Summer Training Program 2016. CCSE V3.0 Certified Cyber Security Expert Version 3.0



Similar documents
Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

Certified Cyber Security Expert V Web Application Development

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

CRYPTUS DIPLOMA IN IT SECURITY

CYBERTRON NETWORK SOLUTIONS

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Course Content: Session 1. Ethics & Hacking

CEH Version8 Course Outline

Course Title: Course Description: Course Key Objective: Fee & Duration:

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Learn Ethical Hacking, Become a Pentester

RMAR Technologies Pvt. Ltd.

Detailed Description about course module wise:

Vulnerability Assessment and Penetration Testing

Penetration Testing with Kali Linux

Certified Ethical Hacker Exam Version Comparison. Version Comparison


EC Council Certified Ethical Hacker V8

Certified Cyber Security Analyst VS-1160

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION

Ethical Hacking & Cyber Security Workshop

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Certified Ethical Hacker (CEH)

[CEH]: Ethical Hacking and Countermeasures

Information Security. Training

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

SONDRA SCHNEIDER JOHN NUNES

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

(WAPT) Web Application Penetration Testing

Ethical Hacking Course Layout

FORBIDDEN - Ethical Hacking Workshop Duration

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

ETHICAL HACKING CYBER SECURITY

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

Application Security Testing

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Loophole+ with Ethical Hacking and Penetration Testing

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

FSP-201: Ethical Hacking & IT Security

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

McAfee Certified Assessment Specialist Network

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited

Audience. Pre-Requisites

Reducing Application Vulnerabilities by Security Engineering

Build Your Own Security Lab

Workshop Designed & Powered by TCIL IT, Chandigarh

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

Codes of Connection for Devices Connected to Newcastle University ICT Network

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

Information Security Services

Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0

Adobe Systems Incorporated

Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING. Anestis Bechtsoudis. abechtsoudis (at) ieee.

Passing PCI Compliance How to Address the Application Security Mandates

Web App Security Audit Services

INFORMATION SECURITY TRAINING

Web application testing

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Networking: EC Council Network Security Administrator NSA

INFORMATION SECURITY TRAINING CATALOG (2015)

EC-Council Certified Security Analyst (ECSA)

Android & ios Application Vulnerability Assessment & Penetration Testing Training. 2-Day hands on workshop on VAPT of Android & ios Applications

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

EC-Council Ethical Hacking and Countermeasures

Where every interaction matters.

Guidelines for Web applications protection with dedicated Web Application Firewall

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

LINUX / INFORMATION SECURITY

Web Application Penetration Testing

Metasploit The Elixir of Network Security

ASL IT SECURITY XTREME XPLOIT DEVELOPMENT

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

CIS 4204 Ethical Hacking Fall, 2014

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

EC-Council. Certified Ethical Hacker. Program Brochure

Deciphering The Prominent Security Tools Ofkali Linux

Section 12 MUST BE COMPLETED BY: 4/22

ASL IT Security Advanced Web Exploitation Kung Fu V2.0

Network Security Audit. Vulnerability Assessment (VA)

A Systems Engineering Approach to Developing Cyber Security Professionals

Penetration Testing. Presented by: Elham Hojati Advisor: Dr. Akbar Namin July 2014

Hackers are here. Where are you?

June 2014 WMLUG Meeting Kali Linux

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

CompTIA Security+ (Exam SY0-410)

Transcription:

Summer Training Program 2016 CCSE V3.0 Certified Cyber Security Expert Version 3.0

TechD Facts Incorporated in November 2009 Trained more than 50,000 students, conducted 400 Workshops Including all IITs, NITs & Many colleges across India. Trained Professional from many reputed companies like Yahoo!,Google,ISACA,k7 Antivirus, Elitecore, Indian Oil, Temenos, ZOHO, HCL,TCS Infosys. Trained Investigation agencies of Gujarat, Maharashtra, Rajasthan, Tamilnadu, West Bengal. Successfully completed more than 15000 training hours into IT Security.

TechD Facts Trained & Certified 2100 Students & Professionals for CCSE ( Certified Cyber Security Expert) Course. Helped Top Investigating Agencies to Solve Ahmedabad & Mumbai blasts Cyber trails. Associated for an out reach program with the Major Technical festivals of IIT Bombay, Kanpur, NIT Bhopal, NIT Calicut, Jadavpur University Kolkata, and BITS Pilani Goa for giving authorized certification. Major VAPT Clients includes Sulekha.com, Cyberoam. Supported by Ministry of Home Affairs, Malaysia & CMO, Gujarat. Developed our own Crypters, Trojans, RATS for demonstrations.

TechD Facts Sunny Vaghela (Director & CTO) is recipient of Rajiv Gandhi Young Achiever s Award. TechDefence has been awarded as Best Ethical Hacking & Information Security Company by NBC at Trident Hotel, Mumbai.

TechD Facts TechDefence has also been awarded as Best Ethical Hacking & Information Security Company of Western India by BIG Research & IBN 7. Nominated for World Education Awards into category of Private Sector Initiative for use of innovative Technology for skilled education

TechD Facts TechDefence Certified Cyber Security Expert is career oriented hands on training program on Advanced Ethical Hacking, Cyber Crime Investigation, Cyber Forensics & Information Security.

Module 1 : Cyber Ethics - Hackers & hacking methodologies Why Security? Why Attacks? Hacking Introduction Communities of Hackers Types of Hackers Malicious Hacker Strategies Ethical Hacker Strategies Steps for conducting Ethical Hacking. Importance of Vulnerability Research. Vulnerability Research References. Conclusion

Module 2: Basic Network Terminologies IP address Versions of IP Address Types of IP Address Classes of IP addresses Categories of IP Address Network Address Translation TCP protocol UDP Protocol Difference between TCP & UDP Proxies and VPN s

Module 3: Information Gathering WHOIS Information Gathering DNS Information Gathering DNS Report MX-information NS LookUp Website Mirroring Website Information Gathering Email Information Gathering Doxing (Peoples & Digitals Boxes) Tools that aid in Information Gathering Savitabhabhi.com Case Study Maltego & Kartoo Search Engines

Module 4: Scanning & Enumeration Why Scanning? Types of Scanning. Objective of Scanning. Port Scanning. Port Scanning Techniques. Port Scanning using Nmap Advance Nmap Scanning(Nmap Scripting Engine) Banner Grabbing techniques Network Scanning Techniques. Network Auditors. Enumeration

Module 5: Virus, Worms, Malware, Spyware, Adware & Trojans What is Virus? What are Worms? Difference between Virus & Worms What are Trojans? How Trojans Work? How to hack a computer system using Trojan? How to create a Trojan? Introduction to some RAT Tools Issues in sending and executing a Trojan Overcoming above issues.

Module 6: Phishing & its Prevention History of Phishing What is Phishing? Types of Phishing Why it is called as a Social Engineering Technique? Steps to perform Phishing Tricks to perform Phishing Precautions against Phishing Attempts Detecting Phishing Crimes Investigating Phishing Crimes

Module 7: System Hacking & Security Password Cracking Privilege Escalation Tools to aid in System Hacking Understanding Rootkits Clearing Traces Countermeasures

Module 8: Windows Honeypot & Web Based Honeypot Introduction to Honeypots Setting up Account Setting up a Honeypot Managing Honeypot Prevention against Spammers

Module 9: Cryptography Public-key Cryptography Working of Encryption Digital Signature RSA & Example of RSA Algorithm RC4, RC5, RC6, Blowfish Algorithms and Security Email Encryption Tools that aid in Cryptography

Module 10: Introduction to Web Application & Database What is a Website? What is a Web Application? Website Vs. Web Application Categories of Website Architecture One-Tier Architecture Two-Tier Architecture Three-Tier Architecture Multi/N-Tier Architecture Technologies What is a Database? Well Known Databases

Module 11: Introduction to OWASP Top 10 What is a OWASP? Understanding OWASP Introduction to OWASP Top 10 Vulnerabilities

Module 12: Authentication Bypass (Basic SQL Injection) What is Authentication? Database Basics What is SQL? Basics of SQL Query Introduction to Logic Gates How to Bypass Authentication? Video Demonstration Basic Combinations to Bypass Bypass Cheat Sheet Remediation Approach

Module 13: Google Hacking Understanding how Google works Google basic operators Google advanced operators Automated Google tools How to use Google to find the desired website How Google can aid in searching vulnerable website

Module 14: Advance SQL Injection(MySQL) Definition Vulnerability Testing for Vulnerability Injection Type Integer Based Injection String Based Injection Exploiting Vulnerability Enumerating Database Name and Version Enumerating Table Names Enumerating Column Names Enumerating Data from Column Names Remediation Approach / Preventing MySQL Injection

Module 15: SQL Injection Firewall Evasion What is WAF? Working of WAF How to know if there is a Web Application Firewall? Techniques to Bypass WAF Video Demonstration SQL Injection Firewall Evasion Scope of this technique

Module 16: Advance SQL Injection(MSSQL Injection) What is MSSQL? What would be Target Applications? Finding Vulnerable Links Testing Vulnerability Exploiting Vulnerability Enumerating Table Names Enumerating Column Names Enumerating Data

Module 17: SQL Injection using Automated Tools Introduction to Automated Tools Why to use Automated Tools? Introduction to Best Tools Using Tools - Hands on Demonstration

Module 18: Hacking Web Servers Introduction to Web Server Web Application & Web Server Way to Hack Web Server Vulnerability on Web Application What is Shell? List of Shells Functionalities of Shell How to Upload Shell? Video Demonstration

Module 19: XSS Cross Site Scripting Introduction to HTML Introduction to JavaScripts Introduction to Cookies What is XSS? Impact of XSS Severity of XSS How to test for XSS Bypassing Filters How to Exploit XSS Cookie Grabbing using XSS

Module 20: CSRF, Click Jacking Introduction to CSRF Building Proof of Concept Code Protections against CSRF Click Jacking & Protections Module 21: Information Disclosure Vulnerabilities Introduction Setting up the correct chmod Protecting the sensitive server files Preventing the data loss

Module 22: Introduction to Burp Suite Burp Interceptor Burp Target Burp Spider Burp Scanner Burp Intruder Burp Repeater Burp Decoder Burp Sequencer Burp Extender Burp App Store- Introduction Live Hacking Through Burp

Module 23: Vulnerability Assessment & Penetration Testing Introduction to VAPT Categories of security assessments Vulnerability Assessment Limitations of Vulnerability Assessment Penetration Testing Types of Penetration Testing Do-It-Yourself Testing Outsourcing Penetration Testing Services Terms of Engagement Project Scope & Pentest Service Level Agreements Testing points & Locations Automated & Manual Testing

Module 24: Assembly Language Basics Difference Assembly Language Vs High-level Language Assembly Language Compilers Understanding Instruction operands, Directive & preprocessor Interrupts, Interrupt handler, External interrupts and Internal interrupts Handlers Assembling the & Compiling the C code Linking the object files & Understanding an assembly listing file Big and Little Endian Representation, Skeleton File Working with Integers, Signed integers & Signed Magnitude Understanding Two s Compliment, If statements, Do while loops Indirect addressing, Subprogram Understanding The Stack, SS segment& ESP The Stack UsageThe CALL and RET Instructions

Module 25 : Reverse Engineering Introduction to RE Briefing OllyDbg Patching SMAC, ClassRoomSpyPro & PowerISO Cracking SMAC, ClassRoomSpyPro & PowerISO Keygening SMAC, ClassRoomSpyPro & PowerISO Countermeasures

Module 26 & Module 27: Buffer Overflows 1-2 Introduction How BOF works Stack based buffer overflow Understanding the Shellcode Mapping the memory Countermeasures

Module 28: Exploit Writing Exploits Overview Prerequisites for Writing Exploits and Shellcodes Purpose of Exploit Writing Types of Exploits Tools that aid in writing Shellcode Issues Involved With Shellcode Writing Addressing problem Null byte problem System call implementation

Module 29 : Metasploit Framework using BackTrack or Kali Linux Introduction to this framework Getting hands on commands Hacking windows with Metasploit Hacking Linux with Metasploit WebServer Hacking through Metasploit Android Hacking using Metasploit MSFVenom Payload creation MSFVenom - Creating Malicious PDF Files through MSF Modules

Module 30: Wireless Hacking & Security Wireless Protocols Wireless Routers-Working Attacks on Wireless Routers Cracking Wireless routers password(wep) Wi-Fi Phisher Securing routers from Hackers Countermeasures

Module 31: Mobile, VoIP Hacking & Security SMS & SMSC Introduction SMS forging & countermeasures Sending & Tracking fake SMSes Call Forging & countermeasures Android Hacking using Android Malware Android Hacking using Android Trojan VoIP Introduction Installing VoIP Server & Forging Call using VoIP Android Phone Rooting Understanding ADB Pattern Lock Bypass using ADB Shell

Module 32: Mobile Application Security (Android) What is Android? History of Android Android Application Fundamentals Understanding AndroidManifest.xml file Android Application Vulnerabilities Static Analysis of Android Binaries Live Demonstrations

Module 33: Introduction to Cyber Crime Investigation & IT ACT 2000 Types of Cyber Crimes Reporting Cyber Crimes & Incidence response Introduction to IT Act 2000 & its sections Flaws in IT ACT,2000 Investigation Methodologies & Case Studies Different Logging Systems. Investigating Emails ( Email Tracing) Ahmedabad Bomb Blasts Terror Mail case study Investigating Phishing Cases Investigating Data Theft Cases Investigating Facebook Profile Impersonation Cases Investigating SMS & Call Spoofing Cases

Module 34: Cyber Forensics Cyber Forensics Understanding Cyber Forensics Hands on Cyber Forensics on Hard Disks Whatsapp Forensics Module 35 : Final Exam To know about portal visit www.ccseonline.in

Other Details Total Hours: 80 hours Training Duration : 30 45 Days. Training Centers: Ahmedabad, Delhi, Hyderabad. For More information Call on 9723373375, 7567867774