CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world. In the Training we teach to students how Hacker breaks the computer security, Mobile security, Network Security, web
application security, cyber forensics etc. for making them secure from hackers. By doing this they can create own security rules between their data and hackers. This Training provides hacking skills as well defence techniques, because in the cyber world organisations need security. And we must learn hacking techniques before make the secure the cyber world. And we teach students more practical s sessions than theory part. COURSE DURATION: 6 MONTHS COURSE FEE : $1250 (Including Service Tax) Course Banefits:- Understanding Digital Foot-printing. Analyse Computer Malwares and How to secure computer from malwares and remove them manually. Hacking Email Accounts & Social networking accounts and How to secure them. Web application penetration testing. Bug Bounty programs. Understanding Latest Exploitations Understand Wireless mechanism and Its Security. Mobile hacking & Forensics. Software Cracking Prerequisites: Basic knowledge of computer. Course Modules: Introduction to Ethical Hacking Introduction Need of information Security Phases Of Hacking Understanding Penetration Testing Understand scope and limitations of ethical hacking Cyber Crimes and Laws Networking Basics & Web Applications
What is IP Address and Subnetting,Tracing & Spoofing LAN,WAN AND MAN Web Application working Mechanism TCP & OSI Model Virtual Private Networks Working Mechanism Digital Foot printing Information Gathering Tools For online Information Gathering Reverse IP domain Check Personal Information gathering Information Gathering By Social Engineering Enumeration Social Engineering Trace someone IP Address Email hacking & Security Social Networking Acounts Hacking Fake Emails Google Hacking Google hacking Database Writing Exploitation on the basis of GHDB Google Dorks Network Scanning Nmap Scanning Nessus Scanning Network Scanning Tools Network Hacking Man In the middle Attack using ARP Replay Attack Ettercap and Cain & Abel SSL Stripping Wireless Hacking WEP Hacking WPA/WPA2 Hacking using Dictionary & Without Dictionary De-authentication Attack Wireless Security Web Application Hacking
Web Application Working Mechanism XSS Attack Email & SMS Flooding using Web Application hacking Owasp Top 10 Website Defacement By using Web vulnerabilities Web Application Security techniques Web vulnerability Scanners SQL Injection Introduction to SQL injection Admin Login Authentication bypass Union Sql injection Mod_Security Bypassing Complete Database Dump By SQL Injection SQL Injection In POST method Tools For SQL Injection Web Server hacking Introduction to Web Backdoors Shell uploading Web Server Hacking By LFI Vulnerability Virus, Worms And Trojans Difference between Virus, worms & Trojans Virus & worms making techniques RAT Trojan making techniques Manually removing Trojans System Hacking Keyloggers Windows password cracking without tools and with tools Botnet Cryptography Introduction to Cryptography Types of cryptography Algorithms Encryption Analysis Buffer overflow Metasploit Framework
Network Scanning for OS Detection & Open Ports Social Engineering Tool KIT Metasploit Exploits Armitage Firewall Bypassing Penetration testing By Metasploit Firewall, IDS and Honeypots Windows Firewall Setup Linux Firewall Setup Web application Firewall Setup Firewall Logs analysis IDS Configuration Penetration Testing External Penetration testing Internal penetration testing Router Penetration testing Denial of Service penetration testing Penetration testing Reports & Documentation Writing Hacking Mobile Platforms Mobile Application cracking Mobile keyloggers Mobile Trojans Android Hacking Reverse Engineering Software Cracking Making Keygens Need Of IT Security TCP Packet Capturing Understand the security, functionality and ease of use triangle Understand the term Penetration testing Describe password Cracking Penetration Testing Mechanism Legal Agreements with Companies Rules of Penetration Testing Penetration Testing Steps
Advance Information Gathering Bug Bounty Programs Vulnerability Research Network penetration testing Internal Network Testing Methodologies Firewall Testing Snort Analysis Password Cracking Methodologies Advance Social Engineering Web Application Vulnerability Analysis Advance SQL Injection Penetration Testing Reports Generating