Untitled Document
 
Home About Us Web Development Web Hosting Advertising Our Portfolio Study Abroad Contact Us



CERTIFIED INFORMATION SECURITY EXPERT / CERTIFIED ETHICAL HACKING (CISE/CEH) LEVEL 1

CISE (Certified Information Security Expert) certification is one of the most recognized International certification in Information Security and Ethical Hacking. The program covers all aspects of Information Security and Ethical Hacking, enabling one to become an Information Security Expert. Online Security Breaches are happening at a very fast rate and experts are needed to check and cure these.IT Security Experts (ITS) are in demand. According to NASSCOM, the demand for ITS Experts is going to rise substantially worldwide. Its the next big thing in ICT and you should make the best of it.

Our objective is to provide Highly Technical Training Solutions for Individuals and Corporate bodies on Ethical Hacking and Information Security. We currently provide
trainings over subjects ranging from Network Security, Web Application Security, Exploit Development to Malware Analysis amongst others.

Training Duration: 50 Hours, Weekends Onlys

Pre-requisite: Basic Knowledge of Computers and Internet

Venue: 48, Chivata Avenue, Ajao Estate, Lagos.

Next Batch Starts: November 10th, 2012.

Registration Fees: N2, 500 (Non- refundable) - Come with a passport photograph

Price:

Option1: Individual - N60,000 (Without Exam)

Option2: Individual - N 80,000, Corporate - N120, 000 (Online Examination Cost, E-Books, international Certification-from India, Tools included)

Requirements for Training Program: Laptop Required – In order to Gain Maximum Efficiency during Training and Research, Students are required to bring their own laptop so that they can connect directly to the Classroom Training Network that we will create.

Quick inquiry: 01-2182045, 08026319397, Intl. Office: +2304762963

 

CISE/CEH

INQUIRY FORM

Name:
Email:
Phone:
Message
Verifiaction Code:
 

        COURSE MODULE

Chapter 1 - Introduction
Chapter 2 - Networking & Basics
Chapter 3 - Foot Printing
Chapter 4 - Google Hacking
Chapter 5 - Scanning
Chapter 6 - Windows Hacking
Chapter 7 - Linux Hacking
Chapter 8 - Trojans & Backdoors
Chapter 9 - Virus & Worms
Chapter 10 - Proxy & Packet Filtering
Chapter 11 - Denial of Service
Chapter 12 - Sniffer
Chapter 13 - Social Engineering
Chapter 14 - Physical Security
Chapter 15 - Steganography
Chapter 16 - Cryptography
Chapter 17 - Wireless Hacking
Chapter 18 - Firewall & Honeypots
Chapter 19 - Backtrack 5
Chapter 20 - Vulnerability
Chapter 21 - Penetration Testing
Chapter 22 - Session Hijacking
Chapter 23 - Hacking Web Servers
Chapter 24 - SQL Injection
Chapter 25 - Cross Site Scripting
Chapter 26 - Exploit Writing
Chapter 27 - Buffer Overflow
Chapter 28 - Reverse Engineering
Chapter 29 - Email Hacking
Chapter 30 - Incident Handling & Response
 

   
        For more information about this bootcamp, visit ICT NETWORLD WEBSITE

 

Untitled Document
               

All Rights Reserved,
Detech Technologies
© 2008-2017.



Follow Us Today

About us Web Development Facebook Advert Login
Our Team Web Hosting Study Abroad Register
Portfolio Software Developmnent Bulk SMS Solution Billing & Support FacebookTwitterBlog RSS Feeds
Testimonials IT Networks Email Marketing Promotions