2. About Ankit……..
Ankit Fadia, 21 years old, is an independent
computer security and digital intelligence consultant .
He has authored six internationally best-selling books on numerous
topics related to Computer Security that have been widely
appreciated by both professionals and industry leaders the world
over.
His books have sold a record 250,000 copies across the globe, have
been translated into Japanese, Korean, Portuguese and Polish and
are also being used as reference textbooks in some of the most
prestigious academic institutions in Asia and North America.
confidential
3. About Ankit……….
In November 2001, Fadia was consulted by a classified intelligence
agency for breaking an encrypted message sent by one of Osama Bin
Laden’s men.
Since then Fadia has been involved in numerous classified projects
pertaining to International Security and Computer Networks. He handles
the Asia Operations of the classified intelligence agency.
Fadia provides customized cyber security training and consulting
solutions to clients all across Asia, Australia, North America and the
Middle East including Google, Citibank, Shell, Volvo, Thai Airways,
UOB Bank, PT Cisco Systems, Bank of Thailand, Bangkok Public
Bank, Amari Hotels, BlueScope Steel, Jumeirah International, Wipro,
Singapore Health Promotion Board, Infosys, Satyam, Schering Ltd
and many other organizations in the government, police and corporate
sectors.
confidential
4. Ankit’s Training Portfolio
Financial & Banking Sector:
TA Securities (Malaysia), Bank of Maharashtra, United Overseas
Bank of Singapore, Bangkok Bank Public Co. Ltd, Citibank Taiwan,
Monetary Authority of Singapore, Bank of Thailand, GHL Systems
Berhad, PT Bank Rabobank International Indonesia and Australian
bank officials.
Software Sector:
Wipro Technologies, Infosys, Symphony Services, Satyam
Corporation, CMC Limited (TATA), PT Cisco Systems Indonesia.
Internet Services Sector:
Google, Sify (Satyam).
Government Sector:
Singapore Police, Inland Revenue Authority (Singapore), Inland
Revenue Board (Malaysia), Ministry of Defence (Singapore),
NISER (Malaysia), Ministry of National Development (Singapore,
Ministry of Home Affairs (Singapore), Monetary Authority of
Singapore, Multimedia Super Corridor (Malaysia), Indian Police,
Central Forensics Laboratory, Kerela Police, Andhra Pradesh Police
Department, APFSL, Pune Police.
confidential
5. Ankit’s Training Portfolio
Transportation Sector:
Singapore SMRT Corporation, Thai Airways International.
Industrial Goods Sector:
The Siam Chemicals (Thailand), BlueScope Steel (Malaysia) Sdn Bhd, Shell
Information Technology International (Malaysia) and PT Indah Kiat Pulp &
Paper TBK (Malaysia).
Automobiles Sector:
Volvo Malaysia Sdn Bhd.
Education Sector:
Institute of Defence and Strategic Studies (IDSS, Singapore), Indian School
of Business (Hyderabad,India) Singapore Management University, Indian
Institute of Technology (IIT: Mumbai, Delhi and Kharagpur branches), BITS
Pilani, Ministry of Education (Singapore), Multimedia University.
Services Sector:
Amari Hotels and Resorts (Thailand), Jumeirah International Luxury &
Corporate Hotels.
confidential
6. Ankit’s Training Portfolio
Healthcare Sector:
Schering (Bangkok) Ltd, Compakar eHealth Tech Sdn.Bhd (Malaysia),
Health Promotion Board (Singapore).
International Conferences:
Young Entrepreneurs Organization (Dubai), Asia Technological Initiative
(Singapore), HACK (Singapore, Australia and Malaysia), Junior Chamber
International (New Delhi), CAN 2005 (Malaysia), Hacking (Malaysia,
Thailand and India) and InfoSec World (Singapore).
Business Leaders:
Young Entrepreneurs Organization (Asia-Pacific, Dubai University,
Singapore, Malaysia, Indonesia, Dubai, Bangalore, Chennai, Mumbai,
Kolkata and Delhi), Young Presidents Organization (Malaysia, Bangalore,
Mumbai and Kolkata) and Young Leaders Forum (Kolkata).
confidential
7. What is the AFCEH program?
An ANKIT FADIA CERTIFIED ETHCAL HACKER is a
computer security program on the science of ethical hacking,
to discover loopholes in target systems and to setup security
systems to counter the computer criminals. Professionals who
undergo this training and certification program will have the
necessary knowledge required to administer security solutions
to companies and individuals by making computer networks
secure. Want to be recognized for your computer security
expertise? Want to be considered amongst the best security
gurus in the world? Want to climb up the career ladder and
improve your global job prospects? Want to be trained and
certified by world renowned author and computer security
guru? Want to become an ANKIT FADIA CERTIFIED
ETHICAL HACKER? If your answer to any of the above
questions is a yes, then you have come to the RIGHT PLACE!
confidential
8. AFCEH – Ver.1 Key Milestones
• Started in March 2006. 5 batches conducted, 3000 students
trained in more than 90 cities.
• Participants included students, industry and government -
Airtel, Reliance, MTNL, BSNL, ICICI Bank, Tata, DSP Merlyn
Lynch, Indian Army, Airforce and State Police Departments.
• 27,000 Hours of Video Lectures and 18,000 Text Books used.
• AFCEH helped thousands of Participants added credibility to
their resume and managed to receive better jobs.
• In Jan 2007, AFCEH was started in China, Singapore and
Malaysia.
confidential
9. AFCEH – Ver.1 Key Milestones
• Toppers of each batch were interviewed and given the
opportunity to work with Ankit Fadia on projects like
research, consulting, writing books, teaching
assistantships and others.
• In April 2007, a special conference style package of the
AFCEH course was made available for corporate called
Ankit Fadia Computer Security (AFCS).
confidential
10. AFCEH Ver.1 Success Stories
Name: Jaya Bhattacharjee (26 years old)
City: Kolkata
Claim to Fame: After topping the AFCEH exam, Jaya was
selected for a project, then carried out research and co
authored a book on the topic of Encryption with Mr. Ankit
Fadia that was released at a national press conference in
February 2007.
Her Thoughts: The AFCEH course gave me the
opportunity to gain invaluable knowledge in the field of
Computer Security in a systematic manner. Everybody will
gain a lot from this course. Even if a person does not know
anything about the subject will also be able to understand
the concepts if he/she is sincere. I had a wonderful
experience writing the book and it gave me a well
deserved recognition among my friends, relatives, peers
and colleagues. It gives me immense happiness when I
see the books lined up in all the bookshops across India
like in Kolkata, Bangalore and others!
confidential
11. AFCEH Ver.1 Success Stories
Name: Manu Zacharia (30 years old)
City: New Jersey, USA (Cochin in India)
Claim to Fame: Like Jaya, even Manu co-authored a book on the
topic of Intrusion Detection with Mr. Ankit Fadia that was released at
a national press conference in February 2007. This book will soon
be released internationally. He was also selected to be the teaching
assistant of the course.
His Thoughts: I would like to express how much I enjoyed the
AFCEH course (Batch 1) and working with Ankit Fadia. The course
is taught in a friendly, easy to grasp manner. Beginners and experts
alike will benefit from the concise way that the course is structured.
The course takes you from an absolute beginner to a
knowledgeable expert in a very short amount of time. Everything is
written in plain English, & is easy to understand. I wouldrecommend
this course to any one who wants to gain insight into the mindset of
the hacker community and to protect and defend themselves
against the attacks. The quality of the course is very high as was
the delivery and presentation. Excellent content, good books and
easy to learn. Well done.
confidential
12. AFCEH Ver.1 Success Stories
Name: Vaibhav Kaushal (19 years old)
City: Hazaribagh, Jharkhand
Claim to Fame: After topping the AFCEH exam, Vaibhav was selected for a project, then
carried out research and co-authored a book on the topic of OS Hacking with Mr. Ankit
Fadia. This book is likely to be launched in the market SOON.
His Thoughts: I do not have words good enough to express how much I liked the
course. The course helped me gain better knowledge about many areas of the computer
security and the practical ways to protect computers from being attacked by other people.
What I liked about the course was that I had the opportunity to communicate with so
many people with special knowledge in various fields. We helped each other learn a lot
on the mailing lists of the AFCEH course group on Yahoo! In fact I was feeling a bit
nostalgic after we had completed the course ended.
confidential
13. Why is there a need for the new AFCEH 2.0?
Computer Security is a very dynamic industry. Every
single day thousands of new viruses, worms and security
vulnerabilities are discovered on the Internet. It is very
important for computer security professionals to remain
updated, educated and aware of the latest developments
in this dynamic industry. This is why it was important to
release version 2.0 of the AFCEH program. This new,
updated and improved version of the highly successful
AFCEH program contains NEW comprehensive training
material, content, lectures and books on the latest tools,
techniques and methods being used in the field of
computer security. AFCEH 2.0 will not only allow
participants to update their knowledge, but will also teach
them newly discovered techniques that were previously
not known while AFCEH 1.0 was being developed.
confidential
14. What is new in AFCEH 2.0?
• The KEYWORDS that succinctly describe AFCEH 2.0
are:
NEW
UPDATED
MORE
confidential
15. What is new in AFCEH 2.0?
• More than 90% of the topics in the video lectures will
have a NEW, UPDATED data and content.
• A NEW book titled Intrusion Detection will be given out to
participants as a text book.
• The following NEW topics will be taught: See
Attachment.
confidential
16. TABLE OF CONTENTS FOR AFCEH
Introduction To Information Security SCANNING
And Ethical Hacking Ping and related ICMP concepts.
Importance of Security Port Scanning
Can Hacking be Ethical? Tool – Pinger
Threat Tool – WS_PingProPack
Vulnerability Tool – NetScan Tools
Target of Evaluation Tool – Hping
Attack Tool – icmpenum
Exploit Detecting Ping Sweeps
CIA Triad – Elements of Security Tool –IDS like ISA Server or Snort
Modes Operandi of Hackers Port Scanning
Reconnaissance TCP Connect Scanning
Scanning TCP SYN Scanning
Gaining Access SYN/ACK Scanning
Maintaining Access TCP FIN Scanning
Covering Tracks TCP NULL Scanning
Classification of Hacker TCP XMAS Scanning
Black Hats Detecting Port Scanning
White Hats Tool – nmap
Grey Hats Tool – SuperScan
TCP/IP Concepts in brief Tool – Cheops
OSI Layer and TCP /IP Architecture DNS Mining
Common Protocols used and their working Tools – Perl script for DNS Mining – blindcrawl.pl
3 Way Handshakes
.FOOT PRINTING ENUMERATION
Whois
DNS lookup / Nslookup NetBIOS Null Session
Network Range NetBIOS Null Session Countermeasures
Traceroute Tool - NBTScan
Sam Spade Tool – DumpSec
NeoTrace Tool – NetBIOS Auditing Tool
Visual Route SNMP Enumeration
SmartWhoIs Tool – SNMP Util
Tool – enum
confidential
17. TABLE OF CONTENTS FOR AFCEH
SYSTEM HACKING TROJAN AND BACKDOORS
Password Attacks Introduction
Password Guessing
Working of Trojans
Dictionary attack
Types of Trojans
Brute Force Attack
Remote Access Trojans
Hybrid Attack
Password Sending Trojans
Social Engineering
Keyloggers
Shoulder Surfing
Destructive Trojans
Dumpster Diving
Tool – Legion DoS Attack Trojans
Rainbow Tables Proxy / Wingate Trojans
Password Sniffing FTP Trojans
Tool – LOphtcrack Software Detection Killers
Previlege Escalation
How Trojans are transmitted
Tool – John The Ripper
Tool – SubSeven or BackOrifice
Password Cracking Countermeasures
Tool – Netbus
Keystroke Loggers
EXE Binders or Wrappers
Hardware Keylogger
XSS (Cross Site Scripting)
Rootkits
Reverse Cross Site Request (RCSR)
Rootkit counter measures
SNIFFERS
How to cover your tracks
Disabling auditing
Clearing the event log What is packet or network sniffing?
Steganography Tool – Ethereal / Wireshark
Other methods of hiding files Tool – Snort
Attrib
Tool – tcpdump
NTFS Alternate Data Stream
Tool – Windump
Buffer Overflows
Man in the middle attack
Protection against buffer overflow
ARP Spoofing
Metasploit
Hacking using USB
confidential
18. TABLE OF CONTENTS FOR AFCEH
DENIAL OF SERVICE ATTACKS
VIRUSES
Introduction
Introduction
Types of DoS Attacks
How viruses work?
Bandwidth attacks
Types of viruses
Protocol attacks, and
Logic attacks Protection of against viruses
DDOS
Tool – SSPing GOOGLE HACKING
Tool – Etherape
Land Exploit
ENCRYPTION
Tool – Trinoo
Preventing DoS Attacks
MISC
SQL INJECTION
Firefox as Pen Testing Tool
Some scripts (perl scripts or other scripts) which is commonly
Introduction
used during pen testing like lbd (load balancing detector)
OLE DB Errors
Input Validation Attacks
Tools used for SQL Injection
How to Prevent SQL Injection
WIRELESS NETWORKS
Introduction
Various Wireless standards
WEP
Wireless DoS
Wireless Sniffing
Tool - Airsnort
Tool – AiroPeek
Wireless IDS
confidential
19. About The Program
18-hour program spread over 30 days
•
• Live Video Lectures and Interactive Q&A Sessions of 4
hours over Video Conference.
• 14 hours free Internet access @ RW for accessing 11
hours of self-pace self-learning Video on demand content,
Hacking demonstration on Video & 2 hours of Online
Exam.
Ankit Fadia’s 6 international bestsellers worth Rs. 1545/- to
•
be given absolutely free.
Certification on successful completion of online certification
•
exams.
confidential
27. From Ankit Fadia moments Batch 4. Our S.P. Mr Milind Bharambe
and A.S.P Mr Sunil Kolhe successfully completed this course with enthusiasm.”
confidential
28. In ROM only Sangli has done Ankit Fadia Corporate Batch. Director Of M/s B.G
Chitale Dairy Mr Vishwas Chitale and also other computer profession’s
successfully completed this course with enthusiasm.” Our S.P. Mr Milind
Bharambe also participated in this course
confidential
29. About The Program
Program Price – Rs. 6499/-
The Price Includes
- Cost Of Video Conferencing
- Access Cost for Video-On-Demand
- On Line Examination Fee
- PLUS
- 6 of Ankit’s International Best Selling books on Hacking & counter
measures
confidential
30. About The Program
For Admission Contact
Mahesh Ojha ( Web Lead )
09373445444.
confidential