Course Content: Session 1. Ethics & Hacking



Similar documents
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Ethical Hacking & Cyber Security Workshop

CRYPTUS DIPLOMA IN IT SECURITY

Ethical Hacking Course Layout

Detailed Description about course module wise:

CYBERTRON NETWORK SOLUTIONS

RMAR Technologies Pvt. Ltd.

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Network Attacks. Common Network Attacks and Exploits

FSP-201: Ethical Hacking & IT Security

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

FORBIDDEN - Ethical Hacking Workshop Duration


When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Ethical Hacking as a Professional Penetration Testing Technique

CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Ed Ferrara, MSIA, CISSP Fox School of Business

Detecting and Exploiting XSS with Xenotix XSS Exploit Framework

Certified Cyber Security Expert V Web Application Development

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Loophole+ with Ethical Hacking and Penetration Testing

Certified Ethical Hacker (CEH)

Learn Ethical Hacking, Become a Pentester

13 Ways Through A Firewall

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

ETHICAL HACKING CYBER SECURITY

CEH Version8 Course Outline

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

Overview of computer and communications security

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

13 Ways Through A Firewall What you don t know will hurt you

Course Title: Course Description: Course Key Objective: Fee & Duration:

CS5008: Internet Computing

Client logo placeholder XXX REPORT. Page 1 of 37

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Introduction: 1. Daily 360 Website Scanning for Malware

Workshop Designed & Powered by TCIL IT, Chandigarh

BE SAFE ONLINE: Lesson Plan

Build Your Own Security Lab

Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

WEB ATTACKS AND COUNTERMEASURES

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Threat Events: Software Attacks (cont.)

The Top Web Application Attacks: Are you vulnerable?

Quick Start Guide to Ethical Hacking

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Vulnerability Assessment and Penetration Testing

EC Council Certified Ethical Hacker V8

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

A Systems Engineering Approach to Developing Cyber Security Professionals

INFORMATION SECURITY TRAINING

Ethical Hacking and Countermeasures 5.0 Course ECEH5.0 5 Days COURSE OVERVIEW AUDIENCE OBJECTIVES OUTLINE

Application Security Testing

Web App Security Audit Services

Web Application Attacks and Countermeasures: Case Studies from Financial Systems

Certified Cyber Security Analyst VS-1160

Penetration Testing with Kali Linux

McAfee Certified Assessment Specialist Network

SONDRA SCHNEIDER JOHN NUNES

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

Own your LAN with Arp Poison Routing

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Web Application Security

1 Introduction. Agenda Item: Work Item:

Network Security Fundamentals

Attack Lab: Attacks on TCP/IP Protocols

TEACHING COMPUTER SECURITY TO UNDERGRADUATES A Hands-On Approach

Web Applications The Hacker s New Target

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Different Types of Adware and Services

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Hands-on Hacking Unlimited

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media

How To Protect Your Network From Attack From A Hacker (For A Fee)

University of Wisconsin Platteville SE411. Senior Seminar. Web System Attacks. Maxwell Friederichs. April 18, 2013

LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS

Tespok Kenya icsirt: Enterprise Cyber Threat Attack Targets Report

1 Introduction. Agenda Item: Work Item:

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

A Network Administrator s Guide to Web App Security

VMware: Advanced Security

Web Application Worms & Browser Insecurity

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Transcription:

Course Content: Session 1 Ethics & Hacking Hacking history : How it all begin Why is security needed? What is ethical hacking? Ethical Hacker Vs Malicious hacker Types of Hackers Building an approach for ethical hacking Steps in Ethical hacking Basics of Internet, Networking & Hacking What is a Network? Types of network LANs, WANs & WLANs What is Internet? History of the Internet Basic Structure What is a Server? What is an IP Address? What is a domain name? IP Domain Relation Client Server Relationship Model Internet networking What is a port? What is Programming? Types of programming languages. What is a Programming loophole or error? Session 2 Information gathering & Google Hacking (Practical) Whois access (Demo) Maltego (Demo) 123people.com (Demo) Ip scanning (Demo) Port scanning (Demo) Network scanning & its tools (Demo) What is Google and how does it work?

Google tricks (Demo) Basic hacks (Demo) How can Google hacking help an Ethical Hacker? (Demo) Accessing online remote cameras Windows security (Practical) Windows security (Demo) Registry (Demo) Port & Services (Demo) Session 3 SQL injections attacks (Practical) Introduction of SQL What is SQL injection Checking SQL injection vulnerability (demo) Basic strategy of SQL injection (Demo) Getting login credentials using SQL injections (Live Demo) Using SQL to login via middleware language (Demo) URL and Forms (Demo) SQL Query SELECT, DROP etc. (Demo) SQL cheat sheets (Demo) Using source changes to bypass client side validation (Demo) Live demonstration of the attack (Demo) Using SQL injection tools (Demo) Importance of server side validation (Demo) How to protect your system from SQL Injections (Demo) Man in the middle attack (MITM Attack) (Practical) What is Manin The Middle attack? What is Backtrack linux (Most common unix system for ethical hacking)? Preparation for Manin The Middle attack (Demo) Setting ettercap tool for the attack (demo) Identifying victim (Demo) Cache poisoning (Demo) Routing table modification (Demo) Eavesdropping (Demo) Countermeasures against MITM attack (Demo) Session 4

Phishing, Trojan & Viruses What is phishing? Social engineering used in phishing (Demo) Phishing attack (Demo) Phishing sites (Demo) Protection against phishing (Demo) Viruses: Trojans, Worms, Malware, Spyware Modes of spreading Different Ways a Trojan can Get into a System (Demo) Creation of Trojan using cybergate (Demo) Attacking a system using our created trojan (Demo) Indications of a Trojan Attack (Demo) Some Famous Trojans and Ports They Use (Demo) How to Detect Trojans? (Demo) How to Determine which Ports are Listening (Demo) Netstat Session hijacking & Cookie grabbing What are cookies? (Demo) Reading and writing cookies (Demo) Passive Vs Active session hijack (demo) TCP sessions and HTTP sessions (Demo) TCP session hijacking: Telnet (Demo) Stealing Cookies to hijack session using: XSS (Demo) Sniffers (Demo) Spoofing (Demo) Spoofing Vs Hijacking Types of Hijacking Protection against session Hijacking (Demo) Session 5 Social Network Attacks (Facebook, WhatsApp & Gmail) Overview of Social Engineering Case Study Example of Social Engineering Attack Java Applet Attack (Demo) WhatsApp Security Facebook Security

Gmail Security Call & SMS Spoofing What is Fake SMS & Call? Method of generating fake SMS & Calls (Demo) Actions to be taken for fake SMS and Calls (Demo) Indian IT Act & Cybercrime IT ACT 2000 Cyber crime/terrorism and its type Sections in the Indian constitution Sec. 65, 66 A,B,C, D, 67, 69 etc. Penalty in all sections of Indian constitution DNS Spoofing What is DNS Spoofing? How does it work? How to secure yourself? DNS Spoofing (Demo) Session 6 Email Forging & Tracing How does an email work? Tracing an email (Demo) Spam Firewalls & Keyloggers (Demo) Detecting fake emails (Demo) What is a firewall? & How can it help you How a firewall works

What are key loggers? (Demo) Types of keyloggers? (Demo) Content developed in association with EI Systems Services.