
Become Certified CSCU"Certified Secure Computer User" | EC-Council
It is regarded as the basis of certification
in the field of computer security. It gives you the basics needed to understand hacking techniques, computer security tools related to the Internet, protection of a computer and a mobile:
- Introduction to Security
- Securing Operating Systems
- Malware and Antivirus
- Internet Security
- Security is Social Networking Sites
- Securing Email Communications
- Securing Mobile Devices
- Securing the Cloud
| Securing the Cloud
- Securing Network Connections
- Data Backup and Disaster Recovery
| Backup and Data Recovery after crash
-
Cost: 250.000F | Cost (Fellows) 90.000F
| Exam cost. Inter: 125.000F
- Duration: 16H / 3months

Become Certified SECURITY + (Admin. Security)For Comptia
Here is the program that gives you the Administrator profile in computer security.In addition to the concepts of CSCU, you advance in the mastery of network security, knowledge of vulnerabilities, security policy development, risk management, physical security, etc.
The Security + follows the ISO 17024 standard, approved by the US Department of Defense (DoD)
and compatible with the rules of the US government
under the Federal Information Security Management Act (FISMA)
- Network Security
- Compliance and Operational Security | Compatibility and Operational Safety
- Threats and Vulnerabilities | Threats and Vulnerabilities
- Application, Data and Host Security | Security Application of Data and Host
- Access Control and Identity Management | Access control and identity management
- Cryptography
.Cost: 500.000F | Cost (Fellows) 290.000F | Exam cost. Inter: 300.000F
.Durée: 40H / 3months

Become CERTIFIED CEH "Certified Ethical Hacker"EC-Council
If you do a training Hacking and get a non-recognized degree or unofficial, orsigned by a trainer or so-called expert, you may not find a job, or belikened to a cybercriminal .. .
The CEH is one of the best known and most requested
in the area ofsecurity/ hacking certifications.
The CEHv9 training is the most advancedethical
hackingmaterial world.
It covers 18
of the largest areas that each ethical hacker wants toknow to set up skills in the field of information security. Throughthese 18 modules, the training covers over 270 techniques most used
byhackers attacks.
Get highly popular hacking skills,as well as certificationCertified Ethical Hacker!
This course prepares the certification Certified Ethical Hacker v9 (ANSI),the examination codesare 312-50 (ECC Exam)
or 312-50 (VUE).
Participants practice the 140 labs created by the experts of the EC-Council.These labsshow real scenarios discussed during the training in order to perceive an attackas it would appear in reality. You also have access to more than 2,200hacking toolsand over 2200 pages of presentation,specifically designed to help control
complex
securityconcepts.
---Introduction to Ethical Hacking
Overview of security threats and attack vectors
Concepts, types and phases of hacking
Concept and scope of Ethical Hacking
Notions of security contôles
Introduction to law and security-related standards
---Footprinting and Reconnaissance
Concepts footprint
Recognition Methodology: browsers, Google Hacking Advanced technical,socialnetworks,websites, email, business intelligence, whois, DNS, network, social engineering
Tools
Against-measures
-Intrusion Test
---Scanning networks
Overview of network scanning
CEH Methodology: live systems, open ports, scanning below IDS, banner grabbing,vulnerability scan,draw a network diagram, prepare proxies
-Penetration Testing by scanning
---Enumeration
Concepts Enumeration
NetBIOS
The different types of enumeration: SNMP, LDAP, NTP, SMTP
Measures against-enumeration
SMB enumeration against-measures
--test intrusion by enumeration
---Hacking System
Information available before step system hacking
The objectives of the system hacking
CEH methodology
Steps hacking system
hidden files
His tracks
--test intrusion
---Malware
Introduction to malware
Trojans: concepts, kinds
Viruses and worms: steps, guys, warning signals, ransonwares, hoaxes and fake antivirus,differentiate a worm and virus, programming
Anti malware Engineering
Malware detection
Against-measures
Anti malware software
--test intrusion
---Sniffing
Concepts sniffing
Different types of attacks: attacks on Mac, DHCP attacks, ARP spoofing, DNS infection
DetectionTools
Against-measures
Detection Techniques
-Detection Test
---Social Engineering
Social Engineering Concepts
Social engineering
Identity theft on social networks
Procedure forimpersonation
Social engineering cons-measures
--test intrusion
---Attacks DoS
Concepts of DoS / DDoS
Technical attacks DoS / DDoS
botnets
DDoS case study
Tools attacks DoS / DDoS
Against-measures
Protection tools DoS / DDoS
--test intrusion
---Hijacking sessions
Concepts of session hijacking
Hijacking of application sessions
Hijacking of network sessions
Session hijacking tools
Against-measures
-Test session hijacking
---Hacking Web Servers
Concepts of web servers
Attacks on web servers
Attack Methodology
Web servers Engaging Tools
Against-measures
Patch Management
Security tools web servers
-Test hacking
---Hacking Web Applications
Concepts web app
Threats to web apps
Web application attack methodology
Web Application Attack Tools
Against-measures
Security Tools
-web app Intrusion Test
---SQL Injection
Concepts SQL injections
Injection SQL types
SQL injection methodology
ToolsSQL injection
Evasion techniques
Against-measures
---Wireless Network Hacking
Concepts Wireless
Encryption for Wireless
Wireless network-related threats
Network attack methodology Wireless: Wi-Fi, GPS, traffic analysis, launch an attack,crack wi-fi encryption
Wireless hacking tools
Hacking Bluetooth
Against-measures
Wireless Network Security Tools
-Wireless network intrusion test
---Hacking mobile platforms
Attack vectors for mobile platforms
Hacking Android OS
hacking iOS
Hacking Windows Phone OS
hacking BlackBerry
Mobile Device Management (MDM) MDM solutions, BYOD
Tools and mobile security guidelines
-Mobile of Penetration Testing
---Evading IDS, Firewalls & Detection of Honey Pots
Concepts of IDS, Firewall and Honeypot
IDS systems, firewall and Honeypot
Bypassing the IDS
Bypassing the firewall
Circumvention tools from IDS, firewall
Detect honeypots
Circumvention measures against-IDS and Firewal
--test intrusion
---cloud computing
Introduction to Cloud Computing
Threats to Cloud Computing
Attacks in the cloud
Security in the Cloud
Security tools for the cloud
-Penetration Testing in the cloud
---Cryptography
Concept and overview of cryptography
Encryption Algorithms
Cryptography Tools
Public Key Infrastructure (PKI)
Encrypting email
Drive Encryption
Cryptographic attacks
Cryptography tools.
- Cost: 1.500.000F | Cost (Fellows) 900.000F | Exam cost. Inter: 500.000F
- Duration: 40H / 6months
You can also sign up for the Special Bootcamp, and become an Expert!
