Two Days Interactive workshop on Cyber Security and Ethical Hacking Total (16 HOURS) Workshop Designed & Powered by TCIL IT, Chandigarh Speaker:- Mr Rahul Tyagi - ETHICAL HACKER
Workshop Contents Cyber Security and Ethical Hacking 1. Ethical Hacking Introduction 1.1 Hackers and Ethical Hackers 1.3 World s top hacking communities 1.3 The hidden underground black hat world 1.4 Indian Cyber Army 2. Blue Print Building 2.1 Gathering info about the victim 2.2 Info gathering of websites 2.3 Info gathering about the present network 2.4 Getting the administration login panel of websites 3. Proxy Server / Be anonymous while attach 3.1 What are proxy servers 3.2 Standalone and web based proxy server 3.3 What are VPN and Socks 3.4 Chain Proxy a criminal hackers way 3.5 MAC spoofing hiding MAC address 4. Black word of RATing / Trojan Backdoors 4.1 How hackers control victim s computer using Trojan 4.2 How to bind malicious RATing with another file 4.3 Making your Trojan UD (Undetectable) FUD fully (Undetectable) 4.4 How to remove Trojan manually 5. Advance Google Hacking 5.1 Hacking unsecured CCTV 5.2 Smart Google hacks for students 5.3 Finding vulnerabilities in websites 5.4 XML attacks through Google 6. Penetrating Network Security
6.1 Introduction to wireless protocols 6.2 Wireless Routers working 6.3 Attacks on wired network 6.4 Cracking wireless routers password (WeP, WPP) 6.5 Security Network attacks 6.6 Network security policies for admin 7. Firewall Security in Corporate Sector 7.1 Firewall 7.2 Types of Firewall 7.3 Responsibilities of Firewall 7.4 Why Firewall security 8. Spamming / The JUNKYARD 8.1 Spamming 8.2 Top 10 Countries Under Spamming 8.3 Case Studies Fraud mail (Bank of Baroda) 8.4 Case Studies Fraud mail (VOLKS WAGON) 8.5 Case Studies Fraud mail (COCA COLA) 8.6 Email Spoofing / Fake Mail 8.7 Spoofing Websites and Tools 9. Digital Forensics and Criminal Tracing 9.1 Digital Forensics introduction 9.2 Data Recovery - Reasons for data loss 9.3 Evidence Recovery from lost data 9.4 Digital Forensic tools 9.5 Tracing Criminals on Internet /E-mail tracing 10. Analyzing modern methods of Stegnogarphy 10.1 Cryptography 10.2 PGP Security 10.3 The RSA blunder 10.5 Stegnography 10.5 Live Demonstration with manual procedure 10.6 Stegnography terrorists way 11. Advance Websites / Server Attacks
11.1 Web Application & Technologies available 11.2 OWASA top vulnerabilities 11.3 SQL Injection attack 11.4 By Pass Authentication attacks 11.5 Website Hacking Attack LFI, RFI, Server Rooting 11.6 SQL Injection with automated tools 11.7 Live 10 Hands on demonstration on real websites 12. Busting Windows Platform 12.1 System Hacking / Role of SAM 12.2 Hacking All Windows Platform, Admin Passwords. Windows XP, Vitsa, Windows 7 12.3 Hacking Admin with CMD 12.4 Buffer overflow attacks 13. E- Mail Hacking Techniques 13.1 E-Mail Hacking 13.2 Myths about E-Mail hacking 13.3 Understanding E- Mail Security 13.4 Creating Strong robust passwords 13.5 E-Mail Hacking tools available 13.6 Social Engineering 13.7 E-Mail attacks counter measures 13. Penetration Testing with Backtrack 5 R1 13.1 Penetration Testing 13.2 Motive of Pen Testing 13.3 Installing / Running Backtrack operating system 13.4 Hacking windows with Metaspoilt frame work 4.0 console 13.5 Armitage The bloody Hunk 13.6 Exploiting and Controlling with Armitage 13.7 Social Engineering toolkit R1 13.8 DNS Spoofing 13.9 E-Mail Collector 14. Corporate Mobile Hacking /Testing 14.1 Hacking Bluetooth of Mobile 14.2 Tracking Mobile 14.3 Role IMEI number 14.4 Blackberry Security v/s iphone 4 security 14.5 Jail breaking Live of iphone 4
Note: These are just the major aspects that we will be discussing, each point will be elaborated in detail with demonstrations of the tools and techniques. Workshop Highlights & Benefits Learn & Interact with renowned Experts Receive an unparalleled education on the art of computer security with personal one-onone attention from Rahul Tyagi Hands on Demonstrations of Latest Hacking Techniques & Tools. Hands on Demonstrations of various cases solved by Rahul Tyagi. PowerPoint Presentation, Live Demos, Interactive Question & Answer sessions and comprehensive reading material. Benefits of TechHacx Successfully conducted more than 150 workshops & seminars for Students & Professionals across globe. We helped Top Investigating Agencies to solve Cyber Terrorism Cases Workshop Material & CDs Comprehensive course material will be provided to participants. Ethical Hacking Toolkit - Participation Certificate to Every Participant from TECH-HACX Participation fee: Rs 1000/- for two days workshop With Regards Shekhar Gharu (Campus Evangelist) TCIL IT Chandigarh Training and Placement Division 09872403977, 09876795015,07696257444 Phone : 0172-4634529