cissp
ceh
ethical hacking
penetration testing
cyber security
information security
it security
cissp training in pakistan
ceh training in pakistan
cissp in pakistan
ceh in pakistan
penetration testing companies in pakistan
penetration testing in pakistan
siem
cyber security operations center
vulnerability assessment
computer forensic
digital forensic
forensic services in pakistan
cyber security pakistan
cert pakistan
pakistan cert
malware analysis
27001
iso 27001
certified ethical hacking
ethical hacking in pakistan
ethical hacking
ethicak hacker
security operations center
csoc
gdpr
security awareness training
security awareness
computer emergency response team
computer emergency response team pakistan
computer forensic in pakistan
threat intelligence
security alerts and advisories
security advisories
computer security alerts
computer security advisories
security policies
information security policies
security policy template
forensic analysis
PAKCERT PENETRATION TESTING / ETHICAL HACKING BOOTCAMP
  • Gain practical experience under the expert guidance of CISSP, CPTS, CEH, COBIT, ITIL and MBCI certified PakCERT instructor
  • State-of-the-art class environment with Windows and UNIX operating systems
  • Learn about the hacker mindset and become familiar with the tools used to attack systems
  • Receive a bootable hacking tools resource pack USB with all the tools and exploits discussed during the course
September, 2019
October, 2019
Starting Date: 2nd September, 2019
Starting Date: To be announced
Last Date for Registration: 27th August, 2019
Last Date for Registration: To be announced

Duration: 3 Days (9:00am - 3:00pm daily)

Fee: Rs.50,000 (excluding tax) **Special Discount for Students. Contact us for details**

Course Package Includes:Penetration Testing bootable USB will pre-installed tools and exploits for all major operating systems, services and network devices, Classroom Notes, Training Certificate and Refreshments

Venue: Karachi

What Will You Learn?

  • Sophisticated, stealthy techniques used by professional hackers to gain access to systems in a purpose-built lab environment
  • How to circumvent traditional security mechanisms
  • How hackers can accurately collect and assimilate information about an organization's infrastructure whilst avoiding detection
  • How end-users thwart security restrictions imposed upon them
  • How hackers conceal their tracks and the route through which access to a target may be maintained
  • Limitations of firewalls and the tools used to bypass them

Who Teaches the Class?

Mr. Qazi Mohammad Misbahuddin Ahmed is regarded as the pioneer of information security services in Pakistan. He holds the following industry leading certifications:
  • Certified Information Systems Security Professional (CISSP)
  • Certified Penetration Testing Specialist (CPTS)
  • Certified Ethical Hacker (CEH)
  • COBIT based IT Governance Exam (COBIT)
  • Information Technology Infrastructure Library (ITIL)
  • Member of Business Continuity Institute (MBCI)

He has performed several penetration tests, forensic analysis, incident response procedures, security policy implementation, information classification, security governance and ISMS implementations for many national and multi-national companies, government and military organizations.

He served as an Information Security Consultant to State of Qatar's Ministry of Interior, where he was responsible for setting up Qatar's National Cyber Security Opearations Center (NCSOC), government data classification, and develop a response center for information security related issues for Qatar's critical infrastructure. He provided ISMS consultancy to several government ministries and military organizations in Qatar.

Mr. Qazi has also served as a member of Network Security Taskforce, Government of Pakistan.

He has conducted several workshops for high profile companies and is a regular speaker at many IT events and conferences like E-Merge, IT Expo, ProCOM, ITCN Asia ProQuest and also served as a coordinator and Judge at the ITCN Asia ProQuest Hacking Competition. Qazi Ahmed is routinely called to comment and discuss on IT security events and has been featured on several TV channels like GEO, ARY Digital, Indus News, PTV, NEO TV and newspapers, magazines and newsletters like DAWN, Spider, @internet, YAHOO!, CISCO, Newsbytes, Wall Street Journal, India Times, Hindustan Times etc.

Mr. Qazi is also credited for finding the most severe security vulnerability ever in Microsoft .NET Passport services affecting millions of people worldwide. Qazi Ahmed also enjoys the membership of renowned worldwide High IQ society, Mensa.

Who Should Take This Course

Those responsible for the security of IT systems including (but not limited to):
    • System Administrators
    • Network Administrators
    • Penetration Testers
    • Information Security Professionals
    • Law Enforcement Officials
    • Computer Auditors
    • IT Security Officer

Our information security training sessions have been attended by professionals from organizations such as:

  • Ministry of Defence
  • Pakistan Atomic Energy Commission
  • Ernst & Young
  • Juma Al Majid Group (UAE)
  • Unilever
  • Habibsons Bank (UK)
  • Allied Bank Limited
  • Qasim International Container Terminal
  • Agha Khan University
  • Dubai Islamic Bank
  • Qatar Airways
  • Central College London (UK)
  • Union Bank
  • Alliance Frances
  • Central Depository Company
  • Karachi Electricity Supply Corporation
  • Getz Pharma
  • Xpert2go Inc. (USA)
  • Compunet Online (ISP)
  • Lucky Textile Mills
  • Nadra
  • Agha Khan Education Service
  • Hamdard University Network
  • Habib Bank AG Zurich
  • Nakshbandi Industries
  • Sidat Hyder Morshed Associates

TRAINING MODULES

  • Footprinting
  • Scanning
  • Enumeration
  • Password Attacks
  • Network Hacking
  • Exploitation
  • Backdoors and Rootkits
  • Website Hacking
cyber security network security
data security companies
information security companies
it security company
information security
it security
cyber security company
it security companies
cyber security companies
cyber security
internet security company
network security companies
security
cyber security services
internet security companies
computer security service
in it security
cybersecurity
it security information
cyber security information
cyber security providers
cyber security firms
it security info
cyber security software
computer security
security
systems security
company security
for security
it security systems
security monitoring
systems and security
home security
information security
it security
security solutions
security companies
security devices
access security
security protection
digital security
home security system
alarm security
security intelligence
best security
it security services
security: security at
security products
in it security
security operations
it security
cyber security services
cyber security
cyber security network security
security
in it security
cyber security information
it security information
cyber security network
information security program
computer security service
security technology
cybersecurity
data security companies
it and cyber security
it security network
cyber security software
digital security
data information security
cyber security risks
cyber security service
computer cyber security
it security companies
business it security
cyber security training
data security companies
information security companies
it security company
it security companies
it security
cyber security company
pakistan jobs
cyber security companies
network security companies
security
internet security company
internet security companies
cyber security services
information security
cyber security network security
cyber security
security technology
in it security
cyber security firms
cyber security providers
computer security service
digital security
it security network
information security website

All rights reserved. Copyright© PakCERT 2000-2024