Professional Documents
Culture Documents
How To Become An Ethical Hacker?
How To Become An Ethical Hacker?
How To Become An Ethical Hacker?
INTERNATIONAL COLLEGE
FOR SECURITY STUDIES
( Established under agies of Pragmatic Society )
HTTPS://CYBER.ICSSINDIA.ORG
ABOUT US
Who We Are?
ICSS is a Training and Consulting Company with high industry training and
consulting Standards. ICSS Deals with various kinds of products like IT
Infrastructure Implementation, Security Implementations, Security Audits,
Vulnerability Assessments, and Penetration Testing. ICSS focuses on
delivering best industry Certifications from top vendors and testing facilities for
various vendors.
Training Programs
Training conducted by International College For Security Studies (ICSS) are:
01
OUR TRAINEES
INDIVIDUAL
School Students
College Students
IT Professionals
IT Officers
IT and LAW Officers
CORPORATE
IT Training Firms/Organizations/Society
IT Consultants
IT Experts
IT Officers
IT Institutions & Colleges
IT Graduated or Computer Science Students
GOVERNANCE
Security Agencies
Security Groups
Govt. IT Institutions
IT Govt. & Security Officers
02
Admission Procedure
EC-COUNCIL COURSES
04
Certification In Information & Cyber Security
Program Overview
Program Highlights
This basic course enables you to understand what cyber security really is and what are
its fundamentals?
It makes you familiar with the technical terms which we are going to study ahead in the
advanced course.
Makes you aware of the simple techniques by which you can prevent an attack and
secure yourself.
Eligibility
05
TRAINING PROGRAM
COURSE CONTENT
06
Certification In Ethical Hacking
Program Overview
The Certification in Ethical Hacking program is the most desired information security
training program any information security professional will ever want to be in. To master
the hacking technologies, you will need to become one, but an ethical one! The
accredited course provides the advanced hacking tools and techniques used by hackers
and information security professionals alike to break into an organization. As we put it,
“To beat a hacker, you need to think like a hacker”.
Program Highlights
Practical live hacking
Our practicals & theory ratio will be 6:4.
Provides NSDC a nationally recognized certification.
Certification Exam Fees & Tools Kits Fee is included in the course fee.
We also design our own tools & scripts for hacking tricks & techniques.
The course tools and programs are included in your fee that saves production time and
cost.
This basic course enables you to understand what ethical hacking really is all about
and what are its fundamentals.
It makes you familiar with the technical terms which we are going to study ahead in the
advanced course.
Makes you aware of the simple techniques by which you can prevent an attack and
secure yourself.
07
TRAINING PROGRAM
Course Content
08
Diploma In Cyber Security
Program Overview
Program Highlights
The underlying objective of DCS is to develop relevant knowledge, skills, and attitude for
job seekers and for professionals looking for career progression. The program aims to
provide:
Our practicals & theory ratio will be 6:4.
Enable the career advancement of existing cybersecurity professionals.
Enable individual to be a trained to defend social engineering attacks
Foster employable abilities, proficiencies and competencies required to gain a
successful career in the cyber industry.
Training under the expert's trainee with lab intensive environment equips the
professionals with in-depth knowledge, practical experience of network security and
exposure to latest hacking technologies.
09
Training Program
Course Content
M1: Fundamental to Information Security
M2: Network Security
M3: Server Security
M4: Database Security
M5: Web App Security
M6: Mobile Application Security
Eligibility
No age limit
12th passed
Pursuing Graduation or Graduate
Basic computer knowledge is compulsory
10
POST GRADUATION DIPLOMA IN CYBER SECURITY
Program Overview
Program Highlight
11
Training Program
Course Content
M1: Fundamental to Information Security
M2: Network Security
M3: Server Security
M4: Database Security
M5: Web App Security
M6: Mobile Application Security
M7: Compliance
M8: Forensics
M9: HTML & Practical Lab
Eligibility
No age limit
Graduation compulsory
Basic computer & cyber security knowledge is compulsory
12
CERTIFIED SECURE COMPUTER USER
Program Overview
Program Highlight
Eligibility
No age limit
Minimum qualification 10th passout
Basic computer knowledge is compulsory
13
03
Training Program
Course Content
M1: Introduction to Security
M2: Securing Operating Systems
M3: Malware and Antivirus
M4: Internet Security
M5: Security on Social Networking Sites
M6: Securing Email Communications
M7: Securing Mobile Devices
M8: Securing the Cloud
M9: Securing Network Connections
M10: Data Backup and Disaster Recovery
14
Certified Ethical Hacker
Program Overview
A skilled professional who is certified in the field of hacking, and have an understanding
as how to look for vulnerabilities in computer systems/targeted electronic machines. A
Certified Ethical Hacker uses his knowledge in a legitimate manner to have access to,
and assess the security position of any corrupted system. The prime purpose of CEH is to
reinforce Ethical Hacking as a unique and self-regulating profession. A Certified Ethical
Hacker uses penetration techniques to hack computer systems with the sole cause of
fixing the found security vulnerabilities. As fast as the technology is rising nowadays, so is
the velocity of attacks on electronic communicating systems- computers, cellphones, etc.
A threat can come from anywhere and at any time, and there’s no way to find out at that
time- how persistent it will be.
The Certified Ethical Hacker program is the most desired information security training
program any information security professional will ever want to be in. The accredited
course provides the advanced hacking tools and techniques used by hackers and
information security professionals alike to break into an organization.
Program Overview
15
Training Program
Course Content
M1: Introduction to Ethical Hacking M11: Session Hijacking
M2: Footprinting and Reconnaissance M12: Evading IDS, Firewalls, and Honeypots
M3: Scanning Networks M13: Hacking Web Servers
M4: Enumeration M14: Hacking Web Applications
M5: Vulnerability Analysis M15: SQL Injection
M6: System Hacking M16: Hacking Wireless Networks
M7: Malware Threats M17: Hacking Mobile Platforms
M8: Sniffing M18: IoT Hacking
M9: Social Engineering M19: Cloud Computing
M10: Denial-of-Service M20: Cryptography
Eligibility
No age limit
12th passed
Pursuing Graduation or Graduate
16
Computer Hacking Forensics Investigator
Program Overview
What CHFI Training & Certification Course aims, to polish the knowledge of the working
professionals in identifying evolutionary hacking attacks. The prime objective of this
course is to prepare the professionals in building shields to protect their organization from
impending Cyber Attack. A candidate perusing CHFI tune-up course learn not only about
Penetration testing methodologies to understand Computer Investigation but also get
trained in Digital Forensics Technologies.
Computer Forensics enters when corporate organizations face incidents related to
continuous fraud through unethical cyber hacking. And the reputation of any company
falls down overnight if the news of such crimes goes out. The customers thus, start to
distrust the company and withdraws themselves from their hold. And this all is happening
despite the advancement we have built up in Digital World. So basically to find the traces
of the crime Computer Forensics is used; who did the crime, how and from where the
atrocities were conducted, what was the gravity of the attack, etc.
Therefore, computer forensics has become vital in our Modern Times for better
sustenance and detection. Computer Forensics is not limited to Cyber Crimes but is also
useful in solving Cyber Terrorism, extortion, online robbery, etc. This CHFI Course can
avail corporates in developing an in-house forensic capability to deal with forensic cases.
Program Haghlights
17
Training Program
Course Content
M1 : Computer Forensics Introduction M20 : Advanced Encryption Standard (AES)
M2 : Computer Forensics Investigator Steps M21 : MACS, MD5 message digest algorithm,
M3 : Understanding Computer Hard Disks Secure hash algorithm(SHA)
M4 : Windows Forensics M22 : Digital Signatures & Digital Certificates
M5 : Data recovery M23 : Kerberos and X.509
M6 : Access Data FTK Investigator M24 : Electronic mail security-pretty good privacy
M7 : Investigation By EnCase (PGP)
M8 : AutoSpy Kali M25 : Becoming a Forensic Expert
M9 : Steganography
M10 : Website Attacks Investigations
M11 : Email Header Analysis CHFI Exam Info
M12 : Investigation By EnCase
Credit Towards Certification: CHFI
M13 : Dumpit & Volatility Framework
Number of Questions: 150
M14 : Substitution ciphers and Transposition Passing Score: 70%
ciphers Test Duration: 4 Hours
M15 : Principals of public key crypto systems
M16 : RSA algorithm & RSA security
Eligibility
M17 : Key management & Distribution in
Public Key System The CHFI program is designed for all
IT professionals involved with
M18 : Diffle-Hellman key exchange algorithm
information system security (IT
M19 : Data encryption standard (DES) Security), computer forensics, and
incident response.
18
EC-Council Certified Security Analyst
Program Overview
Can you become an industry accepted security, professional? Will organizations hire you
to help them protect their systems? Do you have any knowledge in applying a suitable
methodology to conduct a penetration test for an enterprise client?
ECSA is a globally accepted hacking and penetration testing program that covers the
testing of modern infrastructures, operating systems, and application environments while
teaching the students how to document and write a penetration testing report. This
program takes the tools and techniques covered in CEH to next level by utilizing EC-
Council’s published penetration testing methodology.
Program Haghlights
Eligibility
No age limit
12th passed
Pursuing Graduation or Graduate
Must have CEH certification
19
Training Program
Course Content
20
Affiliations & Recognition:
National Council of
Vocational Training
INTERNATIONAL COLLEGE
FOR SECURITY STUDIES
( Established under agies of Pragmatic Society )
D-452, Ramphal Chowk, Palam Extension, Sector 7, Dwarka, New Delhi 110077
Tel : (011)-43870088 | Email : info@icssindia.org | www.icssindia.org