SlideShare a Scribd company logo
1 of 8
Download to read offline
TRAINING
STUDENT HAND BOOK
EXECUTIVE CERTIFICATE
IN
CYBER SECURITY
ECCS
4.0
NDA-Non-Disclosure Agreement
Executive Certificate in Cyber Security
PARTICIPANT NAME:
ADDRESS:
CITY:
COUNTRY:
Non-Disclosure Agreement
General Notice
EXECUTIVE CERTIFICATE IN CYBER SECURITY COURSE MISSION IS TO EDUCATE, INTRODUCE AND DEMONSTRATE HACKING TOOLS FOR PENETRATION TESTING
PURPOSES ONLY. YOU WILL NOT USE THE NEWLY ACQUIRED SKILLS FOR ILLEGAL OR MALICIOUS ATTACKS AND YOU WILL NOT USE SUCH TOOLS IN AN
ATTEMPT TO COMPROMISE ANY COMPUTER SYSTEM, AND TO INDEMNIFY VOICE OF GREEN HATS AND ITS PARTNERS WITH RESPECT TO THE USE OR MISUSE OF THESE
TOOLS, REGARDLESS OF INTENT.
VOICE OF GREEN HATS PROVIDES THE HACKING SKILLS AND TOOLS USED IN THE ECCS CLASSROOM FOR EDUCATIONAL USE. THE HACKING TOOLS ARE NOT
AUTHORED BY ECCS, AND IN MANY CASES ARE SUBMITTED BY THE SECURITY COMMUNITY. WHILE EVERY REASONABLE EFFORT IS MADE TO ENSURE THAT THESE
PROGRAMS DO WHAT IS CLAIMED, VOICE OF GREEN HATS WILL NOT BE HELD ACCOUNTABLE FOR ANY DAMAGE OR DISTRESS CAUSED BY THE PROPER OR
IMPROPER USAGE OF THESE MATERIALS, AND MAKES NO GUARANTEE IN REGARDS TO THEIR OPERATION OR SUITABILITY FOR ANY SPECIFIC PURPOSE.
THE HACKING TOOLS USED IN THE ECCS TRAINING PROGRAM ARE MEANT FOR RESEARCH AND EDUCATIONAL PURPOSES ONLY. THE PRIMARY INTENT OF THESE
TOOLS IS TO PROVIDE THE USER WITH HARD TO FIND CONTENT FOR RESEARCH OR SELF EDUCATION RELEVANT TO NETWORK SECURITY AND VARIOUS
PROTECTION METHODS AND THEIR INTRINSIC FLAWS BY DEMONSTRATING EXPLOIT METHODS AND TECHNIQUES USED TO CIRCUMVENT THEM. WE
HOPE THAT YOU ARE BETTER AWARE OF THE DANGER THAT LURK OUT IN SOCIETY TODAY AND LEARN HOW TO PROTECT YOURSELF WITH THE KNOWLEDGE
YOU ARE ABOUT TO LEARN. IN CONTINUING YOU MUST ACCEPT THAT YOU ARE GOING TO USE THIS INFORMATION ONLY FOR EDUCATIONAL AND RESEARCH
PURPOSES ONLY.
WHILE POSSESSION OF INFORMATION OR PROGRAMS INCLUDED ON THIS TRAINING VIOLATES NO LAWS, ACTUALLY USING OR IMPLEMENTING SOME OF THE
PROGRAMS OR CONTENT MAY VIOLATE FEDERAL LAW. FOR THIS REASON THE USER IS INSTRUCTED NOT TO USE ANY OF THE PROGRAMS OR CONTENT ON THIS
TRAINING WHICH MAY VIOLATE
VOICE OF GREEN HATS
ANY LAWS OR INFRINGE ON THE COPYRIGHT PROTECTION OF OTHERS. WE PROVIDE THEM FOR EDUCATIONAL PURPOSES ONLY.
Terms of Use
1. ACCEPTANCE OF TERMS
1.1 READ THESE VOICE OF GREEN HATS TERMS OF USE ("TERMS") CAREFULLY BEFORE YOU ("YOU") ACCEPT THESE TERMS BY: (A) OPENING THE ECCS
COURSEWARE RED BOX SEAL, AND (B) USING ANY FILES ("FILES") LOCATED IN THE CD-ROM. IF YOU DO NOT AGREE TO ALL OF THESE TERMS YOU WILL NOT BE
ALLOWED INTO THE ECCS TRAINING PROGRAM.
1.2 THE TERMS ARE ENTERED INTO BY AND BETWEEN VOICE OF GREEN HATS AND YOU. VOICE OF GREEN HATS PROVIDES THE TOOLS / INFORMATION /
ELECTRONICAL CODE TO YOU STRICTLY SUBJECT TO THE TERMS.
1.3 THE PROGRAM CONTAINS INFORMATION, SOFTWARE OF SECURITY RELATED MATERIAL
IF YOU ARE UNDER THE AGE OF 21, IF SUCH MATERIAL OFFENDS YOU OR IF IT'S ILLEGAL TO POSSESS/ USE SUCH MATERIAL IN YOUR COMMUNITY YOU ARE
NOT ALLOWED TO CONTINUE.
UNDER PENALTY OF PERJURY I SWEAR THAT:
I AM AT LEAST 21 YEARS OF AGE.
THE FILES AND MATERIALS I AM VIEWING ARE FOR MY OWN PERSONAL USE AND I WILL NOT SHARE THE MATERIAL.
I DESIRE TO RECEIVE/VIEW SECURITY RELATED MATERIAL, THE VIEWING, READING AND DOWNLOADING SECURITY RELATED MATERIAL DOES NOT VIOLATE THE
STANDARDS OF MY COMMUNITY, TOWN, CITY, STATE OR COUNTRY.
I AM SOLELY RESPONSIBLE FOR ANY FALSE DISCLOSURES OR LEGAL RAMIFICATIONS OF VIEWING, READING, USING OR ANY MATERIAL FROM THE ECCS
PROGRAM.
I AM ALLOWED TO ACCESS/RETRIEVE/VIEW/USE THIS INFORMATION/SOFTWARE/PROGRAM/CODE AND I FULLY COMPLY WITH LOCAL LAW
2. PERMITTED USE
2.1 THE HACKING TOOLS MAY NOT BE USED BY YOU OR ANY OTHER PARTY FOR ANY PURPOSE THAT VIOLATES ANY LOCAL, STATE, FEDERAL OR FOREIGN LAW.
YOU UNDERSTAND THAT BREAKING INTO ANY NETWORK OR COMPUTER SYSTEM NOT OWNED BY YOU MAY BE ILLEGAL.
3. NO EXPRESS OR IMPLIED WARRANTY
3.1 VOICE OF GREEN HATS DOES NOT AND CANNOT WARRANT: (I) THAT THE PERFORMANCE OR RESULTS THAT MAY BE OBTAINED BY USING THE SOFTWARE
OR (II) THAT THE SOFTWARE IS APPROPRIATE FOR YOUR PURPOSES OR THAT IT IS ERROR FREE.
ACCORDINGLY, THE SOFTWARE AND ITS DOCUMENTATION ARE PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED,
INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OR MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT.
THE ENTIRE RISK ARISING OUT OF USE OR PERFORMANCE OF THE SOFTWARE / TOOL / ELECTRONICAL CODE REMAINS WITH YOU.
4. LIMITATION OF LIABILITY
VOICE OF GREEN HATS
4.1 EXCLUSION OF INCIDENTAL, CONSEQUENTIAL DAMAGES RESULTING FROM POSSESSION, USE, OR MALFUNCTION OF THIS SOFTWARE AND OTHER DAMAGES
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL ECCOUNCIL BE LIABLE FOR ANY SPECIAL, INCIDENTAL, INDIRECT, OR
CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING, BUT NOT LIMITED TO, DAMAGES FOR: LOSS OF PROFITS, LOSS OF CONFIDENTIAL OR OTHER
INFORMATION, BUSINESS INTERRUPTION, PERSONAL INJURY, LOSS OF PRIVACY, FAILURE TO MEET ANY DUTY (INCLUDING OF GOOD FAITH OR OF REASONABLE
CARE), NEGLIGENCE, AND ANY OTHER PECUNIARY OR OTHER LOSS WHATSOEVER) ARISING OUT OF OR IN ANY WAY RELATED TO THE USE OF OR INABILITY TO
USE THE SOFTWARE OR THE DOCUMENTATION, EVEN IF VOICE OF GREEN HATS OR ANY SUPPLIER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
VOICE OF GREEN HATS MAKES NO WARRANTIES OR REPRESENTATIONS, EXPRESS OR IMPLIED, ABOUT THE ACCURACY, TIMELINESS OR COMPLETENESS OF THE ECCS
PROGRAM, INCLUDING WITHOUT LIMITATIONS THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. VOICE OFGREEN
HATS MAKES NO WARRANTY OF NON INFRINGEMENT.
THIS ECCS TRAINING PROGRAM MAY CONTAIN TECHNICAL INACCURACIESOR TYPOGRAPHICAL ERRORS, NEITHER VOICE OF GREEN HATS NOR ANY OF IT'S
AFFILIATES SHALL BE LIABLE FOR ANY DIRECT, INCIDENTAL, CONSEQUENTIAL, INDIRECT OR PUNITIVE DAMAGES ARISING OUT OF ACCESS TO,"; INABILITY TO
ACCESS, OR ANY USE OF THE CONTENT OF ANY SITE(S) LINKED TO THIS SITE, INCLUDING WITHOUT LIMITATION ANY DAMAGES TO, OR VIRUSES OR TROJAN
HORSES THAT MAY INFECT OR INVADE, YOUR PC EQUIPMENT OR OTHER PROPERTY, EVEN IF VOICE OF GREEN HATS IS EXPRESSLY ADVISED OF THE POSSIBILITY
OF SUCH DAMAGES.
4.2 YOU AGREE TO HOLD VOICE OF GREEN HATS HARMLESS FROM, AND YOU COVENANT NOT TO SUE VOICE OF GREEN HATS FOR, ANY CLAIMS BASED OR
YOUR USE OF, OR YOUR INABILITY TO USE, THE TOOLS.
YOU ALSO AGREE THAT YOU WILL PROTECT, INDEMNIFY, SAVE AND HOLD VOICE OF GREEN HATS HARMLESS FROM ANY AND ALL STIPULATIONS, ARREARS,
LOSSES, EXPENSES, AND ASSERTIONS, AS WELL AS RATIONAL ATTORNEY'S FEES DECLARED AGAINST ECCOUNCIL, ITS REPRESENTATIVES, CUSTOMERS, AND
ADMINISTRATION.
NOTWITHSTANDING ANY DAMAGES THAT YOU MIGHT INCUR FOR ANY REASON WHATSOEVER (INCLUDING, WITHOUT LIMITATION, ALL DAMAGES REFERENCED
ABOVE AND ALL DIRECT OR GENERAL DAMAGES). THE FOREGOING LIMITATIONS, EXCLUSIONS AND DISCLAIMERS SHALL APPLY TO THE MAXIMUM EXTENT PERMITTED
BY APPLICABLE LAW, EVEN IF ANY REMEDY FAILS ITS ESSENTIAL PURPOSE.
5. INDEMNIFICATION
5.1 YOU AGREE TO INDEMNIFY AND HOLD VOICE OF GREEN HATS AND ITS SUBSIDIARIES, AFFILIATES, OFFICERS, AGENTS, TRAINERS, ATCS, DISTRIBUTORS AND
EMPLOYEES HARMLESS FROM ANY AND ALL STIPULATIONS, ARREARS, LOSSES, EXPENSES, ASSERTIONS ANY CLAIM OR DEMAND, INCLUDING ATTORNEY'S FEES,
MADE BY ANY THIRD PARTY DUE TO OR ARISING OUT OF YOUR USE OF THE TOOLS /INFORMATION / ELECTRONICAL CODE, BREACH OF THE TERMS, OR
VIOLATION OF THE RIGHTS OF ANOTHER.
6. MISCELLANEOUS
6.1 THE TERMS CONSTITUTE THE ENTIRE AGREEMENT BETWEEN YOU AND VOICE OF GREEN HATS AND GOVERN YOUR USE OF THE TOOLS / INFORMATION /
ELECTRONICAL CODE, SUPERSEDING ANY PRIOR AGREEMENTS BETWEEN YOU AND VOICE OF GREEN HATS (INCLUDING, BUT NOT LIMITED TO, PRIOR VERSIONS
OF THE TERMS)
6.2 IF YOU USE THE SKILLS AND KNOWLEDGE LEARNT IN THE ECCS TRAINING PROGRAM FROM LOCATIONS OUTSIDE THE UNITED STATES OF AMERICA, YOU ARE
RESPONSIBLE FOR COMPLIANCE WITH APPLICABLE LOCAL LAWS, INCLUDING, BUT NOT LIMITED TO, THE EXPORT AND IMPORT REGULATIONS OF OTHER
COUNTRIES.
6.3 THESE TERMS AND THE ECCS TRAINING PROGRAM COULD INCLUDE INACCURACIES OR TYPOGRAPHICAL ERRORS. VOICE OF GREEN HATS MAY MAKE
IMPROVEMENTS AND/OR CHANGES TO THE TERMS AT ANY TIME WITHOUT NOTICE.
6.4 THE FAILURE OF VOICE OF GREEN HATS TO ENFORCE OR EXERCISE ANY RIGHT OR PROVISION OF THE TERMS DOES NOT CONSTITUTE A WAIVER OF SUCH
RIGHT OR PROVISION.
6.5 IN THE EVENT ANY PROVISION OF THIS"; AGREEMENT IS HELD TO BE UNENFORCEABLE IN ANY RESPECT, SUCH UNENFORCEABILITY SHALL NOT AFFECT ANY
OTHER PROVISION OF THIS AGREEMENT, PROVIDED THAT THE EXPECTED ECONOMIC BENEFITS OF THIS AGREEMENT ARE NOT DENIED TO EITHER PARTY. Contents
of this course has been created, updated and upgrade since last 10 year by Ziaullah Mirza
THIS LEGAL DISCLAIMER CONSTITUTES A LEGAL AGREEMENT BETWEEN VOICE OF GREEN HATS AND YOU AND/OR ANY BUSINESS IN WHICH YOU HAVE ANY
LEGAL OR EQUITABLE INTEREST. IF ANY PORTION OF THIS AGREEMENT IS DEEMED UNENFORCEABLE BY A COURT OF COMPETENT JURISDICTION IT SHALL NOT AFFECT
THE ENFORCEABILITY OF THE OTHER PORTIONS OF THE AGREEMENT.
I AGREE TO THE ABOVE TERMS
SIGNATURE DATE:
THUMB IMPRESSION HERE
These documents and credentials may hand
over to authorized & legal government
organizations or authority on official request
SKILLS BASED
KNOWLEDGE
EXECUTIVE CERTIFICATE IN CYBER
SECURITY
INTRODUCTION:
The development of technologies always has impacts, in positive or negative ways, on businesses, cultures,
economies and even on countries. Information Technology is one of the most effective tools with rapid
development characteristics for itself as well as businesses around the globe. Cyber Security is one of the best
branch or modern tools of Information Technology with respect to security concerns and risk management factors.
Information technology is highly integrated into our everyday lives. As a society, we have gone digital. We play,
learn, socialize, communicate, and do business online. While cyberspace brings significant benefits, ourever-
increasing reliance on it, causing or creating new and significant vulnerabilities.
Voice of Green Hat, brought an innovative research-based certificate in cyber security along with a number of other
cutting-edge technological certifications. This research-based certificate is called ECCS. Executive certificate in
Cyber Security (ECCS) provides a number of researches in special innovative skills, highly brainstorming strategy
to tackle the problems and multidimensional techniques to countermeasure the cyber-attacks and hacking in the
cyber space. Not only this, ECCS also covers intermediate skills for digital forensic investigation, risk management
and competitive intelligence to understand the attacker’s approaches as well as having deep understanding with today’s
Cyber War scenario. This certificate contains six modules of Cyber security & Law; Ethical Hacking &
Countermeasure; Digital Forensic Investigation; Competitive Intelligence; Research & Development and
Important Demanded Skills explained below (As per authored by Ziaullah Mirza):
CURRICULUM:
Module ECCS 01: Cyber Security & Laws
A. Introduction to Cyber World, Cyber Security, Internet Security, Computer Security
B. Cyber Laws in Malaysia, Pakistan, USA, Japan, UK, Australia, EU, Singapore, Canada & New Zealand
C. Cyber Crimes, Law Sections and Penalties
Module ECCS 02: Ethical Hacking & Countermeasures
A. Introduction to Ethical Hacking, Virtualizaion and Cloud Computing
B. Foot printing, Scanning, Enumeration
C. System Hacking, Trojans and Backdoors, Sniffers, Denial of Service, Social Engineering, Session Hijacking D. Hacking Web
Servers, Web Application Vulnerabilities, Web-based Password Cracking Techniques
D. SQL Injection, Hacking Wireless Networks, Virus and Worms
E. Physical Security
F. Linux Hacking, Evading IDS, Firewalls, and Honey pots, Buffer Overflows
G. Cryptography, Penetration Testing
Module ECCS 03: Computer Forensic Investigation
A. Introduction to Computer Forensics Investigation
B. Data Recovery Software Tools
C. Password Recovery Tools Kits Software
Module ECCS 04: Research & Development
A. Knowledge Management Knowledge Work Force
B. Artificial Intelligence & Implementation
C. Industrial Revolution & Hands on Applications
D. Implementation of AR, VR, MR and Holo-Lenses
E. Flying & Traditional Robotics
F. Mind Computing & Research
G. Financial Technologies
H. Big Data & Implementation
Module ECCS 05: Competitive Intelligence
A. Introduction to competitive Intelligence (CI)
B. Ethics of CI
C. Competitive Intelligence and Espionage Impacts
Module ECCS 06: Important Market Demanded Skills
A. Skills of Web Programming/ Web Apps/ Mobile Apps
B. Skills of Networking for Windows/ Cisco/ ZTL etc.
C. Skills of Cloud Computing and Application, Digital Transformation etc.
D. Common Troubleshooting with Windows, Cisco and Linux etc.
SPECIALIZATION:
• Digital Transformation
• Web & Apps Penetration Testing
• Competitive Intelligence
• Digital Forensic Intelligence
• Digital Economy Vs 5th Gen War Cyber warfare
• Disease-X Alert, Monitoring & Countermeasure
• Industrial Revolution & Hands on Applications for IR4.0
• Implementation of AR, VR, MR and Holo-Lenses
• Flying & Traditional Robotics
• Mind Computing & Research
• Financial Technologies
LEARNING OUTCOMES:
A. Student will begin by understanding how perimeter defenses work and then be lead into scanning and
attacking their own networks, no real network is harmed.
B. Student then learns how intruders escalate privileges and what steps can be taken to secure a system.
C. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks,
Buffer Overflows and Virus Creation.
D. Student will learn how to investigate the threats, attack and compromised Data as how to provide risk
management at the initial stages.
E. Student will have strong understanding of Competitive Intelligence and its utilization to eliminate
competitive advantage rival organization or product at primary level.
F. Student will have practical knowledge on OS (Windows XP, VISTA, 7, 8, 10, Azure, Intune; Windows
Server 2003, 2008, 2008R2, 2012, 2012R2, RedHat, Kali, Backtrack, Android etc.) Cloud Computing and
Social Media along with a number of tools for countermeasure, defense, forensic and risk management.
G. Student will be able to create, analyses and publish the penetration report along with effect correct
action and measure to resolve the problems
H. Digital Transformation, Web & Apps Penetration Testing, Digital Forensic Intelligence, Digital
Economy Vs 5th Gen War Cyber warfare, Disease-X Alert & Countermeasure, Industrial Revolution &
Hands on Applications, Implementation of AR, VR, MR and Holo-Lenses, Flying & Traditional Robotics,
Mind Computing & Research, and all type of currencies including crypto etc.,
TARGET AUDIENCE:
A. Security Officers, Security Professionals, Site Administrators, Security Network Administrator
B. Cyber Laws Auditors, Competitive Intelligence, Strategic Analysis, Market Research and Analysis
C. Financial Analysis, Business Development, Marketing, Document or Information Management
D. Strategic Planning
E. Corporate library
F. Human Resources
G. Recruiting Firms
OPERATIONAL INFORMATION:
A. Duration: 30 Hours
B. Vendor: Voice of Green Hats
C. Venue: Pakistan, Malaysia, UAE, Canada, Australia, New Zealand, The Netherlands, Norway
CONTACT INFORMATION:
VOICE OF GREEN HATS @ GREEN HATS INTERNATIONAL INNOVATION CENTER
CONTACT: +92336 8399 991 WHATSAPP: +92302 0533 479
INTERNSHIP/ INDUSTRIAL TRAINING:
Student will be offered industrial training/ Internship with paid or unpaid in the local or International with
minimum 3-month period. We have 100+ locations available for internship/ practice globally
Training Premises in Lahore, Pakistan:

More Related Content

Similar to Executive Certificate in Cyber Security Student Handbook

Articulate end user license agreement
Articulate end user license agreementArticulate end user license agreement
Articulate end user license agreementJagadeesh Hema
 
Third party license
Third party licenseThird party license
Third party licensejenison013
 
3D Printing Legal Challenges (Patrick Van Eecke DLA Piper, 14 Oct. 2013)
3D Printing Legal Challenges (Patrick Van Eecke DLA Piper, 14 Oct. 2013)3D Printing Legal Challenges (Patrick Van Eecke DLA Piper, 14 Oct. 2013)
3D Printing Legal Challenges (Patrick Van Eecke DLA Piper, 14 Oct. 2013)Patrick Van Renterghem
 
Agreement for professional services
Agreement for professional servicesAgreement for professional services
Agreement for professional servicesMichael Claudio
 
Steam install agreement
Steam install agreementSteam install agreement
Steam install agreementAmirulAsy
 
The Morality of Code - Glen Goodwin, SAS Institute, inc.
The Morality of Code - Glen Goodwin, SAS Institute, inc.The Morality of Code - Glen Goodwin, SAS Institute, inc.
The Morality of Code - Glen Goodwin, SAS Institute, inc.NodejsFoundation
 
Samsung Galaxy Sol Manual / User Guide
Samsung Galaxy Sol Manual / User GuideSamsung Galaxy Sol Manual / User Guide
Samsung Galaxy Sol Manual / User Guidemanualsheet
 
Hyperion FDM Admin. Guide
Hyperion FDM Admin. GuideHyperion FDM Admin. Guide
Hyperion FDM Admin. GuideIssam Hejazin
 

Similar to Executive Certificate in Cyber Security Student Handbook (20)

Articulate end user license agreement
Articulate end user license agreementArticulate end user license agreement
Articulate end user license agreement
 
Third party license
Third party licenseThird party license
Third party license
 
hamza xp
hamza xphamza xp
hamza xp
 
Eula
EulaEula
Eula
 
3D Printing Legal Challenges (Patrick Van Eecke DLA Piper, 14 Oct. 2013)
3D Printing Legal Challenges (Patrick Van Eecke DLA Piper, 14 Oct. 2013)3D Printing Legal Challenges (Patrick Van Eecke DLA Piper, 14 Oct. 2013)
3D Printing Legal Challenges (Patrick Van Eecke DLA Piper, 14 Oct. 2013)
 
Eula
EulaEula
Eula
 
Eula
EulaEula
Eula
 
License
LicenseLicense
License
 
Agreement for professional services
Agreement for professional servicesAgreement for professional services
Agreement for professional services
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
Contract Sample
Contract SampleContract Sample
Contract Sample
 
Steam install agreement **
Steam install agreement **Steam install agreement **
Steam install agreement **
 
Steam install agreement
Steam install agreementSteam install agreement
Steam install agreement
 
Steam install agreement
Steam install agreementSteam install agreement
Steam install agreement
 
The Morality of Code - Glen Goodwin, SAS Institute, inc.
The Morality of Code - Glen Goodwin, SAS Institute, inc.The Morality of Code - Glen Goodwin, SAS Institute, inc.
The Morality of Code - Glen Goodwin, SAS Institute, inc.
 
Samsung Galaxy Sol Manual / User Guide
Samsung Galaxy Sol Manual / User GuideSamsung Galaxy Sol Manual / User Guide
Samsung Galaxy Sol Manual / User Guide
 
Consulting e
Consulting eConsulting e
Consulting e
 
Hyperion FDM Admin. Guide
Hyperion FDM Admin. GuideHyperion FDM Admin. Guide
Hyperion FDM Admin. Guide
 

More from Ziaullah Mirza

ابدأ# عملك في# باكستان
ابدأ# عملك في# باكستانابدأ# عملك في# باكستان
ابدأ# عملك في# باكستانZiaullah Mirza
 
Frequently Asked Questions on Anti-Money Laundering
Frequently Asked Questions on Anti-Money LaunderingFrequently Asked Questions on Anti-Money Laundering
Frequently Asked Questions on Anti-Money LaunderingZiaullah Mirza
 
Guidance on Beneficial Ownership
Guidance on  Beneficial OwnershipGuidance on  Beneficial Ownership
Guidance on Beneficial OwnershipZiaullah Mirza
 
Guidance on verification 01092020
Guidance on verification 01092020Guidance on verification 01092020
Guidance on verification 01092020Ziaullah Mirza
 
Managing Risk & Information Security
Managing Risk & Information SecurityManaging Risk & Information Security
Managing Risk & Information SecurityZiaullah Mirza
 
12 part framework to structure safety assessment for autonomous driving
12 part framework to structure safety assessment for autonomous driving12 part framework to structure safety assessment for autonomous driving
12 part framework to structure safety assessment for autonomous drivingZiaullah Mirza
 
Workfare versus Welfare: Incentive Arguments for Work Requirements in Poverty...
Workfare versus Welfare: Incentive Arguments for Work Requirements in Poverty...Workfare versus Welfare: Incentive Arguments for Work Requirements in Poverty...
Workfare versus Welfare: Incentive Arguments for Work Requirements in Poverty...Ziaullah Mirza
 
Social welfare and the rate structure a new look at progressive
Social welfare and the rate structure  a new look at progressiveSocial welfare and the rate structure  a new look at progressive
Social welfare and the rate structure a new look at progressiveZiaullah Mirza
 
Improving the Measurement of Poverty
Improving the Measurement of PovertyImproving the Measurement of Poverty
Improving the Measurement of PovertyZiaullah Mirza
 
2018 CPI Global Map Results
2018 CPI Global Map Results2018 CPI Global Map Results
2018 CPI Global Map ResultsZiaullah Mirza
 
2018 CPI Press Release
2018 CPI Press Release2018 CPI Press Release
2018 CPI Press ReleaseZiaullah Mirza
 
World Economic Situation and Prospects
World Economic Situation and ProspectsWorld Economic Situation and Prospects
World Economic Situation and ProspectsZiaullah Mirza
 
IEDC Advisory Committee Handbook
IEDC Advisory Committee HandbookIEDC Advisory Committee Handbook
IEDC Advisory Committee HandbookZiaullah Mirza
 
Talk on CP-TPP Comprehensive and Progressive Agreement for Trans-Pacific Part...
Talk on CP-TPP Comprehensive and Progressive Agreement for Trans-Pacific Part...Talk on CP-TPP Comprehensive and Progressive Agreement for Trans-Pacific Part...
Talk on CP-TPP Comprehensive and Progressive Agreement for Trans-Pacific Part...Ziaullah Mirza
 
CANADA - JAPAN ECONOMIC PARTNERSHIP AGREEMENT
CANADA - JAPAN ECONOMIC PARTNERSHIP AGREEMENTCANADA - JAPAN ECONOMIC PARTNERSHIP AGREEMENT
CANADA - JAPAN ECONOMIC PARTNERSHIP AGREEMENTZiaullah Mirza
 
Canada - Australia Trade and Economic Cooperation Arrangement (TECA)
Canada - Australia Trade and Economic  Cooperation Arrangement (TECA)Canada - Australia Trade and Economic  Cooperation Arrangement (TECA)
Canada - Australia Trade and Economic Cooperation Arrangement (TECA)Ziaullah Mirza
 
Canada & Australia - Perfect partners for trade & investment
Canada & Australia - Perfect partners for trade & investmentCanada & Australia - Perfect partners for trade & investment
Canada & Australia - Perfect partners for trade & investmentZiaullah Mirza
 
Free Trade Agreements - A TOOL FOR ECONOMIC PROSPERITY
Free Trade Agreements - A TOOL FOR ECONOMIC PROSPERITYFree Trade Agreements - A TOOL FOR ECONOMIC PROSPERITY
Free Trade Agreements - A TOOL FOR ECONOMIC PROSPERITYZiaullah Mirza
 

More from Ziaullah Mirza (20)

ابدأ# عملك في# باكستان
ابدأ# عملك في# باكستانابدأ# عملك في# باكستان
ابدأ# عملك في# باكستان
 
Digital Order 002
Digital Order 002Digital Order 002
Digital Order 002
 
Frequently Asked Questions on Anti-Money Laundering
Frequently Asked Questions on Anti-Money LaunderingFrequently Asked Questions on Anti-Money Laundering
Frequently Asked Questions on Anti-Money Laundering
 
Guidance on Beneficial Ownership
Guidance on  Beneficial OwnershipGuidance on  Beneficial Ownership
Guidance on Beneficial Ownership
 
Guidance on verification 01092020
Guidance on verification 01092020Guidance on verification 01092020
Guidance on verification 01092020
 
Managing Risk & Information Security
Managing Risk & Information SecurityManaging Risk & Information Security
Managing Risk & Information Security
 
12 part framework to structure safety assessment for autonomous driving
12 part framework to structure safety assessment for autonomous driving12 part framework to structure safety assessment for autonomous driving
12 part framework to structure safety assessment for autonomous driving
 
Workfare versus Welfare: Incentive Arguments for Work Requirements in Poverty...
Workfare versus Welfare: Incentive Arguments for Work Requirements in Poverty...Workfare versus Welfare: Incentive Arguments for Work Requirements in Poverty...
Workfare versus Welfare: Incentive Arguments for Work Requirements in Poverty...
 
Social welfare and the rate structure a new look at progressive
Social welfare and the rate structure  a new look at progressiveSocial welfare and the rate structure  a new look at progressive
Social welfare and the rate structure a new look at progressive
 
Improving the Measurement of Poverty
Improving the Measurement of PovertyImproving the Measurement of Poverty
Improving the Measurement of Poverty
 
2018 CPI Global Map Results
2018 CPI Global Map Results2018 CPI Global Map Results
2018 CPI Global Map Results
 
2018 CPI Press Release
2018 CPI Press Release2018 CPI Press Release
2018 CPI Press Release
 
World Economic Situation and Prospects
World Economic Situation and ProspectsWorld Economic Situation and Prospects
World Economic Situation and Prospects
 
IEDC Advisory Committee Handbook
IEDC Advisory Committee HandbookIEDC Advisory Committee Handbook
IEDC Advisory Committee Handbook
 
Worldbank Report 2018
Worldbank Report 2018Worldbank Report 2018
Worldbank Report 2018
 
Talk on CP-TPP Comprehensive and Progressive Agreement for Trans-Pacific Part...
Talk on CP-TPP Comprehensive and Progressive Agreement for Trans-Pacific Part...Talk on CP-TPP Comprehensive and Progressive Agreement for Trans-Pacific Part...
Talk on CP-TPP Comprehensive and Progressive Agreement for Trans-Pacific Part...
 
CANADA - JAPAN ECONOMIC PARTNERSHIP AGREEMENT
CANADA - JAPAN ECONOMIC PARTNERSHIP AGREEMENTCANADA - JAPAN ECONOMIC PARTNERSHIP AGREEMENT
CANADA - JAPAN ECONOMIC PARTNERSHIP AGREEMENT
 
Canada - Australia Trade and Economic Cooperation Arrangement (TECA)
Canada - Australia Trade and Economic  Cooperation Arrangement (TECA)Canada - Australia Trade and Economic  Cooperation Arrangement (TECA)
Canada - Australia Trade and Economic Cooperation Arrangement (TECA)
 
Canada & Australia - Perfect partners for trade & investment
Canada & Australia - Perfect partners for trade & investmentCanada & Australia - Perfect partners for trade & investment
Canada & Australia - Perfect partners for trade & investment
 
Free Trade Agreements - A TOOL FOR ECONOMIC PROSPERITY
Free Trade Agreements - A TOOL FOR ECONOMIC PROSPERITYFree Trade Agreements - A TOOL FOR ECONOMIC PROSPERITY
Free Trade Agreements - A TOOL FOR ECONOMIC PROSPERITY
 

Recently uploaded

Top Call Girls In Arjunganj ( Lucknow ) ✨ 8923113531 ✨ Cash Payment
Top Call Girls In Arjunganj ( Lucknow  ) ✨ 8923113531 ✨  Cash PaymentTop Call Girls In Arjunganj ( Lucknow  ) ✨ 8923113531 ✨  Cash Payment
Top Call Girls In Arjunganj ( Lucknow ) ✨ 8923113531 ✨ Cash Paymentanilsa9823
 
(8264348440) 🔝 Call Girls In Safdarjung Enclave 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Safdarjung Enclave 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Safdarjung Enclave 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Safdarjung Enclave 🔝 Delhi NCRsoniya singh
 
Cheap Rate ➥8448380779 ▻Call Girls In Sector 55 Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Sector 55 GurgaonCheap Rate ➥8448380779 ▻Call Girls In Sector 55 Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Sector 55 GurgaonDelhi Call girls
 
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our EscortsVIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escortssonatiwari757
 
(8264348440) 🔝 Call Girls In Green Park 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Green Park 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Green Park 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Green Park 🔝 Delhi NCRsoniya singh
 
Top Call Girls In Indira Nagar Lucknow ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Indira Nagar Lucknow ( Lucknow  ) 🔝 8923113531 🔝  Cash PaymentTop Call Girls In Indira Nagar Lucknow ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment
Top Call Girls In Indira Nagar Lucknow ( Lucknow ) 🔝 8923113531 🔝 Cash Paymentanilsa9823
 
Call Girls in majnu ka tilla Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in majnu ka tilla Delhi 💯 Call Us 🔝8264348440🔝Call Girls in majnu ka tilla Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in majnu ka tilla Delhi 💯 Call Us 🔝8264348440🔝puti54677
 
Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323Pooja Nehwal
 
(8264348440) 🔝 Call Girls In Siri Fort 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Siri Fort 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Siri Fort 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Siri Fort 🔝 Delhi NCRsoniya singh
 
(8264348440) 🔝 Call Girls In Khanpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Khanpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Khanpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Khanpur 🔝 Delhi NCRsoniya singh
 
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...anilsa9823
 
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...anilsa9823
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...aditipandeya
 
TDC Health Limited Nigeria Business Plan Opportunity Presentation 2024
TDC Health Limited Nigeria Business Plan Opportunity Presentation 2024TDC Health Limited Nigeria Business Plan Opportunity Presentation 2024
TDC Health Limited Nigeria Business Plan Opportunity Presentation 2024Fikrie Omar
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...aditipandeya
 
Mumbai Call Girls Colaba Pooja WhatsApp 7738631006 💞 Full Night Enjoy
Mumbai Call Girls Colaba Pooja WhatsApp  7738631006  💞 Full Night EnjoyMumbai Call Girls Colaba Pooja WhatsApp  7738631006  💞 Full Night Enjoy
Mumbai Call Girls Colaba Pooja WhatsApp 7738631006 💞 Full Night EnjoyPooja Nehwal
 
Cheap Rate ➥8448380779 ▻Call Girls In Sector 56 Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Sector 56 GurgaonCheap Rate ➥8448380779 ▻Call Girls In Sector 56 Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Sector 56 GurgaonDelhi Call girls
 
EMPLOYEES JOB SATISFACTION ( With special reference to selected Sundaram Ind...
EMPLOYEES JOB SATISFACTION  ( With special reference to selected Sundaram Ind...EMPLOYEES JOB SATISFACTION  ( With special reference to selected Sundaram Ind...
EMPLOYEES JOB SATISFACTION ( With special reference to selected Sundaram Ind...ksanjai333
 
Model Call Girl in Bawana Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Bawana Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Bawana Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Bawana Delhi reach out to us at 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

Top Call Girls In Arjunganj ( Lucknow ) ✨ 8923113531 ✨ Cash Payment
Top Call Girls In Arjunganj ( Lucknow  ) ✨ 8923113531 ✨  Cash PaymentTop Call Girls In Arjunganj ( Lucknow  ) ✨ 8923113531 ✨  Cash Payment
Top Call Girls In Arjunganj ( Lucknow ) ✨ 8923113531 ✨ Cash Payment
 
(8264348440) 🔝 Call Girls In Safdarjung Enclave 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Safdarjung Enclave 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Safdarjung Enclave 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Safdarjung Enclave 🔝 Delhi NCR
 
Cheap Rate ➥8448380779 ▻Call Girls In Sector 55 Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Sector 55 GurgaonCheap Rate ➥8448380779 ▻Call Girls In Sector 55 Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Sector 55 Gurgaon
 
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our EscortsVIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
 
(8264348440) 🔝 Call Girls In Green Park 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Green Park 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Green Park 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Green Park 🔝 Delhi NCR
 
Top Call Girls In Indira Nagar Lucknow ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Indira Nagar Lucknow ( Lucknow  ) 🔝 8923113531 🔝  Cash PaymentTop Call Girls In Indira Nagar Lucknow ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment
Top Call Girls In Indira Nagar Lucknow ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
 
Call Girls in majnu ka tilla Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in majnu ka tilla Delhi 💯 Call Us 🔝8264348440🔝Call Girls in majnu ka tilla Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in majnu ka tilla Delhi 💯 Call Us 🔝8264348440🔝
 
Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323
 
(8264348440) 🔝 Call Girls In Siri Fort 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Siri Fort 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Siri Fort 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Siri Fort 🔝 Delhi NCR
 
(8264348440) 🔝 Call Girls In Khanpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Khanpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Khanpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Khanpur 🔝 Delhi NCR
 
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
 
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
 
TDC Health Limited Nigeria Business Plan Opportunity Presentation 2024
TDC Health Limited Nigeria Business Plan Opportunity Presentation 2024TDC Health Limited Nigeria Business Plan Opportunity Presentation 2024
TDC Health Limited Nigeria Business Plan Opportunity Presentation 2024
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
 
Pakistani Jumeirah Call Girls # +971559085003 # Pakistani Call Girls In Jumei...
Pakistani Jumeirah Call Girls # +971559085003 # Pakistani Call Girls In Jumei...Pakistani Jumeirah Call Girls # +971559085003 # Pakistani Call Girls In Jumei...
Pakistani Jumeirah Call Girls # +971559085003 # Pakistani Call Girls In Jumei...
 
Mumbai Call Girls Colaba Pooja WhatsApp 7738631006 💞 Full Night Enjoy
Mumbai Call Girls Colaba Pooja WhatsApp  7738631006  💞 Full Night EnjoyMumbai Call Girls Colaba Pooja WhatsApp  7738631006  💞 Full Night Enjoy
Mumbai Call Girls Colaba Pooja WhatsApp 7738631006 💞 Full Night Enjoy
 
Cheap Rate ➥8448380779 ▻Call Girls In Sector 56 Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Sector 56 GurgaonCheap Rate ➥8448380779 ▻Call Girls In Sector 56 Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Sector 56 Gurgaon
 
EMPLOYEES JOB SATISFACTION ( With special reference to selected Sundaram Ind...
EMPLOYEES JOB SATISFACTION  ( With special reference to selected Sundaram Ind...EMPLOYEES JOB SATISFACTION  ( With special reference to selected Sundaram Ind...
EMPLOYEES JOB SATISFACTION ( With special reference to selected Sundaram Ind...
 
Model Call Girl in Bawana Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Bawana Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Bawana Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Bawana Delhi reach out to us at 🔝8264348440🔝
 

Executive Certificate in Cyber Security Student Handbook

  • 2. STUDENT HAND BOOK EXECUTIVE CERTIFICATE IN CYBER SECURITY ECCS 4.0
  • 3. NDA-Non-Disclosure Agreement Executive Certificate in Cyber Security PARTICIPANT NAME: ADDRESS: CITY: COUNTRY: Non-Disclosure Agreement General Notice EXECUTIVE CERTIFICATE IN CYBER SECURITY COURSE MISSION IS TO EDUCATE, INTRODUCE AND DEMONSTRATE HACKING TOOLS FOR PENETRATION TESTING PURPOSES ONLY. YOU WILL NOT USE THE NEWLY ACQUIRED SKILLS FOR ILLEGAL OR MALICIOUS ATTACKS AND YOU WILL NOT USE SUCH TOOLS IN AN ATTEMPT TO COMPROMISE ANY COMPUTER SYSTEM, AND TO INDEMNIFY VOICE OF GREEN HATS AND ITS PARTNERS WITH RESPECT TO THE USE OR MISUSE OF THESE TOOLS, REGARDLESS OF INTENT. VOICE OF GREEN HATS PROVIDES THE HACKING SKILLS AND TOOLS USED IN THE ECCS CLASSROOM FOR EDUCATIONAL USE. THE HACKING TOOLS ARE NOT AUTHORED BY ECCS, AND IN MANY CASES ARE SUBMITTED BY THE SECURITY COMMUNITY. WHILE EVERY REASONABLE EFFORT IS MADE TO ENSURE THAT THESE PROGRAMS DO WHAT IS CLAIMED, VOICE OF GREEN HATS WILL NOT BE HELD ACCOUNTABLE FOR ANY DAMAGE OR DISTRESS CAUSED BY THE PROPER OR IMPROPER USAGE OF THESE MATERIALS, AND MAKES NO GUARANTEE IN REGARDS TO THEIR OPERATION OR SUITABILITY FOR ANY SPECIFIC PURPOSE. THE HACKING TOOLS USED IN THE ECCS TRAINING PROGRAM ARE MEANT FOR RESEARCH AND EDUCATIONAL PURPOSES ONLY. THE PRIMARY INTENT OF THESE TOOLS IS TO PROVIDE THE USER WITH HARD TO FIND CONTENT FOR RESEARCH OR SELF EDUCATION RELEVANT TO NETWORK SECURITY AND VARIOUS PROTECTION METHODS AND THEIR INTRINSIC FLAWS BY DEMONSTRATING EXPLOIT METHODS AND TECHNIQUES USED TO CIRCUMVENT THEM. WE HOPE THAT YOU ARE BETTER AWARE OF THE DANGER THAT LURK OUT IN SOCIETY TODAY AND LEARN HOW TO PROTECT YOURSELF WITH THE KNOWLEDGE YOU ARE ABOUT TO LEARN. IN CONTINUING YOU MUST ACCEPT THAT YOU ARE GOING TO USE THIS INFORMATION ONLY FOR EDUCATIONAL AND RESEARCH PURPOSES ONLY. WHILE POSSESSION OF INFORMATION OR PROGRAMS INCLUDED ON THIS TRAINING VIOLATES NO LAWS, ACTUALLY USING OR IMPLEMENTING SOME OF THE PROGRAMS OR CONTENT MAY VIOLATE FEDERAL LAW. FOR THIS REASON THE USER IS INSTRUCTED NOT TO USE ANY OF THE PROGRAMS OR CONTENT ON THIS TRAINING WHICH MAY VIOLATE VOICE OF GREEN HATS ANY LAWS OR INFRINGE ON THE COPYRIGHT PROTECTION OF OTHERS. WE PROVIDE THEM FOR EDUCATIONAL PURPOSES ONLY. Terms of Use 1. ACCEPTANCE OF TERMS 1.1 READ THESE VOICE OF GREEN HATS TERMS OF USE ("TERMS") CAREFULLY BEFORE YOU ("YOU") ACCEPT THESE TERMS BY: (A) OPENING THE ECCS COURSEWARE RED BOX SEAL, AND (B) USING ANY FILES ("FILES") LOCATED IN THE CD-ROM. IF YOU DO NOT AGREE TO ALL OF THESE TERMS YOU WILL NOT BE ALLOWED INTO THE ECCS TRAINING PROGRAM. 1.2 THE TERMS ARE ENTERED INTO BY AND BETWEEN VOICE OF GREEN HATS AND YOU. VOICE OF GREEN HATS PROVIDES THE TOOLS / INFORMATION / ELECTRONICAL CODE TO YOU STRICTLY SUBJECT TO THE TERMS. 1.3 THE PROGRAM CONTAINS INFORMATION, SOFTWARE OF SECURITY RELATED MATERIAL IF YOU ARE UNDER THE AGE OF 21, IF SUCH MATERIAL OFFENDS YOU OR IF IT'S ILLEGAL TO POSSESS/ USE SUCH MATERIAL IN YOUR COMMUNITY YOU ARE NOT ALLOWED TO CONTINUE. UNDER PENALTY OF PERJURY I SWEAR THAT: I AM AT LEAST 21 YEARS OF AGE. THE FILES AND MATERIALS I AM VIEWING ARE FOR MY OWN PERSONAL USE AND I WILL NOT SHARE THE MATERIAL. I DESIRE TO RECEIVE/VIEW SECURITY RELATED MATERIAL, THE VIEWING, READING AND DOWNLOADING SECURITY RELATED MATERIAL DOES NOT VIOLATE THE STANDARDS OF MY COMMUNITY, TOWN, CITY, STATE OR COUNTRY. I AM SOLELY RESPONSIBLE FOR ANY FALSE DISCLOSURES OR LEGAL RAMIFICATIONS OF VIEWING, READING, USING OR ANY MATERIAL FROM THE ECCS PROGRAM. I AM ALLOWED TO ACCESS/RETRIEVE/VIEW/USE THIS INFORMATION/SOFTWARE/PROGRAM/CODE AND I FULLY COMPLY WITH LOCAL LAW 2. PERMITTED USE 2.1 THE HACKING TOOLS MAY NOT BE USED BY YOU OR ANY OTHER PARTY FOR ANY PURPOSE THAT VIOLATES ANY LOCAL, STATE, FEDERAL OR FOREIGN LAW. YOU UNDERSTAND THAT BREAKING INTO ANY NETWORK OR COMPUTER SYSTEM NOT OWNED BY YOU MAY BE ILLEGAL. 3. NO EXPRESS OR IMPLIED WARRANTY 3.1 VOICE OF GREEN HATS DOES NOT AND CANNOT WARRANT: (I) THAT THE PERFORMANCE OR RESULTS THAT MAY BE OBTAINED BY USING THE SOFTWARE OR (II) THAT THE SOFTWARE IS APPROPRIATE FOR YOUR PURPOSES OR THAT IT IS ERROR FREE. ACCORDINGLY, THE SOFTWARE AND ITS DOCUMENTATION ARE PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OR MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. THE ENTIRE RISK ARISING OUT OF USE OR PERFORMANCE OF THE SOFTWARE / TOOL / ELECTRONICAL CODE REMAINS WITH YOU. 4. LIMITATION OF LIABILITY VOICE OF GREEN HATS 4.1 EXCLUSION OF INCIDENTAL, CONSEQUENTIAL DAMAGES RESULTING FROM POSSESSION, USE, OR MALFUNCTION OF THIS SOFTWARE AND OTHER DAMAGES TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL ECCOUNCIL BE LIABLE FOR ANY SPECIAL, INCIDENTAL, INDIRECT, OR
  • 4. CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING, BUT NOT LIMITED TO, DAMAGES FOR: LOSS OF PROFITS, LOSS OF CONFIDENTIAL OR OTHER INFORMATION, BUSINESS INTERRUPTION, PERSONAL INJURY, LOSS OF PRIVACY, FAILURE TO MEET ANY DUTY (INCLUDING OF GOOD FAITH OR OF REASONABLE CARE), NEGLIGENCE, AND ANY OTHER PECUNIARY OR OTHER LOSS WHATSOEVER) ARISING OUT OF OR IN ANY WAY RELATED TO THE USE OF OR INABILITY TO USE THE SOFTWARE OR THE DOCUMENTATION, EVEN IF VOICE OF GREEN HATS OR ANY SUPPLIER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. VOICE OF GREEN HATS MAKES NO WARRANTIES OR REPRESENTATIONS, EXPRESS OR IMPLIED, ABOUT THE ACCURACY, TIMELINESS OR COMPLETENESS OF THE ECCS PROGRAM, INCLUDING WITHOUT LIMITATIONS THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. VOICE OFGREEN HATS MAKES NO WARRANTY OF NON INFRINGEMENT. THIS ECCS TRAINING PROGRAM MAY CONTAIN TECHNICAL INACCURACIESOR TYPOGRAPHICAL ERRORS, NEITHER VOICE OF GREEN HATS NOR ANY OF IT'S AFFILIATES SHALL BE LIABLE FOR ANY DIRECT, INCIDENTAL, CONSEQUENTIAL, INDIRECT OR PUNITIVE DAMAGES ARISING OUT OF ACCESS TO,"; INABILITY TO ACCESS, OR ANY USE OF THE CONTENT OF ANY SITE(S) LINKED TO THIS SITE, INCLUDING WITHOUT LIMITATION ANY DAMAGES TO, OR VIRUSES OR TROJAN HORSES THAT MAY INFECT OR INVADE, YOUR PC EQUIPMENT OR OTHER PROPERTY, EVEN IF VOICE OF GREEN HATS IS EXPRESSLY ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 4.2 YOU AGREE TO HOLD VOICE OF GREEN HATS HARMLESS FROM, AND YOU COVENANT NOT TO SUE VOICE OF GREEN HATS FOR, ANY CLAIMS BASED OR YOUR USE OF, OR YOUR INABILITY TO USE, THE TOOLS. YOU ALSO AGREE THAT YOU WILL PROTECT, INDEMNIFY, SAVE AND HOLD VOICE OF GREEN HATS HARMLESS FROM ANY AND ALL STIPULATIONS, ARREARS, LOSSES, EXPENSES, AND ASSERTIONS, AS WELL AS RATIONAL ATTORNEY'S FEES DECLARED AGAINST ECCOUNCIL, ITS REPRESENTATIVES, CUSTOMERS, AND ADMINISTRATION. NOTWITHSTANDING ANY DAMAGES THAT YOU MIGHT INCUR FOR ANY REASON WHATSOEVER (INCLUDING, WITHOUT LIMITATION, ALL DAMAGES REFERENCED ABOVE AND ALL DIRECT OR GENERAL DAMAGES). THE FOREGOING LIMITATIONS, EXCLUSIONS AND DISCLAIMERS SHALL APPLY TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, EVEN IF ANY REMEDY FAILS ITS ESSENTIAL PURPOSE. 5. INDEMNIFICATION 5.1 YOU AGREE TO INDEMNIFY AND HOLD VOICE OF GREEN HATS AND ITS SUBSIDIARIES, AFFILIATES, OFFICERS, AGENTS, TRAINERS, ATCS, DISTRIBUTORS AND EMPLOYEES HARMLESS FROM ANY AND ALL STIPULATIONS, ARREARS, LOSSES, EXPENSES, ASSERTIONS ANY CLAIM OR DEMAND, INCLUDING ATTORNEY'S FEES, MADE BY ANY THIRD PARTY DUE TO OR ARISING OUT OF YOUR USE OF THE TOOLS /INFORMATION / ELECTRONICAL CODE, BREACH OF THE TERMS, OR VIOLATION OF THE RIGHTS OF ANOTHER. 6. MISCELLANEOUS 6.1 THE TERMS CONSTITUTE THE ENTIRE AGREEMENT BETWEEN YOU AND VOICE OF GREEN HATS AND GOVERN YOUR USE OF THE TOOLS / INFORMATION / ELECTRONICAL CODE, SUPERSEDING ANY PRIOR AGREEMENTS BETWEEN YOU AND VOICE OF GREEN HATS (INCLUDING, BUT NOT LIMITED TO, PRIOR VERSIONS OF THE TERMS) 6.2 IF YOU USE THE SKILLS AND KNOWLEDGE LEARNT IN THE ECCS TRAINING PROGRAM FROM LOCATIONS OUTSIDE THE UNITED STATES OF AMERICA, YOU ARE RESPONSIBLE FOR COMPLIANCE WITH APPLICABLE LOCAL LAWS, INCLUDING, BUT NOT LIMITED TO, THE EXPORT AND IMPORT REGULATIONS OF OTHER COUNTRIES. 6.3 THESE TERMS AND THE ECCS TRAINING PROGRAM COULD INCLUDE INACCURACIES OR TYPOGRAPHICAL ERRORS. VOICE OF GREEN HATS MAY MAKE IMPROVEMENTS AND/OR CHANGES TO THE TERMS AT ANY TIME WITHOUT NOTICE. 6.4 THE FAILURE OF VOICE OF GREEN HATS TO ENFORCE OR EXERCISE ANY RIGHT OR PROVISION OF THE TERMS DOES NOT CONSTITUTE A WAIVER OF SUCH RIGHT OR PROVISION. 6.5 IN THE EVENT ANY PROVISION OF THIS"; AGREEMENT IS HELD TO BE UNENFORCEABLE IN ANY RESPECT, SUCH UNENFORCEABILITY SHALL NOT AFFECT ANY OTHER PROVISION OF THIS AGREEMENT, PROVIDED THAT THE EXPECTED ECONOMIC BENEFITS OF THIS AGREEMENT ARE NOT DENIED TO EITHER PARTY. Contents of this course has been created, updated and upgrade since last 10 year by Ziaullah Mirza THIS LEGAL DISCLAIMER CONSTITUTES A LEGAL AGREEMENT BETWEEN VOICE OF GREEN HATS AND YOU AND/OR ANY BUSINESS IN WHICH YOU HAVE ANY LEGAL OR EQUITABLE INTEREST. IF ANY PORTION OF THIS AGREEMENT IS DEEMED UNENFORCEABLE BY A COURT OF COMPETENT JURISDICTION IT SHALL NOT AFFECT THE ENFORCEABILITY OF THE OTHER PORTIONS OF THE AGREEMENT. I AGREE TO THE ABOVE TERMS SIGNATURE DATE: THUMB IMPRESSION HERE These documents and credentials may hand over to authorized & legal government organizations or authority on official request
  • 6. EXECUTIVE CERTIFICATE IN CYBER SECURITY INTRODUCTION: The development of technologies always has impacts, in positive or negative ways, on businesses, cultures, economies and even on countries. Information Technology is one of the most effective tools with rapid development characteristics for itself as well as businesses around the globe. Cyber Security is one of the best branch or modern tools of Information Technology with respect to security concerns and risk management factors. Information technology is highly integrated into our everyday lives. As a society, we have gone digital. We play, learn, socialize, communicate, and do business online. While cyberspace brings significant benefits, ourever- increasing reliance on it, causing or creating new and significant vulnerabilities. Voice of Green Hat, brought an innovative research-based certificate in cyber security along with a number of other cutting-edge technological certifications. This research-based certificate is called ECCS. Executive certificate in Cyber Security (ECCS) provides a number of researches in special innovative skills, highly brainstorming strategy to tackle the problems and multidimensional techniques to countermeasure the cyber-attacks and hacking in the cyber space. Not only this, ECCS also covers intermediate skills for digital forensic investigation, risk management and competitive intelligence to understand the attacker’s approaches as well as having deep understanding with today’s Cyber War scenario. This certificate contains six modules of Cyber security & Law; Ethical Hacking & Countermeasure; Digital Forensic Investigation; Competitive Intelligence; Research & Development and Important Demanded Skills explained below (As per authored by Ziaullah Mirza): CURRICULUM: Module ECCS 01: Cyber Security & Laws A. Introduction to Cyber World, Cyber Security, Internet Security, Computer Security B. Cyber Laws in Malaysia, Pakistan, USA, Japan, UK, Australia, EU, Singapore, Canada & New Zealand C. Cyber Crimes, Law Sections and Penalties Module ECCS 02: Ethical Hacking & Countermeasures A. Introduction to Ethical Hacking, Virtualizaion and Cloud Computing B. Foot printing, Scanning, Enumeration C. System Hacking, Trojans and Backdoors, Sniffers, Denial of Service, Social Engineering, Session Hijacking D. Hacking Web Servers, Web Application Vulnerabilities, Web-based Password Cracking Techniques D. SQL Injection, Hacking Wireless Networks, Virus and Worms E. Physical Security F. Linux Hacking, Evading IDS, Firewalls, and Honey pots, Buffer Overflows G. Cryptography, Penetration Testing Module ECCS 03: Computer Forensic Investigation A. Introduction to Computer Forensics Investigation B. Data Recovery Software Tools C. Password Recovery Tools Kits Software Module ECCS 04: Research & Development A. Knowledge Management Knowledge Work Force B. Artificial Intelligence & Implementation C. Industrial Revolution & Hands on Applications D. Implementation of AR, VR, MR and Holo-Lenses E. Flying & Traditional Robotics F. Mind Computing & Research G. Financial Technologies H. Big Data & Implementation Module ECCS 05: Competitive Intelligence A. Introduction to competitive Intelligence (CI) B. Ethics of CI C. Competitive Intelligence and Espionage Impacts Module ECCS 06: Important Market Demanded Skills A. Skills of Web Programming/ Web Apps/ Mobile Apps B. Skills of Networking for Windows/ Cisco/ ZTL etc.
  • 7. C. Skills of Cloud Computing and Application, Digital Transformation etc. D. Common Troubleshooting with Windows, Cisco and Linux etc. SPECIALIZATION: • Digital Transformation • Web & Apps Penetration Testing • Competitive Intelligence • Digital Forensic Intelligence • Digital Economy Vs 5th Gen War Cyber warfare • Disease-X Alert, Monitoring & Countermeasure • Industrial Revolution & Hands on Applications for IR4.0 • Implementation of AR, VR, MR and Holo-Lenses • Flying & Traditional Robotics • Mind Computing & Research • Financial Technologies LEARNING OUTCOMES: A. Student will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. B. Student then learns how intruders escalate privileges and what steps can be taken to secure a system. C. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. D. Student will learn how to investigate the threats, attack and compromised Data as how to provide risk management at the initial stages. E. Student will have strong understanding of Competitive Intelligence and its utilization to eliminate competitive advantage rival organization or product at primary level. F. Student will have practical knowledge on OS (Windows XP, VISTA, 7, 8, 10, Azure, Intune; Windows Server 2003, 2008, 2008R2, 2012, 2012R2, RedHat, Kali, Backtrack, Android etc.) Cloud Computing and Social Media along with a number of tools for countermeasure, defense, forensic and risk management. G. Student will be able to create, analyses and publish the penetration report along with effect correct action and measure to resolve the problems H. Digital Transformation, Web & Apps Penetration Testing, Digital Forensic Intelligence, Digital Economy Vs 5th Gen War Cyber warfare, Disease-X Alert & Countermeasure, Industrial Revolution & Hands on Applications, Implementation of AR, VR, MR and Holo-Lenses, Flying & Traditional Robotics, Mind Computing & Research, and all type of currencies including crypto etc., TARGET AUDIENCE: A. Security Officers, Security Professionals, Site Administrators, Security Network Administrator B. Cyber Laws Auditors, Competitive Intelligence, Strategic Analysis, Market Research and Analysis C. Financial Analysis, Business Development, Marketing, Document or Information Management D. Strategic Planning E. Corporate library F. Human Resources G. Recruiting Firms OPERATIONAL INFORMATION: A. Duration: 30 Hours B. Vendor: Voice of Green Hats C. Venue: Pakistan, Malaysia, UAE, Canada, Australia, New Zealand, The Netherlands, Norway CONTACT INFORMATION: VOICE OF GREEN HATS @ GREEN HATS INTERNATIONAL INNOVATION CENTER CONTACT: +92336 8399 991 WHATSAPP: +92302 0533 479 INTERNSHIP/ INDUSTRIAL TRAINING: Student will be offered industrial training/ Internship with paid or unpaid in the local or International with minimum 3-month period. We have 100+ locations available for internship/ practice globally
  • 8. Training Premises in Lahore, Pakistan: