COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world. In the Training we teach to students how Hacker breaks the computer security, Mobile security, Network Security, web application security, cyber forensics etc. for making them secure from hackers. By doing this they can create own security rules between their data and hackers. This Training provides hacking skills as well defence techniques, because in the cyber world organisations need security. And we must learn hacking techniques before make the secure the cyber world. And we teach students more practical s sessions than theory part.
Course Banefits:- Understanding Digital Footprinting. Analyze Computer Malwares and How to secure computer from malwares and remove them manually. Hacking Email Accounts & Social networking accounts and How to secure them. Web application penetration testing. Bug Bounty programs. Understanding Latest Exploitations Understand Wireless mechanism and Its Security. Mobile hacking & Forensics. Software Cracking Prerequisites: Basic knowledge of computer. Course Modules: 1. Introduction to Ethical Hacking 1) Introduction 2) Need of information Security 3) Phases Of Hacking 4) Understanding Penetration Testing 5) Understand scope and limitations of ethical hacking 6) Cyber Crimes and Laws 7) Conclusion 2. Networking Basics & Web Applications 1) Introduction 2) What is IP Address and Subnetting,Tracing & Spoofing 3) LAN,WAN AND MAN 4) Web Application working Mechanism 5) TCP & OSI Model 6) Virtual Private Networks Working Mechanism 3. Digital Foot printing 1) Information Gathering
2) Tools For online Information Gathering 3) Reverse IP domain Check 4) Personal Information gathering 5) Information Gathering By Social Engineering 4. Enumeration 5. Social Engineering 1) Trace someone IP Address 2) Email hacking & Security 3) Social Networking Acounts Hacking 4) Fake Emails 6. Google Hacking 1) Google hacking Database 2) Writing Exploitation on the basis of GHDB 3) Google Dorks 7. Network Scanning 1) Nmap Scanning 2) Nessus Scanning 3) Network Scanning Tools 8. Network Hacking 1) Man In the middle Attack using ARP Replay Attack 2) Ettercap and Cain & Abel 3) SSL Stripping 9. Wireless Hacking 1) WEP Hacking 2) WPA/WPA2 Hacking using Dictionary & Without Dictionary 3) De-authentication Attack 4) Wireless Security 10. Web Application Hacking 1) Web Application Working Mechanism 2) XSS Attack 3) Email & SMS Flooding using Web Application hacking 4) Owasp Top 10 5) Website Defacement By using Web vulnerabilities 6) Web Application Security techniques 7) Web vulnerability Scanners 11. SQL Injection 1) Introduction to SQL injection
2) Admin Login Authentication bypass 3) Union Sql injection 4) Mod_Security Bypassing 5) Complete Database Dump By SQL Injection 6) SQL Injection In POST method 7) Tools For SQL Injection 12. Web Server hacking 1) Introduction to Web Backdoors 2) Shell uploading 3) Web Server Hacking By LFI Vulnerability 13. Virus, Worms And Trojans 1) Difference between Virus, worms & Trojans 2) Virus & worms making techniques 3) RAT Trojan making techniques 4) Manually removing Trojans 14. System Hacking 1) Keyloggers 2) Windows password cracking without tools and with tools 3) Botnet 15. Cryptography 1) Introduction to Cryptography 2) Types of cryptography Algorithms 3) Encryption Analysis 16. Buffer overflow 17. Metasploit Framework 1) Network Scanning for OS Detection & Open Ports 2) Social Engineering Tool KIT 3) Metasploit Exploits 4) Armitage 5) Firewall Bypassing 6) Penetration testing By Metasploit 18. Firewall, IDS and Honeypots 1) Windows Firewall Setup 2) Linux Firewall Setup 3) Web application Firewall Setup 4) Firewall Logs analysis
5) IDS Configuration 19. Penetration Testing 1) External Penetration testing 2) Internal penetration testing 3) Router Penetration testing 4) Denial of Service penetration testing 5) Penetration testing Reports & Documentation Writing 20. Hacking Mobile Platforms 1) Mobile Application cracking 2) Mobile keyloggers 3) Mobile Trojans 4) Android Hacking 21. Reverse Engineering 1) Software Cracking 2) Making Keygens