You are on page 1of 11

Student Introduction

Introduction of Participants

Name :

Company Affiliation :

Title / Function :

Job Responsibility :

System security related experience :

Expectations :
Course Outline

Chapter 1 - Introduction To Ethical Hacking


Chapter 2 - Networking & Basics
Chapter 3 - Footprinting
Chapter 4 - Google Hacking
Chapter 5 - Scanning
Chapter 6 - Windows Hacking
Chapter 7 - Linux Hacking
Chapter 8 - Trojans & Backdoors
Course Outline

Chapter 9 - Virus & worms


Chapter 10 - Proxy servers & Packet Filtering
Chapter 11 - Denial of service
Chapter 12 - Sniffers
Chapter 13 - Social Engineering
Chapter 14 - Physical Security
Chapter 15 - Steganography
Chapter 16 - Cryptography
Course Outline

Chapter 17 - Wireless Hacking


Chapter 18 - Firewalls & Honeypots
Chapter 19 - IDS & IPS
Chapter 20 - Vulnerability Assessment
Chapter 21 - Penetration Testing
Chapter 22 - Session Hijacking
Chapter 23 - Hacking Web Server
Chapter 24 - SQL Injection
Course Outline

Chapter 25 - XSS
Chapter 26 - Exploit Writing
Chapter 27 - Buffer Overflow
Chapter 28 - Reverse Engineering
Chapter 29 - Email Hacking
Chapter 30 - Incident Handling & Response
Chapter 31 - Bluetooth Hacking
Chapter 32 - Mobile Phone Hacking
Following Are Self Study Modules:

Chapter 15 - Physical Security


Chapter 30 - Incident handling & Response
Chapter 31 - Bluetooth Hacking
Chapter 32 - Mobile Phone Hacking
Homework

CISEv2 Curriculum consists of Instructor Led Training and Self Study.


The Instructor will cover 28 Modules in the Classroom.
There will be Self study homework also from Module 1 to 32, There
will lots of research work And Practicals in every module that the
student needs to study these on their own.
It is mandatory to finish to all the Practicals and Research work
of the previous class before attending the next class in order
to understand the topics and concepts properly.
Your instructor will provide details of additional modules
marked for self-study (if any)
It is also recommended thats students create their notes for each
module covered in the classroom.
C.I.S.E Certification Program

There are several levels of certification tracks under C I S E

Certified Information Security Expert (CISEv2) Level 1 You are here

Certified Information Security Expert Level 2

Exploit Writing & Advance Metasploit

Malware development

Reverse Engineering

Web Application Hacking

Network Security
CISEv2 Class Speed

The CISEv2 class is extremely fast paced.


Please be prepared for this.

The instructor WILL NOT be able to demonstrate all the tools.


NDA Document

Please read the contents of the provided Innobuzz knowledge


Solutions CISEv2 Program NDA document. Sign and hand it over
to the instructor.

We will NOT start the class unless you sign this document.

Please approach the instructor if you are not presented with


this document.

You might also like