CRYPTUS DIPLOMA IN IT SECURITY



Similar documents
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Course Title: Course Description: Course Key Objective: Fee & Duration:

CYBERTRON NETWORK SOLUTIONS

Detailed Description about course module wise:

Ethical Hacking Course Layout

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Certified Cyber Security Expert V Web Application Development

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

CEH Version8 Course Outline

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Certified Ethical Hacker (CEH)

RMAR Technologies Pvt. Ltd.

Certified Ethical Hacker Exam Version Comparison. Version Comparison

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Professional Penetration Testing Techniques and Vulnerability Assessment ...

FSP-201: Ethical Hacking & IT Security

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

Course Content: Session 1. Ethics & Hacking


National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

[CEH]: Ethical Hacking and Countermeasures

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

EC Council Certified Ethical Hacker V8

Build Your Own Security Lab

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Vulnerability Assessment and Penetration Testing

ETHICAL HACKING CYBER SECURITY

Learn Ethical Hacking, Become a Pentester

Workshop Designed & Powered by TCIL IT, Chandigarh

EC-Council Certified Security Analyst (ECSA)

Ethical Hacking & Cyber Security Workshop

Ethical Hacking v7 40 H.

Information Security. Training

Application Security Testing

INFORMATION SECURITY TRAINING

SONDRA SCHNEIDER JOHN NUNES

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Audience. Pre-Requisites

Penetration Testing with Kali Linux

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

A Systems Engineering Approach to Developing Cyber Security Professionals

Pen Testing Methodology Gueststealer TomCat Zero Day Directory Traversal VASTO

2016 TÜBİTAK BİLGEM Cyber Security Institute

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

Attack Frameworks and Tools

Demystifying Penetration Testing

Networking: EC Council Network Security Administrator NSA

Certified Cyber Security Analyst VS-1160

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

FORBIDDEN - Ethical Hacking Workshop Duration

EC-Council. Certified Ethical Hacker. Program Brochure

CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security

Ethical Hacking and Countermeasures 5.0 Course ECEH5.0 5 Days COURSE OVERVIEW AUDIENCE OBJECTIVES OUTLINE

INFORMATION SECURITY TRAINING CATALOG (2016)

Loophole+ with Ethical Hacking and Penetration Testing

LINUX / INFORMATION SECURITY

Client logo placeholder XXX REPORT. Page 1 of 37

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

ETHICAL HACKING. By REAL TIME FACULTY

Penetration Testing - a way for improving our cyber security

Hackers are here. Where are you?

INFORMATION SECURITY TRAINING CATALOG (2015)

Security of IPv6 and DNSSEC for penetration testers

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

Introduction to Cyber Security / Information Security

Description: Objective: Attending students will learn:

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Network Attacks and Defenses

LUCIDEUS CERTIFIED SECURITY ANALYST (LCSA) LEVEL 1 LEVEL 2 LEVEL 3 TRAINING

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

CH EHC EC-Council Ethical Hacking and Countermeasures [v.9]

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Course Outline: Certified Ethical Hacker v8. Learning Method: Instructor-led Classroom Learning

LUCIDEUS CERTIFIED ETHICAL HACKER (LCEH) 80 HOURS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Network Incident Report

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

IDS and Penetration Testing Lab ISA 674

CERTIFIED PENETRATION TESTING CONSULTANT

ASK PC Certified Information Systems Security Expert - CISSE

Attack and Penetration Testing 101

SCP - Strategic Infrastructure Security

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

How To Protect Your Network From Attack From A Hacker On A University Server

Transcription:

CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world. In the Training we teach to students how Hacker breaks the computer security, Mobile security, Network Security, web

application security, cyber forensics etc. for making them secure from hackers. By doing this they can create own security rules between their data and hackers. This Training provides hacking skills as well defence techniques, because in the cyber world organisations need security. And we must learn hacking techniques before make the secure the cyber world. And we teach students more practical s sessions than theory part. COURSE DURATION: 6 MONTHS COURSE FEE : $1250 (Including Service Tax) Course Banefits:- Understanding Digital Foot-printing. Analyse Computer Malwares and How to secure computer from malwares and remove them manually. Hacking Email Accounts & Social networking accounts and How to secure them. Web application penetration testing. Bug Bounty programs. Understanding Latest Exploitations Understand Wireless mechanism and Its Security. Mobile hacking & Forensics. Software Cracking Prerequisites: Basic knowledge of computer. Course Modules: Introduction to Ethical Hacking Introduction Need of information Security Phases Of Hacking Understanding Penetration Testing Understand scope and limitations of ethical hacking Cyber Crimes and Laws Networking Basics & Web Applications

What is IP Address and Subnetting,Tracing & Spoofing LAN,WAN AND MAN Web Application working Mechanism TCP & OSI Model Virtual Private Networks Working Mechanism Digital Foot printing Information Gathering Tools For online Information Gathering Reverse IP domain Check Personal Information gathering Information Gathering By Social Engineering Enumeration Social Engineering Trace someone IP Address Email hacking & Security Social Networking Acounts Hacking Fake Emails Google Hacking Google hacking Database Writing Exploitation on the basis of GHDB Google Dorks Network Scanning Nmap Scanning Nessus Scanning Network Scanning Tools Network Hacking Man In the middle Attack using ARP Replay Attack Ettercap and Cain & Abel SSL Stripping Wireless Hacking WEP Hacking WPA/WPA2 Hacking using Dictionary & Without Dictionary De-authentication Attack Wireless Security Web Application Hacking

Web Application Working Mechanism XSS Attack Email & SMS Flooding using Web Application hacking Owasp Top 10 Website Defacement By using Web vulnerabilities Web Application Security techniques Web vulnerability Scanners SQL Injection Introduction to SQL injection Admin Login Authentication bypass Union Sql injection Mod_Security Bypassing Complete Database Dump By SQL Injection SQL Injection In POST method Tools For SQL Injection Web Server hacking Introduction to Web Backdoors Shell uploading Web Server Hacking By LFI Vulnerability Virus, Worms And Trojans Difference between Virus, worms & Trojans Virus & worms making techniques RAT Trojan making techniques Manually removing Trojans System Hacking Keyloggers Windows password cracking without tools and with tools Botnet Cryptography Introduction to Cryptography Types of cryptography Algorithms Encryption Analysis Buffer overflow Metasploit Framework

Network Scanning for OS Detection & Open Ports Social Engineering Tool KIT Metasploit Exploits Armitage Firewall Bypassing Penetration testing By Metasploit Firewall, IDS and Honeypots Windows Firewall Setup Linux Firewall Setup Web application Firewall Setup Firewall Logs analysis IDS Configuration Penetration Testing External Penetration testing Internal penetration testing Router Penetration testing Denial of Service penetration testing Penetration testing Reports & Documentation Writing Hacking Mobile Platforms Mobile Application cracking Mobile keyloggers Mobile Trojans Android Hacking Reverse Engineering Software Cracking Making Keygens Need Of IT Security TCP Packet Capturing Understand the security, functionality and ease of use triangle Understand the term Penetration testing Describe password Cracking Penetration Testing Mechanism Legal Agreements with Companies Rules of Penetration Testing Penetration Testing Steps

Advance Information Gathering Bug Bounty Programs Vulnerability Research Network penetration testing Internal Network Testing Methodologies Firewall Testing Snort Analysis Password Cracking Methodologies Advance Social Engineering Web Application Vulnerability Analysis Advance SQL Injection Penetration Testing Reports Generating