Course Overview

  • What are course description?

    In this course you will deepen your knowledge of the Windows registry and log analysis through the use of the popular tools of computer forensics in order to reconstruct the user's activities in detail. You will gain a new level of knowledge of the very principles of both Windows Registry and Logging. The very practical approach can be used both for understanding the principles behind the automated analysis carried out by the industry's most popular forensics suite, both to deepen the level of detail, thanks to the gained knowledge, and interpretation of the data generated by the system.

  • Who can Avail this course?

    This training program is best suitable for candidates like: Network security officers and practitioners Site administrators IS/IT specialist, analyst or manager IS/IT auditor or consultant IT operations manager Technical support engineer Senior systems engineer Systems analyst or administrator Students of computer science engineering B.E. Students BCA students.

  • Projects given in this training

    There are multiple projects to be completed in this course, along with projects we have small assignments which is compulsory for every trainee to complete. These assignments consist of practice modules which will help you in nourishing your skills for both self development and for your future corporate life. The practice module will conclude each topic which we have covered during the training sessions.

  • Basic requirements for this training.

    There is no such criteria for basic requirement to pursue this course. On the other hand if you have basic knowledge of programming languages(HTML, PHP, JAVA, C, PYTHON), networking, hardware components and operating systems it will be beneficial for you.

  • Validity of certificate?

    Your certificate is valid for 3 years after the declaration of result. After you can simply have to clear certificate renewal exam.

  • Passing criteria of IIEH ?

    Passing criteria in IIEH is 70%. And this is strictly followed by us.

Syllabus

    Tracking User Activities - Combining information from Logs and Registry

    Combining Power Shell with Log Parser

    Tracking Remote Desktop Sessions

    Tracking Network Connections

    A practical example - Unauthorized access from a corporate network

    Tracking Remote Desktop

    Tracking User Activities - Combining information from Logs and Registry

    Combining Power Shell with Log Parser

    Tracking Remote Desktop Sessions

    Tracking Network Connections

    A practical example - Unauthorized access from a corporate network

    Tracking Remote Desktop

    Tracking User Activities - Combining information from Logs and Registry

    Combining Power Shell with Log Parser

    Tracking Remote Desktop Sessions

    Tracking Network Connections

    A practical example - Unauthorized access from a corporate network

    Tracking Remote Desktop

    Tracking User Activities - Combining information from Logs and Registry

    Combining Power Shell with Log Parser

    Tracking Remote Desktop Sessions

    Tracking Network Connections

    A practical example - Unauthorized access from a corporate network

    Tracking Remote Desktop

    Exam & certification

    • Is the Examination fees is included in the training fees?

      Yes, examination fees is included in the CSN training and certification fees.

    • What is the passing criteria of the exam?

      The passing marks criteria for the CSN examination is 70%. This criteria is strictly followed by the IIEH.

    • What are the basic knowledge requirements for this certification?

      There is no such criteria for basic requirement to pursue this course. On the other hand if you have basic knowledge of programming languages(HTML, PHP, JAVA, C, PYTHON), networking, hardware components and operating systems it will be beneficial for you.

    Course advisor

    IIEH Team

    Ethical Hacking India ( IIEH ) is an emerging Information security company with an aim to provide information security solutions to clients with wide array of platforms: Networks,web applications , servers and databases.

    FAQs

    • What is the fee structure of the certification?

      For fee structure details please visit our Headquarters in Mohali

    • What tools do I need to attend the training sessions?

      The tools which are necessary to attend ethical hacking training at IIEH are A laptop with 4GB ram or above The operating system usually use is Windows(Windows 7 or above recommended) or Mac OS (MAC os 10.6 or above recommended) Internet speed is preferred to be higher than 512kbps. So online training you prefer headphone or earphone with the microphone built in it so that you can hear instructions and training session

    • I am not able to access the online course. Who can help me?

      You can contact us via calls or just drop a mail regarding the issue.

    • How can I learn more about this training program?

      Contact us using the contact number or just drop a mail regarding the question or information you require. Contact details, you can visit the contact us page on our website.

    • How much does this Training cost?

      There are two modes of training at IIEH, they are online and walk-in training. In online a trainer will take your classes online. In walk in training, you will attend your training at the institute. The prices are dynamic and change. For current price please contact us or visit the headquarters. For contact details visit us on the Contact us page.

    • Am I required to sign an agreement prior to the exam?

      Yes, Ethical Hacking India has developed a number of policies to support the goals of the Ethical Hacking India certification program and its Integrity.

    • What If I miss a session?

      It is highly recommended not to miss any session in the training. But in case if you miss any session due to the genuine problem we will provide you with extra lectures for that particular session.

      Request more information