INSEC
>

New at the security field ? ? ? Thinking whether you can pass the EC - Council course at one go ? FEAR NOT!! Our "PATH OPENER" is just the thing you need. 

Get certified in the world's latest and most comprehensive computer forensics program which includes the application of computer investigation and cyber crime.

The most advanced course in the world that covers cutting edge of hacking technology.The courseware is over 3200 pages, with over
25 GB of  underground hacking tools

THE WAR OF CYBER CRIME STARTED. AND KNOWLEDGE IS THE ONLY WEAPON!!!!
 
6 WEEK FCEH COURSE STRUCTURE
MODULE: INTRODUCTION TO INFORMATION  SECURITY AND ETHICAL  
               HACKING
                                  
MODULE: BASIC COMPUTER SECURITY
                           UNIT 1: CONCEPT OF OS
                           UNIT 2: CONCEPT OF SECURITY LOOPHOLES
                           UNIT 3: BASIC LINUX
                           UNIT 4: UNDERSTANDING VIRTUAL OS SETUP

MODULE: WEB BASED SECURITY
                            UNIT 1: BASIC LAN SETUP
                            UNIT 2: CONCEPT OF HACKING THROUGH NETWORK
                            UNIT 3: WIFI NETWORK AND ITS SECURITY
                            UNIT 4: E-MAIL SECURITY

MODULE: VIRUS
                            UNIT 1 : INTRODUCTION
                            UNIT 2 : UNDERSTANDING VIRUS FAMILY
                            UNIT 3 : HACKING THORUGH VIRUS AND WORM
S
Some of the hacking concepts you will learn to master during this hands on Ethical Hacking course
 

Module 01: Introduction to Ethical Hacking

Module 02: Footprinting and Reconnaissance

Module 03: Scanning Networks

Module 04: Enumeration

Module 05: System Hacking


Module 06: Trojans and Backdoors

Module 07: Viruses and Worms

Module 08: Sniffers

Module 09: Social Engineering

Module 10: Denial of Service

Module 11: Session Hijacking

Module 12: Hacking Webservers


Module 13: Hacking Web Applications

Module 14: SQL Injection

Module 15: Hacking Wireless Networks

Module 16: Evading IDS, Firewalls, and Honeypots

Module 17: Buffer Overflow

Module 18: Cryptography

Module 19: Penetration Testing


Some of the hacking concepts you will learn to master during this hands on FORENSIC course


Module 01: Computer Forensics in Today's World

Module 02: Computer Forensics Investigation Process

Module 03: Searching and Seizing Computers

Module 04: Digital
Evidence

Module 05: First Responder Procedures

Module 06: Computer Forensics Lab

Module 07: Understanding Hard Disks and File Systems

Module 08: Windows Forensics

Module 09: Data Acquisition and Duplication

Module 10: Recovering Deleted Files and Deleted Partitions

Module 11: Forensics Investigation using AccessData FTK

Module 12: Forensics Investigation Using EnCase

Module 13: Steganography and Image File Forensics

Module 14: Application Password Crackers

Module 15: Log Capturing and Event Correlation

Module 16: Network Forensics, Investigating Logs and Investigating Network Traffic

Module 17: Investigating Wireless Attacks

Module 18: Investigating Web Attacks

Module 19: Tracking Emails and Investigating Email Crimes

Module 20: Mobile Forensics

Module 21: Investigative Reports

Module 22: Becoming an Expert Witness
The Exam 412-79 tests ECSA/LPT candidates on the following 35 domains.

  Module 1: The Need for Security Analysis
    Module 2: Advanced Googling
    Module 3: TCP/IP Packet Analysis
    Module 4: Advanced Sniffing Techniques
    Module 5: Vulnerability Analysis with Nessus
    Module 6: Advanced Wireless Testing
    Module 7: Designing a DMZ
    Module 8: Snort Analysis
    Module 9: Log Analysis
    Module 10: Advanced Exploits and Tools
    Module 11: Penetration Testing Methodologies
    Module 12: Customers and Legal Agreements
    Module 13: Penetration Testing Planning and Scheduling
    Module 14: Pre Penetration Testing Checklist
    Module 15: Information Gathering
    Module 16: Vulnerability Analysis
    Module 17: External Penetration Testing
    Module 18: Internal Network Penetration Testing
    Module 19: Router Penetration Testing
    Module 20: Firewall Penetration Testing
    Module 21: IDS Penetration Testing
    Module 22: Wireless Network Penetration Testing
    Module 23: Denial of Service Penetration Testing
    Module 24: Password Cracking Penetration Testing
    Module 25: Social Engineering Penetration Testing
    Module 26: Stolen Laptop Penetration Testing
    Module 27: Application Penetration Testing
    Module 28: Physical Security Penetration Testing
    Module 29: Database Penetration testing
    Module 30: VoIP Penetration Testing
    Module 31: VPN Penetration Testing
    Module 32: Penetration Testing Report Analysis
    Module 33: Penetration Testing Report and Documentation Writing
    Module 34: Penetration Testing Deliverables and Conclusion
    Module 35: Ethics of a Licensed Penetration Tester
The Exam 112-12 tests CSCU candidates on the following 13 domains

 
  Module 1: Foundations of Security
    Module 2: Securing Operating Systems
    Module 3: Protecting System Using Antiviruses
    Module 4: Data Encryption
    Module 5: Data Backup and Disaster Recovery
    Module 6: Internet Security
    Module 7: Securing Network Connections
    Module 8: Securing Online Transactions
    Module 9: Securing Email Communications
    Module 10: Social Engineering and Identity Theft
    Module 11: Security on Social Networking Sites
    Module 12: Information Security & Legal Compliance
    Module 13: Securing Mobile Device
   
   
We offer all the courses of EC-Council. All the available courses are

01: Fundamental/Foundations of Information Security

02: Fundamental/Foundations of Computer Forensics

03: Fundamental/Foundations of Network Security

04: EC-Council Incident Handling

05: Wireless 5

06: Network 5

07: Network Security Administrator

08: EC Council Voice Over Internet Protocol

09: Disaster Recovery - EDRP

10: EC-Council Security Specialist