COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM



Similar documents
CRYPTUS DIPLOMA IN IT SECURITY

Course Title: Course Description: Course Key Objective: Fee & Duration:

CYBERTRON NETWORK SOLUTIONS

Detailed Description about course module wise:

Ethical Hacking Course Layout

Certified Cyber Security Expert V Web Application Development

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

CEH Version8 Course Outline

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Certified Ethical Hacker (CEH)

RMAR Technologies Pvt. Ltd.

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

FSP-201: Ethical Hacking & IT Security

Certified Ethical Hacker Exam Version Comparison. Version Comparison

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

Course Content: Session 1. Ethics & Hacking

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus


Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

[CEH]: Ethical Hacking and Countermeasures

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

EC Council Certified Ethical Hacker V8

Build Your Own Security Lab

Workshop Designed & Powered by TCIL IT, Chandigarh

Vulnerability Assessment and Penetration Testing

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Learn Ethical Hacking, Become a Pentester

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

ETHICAL HACKING CYBER SECURITY

Ethical Hacking & Cyber Security Workshop

Application Security Testing

INFORMATION SECURITY TRAINING

Ethical Hacking v7 40 H.

EC-Council Certified Security Analyst (ECSA)

SONDRA SCHNEIDER JOHN NUNES

Penetration Testing with Kali Linux

Information Security. Training

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Pen Testing Methodology Gueststealer TomCat Zero Day Directory Traversal VASTO

A Systems Engineering Approach to Developing Cyber Security Professionals

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

Audience. Pre-Requisites

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security

2016 TÜBİTAK BİLGEM Cyber Security Institute

Demystifying Penetration Testing

LINUX / INFORMATION SECURITY

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

FORBIDDEN - Ethical Hacking Workshop Duration

Certified Cyber Security Analyst VS-1160

INFORMATION SECURITY TRAINING CATALOG (2016)

Ethical Hacking and Countermeasures 5.0 Course ECEH5.0 5 Days COURSE OVERVIEW AUDIENCE OBJECTIVES OUTLINE

Attack Frameworks and Tools

Loophole+ with Ethical Hacking and Penetration Testing

Client logo placeholder XXX REPORT. Page 1 of 37

Penetration Testing - a way for improving our cyber security

Networking: EC Council Network Security Administrator NSA

EC-Council. Certified Ethical Hacker. Program Brochure

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

Introduction to Cyber Security / Information Security

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

ETHICAL HACKING. By REAL TIME FACULTY

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

INFORMATION SECURITY TRAINING CATALOG (2015)

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

Security of IPv6 and DNSSEC for penetration testers

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Attack and Penetration Testing 101

LUCIDEUS CERTIFIED ETHICAL HACKER (LCEH) 80 HOURS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY

CH EHC EC-Council Ethical Hacking and Countermeasures [v.9]

Course Outline: Certified Ethical Hacker v8. Learning Method: Instructor-led Classroom Learning

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Internal Penetration Test

LUCIDEUS CERTIFIED SECURITY ANALYST (LCSA) LEVEL 1 LEVEL 2 LEVEL 3 TRAINING

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Hackers are here. Where are you?

Description: Objective: Attending students will learn:

CERTIFIED PENETRATION TESTING CONSULTANT

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Understanding Security Testing

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Passing PCI Compliance How to Address the Application Security Mandates

Reducing Application Vulnerabilities by Security Engineering

Web App Security Audit Services

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

13 Ways Through A Firewall

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Transcription:

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world. In the Training we teach to students how Hacker breaks the computer security, Mobile security, Network Security, web application security, cyber forensics etc. for making them secure from hackers. By doing this they can create own security rules between their data and hackers. This Training provides hacking skills as well defence techniques, because in the cyber world organisations need security. And we must learn hacking techniques before make the secure the cyber world. And we teach students more practical s sessions than theory part.

Course Banefits:- Understanding Digital Footprinting. Analyze Computer Malwares and How to secure computer from malwares and remove them manually. Hacking Email Accounts & Social networking accounts and How to secure them. Web application penetration testing. Bug Bounty programs. Understanding Latest Exploitations Understand Wireless mechanism and Its Security. Mobile hacking & Forensics. Software Cracking Prerequisites: Basic knowledge of computer. Course Modules: 1. Introduction to Ethical Hacking 1) Introduction 2) Need of information Security 3) Phases Of Hacking 4) Understanding Penetration Testing 5) Understand scope and limitations of ethical hacking 6) Cyber Crimes and Laws 7) Conclusion 2. Networking Basics & Web Applications 1) Introduction 2) What is IP Address and Subnetting,Tracing & Spoofing 3) LAN,WAN AND MAN 4) Web Application working Mechanism 5) TCP & OSI Model 6) Virtual Private Networks Working Mechanism 3. Digital Foot printing 1) Information Gathering

2) Tools For online Information Gathering 3) Reverse IP domain Check 4) Personal Information gathering 5) Information Gathering By Social Engineering 4. Enumeration 5. Social Engineering 1) Trace someone IP Address 2) Email hacking & Security 3) Social Networking Acounts Hacking 4) Fake Emails 6. Google Hacking 1) Google hacking Database 2) Writing Exploitation on the basis of GHDB 3) Google Dorks 7. Network Scanning 1) Nmap Scanning 2) Nessus Scanning 3) Network Scanning Tools 8. Network Hacking 1) Man In the middle Attack using ARP Replay Attack 2) Ettercap and Cain & Abel 3) SSL Stripping 9. Wireless Hacking 1) WEP Hacking 2) WPA/WPA2 Hacking using Dictionary & Without Dictionary 3) De-authentication Attack 4) Wireless Security 10. Web Application Hacking 1) Web Application Working Mechanism 2) XSS Attack 3) Email & SMS Flooding using Web Application hacking 4) Owasp Top 10 5) Website Defacement By using Web vulnerabilities 6) Web Application Security techniques 7) Web vulnerability Scanners 11. SQL Injection 1) Introduction to SQL injection

2) Admin Login Authentication bypass 3) Union Sql injection 4) Mod_Security Bypassing 5) Complete Database Dump By SQL Injection 6) SQL Injection In POST method 7) Tools For SQL Injection 12. Web Server hacking 1) Introduction to Web Backdoors 2) Shell uploading 3) Web Server Hacking By LFI Vulnerability 13. Virus, Worms And Trojans 1) Difference between Virus, worms & Trojans 2) Virus & worms making techniques 3) RAT Trojan making techniques 4) Manually removing Trojans 14. System Hacking 1) Keyloggers 2) Windows password cracking without tools and with tools 3) Botnet 15. Cryptography 1) Introduction to Cryptography 2) Types of cryptography Algorithms 3) Encryption Analysis 16. Buffer overflow 17. Metasploit Framework 1) Network Scanning for OS Detection & Open Ports 2) Social Engineering Tool KIT 3) Metasploit Exploits 4) Armitage 5) Firewall Bypassing 6) Penetration testing By Metasploit 18. Firewall, IDS and Honeypots 1) Windows Firewall Setup 2) Linux Firewall Setup 3) Web application Firewall Setup 4) Firewall Logs analysis

5) IDS Configuration 19. Penetration Testing 1) External Penetration testing 2) Internal penetration testing 3) Router Penetration testing 4) Denial of Service penetration testing 5) Penetration testing Reports & Documentation Writing 20. Hacking Mobile Platforms 1) Mobile Application cracking 2) Mobile keyloggers 3) Mobile Trojans 4) Android Hacking 21. Reverse Engineering 1) Software Cracking 2) Making Keygens