ZOOM Technologies Missing Link in ENTERPRISE NETWORKING

Ethical Hacking Package Classroom Training

+ FREE Ethical Hacking Certification from US-Council

* All prices subject to a 18% Goods and Service Tax Charge. Rates are quoted in U.S. dollars, are subject to change according to Foreign Exchange rates.

Offer Available at ZOOM Technologies, Hyderabad & Vijayawada

Ethical Hacking Package

Course Details

Ethical Hacking Package Offer

(MCSA + CCNA + LINUX / UNIX + Ethical Hacking and Prevention)

MCSA Course details in PDF

MCSE Certification

Introduction

In today’s rapidly changing IT marketplace, Microsoft Certifications are designed to help the IT professional to utilize advanced technologies, fine tune troubleshooting skills and improve job satisfaction. A certification from Microsoft also confirms your demonstrated experience and knowledge in using Microsoft products and solutions.

The MCSA (Microsoft Certified Solutions Associate) certification is the ‘big’ certification from Microsoft designed to validate a professional’s proven job role capabilities. With the MCSE certification, an individual can be distinguished as an IT professional with the comprehensive set of Microsoft technologies / skills necessary to perform a particular job role. The MCSE certification can highlight your field of expertise since there are several concentrations within this one certification.

MCSE Training Details

Over the last many years, the Training Academy at Zoom Technologies has been a centre for training thousands of aspiring IT professionals in various Microsoft Certifications at our state-of-the-art facility in Hyderabad. The following MCSE training certification courses are offered:

a) MCSE: Microsoft Certified Solution Expert (Server Infrastructure)
b) MCSA: Microsoft Certified Solution Associate

These MCSA certification training programs are taught by Senior System/Network engineers with several years of field experience.

MCSA Course Contents

  • Network & Operating System Essentials
  • Installing and Configuring Windows Server 2012
  • Administering Windows Server 2012
  • Designing and Implementing Server Infrastructure
  • Configuring Windows Server 2012 Services
    • Active Directory Domain Services
    • DNS, DHCP, IIS 8.0, VPN
  • Configuring File Server
    • File Server Resource Manager
    • Configuring Shared Resources
  • Implementing Microsoft Virtualization Technologies.
    • Server Virtualization using Hyper-V
  • Configuring Advanced Storage Solutions
    • iSCSI Target and Initiator
    • Storage Spaces and Storage Pools and RAID
  • Implementing Security Restrictions
    • Group Policies
    • Group Policy Preferences

MCSA Course Contents

Network Essentials

  • Networking Concepts, History of Server OS
  • Introduction to windows server 2008 & 2012
  • Features of Windows Server 2012
  • Installation of Windows Server 2012
  • Introduction and Creation of Users accounts
  • Conversion of GUI to Server Core
  • Conversion of Server Core to GUI

RODC & Physical Structure of AD-DS

  • Introduction & Configuration of Read-Only Domain Controller
  • Sites and Global Catalog
  • Replication between the Domain Controllers
  • AD-DS Partitions
  • Configuring A.D.C using Install From Media [IFM]

Active Directory - Domain Services

  • IP Addressing
  • Logical Topologies - Peer-Peer & Domain Models
  • Introduction to Directory Services
  • Evolution of Active Directory Services - LDAP Protocol
  • Features of Active Directory
  • Installing Active Directory – Domain Controller

Dynamic Host Configuration Protocol (DHCP)

  • Introduction and Configuration of DHCP Server
  • DHCP Client Configuration
  • Reservations
  • DHCP Backup
  • Configuring DHCP Failover

Member Servers, Clients, User Configuration

  • Configuring Member Servers and Clients
  • Creating Users in AD-DS
  • User Logon policies
  • Password policies
  • Account Lockout policies
  • User properties

Domain Name System (DNS)

  • Internet Basics, Host & LM Host Files
  • DNS Naming Hierarchy
  • Lookup Zones - Forward and Reverse lookup Zones
  • Types of Zones – Primary, Secondary & Stub Zone
  • Resource Records, Integration with ADS, SRV Records
  • Forwarders, Dynamic Updates

Permissions/Access Control Lists

  • File Systems
  • Security and Sharing Permissions - Folders & Files
  • Access Based Enumeration

Internet Information Services(IIS)

  • IIS 8.0 Configuration
  • Hosting Websites, Virtual Directories
  • Redirecting Web Sites
  • Backup & Restoring Sites
  • FTP Sites

Profiles and File Server Resource Manager [FSRM]

  • Types of Profiles – Local & Roaming
  • Home Folder
  • Configuring Quotas using FSRM
  • Implementing File Screening using FSRM
  • Configuring Storage Reports Management

Windows Deployment Services

  • Introduction and Configuration of WDS Server
  • Attended and Unattended Installation

Distributed File System

  • Creating Organisational Unit
  • Delegating Control to a User
  • DFS Namespace
  • DFS Folders
  • Overview of DFS Replica

Microsoft Hyper-V

  • Installation of Hyper – V
  • Configuring Virtual Machine
  • Configuring Virtual Networks
  • Configuring Virtual Hard disks
  • Configuring Hyper-V Replica

Logical Structure of AD - DS

  • Configuring ADC
  • Tree Structure - Child Domain
  • Forest Structure

Routing & Remote Access

  • Routing Configuration - Static Routes
  • NAT, DHCP Relay Agent
  • Remote Access Server Configuration
  • VPN - PPTP

FSMO Roles of AD - DS

  • Roles of AD - DS
  • Transferring of Roles
  • Seizing of Roles

Remote Desktop Services

  • Remote Administration Mode

Group Policy / System Policies

  • User and Computer Policies
  • Scope of Policies - OU, Domain, Sites
  • Group Policy Modeling (RSOP)
  • Software Deployment
  • Scripts, Folder Redirection
  • Group Policy Preferences
  • Auditing

Storage Technologies

  • Configuring iSCSI Target and Initiator
  • Introdution to Storage spaces and Storage Pools
  • Configuring Simple Volume (RAID – 0)
  • Configuring Mirror Volume (RAID – 1)
  • Configuring Parity Volume (RAID – 5)

Active Directory Trusts

  • Introduction to Trust Relationship
  • Categories, Directions & Types of Trusts
  • Functional Levels
  • Authentication Protocols
  • Configuring Forest Trusts between 2012 Forests
  • Active Directory Recycle Bin

Advanced Topics

  • Windows Server Backup
  • Overview of AD-FS, LDS, RMS, CS
  • Upgrading Windows Server 2008 to 2012
  • Configuring NLB cluster
  • Overview of NAP

CCNA Course details in PDF

CCNA v3 Certification

CCNA Certification Introduction:

The CCNA (Cisco Certified Network Associate) certification is the first in Cisco´s line of certifications that an aspiring networking professional must acquire in order to add value to their IT career. The CCNA certification validates a firm foundation of networking skills that include fundamentals like the OSI Reference Model, Networking Protocols, Layer 2 Switching Concepts and Protocols, Routing Concepts and Protocols, and Wide-Area Networking (WAN) Connectivity. Thus a person who is aiming to qualify for the CCNA certification should be proficient in their abilities to provide basic network installations and troubleshooting.

CCNA Training Details:

Skills and knowledge gained through the CCNA training are valuable in the networking field as the topics covered during the CCNA training program provide the basis for all networking topologies and protocols.

Over the last many years Zoom Technologies has successfully trained several thousands of networking professionals who have qualified the CISCO CCNA certification exam.

The CCNA training covers all aspects of the 200-125 curriculum in detail. The course also provides practical hands-on training on Cisco Routers and Cisco Switches, as no WAN setup is complete without Leased line / Wireless / VSAT / DSL etc. Telecom devices like CSU/DSU, Telco MUX, are also covered in the Practical setup. The training for CCNA Certification is provided by Senior Network/WAN engineers who have several years of field experience.

Students preparing for the CCNA certification have a choice of writing the CCNA exam as a single paper or as two papers together. The details of paper codes and their descriptions are mentioned in the table below.

CCNA Exams

Paper 1 200-125 CCNA Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v3.0

Cisco Training - CCNA Course Contents

  • Introduction to Wide Area Networks
  • Internetwork Operating System (IOS)
  • IP Routing (Static & Dynamic)
  • LAN Switching
  • IPv4 & IPv6
  • STP, PVSTP & RSTP
  • Virtual Private Network - VPN
  • Redundancy Protocols
  • Network monitoring tools
  • NAT & PAT
  • Cisco Express Forwarding
  • Network Device Security
  • WAN Technologies (Cloud, SDN, IoT)
  • Troubleshooting

Cisco Training - CCNA v3 Course Details

1.0 Network Fundamentals

  • Compare & contrast OSI & TCP/IP models
  • Compare & contrast TCP & UDP protocols
  • Impact of infrastructure components in a network
    • Firewalls, Access points, Wireless controllers
  • Effects of cloud resources on network architecture
    • Traffic path to internal and external cloud services
    • Virtual services
    • Basic virtual network infrastructure
  • Compare & contrast collapsed core and three-tier architecture
  • Compare & contrast network topologies
    • Star, Mesh, Hybrid
  • Select the appropriate cabling type (Straight & Cross)
  • Apply troubleshooting methodologies to resolve problems
    • Perform and document fault isolation
    • Resolve or escalate
    • Verify & monitor resolution
  • Configure, verify & troubleshoot IPv4 addressing & subnetting
  • Compare & contrast IPv4 address types
    • Unicast, Broadcast, Multicast
  • Describe the need for private IPv4 addressing
  • Identify IPv6 addressing to use in LAN/WAN environment
  • Configure, verify & troubleshoot IPv6 addressing
  • Configure & verify IPv6 Stateless Address Auto Configuration
  • Compare & contrast IPv6 address types
    Global unicast, Unique local, Link local, Multicast, Modified EUI 64, Autoconfiguration, Anycast

2.0 LAN Switching Technologies

  • Describe & verify switching concepts
    • MAC learning & aging, Frame switching, Frame flooding, MAC address table
  • Interpret Ethernet frame format
  • Troubleshoot interface & cable issues (collisions, errors, duplex, speed)
  • Configure, verify, and troubleshoot VLANs (normal/extended range) spanning multiple switches
    • Access ports (data & voice), Default VLAN
  • Configure, verify, and troubleshoot interswitch connectivity
    • Trunk ports, Add & remove VLANs on a trunk
    • DTP, VTP (v1&v2), and 802.1Q Native VLAN
  • Configure, verify, & troubleshoot STP protocols
    • STP mode (PVST+ and RPVST+), STP root bridge selection
  • Configure, verify & troubleshoot STP related optional features
    • PortFast, BPDU guard
  • Configure & verify Layer 2 protocols
    • Cisco Discovery Protocol, LLDP
  • Configure, verify, & troubleshoot (Layer 2/Layer 3) EtherChannel
    • Static, PAGP, LACP
  • Describe the benefits of switch stacking & chassis aggregation

3.0 Routing Technologies

  • Describe the routing concepts
    • Packet handling along the path through a network
    • Forwarding decision based on route lookup
    • Frame rewrite
  • Interpret the components of a routing table
    • Prefix, Network mask, Next hop, Routing protocol code
    • Administrative distance, Metric
    • Gateway of last resort & Admin distance
  • Configure, verify, & troubleshoot inter-VLAN routing
    • Router on a stick & SVI
  • Compare & contrast static routing & dynamic routing
  • Compare & contrast distance vector and link state routing protocols
  • Compare & contrast interior and exterior routing protocols
  • Configure, verify & troubleshoot IPv4 and IPv6 static routing
    • Default route, Network route, Host route, Floating static
  • Configure, verify & troubleshoot single area & multi-area OSPFv2 for IPv4 & IPv6
    (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs)
  • Configure, verify & troubleshoot EIGRP for IPv4 & IPv6
    (excluding authentication, filtering, manual summarization, redistribution, stub)
  • Configure, verify, and troubleshoot RIPv2 for IPv4
    (excluding authentication, filtering, manual summarization, redistribution)
  • Troubleshoot basic Layer 3 end-to-end connectivity issues

4.0 WAN Technologies

  • Configure & verify PPP and MLPPP on WAN interfaces using local authentication
  • Configure, verify, & troubleshoot PPPoE client-side interfaces using local authentication
  • Configure, verify, & troubleshoot GRE tunnel connectivity
  • Describe WAN topology options
    • Point-to-point, Hub and spoke, Full mesh, Single vs dual-homed
  • Describe WAN access connectivity options
    • MPLS, Metro Ethernet, Broadband PPPoE, Internet VPN (DMVPN, site-to-site VPN, client VPN)
  • Configure and verify single-homed branch connectivity using eBGP IPv4 (limited to peering and route advertisement using Network command only)
  • Describe basic QoS concepts
    • Marking, Device trust, Prioritization, (Voice, Video & Data)
    • Shaping, Policing, Congestion management

5.0 Infrastructure Services

  • Describe DNS lookup operation
  • Troubleshoot client connectivity issues involving DNS
  • Configure and verify DHCP on a router (excluding static reservations)
    • Server, Relay, Client, TFTP, DNS, & gateway options
  • Troubleshoot client- and router-based DHCP connectivity issues
  • Configure, verify, and troubleshoot basic HSRP
    • Priority, Pre-emption, Version
  • Configure, verify, and troubleshoot inside source NAT
    • Static, Pool, PAT
    • Configure and verify NTP operating in a client/server mode

6.0 Infrastructure Services

  • Configure, verify, and troubleshoot port security
    • Static, Dynamic, Sticky, Max MAC addresses, Violation actions & Err-disable recovery
  • Describe common access layer threat mitigation techniques
    • 802.1x, DHCP snooping, Nondefault native VLAN
  • Configure, verify, and troubleshoot IPv4 and IPv6 access list for traffic filtering
    • Standard, Extended, Named
  • Verify ACLs using the APIC-EM Path Trace ACL analysis tool
  • Configure, verify, and troubleshoot basic device hardening
    • Local authentication, Secure password, Access to device (Source address & Telnet/SSH)
    • Login banner
    • Describe device security using AAA with TACACS+ and RADIUS

7.0 Infrastructure Management

  • Configure and verify device-monitoring protocols
    • SNMPv2, SNMPv3 & Syslog
  • Troubleshoot network connectivity issues using ICMP echo-based IP SLA
  • Configure and verify device management
    • Backup and restore device configuration
    • Using CDP or LLDP for device discovery
    • Licensing, Logging, Timezone & Loopback
  • Configure and verify initial device configuration
  • Perform device maintenance
    • Cisco IOS upgrades and recovery (SCP, FTP, TFTP, and MD5 verify)
    • Password recovery and configuration register & File system management
  • Use Cisco IOS tools to troubleshoot and resolve problems
    • Ping & traceroute with extended option
    • Terminal monitor, Log events, Local SPAN
  • Describe network programmability in enterprise network architecture
    • Function of a controller
    • Separation of control plane and data plane
  • Northbound and southbound APIs

Linux Course details in PDF

This course will cover all aspects of Linux Certification. At the end of the course delegates will have the skills required to administer a Linux System. The course will also cover Internet application server configuration on live registered domain name with valid public IP addresses. The training will be given by Senior System / Network engineers with several years of industry experience.

Linux Course Contents

  • Introduction to Unix, Installation of Linux
  • User, Group Administration, ACL
  • Disk Partitions, by using Fdisk
  • Mounting File Systems, Swap File System
  • Backup and recovery, Tar, cpio
  • Basics of NFS, Sharing data
  • Disk Quotas, LVM, Raid
  • DHCP, DNS, Mail, Web, FTP, YUM

Course Curriculum

Introduction to UNIX & LINUX

  • History of UNIX and LINUX
  • Basic concepts of Operating System, Kernel, Shell & File System structure
  • Basic concepts of Linux
  • Differences between CentOS, Red Hat Enterprise Linux & Fedora
  • Basic commands of Linux
  • Advanced Linux Commands

DNS Server

  • Configuration of DNS server
  • Configuration of primary DNS server
  • Configuration of forward lookup zone
  • Configuration of reverse lookup zone
  • Testing tool of DNS zones
  • Adding services in DNS

Installation of Linux

  • Inter active Installation
  • Network Based Installation

Mail Server (SMTP, POP3, IMAP)

  • Basics of Mail Servers
  • Configuring SMTP service using Postfix
  • Configuring POP3 / IMAP service on Linux

Introduction to Graphical Environment

  • Use and customize the GNOME interface
  • Perform command tasks using the GNOME GUI
  • Launch applications from command line & GNOME interface
  • Customize X Window System

Web Server (Apache)

  • Basics of Web Service
  • Introduction to Apache
  • Configuring Apache for main site
  • Configuring Apache for multiple sites using IP-based, port-based and name-based virtual hosting

Software Package Administration

  • Installing and deleting software packages
  • Querying and updating software packages

FTP Server (vsftp daemon)

  • Basics of File Transfer Protocol
  • Configuring vsftpd for anonymous ftp service

User and Group Administration

  • Creating and deleting users from the systems
  • Modifying users profile
  • Creating and deleting groups
  • Important system files related to user administration

RAID (Redundant Array of InExpensive Disks) & Logical Volume Manager

  • Implementing RAIDon Linux
  • RAID levels (0, 1 and 5) configuration using RAID tools
  • Resizing the Partition using LVM

Advanced File Permissions

  • Assigning advanced files permissions i.e. chmod, chown, chgrp & Sticky bit
  • Creating, modifying and deleting ACL's

Web based Administration

  • Installing Webmin on Linux
  • Administrating Linux machine remotely
  • Using Webmin as a tool for configuring various services on Linux

Disk Partitioning and Mounting File System

  • Using fdisk, disk druid utilities for disk partitioning
  • Using mkfs, commands to create file systems
  • Mounting various file systems
  • Auto mounting of file system

Difference between Unix and Linux Flavors

  • Live Setup - Demo by Faculty

Disk Quotas

  • Enabling Quotas on partitions
  • Creating Quotas for users
  • Auditing Quotas limit

Designing, Implementing & Maintaining of Corporate Network

Backup and Recovery

  • Introduction to various types of backup media
  • Backup and restoring using tar and cpio commands

NFS

  • Configuring NFS server
  • Mounting NFS exports on NFS clients

Dynamic Host Configuration Protocol (DHCP)

  • Configuring Linux as DHCP Server
  • Configuring various clients for DHCP Server (Windows & Linux)

Ethical Hacking and Prevention Course details in PDF

This   course is mapped   to the popular   Ethical   Hacking and Prevention course from the US-Council (www.us-council.com). Zoom Technologies are the official training partners of US-Council.

This course is meant for those professionals who are looking for comprehensive and total knowledge in the network security domain. This is the only course which teaches both hacking and countermeasure techniques. And in keeping with Zoom's standards, this course is entirely hands on and real time oriented. And need we say, the instructors are network security and intrusion specialists with several years of experience.

Brief Overview:

  • Introduction to Ethical Hacking
  • Footprinting, Scanning, and Enumeration
  • Hacking Web servers and Web applications
  • DoS, SQL injection, Buffer overflow attacks
  • Cryptography
  • Wireless hacking
  • Linux Hacking
  • Phishing
  • Prevention

Ethical Hacking and Prevention

Introduction to Ethical Hacking

  • What is Hacking
  • Who is a Hacker
  • Skills of a Hacker
  • Types of Hackers
  • Reasons for Hacking
  • Who are at the risk of Hacking attacks
  • Effects of Computer Hacking on an organization
  • Network Security Challenges
  • Elements of Information Security
  • The Security, Functionality & Usability Triangle
  • What is Ethical Hacking
  • Why Ethical Hacking is Necessary
  • Scope & Limitations of Ethical Hacking
  • What is Penetration Testing
  • What is Vulnerability Auditing

FootPrinting

  • What is FootPrinting
  • Objectives of FootPrinting
  • Finding a company's details
  • Finding a company's domain name
  • Finding a company's Internal URLs
  • Finding a company's Public and Restricted URLs
  • Finding a company's Server details
  • Finding the details of domain registration
  • Finding the range of IP Address
  • Finding the DNS information
  • Finding the services running on the server
  • Finding the location of servers
  • Traceroute analysis
  • Tracking e-mail communications

Scanning

  • What is network scanning
  • Objectives of network scanning
  • Finding the live hosts in a network
  • SNMP Enumeration
  • SMTP Enumeration
  • DNS Enumeration
  • Finding open ports on a server
  • Finding the services on a server
  • OS fingerprinting
  • Server Banner grabbing tools
  • What is a Vulnerability Scanning
  • Vulnerability Scanner tools
  • Finding more details about a vulnerability
  • What is a proxy server
  • How does proxy server work
  • Types of proxy servers
  • How to find proxy servers
  • Why do hackers use proxy servers
  • What is a TOR network
  • Why hackers prefer to use TOR networks

Hacking Web Servers & Web Applications

  • What is a web server
  • Different webserver applications in use
  • Why are webservers hacked & its consequences
  • Directory traversal attacks
  • Website defacement
  • Website password brute forcing
  • How to defend against web server hacking

Session Hijacking

  • What is session hijacking
  • Dangers of session hijacking attacks
  • Session hijacking techniques
  • Cross-Site scripting attack
  • Session hijacking tools
  • How to defend against session hijacking

SQL Injection

  • What is SQL Injection
  • Effects of SQL Injection attacks
  • Types of SQL Injection attacks
  • SQL Injection detection tools

Evading Firewalls, IDS & Honeypots

  • What is a Firewall
  • What are the functions of a Firewall
  • What is an IDS
  • How does an IDS work
  • SPAN
  • IDS tools
  • What is a honeypot
  • Types of honeypots
  • Honeypot tools
  • Honeypot detection tools

Buffer Overflow

  • What is a buffer
  • Understanding usage of buffers in applications
  • What is buffer overflow
  • Simple buffer overflow in C programming
  • How to detect a buffer overflow
  • How to defend against buffer overflow attacks

Denial of Service

  • What is a DoS attack
  • What is a DDoS attack
  • Symptoms of a Dos attack
  • DoS attack techniques
  • What is a Botnet
  • Defending DoS attacks

Cryptography

  • What is Cryptography
  • Types of cryptography
  • Cipher algorithms
  • Public key infrastructure
  • What is a Hash
  • Cryptography attacks

System Hacking

  • What is system Hacking
  • Goals of System Hacking
  • Password Cracking
  • Password complexity
  • Finding the default passwords of network devices and softwares
  • Password cracking methods
    • Online password cracking
      • Man-in-the-middle attack
      • Password guessing
    • Offline password cracking
      • Brute force cracking
      • Dictionary based cracking
      • Hybrid attack
  • USB password stealers
  • Elcomsoft Distributed password recovery tools
  • Active password changer
  • What is a keylogger
  • How to deploy a keylogger to a remote pc
  • How to defend against a keylogger

Sniffers

  • What is a sniffer
  • How sniffer works
  • Types of sniffing
    • Active sniffing
    • Passive Sniffing
  • What is promiscuous mode
  • How to put a PC into promiscuous mode
  • What is ARP
  • ARP poison attack
  • Threats of ARP poison attack
  • How MAC spoofing works
  • MAC Flooding
  • What is a CAM Table
  • How to defend against MAC Spoofing attacks
  • How to defend against Sniffers in network

Phishing

  • What is Phishing
  • How Phishing website is hosted
  • How victims are tricked to access Phishing websites
  • How to differentiate a Phishing webpage from the original webpage
  • How to defend against Phishing attacks

Malware

  • What is malware
  • Types of malware
    • Virus
      • What is a virus program
      • What are the properties of a virus program
      • How does a computer get infected by virus
      • Types of virus
      • Virus making tools
      • How to defend against virus attacks
    • Worm
      • What is a worm program
      • How worms are different from virus
      • Trojan
      • What is a Trojan horse
      • How does a Trojan operate
      • Types of Trojans
      • Identifying Trojan infections
      • How to defend against Trojans
    • Spyware
      • What is a spyware
      • Types of spywares
      • How to defend against spyware
      • Rootkits
      • What is a Rootkit
      • Types of Rootkits
      • How does Rootkit operate
      • How to defend against Rootkits

Wireless Hacking

  • Types of wireless networks
  • Wi-Fi usage statistics
  • Finding a Wi-Fi network
  • Types of Wi-Fi authentications
    • Using a centralized authentication server
    • Using local authentication
  • Types of Wi-Fi encryption methods
    • WEP
    • WPA
    • WPA2
  • How does WEP work
  • Weakness of WEP encryption
  • How does WPA work
  • How does WPA2 work
  • Hardware and software required to crack Wi-Fi networks
  • How to crack WEP encryption
  • How to crack WPA encryption
  • How to crack WPA2 encryption
  • How to defend against Wi-Fi cracking attacks

Kali Linux

  • What is Kali Linux
  • How Kali Linux is different from other Linux distributions
  • What are the uses of Kali Linux
  • Tools for Footprinting, Scanning & Sniffing
  • What is Metasploit framework
  • Using Metasploit framework to attack Wiindows machines
  • Using Metasploit framework to attack Android devices

Penetration Testing

  • What is Penetration Testing
  • Types of Penetration Testing
  • What is to be tested
    • Testing the network devices for mis-configuration
    • Testing the servers and hosting applications for mis-configuration
    • Testing the servers and hosting applications for vulnerabilities
    • Testing wireless networks
    • Testing for Denial of Service attacks

Counter Measure Techniques for Network level attacks

  • Types of Firewall
    • Packet Filtering Firewall
    • Circuit-Level Gateway Firewall
    • Application-Level Firewall
    • Stateful Multilayer Inspection Firewall
    • Limitations of a Firewall
  • IDS / IPS
    • What is an IDS
    • What is a IPS
    • Difference between IDS & IPS
    • Placement of IDS in the Network
    • Configuring an IDS in the Network
    • Placement of IPS in the Network
    • Configuring an IPS in the Network
  • UTM / Next-Generation Firewall
    • What is a UTM
    • Features of UTM
    • Difference between a Firewall & a UTM
    • Placement of UTM in the Network
    • Configuring a UTM in the Network
    • Monitoring attacks using UTM
    • Configuring IPS module in UTM to detect and stop attacks

Counter Measure Techniques for Local Systems

  • Identifying the Vulnerabilities of a system
  • Understanding the Vulnerabilities of a system
    • CVE ID
    • Bugtraq ID
  • Patch Management
    • Identifying the patch for a Vulnerability
    • Downloading the Patch
    • Testing the patch for stability in test environment
    • Deploying the patch to Live Network
  • Finding the missing updates in an Operating System
    • Microsoft Baseline Security Analyzer
    • Belarc Advisor

Counter Measure Techniques for Malware Attacks

  • Scanning systems for Malware infections
  • Types of anti-malwares
    • Anti-Virus
    • Anti-Worm
    • Anti-Trojan
    • Anti-Rootkit
    • Internet Security Suites
  • HIDS
  • HIPS
+ FREE Ethical Hacking Certification from US-Council

Course Schedule

Duration to complete all the below Courses: 30/45/60/90 days by taking parallel classes.

Example:

If you take MCSE in the morning batch, Linux in the afternoon and CCNA in the evening then the course will get over in 30 days. If you take classes only in morning and afternoon then it will take 45 days.

Note / Recommendation:

To be able to concentrate and have a proper grasp on the subject we recommend that the minimum duration should be 60 or 90 days.

Course Duration: 1 Month (104 hours including practicals)

Various Date & Time schedule are given as below, any one of Batch/Track can be taken.

Ameerpet Branch Schedule

Month Batch/Track Starting Date Timings
January
To
December
Morning 15th of Every Month 8:30 am - 10:30 am
Afternoon 15th of Every Month 2:00 pm - 4:00 pm
Evening 15th of Every Month 7:30 pm - 9:30 pm

Banjara Hills Branch Schedule

Month Batch/Track Starting Date Time
January
March
May
July
September
November

Afternoon


30th of Every Month

2:00 p.m.

Evening

7:30 p.m.
February
April
June
August
October
December

Morning


30th of Every Month

8:30 a.m.

Afternoon

2.00 p.m.

Course Duration: 1 Month (104 hours including practicals)

Various Date & Time schedule are given as below, any one of Batch / Track can be taken.

Ameerpet Branch Schedule

Month Batch/Track Starting Date Time

January
To
December
Morning

30th of Every Month
8.30 a.m. to 10.30 a.m.
Afternoon 2.00 p.m. to 4.00 p.m.
Evening 7.30 p.m. to 9.30 p.m.

Banjara Hills Branch Schedule

Month Batch/Track Starting Date Time
January
March
May
July
September
November

Morning


15th of Every Month

8:30 a.m.

Afternoon

2.00 p.m.
February
April
June
August
October
December

Afternoon


15th of Every Month

2:00 p.m.

Evening

7:30 p.m.

Course Duration: 2 Weeks (52 hours including practicals)

Various Date & Time schedule are given as below, any one of Batch / Track can be taken.

Ameerpet Branch Schedule

Month Batch/Track Starting Date Time
January
To
December
Morning 15th and 30th of Every Month 8:30 a.m.
Afternoon 15th and 30th of Every Month 2:00 p.m.
Evening 15th and 30th of Every Month 7:30 p.m.

Banjara Hills Branch Schedule

Month Batch/Track Starting Date Time
January
To
December

Contact Counsellor for Schedules

Course Duration: 2 Weeks (52 hours including practicals)

Various Date & Time schedule are given as below, any one of Batch/Track can be taken.

Month Batch/Track Starting Date Time
January
to
December
Morning 15th of Every Month 7.30 a.m. to 9.30 a.m.
Evening 30th of Every Month 7.30 p.m. to 9.30 p.m.

Our Special Offers
Exclusive Premium Packages for Classroom Training Only

Copyright © 1996 - 2019 ZOOM Technologies. All Rights Reserved.