to administer security solutions
  to companies and individuals by making computer networks
  secure. Want to be recognized for your computer security
  expertise? Want to be considered amongst the best security
  gurus in the world? Want to climb up the career ladder and
  improve your global job prospects? Want to be trained and
  certified by world renowned author and computer security
  guru? Want to become an ANKIT FADIA CERTIFIED
  ETHICAL HACKER? If your answer to any of the above
  questions is a yes, then you have come to the RIGHT PLACE!

                                                            confidential
AFCEH – Ver.1 Key Milestones

 • Started in March 2006. 5 batches conducted, 3000 students
   trained in more than 90 cities.

 • Participants included students, industry and government -
   Airtel, Reliance, MTNL, BSNL, ICICI Bank, Tata, DSP Merlyn
   Lynch, Indian Army, Airforce and State Police Departments.

 • 27,000 Hours of Video Lectures and 18,000 Text Books used.

 • AFCEH helped thousands of Participants added credibility to
   their resume and managed to receive better jobs.

 •    In Jan 2007, AFCEH was started in China, Singapore and
     Malaysia.




                                                            confidential
AFCEH – Ver.1 Key Milestones


 • Toppers of each batch were interviewed and given the
   opportunity to work with Ankit Fadia on projects like
   research,    consulting,   writing books,   teaching
   assistantships and others.

 • In April 2007, a special conference style package of the
   AFCEH course was made available for corporate called
   Ankit Fadia Computer Security (AFCS).




                                                         confidential
AFCEH Ver.1 Success Stories

 Name: Jaya Bhattacharjee (26 years old)
 City: Kolkata

 Claim to Fame: After topping the AFCEH exam, Jaya was
 selected for a project, then carried out research and co
 authored a book on the topic of Encryption with Mr. Ankit
 Fadia that was released at a national press conference in
 February 2007.

 Her Thoughts: The AFCEH course gave me the
 opportunity to gain invaluable knowledge in the field of
 Computer Security in a systematic manner. Everybody will
 gain a lot from this course. Even if a person does not know
 anything about the subject will also be able to understand
 the concepts if he/she is sincere. I had a wonderful
 experience writing the book and it gave me a well
 deserved recognition among my friends, relatives, peers
 and colleagues. It gives me immense happiness when I
 see the books lined up in all the bookshops across India
 like in Kolkata, Bangalore and others!

                                                               confidential
AFCEH Ver.1 Success Stories
 Name: Manu Zacharia (30 years old)
 City: New Jersey, USA (Cochin in India)

 Claim to Fame: Like Jaya, even Manu co-authored a book on the
 topic of Intrusion Detection with Mr. Ankit Fadia that was released at
 a national press conference in February 2007. This book will soon
 be released internationally. He was also selected to be the teaching
 assistant of the course.

 His Thoughts: I would like to express how much I enjoyed the
 AFCEH course (Batch 1) and working with Ankit Fadia. The course
 is taught in a friendly, easy to grasp manner. Beginners and experts
 alike will benefit from the concise way that the course is structured.
 The course takes you from an absolute beginner to a
 knowledgeable expert in a very short amount of time. Everything is
 written in plain English, & is easy to understand. I wouldrecommend
 this course to any one who wants to gain insight into the mindset of
 the hacker community and to protect and defend themselves
 against the attacks. The quality of the course is very high as was
 the delivery and presentation. Excellent content, good books and
 easy to learn. Well done.

                                                                          confidential
AFCEH Ver.1 Success Stories

 Name: Vaibhav Kaushal (19 years old)
 City: Hazaribagh, Jharkhand

 Claim to Fame: After topping the AFCEH exam, Vaibhav was selected for a project, then
 carried out research and co-authored a book on the topic of OS Hacking with Mr. Ankit
 Fadia. This book is likely to be launched in the market SOON.

 His Thoughts: I do not have words good enough to express how much I liked the
 course. The course helped me gain better knowledge about many areas of the computer
 security and the practical ways to protect computers from being attacked by other people.
 What I liked about the course was that I had the opportunity to communicate with so
 many people with special knowledge in various fields. We helped each other learn a lot
 on the mailing lists of the AFCEH course group on Yahoo! In fact I was feeling a bit
 nostalgic after we had completed the course ended.




                                                                                       confidential
Why is there a need for the new AFCEH 2.0?

   Computer Security is a very dynamic industry. Every
   single day thousands of new viruses, worms and security
   vulnerabilities are discovered on the Internet. It is very
   important for computer security professionals to remain
   updated, educated and aware of the latest developments
   in this dynamic industry. This is why it was important to
   release version 2.0 of the AFCEH program. This new,
   updated and improved version of the highly successful
   AFCEH program contains NEW comprehensive training
   material, content, lectures and books on the latest tools,
   techniques and methods being used in the field of
   computer security. AFCEH 2.0 will not only allow
   participants to update their knowledge, but will also teach
   them newly discovered techniques that were previously
   not known while AFCEH 1.0 was being developed.
                                                           confidential
What is new in AFCEH 2.0?

 • The KEYWORDS that succinctly describe AFCEH 2.0
  are:

   NEW

   UPDATED

   MORE




                                               confidential
What is new in AFCEH 2.0?


 • More than 90% of the topics in the video lectures will
   have a NEW, UPDATED data and content.

 • A NEW book titled Intrusion Detection will be given out to
   participants as a text book.

 • The following    NEW     topics   will   be   taught:   See
   Attachment.




                                                            confidential
TABLE OF CONTENTS FOR AFCEH

  Introduction To Information Security            SCANNING
   And Ethical Hacking                            Ping and related ICMP concepts.
        Importance of Security                          Port Scanning
        Can Hacking be Ethical?                         Tool – Pinger
        Threat                                          Tool – WS_PingProPack
        Vulnerability                                   Tool – NetScan Tools
        Target of Evaluation                            Tool – Hping
        Attack                                          Tool – icmpenum
        Exploit                                         Detecting Ping Sweeps
        CIA Triad – Elements of Security                Tool –IDS like ISA Server or Snort
        Modes Operandi of Hackers                       Port Scanning
        Reconnaissance                                  TCP Connect Scanning
        Scanning                                        TCP SYN Scanning
        Gaining Access                                  SYN/ACK Scanning
        Maintaining Access                              TCP FIN Scanning
        Covering Tracks                                 TCP NULL Scanning
        Classification of Hacker                        TCP XMAS Scanning
        Black Hats                                      Detecting Port Scanning
        White Hats                                      Tool – nmap
        Grey Hats                                       Tool – SuperScan
   TCP/IP Concepts in brief                             Tool – Cheops
        OSI Layer and TCP /IP Architecture              DNS Mining
        Common Protocols used and their working         Tools – Perl script for DNS Mining – blindcrawl.pl
        3 Way Handshakes
  .FOOT PRINTING                                  ENUMERATION
        Whois
        DNS lookup / Nslookup                           NetBIOS Null Session
        Network Range                                   NetBIOS Null Session Countermeasures
        Traceroute                                      Tool - NBTScan
        Sam Spade                                       Tool – DumpSec
        NeoTrace                                        Tool – NetBIOS Auditing Tool
        Visual Route                                    SNMP Enumeration
        SmartWhoIs                                      Tool – SNMP Util
                                                        Tool – enum



                                                                                                             confidential
TABLE OF CONTENTS FOR AFCEH

 SYSTEM HACKING                           TROJAN AND BACKDOORS

     Password Attacks                          Introduction
     Password Guessing
                                               Working of Trojans
     Dictionary attack
                                               Types of Trojans
     Brute Force Attack
                                               Remote Access Trojans
     Hybrid Attack
                                               Password Sending Trojans
     Social Engineering
                                               Keyloggers
     Shoulder Surfing
                                               Destructive Trojans
     Dumpster Diving
     Tool – Legion                             DoS Attack Trojans
     Rainbow Tables                            Proxy / Wingate Trojans
     Password Sniffing                         FTP Trojans
     Tool – LOphtcrack                         Software Detection Killers
     Previlege Escalation
                                               How Trojans are transmitted
     Tool – John The Ripper
                                               Tool – SubSeven or BackOrifice
     Password Cracking Countermeasures
                                               Tool – Netbus
     Keystroke Loggers
                                               EXE Binders or Wrappers
     Hardware Keylogger
                                               XSS (Cross Site Scripting)
     Rootkits
                                               Reverse Cross Site Request (RCSR)
     Rootkit counter measures
                                          SNIFFERS
     How to cover your tracks
     Disabling auditing
     Clearing the event log                    What is packet or network sniffing?
     Steganography                             Tool – Ethereal / Wireshark
     Other methods of hiding files             Tool – Snort
     Attrib
                                               Tool – tcpdump
     NTFS Alternate Data Stream
                                               Tool – Windump
     Buffer Overflows
                                               Man in the middle attack
     Protection against buffer overflow
                                               ARP Spoofing
     Metasploit
     Hacking using USB




                                                                                     confidential
TABLE OF CONTENTS FOR AFCEH

 DENIAL OF SERVICE ATTACKS
                                      VIRUSES
       Introduction
                                             Introduction
       Types of DoS Attacks
                                             How viruses work?
       Bandwidth attacks
                                             Types of viruses
       Protocol attacks, and
       Logic attacks                         Protection of against viruses
       DDOS
       Tool – SSPing                  GOOGLE HACKING
       Tool – Etherape
       Land Exploit
                                             ENCRYPTION
       Tool – Trinoo
       Preventing DoS Attacks
                                      MISC
 SQL INJECTION
                                             Firefox as Pen Testing Tool
                                             Some scripts (perl scripts or other scripts) which is commonly
       Introduction
                                             used during pen testing like lbd (load balancing detector)
       OLE DB Errors
       Input Validation Attacks
       Tools used for SQL Injection
       How to Prevent SQL Injection

 WIRELESS NETWORKS

       Introduction
       Various Wireless standards
       WEP
       Wireless DoS
       Wireless Sniffing
       Tool - Airsnort
       Tool – AiroPeek
       Wireless IDS




                                                                                                       confidential
About The Program


    18-hour program spread over 30 days
•
     • Live Video Lectures and Interactive Q&A Sessions of 4
       hours over Video Conference.
     • 14 hours free Internet access @ RW for accessing 11
       hours of self-pace self-learning Video on demand content,
       Hacking demonstration on Video & 2 hours of Online
       Exam.

    Ankit Fadia’s 6 international bestsellers worth Rs. 1545/- to
•
    be given absolutely free.

    Certification on successful completion of online certification
•
    exams.


                                                               confidential
How To Enroll @ Reliance World




                           confidential
Click Here to access the course




                                  confidential
Click Here to register the course




                                    confidential
confidential
Click Here to Enter for Video Lessons the course




                                                   confidential
confidential
confidential
From Ankit Fadia moments Batch 4. Our S.P. Mr Milind Bharambe
and A.S.P Mr Sunil Kolhe successfully completed this course with enthusiasm.”

                                                                     confidential
In ROM only Sangli has done Ankit Fadia Corporate Batch. Director Of M/s B.G
Chitale Dairy Mr Vishwas Chitale and also other computer profession’s
successfully completed this course with enthusiasm.” Our S.P. Mr Milind
Bharambe also participated in this course
                                                                      confidential
About The Program

  Program Price – Rs. 6499/-
  The Price Includes
   - Cost Of Video Conferencing
   - Access Cost for Video-On-Demand
   - On Line Examination Fee
   - PLUS
   - 6 of Ankit’s International Best Selling books on Hacking & counter
     measures




                                                                    confidential
About The Program




     For Admission Contact
    Mahesh Ojha ( Web Lead )
          09373445444.


                          confidential

Mais conteúdo relacionado

Semelhante a Afceh 2.0 Final

English (US)_Classroom Toolkit - Unlocking Generative AI Safely and Responsib...
English (US)_Classroom Toolkit - Unlocking Generative AI Safely and Responsib...English (US)_Classroom Toolkit - Unlocking Generative AI Safely and Responsib...
English (US)_Classroom Toolkit - Unlocking Generative AI Safely and Responsib...
AdliAlimi1
 
E Learning In India
E Learning In IndiaE Learning In India
E Learning In India
guestf421ad
 
Communication Skills Improving Assistance
Communication Skills Improving AssistanceCommunication Skills Improving Assistance
Communication Skills Improving Assistance
ijtsrd
 
Session 1 AI literacy What is AI and how do we use it (video).pptx
Session 1 AI literacy What is AI and how do we use it (video).pptxSession 1 AI literacy What is AI and how do we use it (video).pptx
Session 1 AI literacy What is AI and how do we use it (video).pptx
jameshodgkinson9
 
Supporting learner mobility with Mobler Cards
Supporting learner mobility with Mobler CardsSupporting learner mobility with Mobler Cards
Supporting learner mobility with Mobler Cards
Christian Glahn
 

Semelhante a Afceh 2.0 Final (20)

Regenerating learning experience with AI
Regenerating learning experience with AIRegenerating learning experience with AI
Regenerating learning experience with AI
 
Usage of ChatGPT at Higher Learning Institutions.pptx
Usage of ChatGPT at Higher Learning Institutions.pptxUsage of ChatGPT at Higher Learning Institutions.pptx
Usage of ChatGPT at Higher Learning Institutions.pptx
 
CSR Plan for National Celular Operator - Award Winning CSR
CSR Plan for National Celular Operator - Award Winning CSRCSR Plan for National Celular Operator - Award Winning CSR
CSR Plan for National Celular Operator - Award Winning CSR
 
English (US)_Classroom Toolkit - Unlocking Generative AI Safely and Responsib...
English (US)_Classroom Toolkit - Unlocking Generative AI Safely and Responsib...English (US)_Classroom Toolkit - Unlocking Generative AI Safely and Responsib...
English (US)_Classroom Toolkit - Unlocking Generative AI Safely and Responsib...
 
Ventura Labs: An Indoplan Institute Initiative
Ventura Labs: An Indoplan Institute InitiativeVentura Labs: An Indoplan Institute Initiative
Ventura Labs: An Indoplan Institute Initiative
 
Inside-Out-Newsletter 2019-20.pdf
Inside-Out-Newsletter 2019-20.pdfInside-Out-Newsletter 2019-20.pdf
Inside-Out-Newsletter 2019-20.pdf
 
Struggle to success: How generative ai can transform your university experience?
Struggle to success: How generative ai can transform your university experience?Struggle to success: How generative ai can transform your university experience?
Struggle to success: How generative ai can transform your university experience?
 
Inside-Out-Newsletter 2020-21.pdf
Inside-Out-Newsletter 2020-21.pdfInside-Out-Newsletter 2020-21.pdf
Inside-Out-Newsletter 2020-21.pdf
 
AESIR Impact Report
AESIR Impact ReportAESIR Impact Report
AESIR Impact Report
 
E Learning In India
E Learning In IndiaE Learning In India
E Learning In India
 
Communication Skills Improving Assistance
Communication Skills Improving AssistanceCommunication Skills Improving Assistance
Communication Skills Improving Assistance
 
AI for Educators - Integrating AI in the Classrooms
AI for Educators - Integrating AI in the ClassroomsAI for Educators - Integrating AI in the Classrooms
AI for Educators - Integrating AI in the Classrooms
 
Artificial Intelligence (AI) Tools in Scientific Research .pptx
Artificial Intelligence (AI) Tools in Scientific Research .pptxArtificial Intelligence (AI) Tools in Scientific Research .pptx
Artificial Intelligence (AI) Tools in Scientific Research .pptx
 
Session 1 AI literacy What is AI and how do we use it (video).pptx
Session 1 AI literacy What is AI and how do we use it (video).pptxSession 1 AI literacy What is AI and how do we use it (video).pptx
Session 1 AI literacy What is AI and how do we use it (video).pptx
 
Top 10 Promising Startups in Education Technology 2022.pdf
Top 10 Promising Startups in Education Technology 2022.pdfTop 10 Promising Startups in Education Technology 2022.pdf
Top 10 Promising Startups in Education Technology 2022.pdf
 
TechByte 2017 - 14th Annual IT Symposium- - JIMS Rohini
TechByte 2017 - 14th Annual IT Symposium- - JIMS RohiniTechByte 2017 - 14th Annual IT Symposium- - JIMS Rohini
TechByte 2017 - 14th Annual IT Symposium- - JIMS Rohini
 
[Startup Nations Summit 2014] Competition - Singapore
[Startup Nations Summit 2014] Competition - Singapore[Startup Nations Summit 2014] Competition - Singapore
[Startup Nations Summit 2014] Competition - Singapore
 
31EIEAD-OER_AI.pptx
31EIEAD-OER_AI.pptx31EIEAD-OER_AI.pptx
31EIEAD-OER_AI.pptx
 
Supporting learner mobility with Mobler Cards
Supporting learner mobility with Mobler CardsSupporting learner mobility with Mobler Cards
Supporting learner mobility with Mobler Cards
 
infosys
infosysinfosys
infosys
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Afceh 2.0 Final

  • 1. Ankit Fadia Certified Ethical Hacker (AFCEH) II confidential
  • 2. About Ankit…….. Ankit Fadia, 21 years old, is an independent computer security and digital intelligence consultant . He has authored six internationally best-selling books on numerous topics related to Computer Security that have been widely appreciated by both professionals and industry leaders the world over. His books have sold a record 250,000 copies across the globe, have been translated into Japanese, Korean, Portuguese and Polish and are also being used as reference textbooks in some of the most prestigious academic institutions in Asia and North America. confidential
  • 3. About Ankit………. In November 2001, Fadia was consulted by a classified intelligence agency for breaking an encrypted message sent by one of Osama Bin Laden’s men. Since then Fadia has been involved in numerous classified projects pertaining to International Security and Computer Networks. He handles the Asia Operations of the classified intelligence agency. Fadia provides customized cyber security training and consulting solutions to clients all across Asia, Australia, North America and the Middle East including Google, Citibank, Shell, Volvo, Thai Airways, UOB Bank, PT Cisco Systems, Bank of Thailand, Bangkok Public Bank, Amari Hotels, BlueScope Steel, Jumeirah International, Wipro, Singapore Health Promotion Board, Infosys, Satyam, Schering Ltd and many other organizations in the government, police and corporate sectors. confidential
  • 4. Ankit’s Training Portfolio Financial & Banking Sector: TA Securities (Malaysia), Bank of Maharashtra, United Overseas Bank of Singapore, Bangkok Bank Public Co. Ltd, Citibank Taiwan, Monetary Authority of Singapore, Bank of Thailand, GHL Systems Berhad, PT Bank Rabobank International Indonesia and Australian bank officials. Software Sector: Wipro Technologies, Infosys, Symphony Services, Satyam Corporation, CMC Limited (TATA), PT Cisco Systems Indonesia. Internet Services Sector: Google, Sify (Satyam). Government Sector: Singapore Police, Inland Revenue Authority (Singapore), Inland Revenue Board (Malaysia), Ministry of Defence (Singapore), NISER (Malaysia), Ministry of National Development (Singapore, Ministry of Home Affairs (Singapore), Monetary Authority of Singapore, Multimedia Super Corridor (Malaysia), Indian Police, Central Forensics Laboratory, Kerela Police, Andhra Pradesh Police Department, APFSL, Pune Police. confidential
  • 5. Ankit’s Training Portfolio Transportation Sector: Singapore SMRT Corporation, Thai Airways International. Industrial Goods Sector: The Siam Chemicals (Thailand), BlueScope Steel (Malaysia) Sdn Bhd, Shell Information Technology International (Malaysia) and PT Indah Kiat Pulp & Paper TBK (Malaysia). Automobiles Sector: Volvo Malaysia Sdn Bhd. Education Sector: Institute of Defence and Strategic Studies (IDSS, Singapore), Indian School of Business (Hyderabad,India) Singapore Management University, Indian Institute of Technology (IIT: Mumbai, Delhi and Kharagpur branches), BITS Pilani, Ministry of Education (Singapore), Multimedia University. Services Sector: Amari Hotels and Resorts (Thailand), Jumeirah International Luxury & Corporate Hotels. confidential
  • 6. Ankit’s Training Portfolio Healthcare Sector: Schering (Bangkok) Ltd, Compakar eHealth Tech Sdn.Bhd (Malaysia), Health Promotion Board (Singapore). International Conferences: Young Entrepreneurs Organization (Dubai), Asia Technological Initiative (Singapore), HACK (Singapore, Australia and Malaysia), Junior Chamber International (New Delhi), CAN 2005 (Malaysia), Hacking (Malaysia, Thailand and India) and InfoSec World (Singapore). Business Leaders: Young Entrepreneurs Organization (Asia-Pacific, Dubai University, Singapore, Malaysia, Indonesia, Dubai, Bangalore, Chennai, Mumbai, Kolkata and Delhi), Young Presidents Organization (Malaysia, Bangalore, Mumbai and Kolkata) and Young Leaders Forum (Kolkata). confidential
  • 7. What is the AFCEH program? An ANKIT FADIA CERTIFIED ETHCAL HACKER is a computer security program on the science of ethical hacking, to discover loopholes in target systems and to setup security systems to counter the computer criminals. Professionals who undergo this training and certification program will have the necessary knowledge required to administer security solutions to companies and individuals by making computer networks secure. Want to be recognized for your computer security expertise? Want to be considered amongst the best security gurus in the world? Want to climb up the career ladder and improve your global job prospects? Want to be trained and certified by world renowned author and computer security guru? Want to become an ANKIT FADIA CERTIFIED ETHICAL HACKER? If your answer to any of the above questions is a yes, then you have come to the RIGHT PLACE! confidential
  • 8. AFCEH – Ver.1 Key Milestones • Started in March 2006. 5 batches conducted, 3000 students trained in more than 90 cities. • Participants included students, industry and government - Airtel, Reliance, MTNL, BSNL, ICICI Bank, Tata, DSP Merlyn Lynch, Indian Army, Airforce and State Police Departments. • 27,000 Hours of Video Lectures and 18,000 Text Books used. • AFCEH helped thousands of Participants added credibility to their resume and managed to receive better jobs. • In Jan 2007, AFCEH was started in China, Singapore and Malaysia. confidential
  • 9. AFCEH – Ver.1 Key Milestones • Toppers of each batch were interviewed and given the opportunity to work with Ankit Fadia on projects like research, consulting, writing books, teaching assistantships and others. • In April 2007, a special conference style package of the AFCEH course was made available for corporate called Ankit Fadia Computer Security (AFCS). confidential
  • 10. AFCEH Ver.1 Success Stories Name: Jaya Bhattacharjee (26 years old) City: Kolkata Claim to Fame: After topping the AFCEH exam, Jaya was selected for a project, then carried out research and co authored a book on the topic of Encryption with Mr. Ankit Fadia that was released at a national press conference in February 2007. Her Thoughts: The AFCEH course gave me the opportunity to gain invaluable knowledge in the field of Computer Security in a systematic manner. Everybody will gain a lot from this course. Even if a person does not know anything about the subject will also be able to understand the concepts if he/she is sincere. I had a wonderful experience writing the book and it gave me a well deserved recognition among my friends, relatives, peers and colleagues. It gives me immense happiness when I see the books lined up in all the bookshops across India like in Kolkata, Bangalore and others! confidential
  • 11. AFCEH Ver.1 Success Stories Name: Manu Zacharia (30 years old) City: New Jersey, USA (Cochin in India) Claim to Fame: Like Jaya, even Manu co-authored a book on the topic of Intrusion Detection with Mr. Ankit Fadia that was released at a national press conference in February 2007. This book will soon be released internationally. He was also selected to be the teaching assistant of the course. His Thoughts: I would like to express how much I enjoyed the AFCEH course (Batch 1) and working with Ankit Fadia. The course is taught in a friendly, easy to grasp manner. Beginners and experts alike will benefit from the concise way that the course is structured. The course takes you from an absolute beginner to a knowledgeable expert in a very short amount of time. Everything is written in plain English, & is easy to understand. I wouldrecommend this course to any one who wants to gain insight into the mindset of the hacker community and to protect and defend themselves against the attacks. The quality of the course is very high as was the delivery and presentation. Excellent content, good books and easy to learn. Well done. confidential
  • 12. AFCEH Ver.1 Success Stories Name: Vaibhav Kaushal (19 years old) City: Hazaribagh, Jharkhand Claim to Fame: After topping the AFCEH exam, Vaibhav was selected for a project, then carried out research and co-authored a book on the topic of OS Hacking with Mr. Ankit Fadia. This book is likely to be launched in the market SOON. His Thoughts: I do not have words good enough to express how much I liked the course. The course helped me gain better knowledge about many areas of the computer security and the practical ways to protect computers from being attacked by other people. What I liked about the course was that I had the opportunity to communicate with so many people with special knowledge in various fields. We helped each other learn a lot on the mailing lists of the AFCEH course group on Yahoo! In fact I was feeling a bit nostalgic after we had completed the course ended. confidential
  • 13. Why is there a need for the new AFCEH 2.0? Computer Security is a very dynamic industry. Every single day thousands of new viruses, worms and security vulnerabilities are discovered on the Internet. It is very important for computer security professionals to remain updated, educated and aware of the latest developments in this dynamic industry. This is why it was important to release version 2.0 of the AFCEH program. This new, updated and improved version of the highly successful AFCEH program contains NEW comprehensive training material, content, lectures and books on the latest tools, techniques and methods being used in the field of computer security. AFCEH 2.0 will not only allow participants to update their knowledge, but will also teach them newly discovered techniques that were previously not known while AFCEH 1.0 was being developed. confidential
  • 14. What is new in AFCEH 2.0? • The KEYWORDS that succinctly describe AFCEH 2.0 are: NEW UPDATED MORE confidential
  • 15. What is new in AFCEH 2.0? • More than 90% of the topics in the video lectures will have a NEW, UPDATED data and content. • A NEW book titled Intrusion Detection will be given out to participants as a text book. • The following NEW topics will be taught: See Attachment. confidential
  • 16. TABLE OF CONTENTS FOR AFCEH Introduction To Information Security SCANNING And Ethical Hacking Ping and related ICMP concepts. Importance of Security Port Scanning Can Hacking be Ethical? Tool – Pinger Threat Tool – WS_PingProPack Vulnerability Tool – NetScan Tools Target of Evaluation Tool – Hping Attack Tool – icmpenum Exploit Detecting Ping Sweeps CIA Triad – Elements of Security Tool –IDS like ISA Server or Snort Modes Operandi of Hackers Port Scanning Reconnaissance TCP Connect Scanning Scanning TCP SYN Scanning Gaining Access SYN/ACK Scanning Maintaining Access TCP FIN Scanning Covering Tracks TCP NULL Scanning Classification of Hacker TCP XMAS Scanning Black Hats Detecting Port Scanning White Hats Tool – nmap Grey Hats Tool – SuperScan TCP/IP Concepts in brief Tool – Cheops OSI Layer and TCP /IP Architecture DNS Mining Common Protocols used and their working Tools – Perl script for DNS Mining – blindcrawl.pl 3 Way Handshakes .FOOT PRINTING ENUMERATION Whois DNS lookup / Nslookup NetBIOS Null Session Network Range NetBIOS Null Session Countermeasures Traceroute Tool - NBTScan Sam Spade Tool – DumpSec NeoTrace Tool – NetBIOS Auditing Tool Visual Route SNMP Enumeration SmartWhoIs Tool – SNMP Util Tool – enum confidential
  • 17. TABLE OF CONTENTS FOR AFCEH SYSTEM HACKING TROJAN AND BACKDOORS Password Attacks Introduction Password Guessing Working of Trojans Dictionary attack Types of Trojans Brute Force Attack Remote Access Trojans Hybrid Attack Password Sending Trojans Social Engineering Keyloggers Shoulder Surfing Destructive Trojans Dumpster Diving Tool – Legion DoS Attack Trojans Rainbow Tables Proxy / Wingate Trojans Password Sniffing FTP Trojans Tool – LOphtcrack Software Detection Killers Previlege Escalation How Trojans are transmitted Tool – John The Ripper Tool – SubSeven or BackOrifice Password Cracking Countermeasures Tool – Netbus Keystroke Loggers EXE Binders or Wrappers Hardware Keylogger XSS (Cross Site Scripting) Rootkits Reverse Cross Site Request (RCSR) Rootkit counter measures SNIFFERS How to cover your tracks Disabling auditing Clearing the event log What is packet or network sniffing? Steganography Tool – Ethereal / Wireshark Other methods of hiding files Tool – Snort Attrib Tool – tcpdump NTFS Alternate Data Stream Tool – Windump Buffer Overflows Man in the middle attack Protection against buffer overflow ARP Spoofing Metasploit Hacking using USB confidential
  • 18. TABLE OF CONTENTS FOR AFCEH DENIAL OF SERVICE ATTACKS VIRUSES Introduction Introduction Types of DoS Attacks How viruses work? Bandwidth attacks Types of viruses Protocol attacks, and Logic attacks Protection of against viruses DDOS Tool – SSPing GOOGLE HACKING Tool – Etherape Land Exploit ENCRYPTION Tool – Trinoo Preventing DoS Attacks MISC SQL INJECTION Firefox as Pen Testing Tool Some scripts (perl scripts or other scripts) which is commonly Introduction used during pen testing like lbd (load balancing detector) OLE DB Errors Input Validation Attacks Tools used for SQL Injection How to Prevent SQL Injection WIRELESS NETWORKS Introduction Various Wireless standards WEP Wireless DoS Wireless Sniffing Tool - Airsnort Tool – AiroPeek Wireless IDS confidential
  • 19. About The Program 18-hour program spread over 30 days • • Live Video Lectures and Interactive Q&A Sessions of 4 hours over Video Conference. • 14 hours free Internet access @ RW for accessing 11 hours of self-pace self-learning Video on demand content, Hacking demonstration on Video & 2 hours of Online Exam. Ankit Fadia’s 6 international bestsellers worth Rs. 1545/- to • be given absolutely free. Certification on successful completion of online certification • exams. confidential
  • 20. How To Enroll @ Reliance World confidential
  • 21. Click Here to access the course confidential
  • 22. Click Here to register the course confidential
  • 24. Click Here to Enter for Video Lessons the course confidential
  • 27. From Ankit Fadia moments Batch 4. Our S.P. Mr Milind Bharambe and A.S.P Mr Sunil Kolhe successfully completed this course with enthusiasm.” confidential
  • 28. In ROM only Sangli has done Ankit Fadia Corporate Batch. Director Of M/s B.G Chitale Dairy Mr Vishwas Chitale and also other computer profession’s successfully completed this course with enthusiasm.” Our S.P. Mr Milind Bharambe also participated in this course confidential
  • 29. About The Program Program Price – Rs. 6499/- The Price Includes - Cost Of Video Conferencing - Access Cost for Video-On-Demand - On Line Examination Fee - PLUS - 6 of Ankit’s International Best Selling books on Hacking & counter measures confidential
  • 30. About The Program For Admission Contact Mahesh Ojha ( Web Lead ) 09373445444. confidential