cissp
ceh
ethical hacking
penetration testing
cyber security
information security
it security
cissp training in pakistan
ceh training in pakistan
cissp in pakistan
ceh in pakistan
penetration testing companies in pakistan
penetration testing in pakistan
siem
cyber security operations center
vulnerability assessment
computer forensic
digital forensic
forensic services in pakistan
cyber security pakistan
cert pakistan
pakistan cert
malware analysis
27001
iso 27001
certified ethical hacking
ethical hacking in pakistan
ethical hacking
ethicak hacker
security operations center
csoc
gdpr
security awareness training
security awareness
computer emergency response team
computer emergency response team pakistan
computer forensic in pakistan
threat intelligence
security alerts and advisories
security advisories
computer security alerts
computer security advisories
security policies
information security policies
security policy template
forensic analysis
|
PAKCERT
PENETRATION TESTING / ETHICAL HACKING BOOTCAMP |
- Gain practical experience
under the expert guidance of CISSP, CPTS, CEH, COBIT,
ITIL and MBCI certified PakCERT instructor
- State-of-the-art class
environment with Windows and UNIX operating systems
- Learn about the hacker
mindset and become familiar with the tools used to attack
systems
- Receive a bootable
hacking tools resource pack USB with all the tools and
exploits discussed during the course
|
September,
2019
|
October,
2019
|
Starting
Date: 2nd September, 2019
|
Starting
Date: To be announced
|
Last
Date for Registration: 27th August, 2019
|
Last
Date for Registration: To be announced
|
Duration:
3 Days (9:00am - 3:00pm daily)
Fee:
Rs.50,000 (excluding tax) **Special Discount
for Students. Contact us for details**
Course
Package Includes:Penetration Testing bootable
USB will pre-installed tools and exploits for all
major operating systems, services and network devices,
Classroom Notes, Training Certificate and Refreshments
Venue:
Karachi
|
What Will You Learn?
-
Sophisticated,
stealthy techniques used by professional hackers to
gain access to systems in a purpose-built lab environment
-
How to
circumvent traditional security mechanisms
-
How
hackers can accurately collect and assimilate information
about an organization's infrastructure whilst avoiding
detection
-
How end-users
thwart security restrictions imposed upon them
-
How hackers
conceal their tracks and the route through which access
to a target may be maintained
-
Limitations
of firewalls and the tools used to bypass them
|
Mr.
Qazi Mohammad Misbahuddin Ahmed is regarded as
the pioneer of information security services in
Pakistan. He holds the following industry leading
certifications:
-
Certified
Information Systems Security Professional
(CISSP)
-
Certified
Penetration Testing Specialist (CPTS)
-
Certified
Ethical Hacker (CEH)
-
COBIT
based IT Governance Exam (COBIT)
-
Information
Technology Infrastructure Library (ITIL)
-
Member of Business Continuity Institute (MBCI)
He has performed
several penetration tests, forensic analysis,
incident response procedures, security policy
implementation, information classification,
security governance and ISMS implementations
for many national and multi-national companies,
government and military organizations.
He served as
an Information Security Consultant to State
of Qatar's Ministry of Interior, where he was
responsible for setting up Qatar's National
Cyber Security Opearations Center (NCSOC), government
data classification, and develop a response
center for information security related issues
for Qatar's critical infrastructure. He provided
ISMS consultancy to several government ministries
and military organizations in Qatar.
Mr. Qazi has
also served as a member of Network Security
Taskforce, Government of Pakistan.
He has conducted
several workshops for high profile companies
and is a regular speaker at many IT events and
conferences like E-Merge, IT Expo, ProCOM, ITCN
Asia ProQuest and also served as a coordinator
and Judge at the ITCN Asia ProQuest Hacking
Competition. Qazi Ahmed is routinely called
to comment and discuss on IT security events
and has been featured on several TV channels
like GEO, ARY Digital, Indus News, PTV, NEO
TV and newspapers, magazines and newsletters
like DAWN, Spider, @internet, YAHOO!, CISCO,
Newsbytes, Wall Street Journal, India Times,
Hindustan Times etc.
Mr. Qazi is also
credited for finding the most severe security
vulnerability ever in Microsoft .NET Passport
services affecting millions of people worldwide.
Qazi Ahmed also enjoys the membership of renowned
worldwide High IQ society, Mensa.
|
Who Should Take This Course
Those
responsible for the security of IT systems including (but
not limited to):
- System Administrators
- Network Administrators
- Penetration Testers
- Information Security
Professionals
- Law Enforcement Officials
- Computer Auditors
-
IT
Security Officer
|
Our information security training
sessions have been attended by professionals from organizations
such as:
|
- Pakistan Atomic Energy
Commission
|
|
- Juma Al Majid Group
(UAE)
|
|
|
|
- Qasim International
Container Terminal
|
|
|
|
- Central College London
(UK)
|
|
|
- Central Depository
Company
|
- Karachi Electricity
Supply Corporation
|
|
|
|
|
|
- Agha Khan Education
Service
|
- Hamdard University
Network
|
|
|
- Sidat Hyder Morshed
Associates
|
TRAINING
MODULES
- Footprinting
- Scanning
- Enumeration
- Password Attacks
- Network Hacking
- Exploitation
- Backdoors and Rootkits
- Website Hacking
|
|
cyber
security network security
data security companies
information security companies
it security company
information security
it security
cyber security company
it security companies
cyber security companies
cyber security
internet security company
network security companies
security
cyber security services
internet security companies
computer security service
in it security
cybersecurity
it security information
cyber security information
cyber security providers
cyber security firms
it security info
cyber security software
computer security
security
systems security
company security
for security
it security systems
security monitoring
systems and security
home security
information security
it security
security solutions
security companies
security devices
access security
security protection
digital security
home security system
alarm security
security intelligence
best security
it security services
security: security at
security products
in it security
security operations
it security
cyber security services
cyber security
cyber security network security
security
in it security
cyber security information
it security information
cyber security network
information security program
computer security service
security technology
cybersecurity
data security companies
it and cyber security
it security network
cyber security software
digital security
data information security
cyber security risks
cyber security service
computer cyber security
it security companies
business it security
cyber security training
data security companies
information security companies
it security company
it security companies
it security
cyber security company
pakistan jobs
cyber security companies
network security companies
security
internet security company
internet security companies
cyber security services
information security
cyber security network security
cyber security
security technology
in it security
cyber security firms
cyber security providers
computer security service
digital security
it security network
information security website
|