LCEH Course Description
LCEH Course Description
LCEH Course Description
w w w. l u c i d e u s . c o m
Course Title
LUCIDEUS CERTIFIED ETHICAL HACKER (LCEH)
Course Description
This is a Penetration Testing & Information Security Training Program. The training provides you an intensive
session which will empower you with knowledge in a simplified and easily graspable manner. In the training,
we teach our students how hackers break into the systems, network, mobiles and website so as to make them
aware of the possible loopholes and therefore, making them proficient in reverse-penetration. By doing so,
they are able to create a virtual wall between their data and the hackers. This training will enable you to carry out
attacking as well as defensive methodologies which will help you and your organization to not only protect but
also assess the safety and vulnerability ratio.
Delivery Method
Methods
Duration
No. of days
80 Hours
40 Days
7:3
80 Hours
12 Days
7:3
(MON - FRI)
(SUN)
Course Objectives
At the end of this course, participants will be able to:
Understand and perform Information Gathering on Digital Foot Prints
Understand Email attacks and will be able to protect their email accounts as well as social networking
accounts from these attacks
Analyze Malwares from a computer system and remove them manually
Understand Web Application Attacks and will be able to patch them to produce a secure web application.
Understand windows memory management and assembly language to perform basic Reverse
Engineering
Understand Enterprise Network Security Architecture
Understand Exploitation
Understand Wireless Security
Understand Security Architecture of mobile Platforms
1
Copyright of Lucideus 2015
Target audience
This course can be attended by security officers, auditors, security professionals, website
administrators, anyone who is concerned about the security of their network infrastructure and
everyone who want to have a promising career in cyber security
Prerequisites
Basic knowledge of computers and internet technologies.
Hands-On
The course includes practical hands-on exercises that enable you to test your acquired skills during the
training and understand its usage in a live environment
2
Copyright of Lucideus 2015
Our Facilities
3
Copyright of Lucideus 2015
1 Hour
Introduction
Need of Information Security
Ethical Side of Hacking
Steganography
Latest Test Cases
Cyber Law & Indian IT Acts
Conclusion
4 Hours
Introduction
IP Address
NAT
IP Subnets
DHCP Server
Ports
DNS
Proxy Servers
Virtual Private Networks
DNS Server
OSI Model
Web Architecture
Server Configuration
HTML Basics
PHP Basics
1 Hour
4
Copyright of Lucideus 2015
Email Security
3 Hours
1 Hour
2 Hours
Introduction to Firewalls
Network Firewalls
Web Application Firewalls
Weakness in Firewalls
Intrusion Detection Systems and weakness
Intrusion Prevention Systems and weakness
Honey Pots and Security Misconfiguration
5
Copyright of Lucideus 2015
15 Hours
SQL Injections
Authentication Bypass Injection
Blind Injections
Error Based Injection
Union Based Injection
Stacked Query Injection
Time Based Injection
CSRF
Security Misconfiguration
System Hacking
4 Hours
OS Login Bypass
Linux Basics
2 Hours
Network Attacks
2 Hours
Wireless Security
4 Hours
De-Authentication Attack
Security Countermeasures
Mobile Security
1 Hour
7
Copyright of Lucideus 2015
Network Attacks
4 Hours
Reverse Engineering
6 Hours
Cryptography
2 Hours
4 Hours
8
Copyright of Lucideus 2015
6 Hours
10 Hours
OS Detection
Open Port & Service Detection
Metasploit Framework Architecture
Various Interfaces of Metasploit Framework
Basic Terminologies
Vulnerability Analysis
Exploitation on Various Platforms
Evade Anti-Virus & Firewalls
Metasploit Scripting
Create Custom API to test Window Security
Configure Nmap with Metasploit Framework
SET
Ways to deliver Expolits
2 Hours
9
Copyright of Lucideus 2015
Penetration Testing
6 Hours
Router Exploitation
Reset Framework
Scalability Analysis
Security Misconfigurations
80 Hours
10
Copyright of Lucideus 2015
Take Away
Certification
Participants clearing final exam with more than 70% marks will be awarded with LCEH (Lucideus
Certified Ethical Hacker) Certificate.
Each Participant will get a participation certificate and a training completion letter
LCEH
Training
25000
3090
LCEH
Examination
5000
618
Course
Total (INR)
33708
11
Copyright of Lucideus 2015
Rahul is a post-graduate with majors in Computer Science and has conducted, more than a hundred
training sessions globally to his account. Being a cyber space researcher himself, Rahul can claim to
have found critical vulnerabilities on website of Intel, Sony, HP, Discovery Networks, TED and many
more. He is also listed in BlackBerry Hall of Fame for his contributions to the organization. A
published author of two books on information security. He has been covered extensively by the
global media and is one of the most followed Indian Information Security Expert on various social
media platforms
Aman is an avid security researcher with special interest in network exploitation and web application
security analysis. He has an experience of over 3000 hours of training in the information security
space and has trained over 5000 individuals personally till date. His student base ranges from
personnel from the Indian Army, The Indian Navy, Intelligence Agencies, Special Task Forces,
Criminal Investigation Departments of State Police, Enterprise IT teams and Engineering students
among others. He has found multiple security flaws on websites like Google, Facebook, EA, MIT,
National Geography, Blackberry among others.
12
Copyright of Lucideus 2015
Testimonials
The vision of Lucideus stands out from generic security industry entrepreneurs as a powerful intellect, with
clarity of thought. I hope we can stay in contact, and I am interested to learn more about Lucideus.
Jim Noble
Senior Advisor, USA Department of Homeland Security
Former Global CIO, Merrill Lynch
Former Chief IT Strategy Officer, British Petroleum
The course on cyber security was well attended by the CBI officers and we have received positive feedback
on the training conducted. The content was useful and the methodology was effective and it has enhanced
the skills and knowledge of our team.
P V Hari Krishna
Superintendent of Police
The CBI
Government of India
Thank you for your though provoking interactive session on web security. It was extremely informative and
provided valuable insights for comprehensive web security to our users. We look forward to build further
relationship with your esteemed organization in areas of Cyber Security
Brigadier J K Sethi
Deputy Director General
MISO, Dte General Information Systems
Indian Army
Ministry of Defence, Government of India
I sincerely wish you and your team the very best in spreading security consciousness in the persons who
are lucky to have come across your existence. I also want to acknowledge the excellent resources your
organization possess to help bridge gaps in cyber combat-readiness requirements/services for the
government and the legal agencies.
Commander S Srivastava
Secretary
NESC
Indian Navy
Ministry of Defence, Government of India
13
Copyright of Lucideus 2015
15
Copyright of Lucideus 2015
Lucideus Headquarters
New Delhi
C-17,
Safdarjung Development
Area, Hauz Khas,
New Delhi - 110016
Lucideus Labs
IIT Bombay
4th Floor, SINE
KReSIT Building
IIT Bombay, Powai
Mumbai - 400076