Course Title: Course Description: This is the Ethical hacking & Information Security Diploma program. This 6 months Diploma Program provides you Penetration Testing in the various field of cyber world. In the Training we teach to students how Hacker breaks the computer security, Mobile security, Network Security, web application security, cyber forensics etc., for making them secure from hackers. After the Diploma Course they can create own security rules between their data and hackers. This Training provides hacking skills as well defense techniques in various area of cyber security, because in the cyber world organizations need security, and we must learn hacking techniques before make the secure the cyber world. And we teach students more practical s sessions than theory part. So this diploma program is the best investment for the cyber security training program. Course Key Objective: Understanding Digital Foot-printing. Analyse Computer Malwares and How to secure computer from malwares and remove them manually. Hacking Email Accounts & Social networking accounts and How to secure them. Web application penetration testing. Bug Bounty programs. Understanding Latest Exploitations Understand Wireless mechanism and Its Security. Mobile hacking & Forensics. Software Cracking Understanding Networking Mechanism 1 TB software Digital Tool kit 3 years cryptus membership Fee & Duration: COURSE DURATION : 6 MONTHS Certification : CRYPTUS CERTIFIED CYBER SECURITY EXPERT VALID TILL : 3 years COURSE FEE : 50000/- INR Copyright Cryptus 2016 1
1 st Month Course Modules Introduction to Ethical Hacking Networking Basic and Web Application Digital Foot Printing Enumeration Social Engineering Email Hacking & Security Sending Fake Emails Google Hacking Database Nmap Scanning Nessus Scanning Network Scanning Tools Man in the Middle Attack using ARP Reply Attack Ettercap and Cain & Abel WEP Hacking De-authentification Attack Copyright Cryptus 2016 2
2 st Month Course Modules SSL Stripping Shell Uploading Website Defacement Virus & Worms RAT Trojan Key loggers Windows Password Cracking Botnet Metasploit Framework Firewall, IDS & Honeypots Metasploit Armitage Penetration Testing Methodologies Copyright Cryptus 2016 3
3 st Month Course Modules Web Application Working Mechanism Admin Login Authentication Bypass Union SQL Injection MOD Security Bypass DIOS Attack Error Based SQL Injection Time Based SQL Injection Post Based SQL Injection XSS Attack Session hijacking Website Scanners How to find Vulnerable Sites CSRF Attack Web Application Security Mechanism Copyright Cryptus 2016 4
4 st Month Course Modules Owasp Top 10 Mobile Application Hijacking Software Cracking Cryptography Buffer Overflow Rules Of Penetration Testing Penetration Testing Steps Firewall Penetration Testing Snort IDS Analysis Penetration Testing Report Generate Bug Bounty Program Copyright Cryptus 2016 5
5 st Month Course Modules Computer Forensic Investigation Digital Footprinting Computer Vulnerability Analysis Digital Signature Forensic Investigator Understanding Computer Hard Disks Operating System Forensic FTK Investigator Stangnography Mobile Forensic Process Investigating By Encase Website Attack Invstigator Copyright Cryptus 2016 6
6 st Month Course Modules Building a Simple Network Managing Network Device Security Troubleshooting Basic Connectivity Implementing EIGRP-Based Solutions Building a Medium-Sized Network Implementing a Scalable OSPF-Based Solution SNMP and Syslog Basic Configuration Project on IT Security Our Clients: Copyright Cryptus 2016 7
CRYPTUS CYBER SECURITY PVT. LTD. Cryptus Cyber Security Pvt Ltd. U-135D T/F, Lakshmi Nagar, Shakarpur Vikas Marg, Delhi 100092 www.cryptus.in info@cryptus.com +91 11 3222066. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or DE compilation is strictly prohibited without the prior written consent of Cryptus. No part of this document may be reproduced in any form or by any means without the prior written authorization of Cryptus. While every precaution has been taken in the preparation of this document, Cryptus assumes no responsibility for errors or omissions. Copyright of Cryptus 2016 Copyright Cryptus 2016 8