Workshop Designed & Powered by TCIL IT, Chandigarh



Similar documents
Ethical Hacking & Cyber Security Workshop

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

CRYPTUS DIPLOMA IN IT SECURITY

Certified Cyber Security Expert V Web Application Development

Detailed Description about course module wise:

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

CYBERTRON NETWORK SOLUTIONS

CEH Version8 Course Outline

Certified Cyber Security Analyst VS-1160

Course Title: Course Description: Course Key Objective: Fee & Duration:

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Course Content: Session 1. Ethics & Hacking

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Ethical Hacking Course Layout

ETHICAL HACKING CYBER SECURITY

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

FORBIDDEN - Ethical Hacking Workshop Duration

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Networking: EC Council Network Security Administrator NSA

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Professional Penetration Testing Techniques and Vulnerability Assessment ...

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

FSP-201: Ethical Hacking & IT Security

Page: Designed & Executed By: Presents Cyber Security Training

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

Certified Cyber Security Analyst VS-1160

EC Council Certified Ethical Hacker V8

Loophole+ with Ethical Hacking and Penetration Testing

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Certified Ethical Hacker (CEH)

Introduction to Cyber Security / Information Security

RMAR Technologies Pvt. Ltd.

[CEH]: Ethical Hacking and Countermeasures

Ed Ferrara, MSIA, CISSP Fox School of Business

A Systems Engineering Approach to Developing Cyber Security Professionals

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Advanced Security and Mobile Networks

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V

Build Your Own Security Lab

June 2014 WMLUG Meeting Kali Linux

SONDRA SCHNEIDER JOHN NUNES

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Master of Science in Information Systems & Security Management. Courses Descriptions

Application Security Testing

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

Web App Security Audit Services

NETWORK PENETRATION TESTING

COSC 472 Network Security

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws

Penetration Testing - a way for improving our cyber security

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Penetration Testing. Presented by

KEVIN CARDWELL. Q/SA (Qualified Security Analyst) Penetration Tester. & Optional Q/PTL (Qualified Penetration Licence) Workshop

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

Common Security Vulnerabilities in Online Payment Systems

Virtual Learning Tools in Cyber Security Education

Microsoft Technologies

Understanding Security Testing

3 day Workshop on Cyber Security & Ethical Hacking

CERTIFICATE COURSE 1 ST YEAR onwards ADD ON COURSE. Computer Hardware Networking and Ethical Hacking. Semester I

TUSKEGEE CYBER SECURITY PATH FORWARD

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

InfoSec Academy Pen Testing & Hacking Track

Penetration testing & Ethical Hacking. Security Week 2014

Wireless Network Best Practices for General User

Higher National Unit specification: general information

Passing PCI Compliance How to Address the Application Security Mandates

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

LINUX / INFORMATION SECURITY

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

DDoS-blocker: Detection and Blocking of Distributed Denial of Service Attack

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

Cyber Exercises, Small and Large

CHAPTER 10: COMPUTER SECURITY AND RISKS

Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence

Penetration Testing Service. By Comsec Information Security Consulting

Smart Card APDU Analysis

Honeypot that can bite: Reverse penetration

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

Computer Security Literacy


Intruders & Intrusion Hackers Criminal groups Insiders. Detection and IDS Techniques Detection Principles Requirements Host-based Network-based

Promoting Network Security (A Service Provider Perspective)

CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Cyber Threats in Physical Security Understanding and Mitigating the Risk

IDS and Penetration Testing Lab ISA 674

A Decision Maker s Guide to Securing an IT Infrastructure

Cyber Security, Cyber Crimes and Cyber Laws

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Scene of the Cybercrime Second Edition. Michael Cross

Transcription:

Two Days Interactive workshop on Cyber Security and Ethical Hacking Total (16 HOURS) Workshop Designed & Powered by TCIL IT, Chandigarh Speaker:- Mr Rahul Tyagi - ETHICAL HACKER

Workshop Contents Cyber Security and Ethical Hacking 1. Ethical Hacking Introduction 1.1 Hackers and Ethical Hackers 1.3 World s top hacking communities 1.3 The hidden underground black hat world 1.4 Indian Cyber Army 2. Blue Print Building 2.1 Gathering info about the victim 2.2 Info gathering of websites 2.3 Info gathering about the present network 2.4 Getting the administration login panel of websites 3. Proxy Server / Be anonymous while attach 3.1 What are proxy servers 3.2 Standalone and web based proxy server 3.3 What are VPN and Socks 3.4 Chain Proxy a criminal hackers way 3.5 MAC spoofing hiding MAC address 4. Black word of RATing / Trojan Backdoors 4.1 How hackers control victim s computer using Trojan 4.2 How to bind malicious RATing with another file 4.3 Making your Trojan UD (Undetectable) FUD fully (Undetectable) 4.4 How to remove Trojan manually 5. Advance Google Hacking 5.1 Hacking unsecured CCTV 5.2 Smart Google hacks for students 5.3 Finding vulnerabilities in websites 5.4 XML attacks through Google 6. Penetrating Network Security

6.1 Introduction to wireless protocols 6.2 Wireless Routers working 6.3 Attacks on wired network 6.4 Cracking wireless routers password (WeP, WPP) 6.5 Security Network attacks 6.6 Network security policies for admin 7. Firewall Security in Corporate Sector 7.1 Firewall 7.2 Types of Firewall 7.3 Responsibilities of Firewall 7.4 Why Firewall security 8. Spamming / The JUNKYARD 8.1 Spamming 8.2 Top 10 Countries Under Spamming 8.3 Case Studies Fraud mail (Bank of Baroda) 8.4 Case Studies Fraud mail (VOLKS WAGON) 8.5 Case Studies Fraud mail (COCA COLA) 8.6 Email Spoofing / Fake Mail 8.7 Spoofing Websites and Tools 9. Digital Forensics and Criminal Tracing 9.1 Digital Forensics introduction 9.2 Data Recovery - Reasons for data loss 9.3 Evidence Recovery from lost data 9.4 Digital Forensic tools 9.5 Tracing Criminals on Internet /E-mail tracing 10. Analyzing modern methods of Stegnogarphy 10.1 Cryptography 10.2 PGP Security 10.3 The RSA blunder 10.5 Stegnography 10.5 Live Demonstration with manual procedure 10.6 Stegnography terrorists way 11. Advance Websites / Server Attacks

11.1 Web Application & Technologies available 11.2 OWASA top vulnerabilities 11.3 SQL Injection attack 11.4 By Pass Authentication attacks 11.5 Website Hacking Attack LFI, RFI, Server Rooting 11.6 SQL Injection with automated tools 11.7 Live 10 Hands on demonstration on real websites 12. Busting Windows Platform 12.1 System Hacking / Role of SAM 12.2 Hacking All Windows Platform, Admin Passwords. Windows XP, Vitsa, Windows 7 12.3 Hacking Admin with CMD 12.4 Buffer overflow attacks 13. E- Mail Hacking Techniques 13.1 E-Mail Hacking 13.2 Myths about E-Mail hacking 13.3 Understanding E- Mail Security 13.4 Creating Strong robust passwords 13.5 E-Mail Hacking tools available 13.6 Social Engineering 13.7 E-Mail attacks counter measures 13. Penetration Testing with Backtrack 5 R1 13.1 Penetration Testing 13.2 Motive of Pen Testing 13.3 Installing / Running Backtrack operating system 13.4 Hacking windows with Metaspoilt frame work 4.0 console 13.5 Armitage The bloody Hunk 13.6 Exploiting and Controlling with Armitage 13.7 Social Engineering toolkit R1 13.8 DNS Spoofing 13.9 E-Mail Collector 14. Corporate Mobile Hacking /Testing 14.1 Hacking Bluetooth of Mobile 14.2 Tracking Mobile 14.3 Role IMEI number 14.4 Blackberry Security v/s iphone 4 security 14.5 Jail breaking Live of iphone 4

Note: These are just the major aspects that we will be discussing, each point will be elaborated in detail with demonstrations of the tools and techniques. Workshop Highlights & Benefits Learn & Interact with renowned Experts Receive an unparalleled education on the art of computer security with personal one-onone attention from Rahul Tyagi Hands on Demonstrations of Latest Hacking Techniques & Tools. Hands on Demonstrations of various cases solved by Rahul Tyagi. PowerPoint Presentation, Live Demos, Interactive Question & Answer sessions and comprehensive reading material. Benefits of TechHacx Successfully conducted more than 150 workshops & seminars for Students & Professionals across globe. We helped Top Investigating Agencies to solve Cyber Terrorism Cases Workshop Material & CDs Comprehensive course material will be provided to participants. Ethical Hacking Toolkit - Participation Certificate to Every Participant from TECH-HACX Participation fee: Rs 1000/- for two days workshop With Regards Shekhar Gharu (Campus Evangelist) TCIL IT Chandigarh Training and Placement Division 09872403977, 09876795015,07696257444 Phone : 0172-4634529