Summer Training Program 2014. CCSE V3.0 Certified Cyber Security Expert Version 3.0



Similar documents
Certified Cyber Security Expert V Web Application Development

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

CYBERTRON NETWORK SOLUTIONS

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

CRYPTUS DIPLOMA IN IT SECURITY

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Detailed Description about course module wise:

CEH Version8 Course Outline

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Course Title: Course Description: Course Key Objective: Fee & Duration:

RMAR Technologies Pvt. Ltd.

EC Council Certified Ethical Hacker V8

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

[CEH]: Ethical Hacking and Countermeasures

SONDRA SCHNEIDER JOHN NUNES

Course Content: Session 1. Ethics & Hacking

Certified Ethical Hacker (CEH)

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

Ethical Hacking & Cyber Security Workshop

Vulnerability Assessment and Penetration Testing

Certified Cyber Security Analyst VS-1160

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Penetration Testing with Kali Linux

Professional Penetration Testing Techniques and Vulnerability Assessment ...

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Workshop Designed & Powered by TCIL IT, Chandigarh

Learn Ethical Hacking, Become a Pentester

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access


National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Ethical Hacking Course Layout

ETHICAL HACKING CYBER SECURITY

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Ethical Hacking v7 40 H.

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION

Information Security. Training

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

INFORMATION SECURITY TRAINING

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

FORBIDDEN - Ethical Hacking Workshop Duration

(WAPT) Web Application Penetration Testing

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Description: Objective: Attending students will learn:

Build Your Own Security Lab

Loophole+ with Ethical Hacking and Penetration Testing

Audience. Pre-Requisites

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

FSP-201: Ethical Hacking & IT Security

INFORMATION SECURITY TRAINING CATALOG (2015)

Application Security Testing

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

Ethical Hacking and Countermeasures 5.0 Course ECEH5.0 5 Days COURSE OVERVIEW AUDIENCE OBJECTIVES OUTLINE

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

LINUX / INFORMATION SECURITY

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Course Outline: Certified Ethical Hacker v8. Learning Method: Instructor-led Classroom Learning

Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING. Anestis Bechtsoudis. abechtsoudis (at) ieee.

LUCIDEUS CERTIFIED SECURITY ANALYST (LCSA) LEVEL 1 LEVEL 2 LEVEL 3 TRAINING

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

June 2014 WMLUG Meeting Kali Linux

McAfee Certified Assessment Specialist Network

Reducing Application Vulnerabilities by Security Engineering

Codes of Connection for Devices Connected to Newcastle University ICT Network

Using Nessus In Web Application Vulnerability Assessments

EC-Council Certified Security Analyst (ECSA)

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

Passing PCI Compliance How to Address the Application Security Mandates

LUCIDEUS CERTIFIED ETHICAL HACKER (LCEH) 80 HOURS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY

A Systems Engineering Approach to Developing Cyber Security Professionals

CompTIA Security+ (Exam SY0-410)

2016 TÜBİTAK BİLGEM Cyber Security Institute

CIS 4204 Ethical Hacking Fall, 2014

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Web application testing

INFORMATION SECURITY TRAINING CATALOG (2016)

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Hackers are here. Where are you?

EC-Council Ethical Hacking and Countermeasures

ASL IT SECURITY XTREME XPLOIT DEVELOPMENT

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Introduction to Cyber Security / Information Security

IBM Protocol Analysis Module

Secrets of Vulnerability Scanning: Nessus, Nmap and More. Ron Bowes - Researcher, Tenable Network Security

Certified Cyber Security Analyst VS-1160

LUCIDEUS CERTIFIED CYBER SECURITY ANALYST (LCCSA)

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Web App Security Audit Services

KEVIN CARDWELL. Q/SA (Qualified Security Analyst) Penetration Tester. & Optional Q/PTL (Qualified Penetration Licence) Workshop

Client logo placeholder XXX REPORT. Page 1 of 37

Transcription:

Summer Training Program 2014 CCSE V3.0 Certified Cyber Security Expert Version 3.0

TechD Facts Incorporated in November 2009 Trained more than 40000 students, conducted 400 Workshops Including all IITs, NITs & Many colleges across India. Trained Professional from many reputed companies like Yahoo!,Google,ISACA,k7 Antivirus, Elitecore, Indian Oil, Temenos, ZOHO, HCL,TCS Infosys. Trained Investigation agencies of Gujarat, Maharashtra, Rajasthan, Tamilnadu, West Bengal. Successfully completed more than 10000 training hours into IT Security.

TechD Facts Trained & Certified 2000 Students & Professionals for CCSE ( Certified Cyber Security Expert) Course. Helped Top Investigating Agencies to Solve Ahmedabad & Mumbai blasts Cyber trails. Associated for an out reach program with the Major Technical festivals of IIT Bombay, Kanpur, NIT Bhopal, NIT Calicut, Jadavpur University Kolkata, and BITS Pilani Goa for giving authorized certification. Major VAPT Clients includes Sulekha.com, Cyberoam. Supported by Ministry of Home Affairs, Malaysia & CMO, Gujarat. Developed our own Crypters, Trojans, RATS for demonstrations.

TechD Facts Sunny Vaghela (Director & CTO) is recipient of Rajiv Gandhi Young Achiever s Award. TechDefence has been awarded as Best Ethical Hacking & Information Security Company by NBC at Trident Hotel, Mumbai.

TechD Facts TechDefence has also been awarded as Best Ethical Hacking & Information Security Company of Western India by BIG Research & IBN 7. Nominated for World Education Awards into category of Private Sector Initiative for use of innovative Technology for skilled education

Module 1 : Cyber Ethics - Hackers & hacking methodologies Types of hackers Communities of Hackers Malicious Hacker Strategies Steps to conduct Ethical Hacking Hiding your identity while performing attacks Module 2: Basic Network Terminologies TCP / IP protocols IP addresses Classes of IP addresses NAT Proxies and VPN s SSH and putty

Module 3: Information Gathering & Footprinting Whois information Active / Passive information gathering DNS report NS Report MX-information DNS-cache Maltego Doxing (Peoples & Digitals Boxes) Foot printing methodologies Tools that aid in foot printing Savitabhabhi.com case study

Module 4: Scanning & Enumeration Why scanning? Types of scanning Tools to aid in scanning Nmap - The Godfather Banner grabbing DNS Enumeration with Different Scripts

Module 5: Trojans, Backdoors How to control victim s computer using Trojans Binding Trojans with another file Undetection process of Trojans from Antivirus Removal of Trojans from your computer Analysis of Trojans/Virus Module 6: Virus & Worms Introduction to viruses How they work? Methods use to hide themselves and replicate themselves Introduction to worms Causes of worms Method used to replicate themselves Role of antivirus product and goat file

Module 7: Phishing & its Prevention Making phishing pages (3 types of Phishing) How to detect phishing pages. Detecting Phishing Crimes Module 8: System Hacking & Security Password cracking Privilege escalation Tools to aid in system hacking Understanding rootkits Clearing traces Countermeasures

Module 9: Social engineering & Honeypots Introduction Laws of social engineering Types of social engineering Honeypots introduction Types of honeypots Setting up windows / Linux honeypot Module 10: Bot,Bots & DOS(Denial of Service) Introduction to bots Introduction to botnets and zombies Botnet lifecycle IRC bots Customize your own bot

Module 11: Cryptography CCSE Contents Public-key Cryptography Working of Encryption Digital Signature RSA & Example of RSA Algorithm RC4, RC5, RC6, Blowfish Algorithms and Security Tools that aid in Cryptography Module 12: Google Hacking Understanding how Google works Google basic operators Google advanced operators Automated Google tools How to use Google to find the desired website How Google can aid in searching vulnerable website

Module 13: SQL Injection 1 Web Application Overview Web Application Attacks OWASP Top 10 Vulnerabilities Putting Trojans on websites SQL injection attacks Executing Operating System Commands Getting Output of SQL Query Getting Data from the Database Using ODBC Error Message How to Mine all Column Names of a Table How to Retrieve any Data How to Update/Insert Data into Database SQL Injection in Oracle SQL Injection in MySql Database, 20 Hands on Demonstrations on real websites

Module 14: SQL Injection 2 Attacking Against SQL Servers SQL Server Resolution Service (SSRS) SQL Injection Automated Tools MSSQL Injection Blind SQL Injection Preventing SQL Injection Attacks Module 15: XSS Cross Site Scripting Introduction to XSS & Types of XSS XSS worm and XSS shell Cookie grabbing Countermeasures

Module 16: CSRF, Click Jacking & Privilege Escalation Vulnerabilities Introduction to csrf Building proof of concept code Protections against csrf Click Jacking & Protections Module 17: Information Disclosure Vulnerabilities Introduction Setting up the correct chmod Protecting the sensitive server files Preventing the data loss

Module 18: LFI / RFI Introduction to LFI / RFI Finding out LFI / RFI Vulnerabilities Demonstration & Prevention Module 19:Hacking Web Servers Understanding IIS and apache How to use PHP and ASP backdoors What are local root exploits? Implementing web server security Patch management

Module 20: Vulnerability Assessment & Penetration Testing Burp Interceptor Burp Target Burp Spider Burp Scanner Burp Intruder Burp Repeater Burp Decoder Burp Sequencer Burp Extender Burp App Store- Introduction Live Hacking Through Burp

Module 21: Vulnerability Assessment & Penetration Testing Introduction to VAPT Categories of security assessments Vulnerability Assessment Limitations of Vulnerability Assessment Penetration Testing Types of Penetration Testing Do-It-Yourself Testing Outsourcing Penetration Testing Services Terms of Engagement Project Scope & Pentest Service Level Agreements Testing points & Locations Automated & Manual Testing

Module 22: Assembly Language Basics Difference Assembly Language Vs High-level Language Assembly Language Compilers Understanding Instruction operands, Directive & preprocessor Interrupts, Interrupt handler, External interrupts and Internal interrupts Handlers Assembling the & Compiling the C code Linking the object files & Understanding an assembly listing file Big and Little Endian Representation, Skeleton File Working with Integers, Signed integers & Signed Magnitude Understanding Two s Compliment, If statements, Do while loops Indirect addressing, Subprogram Understanding The Stack, SS segment& ESP The Stack UsageThe CALL and RET Instructions

Module 23 & Module 24: Buffer Overflows 1-2 Introduction How BOF works Stack based buffer overflow Heap based buffer overflow Heap spray Understanding the shellcode Mapping the memory Fuzzing Countermeasures

Module 25: Exploit Writing Exploits Overview Prerequisites for Writing Exploits and Shellcodes Purpose of Exploit Writing Types of Exploits Tools that aid in writing Shellcode Issues Involved With Shellcode Writing Addressing problem Null byte problem System call implementation

Module 26 : Reverse Engineering Introduction to RE Briefing OllyDbg Patching Cracking Keygening Countermeasures Module 27: Firewalls, IDS, Evading IDS Introduction How to detect Intrusion Types of Intrusion Configuring IDPS Firewall and it s types Evading Firewalls and IDS

Module 28 & Module 29: Metasploit Framework using BackTrack Introduction to this framework Getting hands on commands Hacking windows with metasploit Hacking Linux with metasploit Web Hacking through Metasploit

Module 30: Wireless Hacking & Security Wireless Protocols Wireless Routers-Working Attacks on Wireless Routers Cracking Wireless routers password(wep) Securing routers from Hackers Countermeasures Module 31: Mobile, VoIP Hacking & Security SMS & SMSC Introduction SMS forging & countermeasures Sending & Tracking fake SMSes VoIP Introduction Installing VoIP Server & Forging Call using VoIP

Module 32: Introduction to Cyber Crime Investigation & IT ACT 2000 Types of Cyber Crimes Reporting Cyber Crimes & Incidence response Introduction to IT Act 2000 & its sections Flaws in IT ACT,2000 Investigation Methodologies & Case Studies Different Logging Systems. Investigating Emails ( Email Tracing) Ahmedabad Bomb Blasts Terror Mail case study Investigating Phishing Cases Investigating Data Theft Cases Investigating Facebook Profile Impersonation Cases Investigating SMS & Call Spoofing Cases

Module 33: Cyber Forensics Cyber Forensics Understanding Cyber Forensics Hands on Cyber Forensics on Hard Disks Preparing Cyber Forensics Reports Module 34-35: Project Work 1, Project Work 2 & Final Exam. Training attendees will be getting exposures to live projects like Penetration testing, Creating own vulnerable penetration testing framework, Online Malware Scanners. Semi Final & Final Exam ( Online Hacking Challenge)

Total Hours: 80 hours Training Duration : 30 45 Days. Training Centers: Ahmedabad, Delhi, Hyderabad. For More information Call on 7567867774, 9723373375, 7567867770