Certified Cyber Security Expert V 2.0 + Web Application Development



Similar documents
Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

CYBERTRON NETWORK SOLUTIONS

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

CRYPTUS DIPLOMA IN IT SECURITY

Detailed Description about course module wise:

Ethical Hacking & Cyber Security Workshop

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Workshop Designed & Powered by TCIL IT, Chandigarh

Certified Ethical Hacker Exam Version Comparison. Version Comparison

CEH Version8 Course Outline

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Course Title: Course Description: Course Key Objective: Fee & Duration:

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

RMAR Technologies Pvt. Ltd.

EC Council Certified Ethical Hacker V8

Penetration Testing with Kali Linux

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Certified Ethical Hacker (CEH)

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION

SONDRA SCHNEIDER JOHN NUNES

[CEH]: Ethical Hacking and Countermeasures

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Ethical Hacking Course Layout

Vulnerability Assessment and Penetration Testing

FORBIDDEN - Ethical Hacking Workshop Duration

Certified Cyber Security Analyst VS-1160

Loophole+ with Ethical Hacking and Penetration Testing

ETHICAL HACKING CYBER SECURITY

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Course Content: Session 1. Ethics & Hacking

Learn Ethical Hacking, Become a Pentester


CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Audience. Pre-Requisites

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Ethical Hacking v7 40 H.

INFORMATION SECURITY TRAINING

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Application Security Testing

Information Security. Training

INFORMATION SECURITY TRAINING CATALOG (2015)

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

Build Your Own Security Lab

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

ASL IT Security Advanced Web Exploitation Kung Fu V2.0

Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING. Anestis Bechtsoudis. abechtsoudis (at) ieee.

Using Nessus In Web Application Vulnerability Assessments

FSP-201: Ethical Hacking & IT Security

Description: Objective: Attending students will learn:

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

Codes of Connection for Devices Connected to Newcastle University ICT Network

LINUX / INFORMATION SECURITY

EC-Council Certified Security Analyst (ECSA)

Hackers are here. Where are you?

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

ASL IT SECURITY XTREME XPLOIT DEVELOPMENT

Ethical Hacking and Countermeasures 5.0 Course ECEH5.0 5 Days COURSE OVERVIEW AUDIENCE OBJECTIVES OUTLINE

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

A Systems Engineering Approach to Developing Cyber Security Professionals

INFORMATION SECURITY TRAINING CATALOG (2016)

Web application testing

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Introduction to Cyber Security / Information Security

Web Application Security

Course Outline: Certified Ethical Hacker v8. Learning Method: Instructor-led Classroom Learning

EC-Council. Program Brochure. EC-Council. Page 1

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

2016 TÜBİTAK BİLGEM Cyber Security Institute

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

McAfee Certified Assessment Specialist Network

Network Incident Report

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

Penetration testing & Ethical Hacking. Security Week 2014

EC-Council. Certified Ethical Hacker. Program Brochure

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

Passing PCI Compliance How to Address the Application Security Mandates

(WAPT) Web Application Penetration Testing

Certified Cyber Security Analyst VS-1160

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

June 2014 WMLUG Meeting Kali Linux

Client logo placeholder XXX REPORT. Page 1 of 37

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Common Security Vulnerabilities in Online Payment Systems

CompTIA Security+ (Exam SY0-410)

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Adobe Systems Incorporated

Transcription:

Summer Training Program Certified Cyber Security Expert V + Web Application Development A] Training Sessions Schedule: Modules Ethical Hacking & Information Security Particulars Duration (hours) Ethical Hacking Cyber Ethics Hackers & hacking methodologies Types of hackers 1 Communities of Hackers Malicious Hacker Strategies Steps to conduct Ethical Hacking Hiding your identity while performing attacks Basic Network Terminologies TCP / IP protocols IP addresses 2 Classes of IP addresses NAT Proxies and VPN s SSH and putty Information Gathering & Footprinting Whois information Active / Passive information gathering 3 Information gathering using Foot printing methodologies Tools that aid in foot printing Savitabhabhi.com case studies Scanning & Enumeration Why scanning? Types of scanning 4 Tools to aid in scanning Nmap - The Godfather Banner grabbing Trojans, Backdoors How to control victim s computer using Trojans Binding Trojans with another file 5 Undetection process of Trojans from Antivirus Removal of Trojans from your computer Analysis of Trojans/Virus

Virus & Worms Introduction to viruses How they work? Methods use to hide themselves and replicate themselves 6 Introduction to worms Causes of worms Method used to replicate themselves Role of antivirus product and goat file Phishing & its Prevention Making phishing pages 7 How to detect phishing pages Detecting Phishing Crimes System Hacking & Security Password cracking Privilege escalation 8 Tools to aid in system hacking Understanding rootkits Clearing traces Countermeasures Social engineering & Honeypots Introduction Laws of social engineering 9 Types of social engineering Honeypots introduction Types of honeypots Setting up windows / Linux honeypot Bot,Bots & DOS(Denial of Service) Introduction to bots Introduction to botnets and zombies 10 Botnet lifecycle IRC bots Customize your own bot Cryptography Public-key Cryptography Working of Encryption Digital Signature 11 RSA Example of RSA Algorithm RC4, RC5, RC6, Blowfish Algorithms and Security Tools that aid in Cryptography Google Hacking Understanding how Google works Google basic operators Google advanced operators 12 Automated Google tools How to use Google to find the desired website How Google can aid in searching vulnerable website

SQL Injection 1 Web Application Overview Web Application Attacks OWASP Top 10 Vulnerabilities Putting Trojans on websites SQL injection attacks Executing Operating System Commands 13 Getting Output of SQL Query Getting Data from the Database Using ODBC Error Message How to Mine all Column Names of a Table How to Retrieve any Data How to Update/Insert Data into Database SQL Injection in Oracle SQL Injection in MySql Database 20 Hands on Demonstrations on real websites SQL Injection 2 Attacking Against SQL Servers SQL Server Resolution Service (SSRS) 14 SQL Injection Automated Tools MSSQL Injection Blind SQL Injection Preventing SQL Injection Attacks Proxy servers and VPN s Introduction 15 Different Between Proxies & VPN Making own proxy server Configuring own proxy server Configuring VPN Cross Site Scripting Introduction to XSS 16 Types of XSS XSS worm and XSS shell Cookie grabbing Countermeasures Local File Inclusion/Remote File Inclusion Introduction to LFI 17 Parameters to LFI Introduction to RFI Countermeasures Secure Coding Practices Why secure coding? 18 Secure coding standards Secure coding methods Dissecting the source code Information Disclosure Vulnerabilities Introduction 19 Setting up the correct chmod Protecting the sensitive server files Preventing the data loss

Session Hijacking Introduction 20 Types of session hijacking Tools that aid in session hijacking Countermeasures Hacking Web Servers Understanding IIS and apache How to use PHP and ASP backdoors 21 What are local root exploits? Implementing web server security Patch management Vulnerability Assessment & Penetration Testing Introduction to VAPT Categories of security assessments Vulnerability Assessment Limitations of Vulnerability Assessment Penetration Testing Types of Penetration Testing Risk Management Do-It-Yourself Testing 22 Outsourcing Penetration Testing Services Terms of Engagement Project Scope Pentest Service Level Agreements Testing points Testing Locations Automated Testing Manual Testing Demonstrations Assembly Language Basics Machine Language Assembly Language Assembler Assembly Language Vs High-level Language Assembly Language Compilers Instruction operands MOV instruction ADD instruction SUB instruction 23 INC and DEC instructions Directive preprocessor Interrupts Interrupt handler External interrupts and Internal interrupts Handlers Assembling the code Compiling the C code Linking the object files

Understanding an assembly listing file Big and Little Endian Representation Skeleton File Working with Integers Signed integers Signed Magnitude Two s Compliment If statements Do while loops Indirect addressing Subprogram The Stack The SS segment ESP The Stack Usage The CALL and RET Instructions Buffer Overflows 1-2 Introduction How BOF works Stack based buffer overflow Heap based buffer overflow 24-25 4.0 Heap spray Understanding the shellcode Mapping the memory Fuzzing Countermeasures Exploit Writing Exploits Overview Prerequisites for Writing Exploits and Shellcodes Purpose of Exploit Writing Types of Exploits 26 Tools that aid in writing Shellcode Issues Involved With Shellcode Writing Addressing problem Null byte problem System call implementation Metasploit Framework Introduction to this framework Getting hands on commands 27-28 4.0 Hacking windows with metasploit Hacking Linux with metasploit Difference between exploits and payloads Reverse Engineering Introduction to RE Briefing OllyDbg 29 Patching Cracking Keygening Countermeasures

Firewalls, IDS, Evading IDS Introduction How to detect Intrusion 30 Types of Intrusion Configuring IDPS Firewall and it s types Evading Firewalls and IDS Wireless Hacking & Security Wireless Protocols Wireless Routers-Working 31 Attacks on Wireless Routers Cracking Wireless routers password(wep) Securing routers from Hackers Countermeasures Mobile, VoIP Hacking & Security SMS & SMSC Introduction SMS forging & countermeasures 32 Sending & Tracking fake SMSes VoIP Introduction Installing VoIP Server Forging Call using VoIP Bluetooth Hacking Introduction to Bluetooth Understanding Bluetooth protocols Types of Bluetooth attacks Bluejacking Tools for Bluejacking 33 BlueSpam Blue snarfing BlueBug Attack Short Pairing Code Attacks Man-In-Middle Attacks Tools that aid in Bluetooth Hacking Countermeasures Introduction to Cyber Crime Investigation & IT ACT 2000 Types of Cyber Crimes 34 Reporting Cyber Crimes & Incidence response Introduction to IT Act 2000 & its sections Flaws in IT ACT,2000 Investigation Methodologies & Case Studies Different Logging Systems Investigating Emails ( Email Tracing) 35 Ahmedabad Bomb Blasts Terror Mail case study Investigating Phishing Cases Investigating Data Theft Cases Investigating Orkut Profile Impersonation Cases Investigating SMS & Call Spoofing Cases 36 Cyber Forensics Understanding Cyber Forensics

Hands on Cyber Forensics on Hard Disks Preparing Cyber Forensics Reports Enterprise Information Security Management Establishment of ISMS Implementation,Monitoring,Review & Maintenance of ISMS 37 Resource Management & Management Responsibilities Internal Audits Selection of Appropriate Controls Corrective & Preventive Actions 38 Project Work 1 39 Project Work 2 40 Examination Total Hours 80 Web Application Development (PHP) Modules Particulars Hours PHP 1 Exploring PHP Environment & Setting PHP Environment in WAMP Server 2 Understanding & Implementing HTML 3 Working PHP Variables 4 Understanding Operators & Flow Control 5 Handling Strings & Arrays 6 Handling HTML Controls & Forms in Webpage 7 Uploading files to server using PHP 8 Installing & Configuring Database using Database 9 Working with MYSQL Database 10 Understanding Database & Implementing Mysql Schema 11 File Handling 12 Working with Sessions & Cookies 13 Securing Web Application 14 Making Sample Web Application 1 15 Making Sample Web Application 1 Total Hours 30 Note: These are just the major aspects that we will be discussing, each point will be elaborated in detail with demonstrations of the tools and techniques. B] Projects/Web Applications to offer: Online Antivirus Scanner Online Vulnerability Scanner Institute Management System C] Program Duration: 6 Weeks(Approx 45 Days)

D] Program Benefits & Highlights: Learn & Interact with renowned Industry Experts Receive an unparalleled education on the art of computer security with personal one-onone attention from TechDefence. Hands on Demonstrations of Latest Hacking Techniques & Tools. Hands on Demonstrations of various cases solved by TechDefence. PowerPoint Presentation, Live Demos, Interactive Question & Answer sessions and comprehensive reading material. E] Key Benefits of TechDefence: We have rich experience working on cases & training for Crime Branch, Ahmedabad, Nashik, Hyderabad, Surat & Rajkot. Conducted more than 280 workshops & seminars for Students & Professionals across globe. We helped Top Investigating Agencies to solve Cyber Terrorism Cases like Ahmedabad & Mumbai Blasts Cases. We do not use third party tools. we have developed our Crypters, Trojans, Scripts etc. Our Director & Trainer is supported by Ministry of Home Affairs, Malaysia & Border Security Force, India. F] Program Trainer: TechDefence (To know more about Sunny Vaghela please visit www.techdefence.com ) G] Summer Training Centres: Ahmedabad, New Delhi, Jaipur, Hyderabad, Rajkot. H] Course Material & CDs: Comprehensive course material will be provided to participants. Ethical Hacking Toolkit(10 CDS) (Containing Tools, Videos, EBooks, Presentations and reading material) I] Certification: Certificate of Certified Cyber Security Expert Version will be given to participants from TechDefence. Certificate of summer training completion will be provided to all participants from TechDefence.

In case of certain other details or formalities on our end, do revert back to us. Tel: +91 79-30471265-67 Mobile: +91 7567867770 TechDefence, Ahmedabad. Tel: +91 11 45110143-44 Mobile: +91 7503867993 Email: delhi@techdefence.com TechDefence, New Delhi Tel: +91 40 65551560 Mobile: +91 9032119825 Email: hyderabad@techdefence.com TechDefence, Hyderabad. Tel: +91 141 5104143-44 Mobile: +91 9772200143 Email: jaipur@techdefence.com TechDefence, Jaipur.