FSP-201: Ethical Hacking & IT Security

Similar documents
Ethical Hacking Course Layout

FSP AC-104: Forensic Psychology

CEH Version8 Course Outline

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Certified Ethical Hacker Exam Version Comparison. Version Comparison

CYBERTRON NETWORK SOLUTIONS

CRYPTUS DIPLOMA IN IT SECURITY

[CEH]: Ethical Hacking and Countermeasures

EC Council Certified Ethical Hacker V8

Detailed Description about course module wise:

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Certified Ethical Hacker (CEH)

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

SONDRA SCHNEIDER JOHN NUNES

Course Title: Course Description: Course Key Objective: Fee & Duration:

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Course Content: Session 1. Ethics & Hacking


RMAR Technologies Pvt. Ltd.

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Build Your Own Security Lab

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

INFORMATION SECURITY TRAINING

EC-Council. Certified Ethical Hacker. Program Brochure

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Vulnerability Assessment and Penetration Testing

Ethical Hacking v7 40 H.

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

A Systems Engineering Approach to Developing Cyber Security Professionals

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Course Outline: Certified Ethical Hacker v8. Learning Method: Instructor-led Classroom Learning

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

LINUX / INFORMATION SECURITY

Network Attacks and Defenses

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Ethical Hacking and Countermeasures 5.0 Course ECEH5.0 5 Days COURSE OVERVIEW AUDIENCE OBJECTIVES OUTLINE

McAfee Certified Assessment Specialist Network

Certified Cyber Security Expert V Web Application Development

CS5008: Internet Computing

The Information Security Problem

CH EHC EC-Council Ethical Hacking and Countermeasures [v.9]

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

ETHICAL HACKING. By REAL TIME FACULTY

Ethical Hacking & Cyber Security Workshop

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

Information Technology Career Cluster Advanced Cybersecurity Course Number:

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

Audience. Pre-Requisites

CIS 4204 Ethical Hacking Fall, 2014

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Course Title: Penetration Testing: Security Analysis

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

CERTIFIED PENETRATION TESTING CONSULTANT

Security + Certification (ITSY 1076) Syllabus

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Workshop Designed & Powered by TCIL IT, Chandigarh

Certified Cyber Security Analyst VS-1160

Understanding Security Testing

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

Description: Objective: Attending students will learn:

BUY ONLINE FROM:

Ethical Hacking as a Professional Penetration Testing Technique

Scene of the Cybercrime Second Edition. Michael Cross

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

Certified Penetration Testing Specialist

Networking: EC Council Network Security Administrator NSA

FORBIDDEN - Ethical Hacking Workshop Duration

EC-Council Ethical Hacking and Countermeasures

Penetration Testing with Kali Linux

Introduction to Cyber Security / Information Security

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

Ed Ferrara, MSIA, CISSP Fox School of Business

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

CompTIA Security+ (Exam SY0-410)

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Network/Internet Forensic and Intrusion Log Analysis

EC-Council. Program Brochure. EC-Council. Page 1

MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY

Network Attacks. Common Network Attacks and Exploits

How To Protect Your Network From Attack From A Hacker On A University Server

CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

2016 TÜBİTAK BİLGEM Cyber Security Institute

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Information Security. Training

Transcription:

FSP-201: Ethical Hacking & IT Security Session 2015-16

OVERVIEW ABOUT SIFS INDIA COURSE INTRODUCTION ENTRY REQUIREMENTS HOW TO APPLY FEE STRUCTURE COURSE MODULES CAREER PROSPECTS LIBRARY TRAINING & INTERNSHIP CONTACT US 01 01 02 02 02 03 12 12 13 13

ABOUT SIFS INDIA SIFS INDIA was founded from 2005 with an aim to impart high quality and easily accessible Forensic Services and Education to meet the growing demand of Law enforcement and other Government and private legal Departments. We aim to encourage new developments and research in the field of Forensic Sciences including Cyber Law, Cyber Forensic, Fingerprint Verification and Handwriting Analysis. SIFS INDIA is registered with Govt. of India, We provide various science services including- Forensic Education-Department of Education provides various Forensic Science Courses in the fields of Forensic Science and Criminal Investigation. These courses provide you advantages for the development of your career in the fields of Private Forensic Investigation, Banks, Police Departments, Detective agency, IT industries, IB, CBI and many more.. We impart services to the several Govt. and Corporate agency to help them in field of forensics under our other departments such as- Forensic Investigation Forensic Training Forensic Internship Forensic Research Security Services Scientific Equipment Department COURSE INTRODUCTION Ethical hacking Ethical hackers are normally white hat guys who normally penetrates and secure IT system. Introduction to Computer Crime and Ethical Hacking: In this module we will have introduction to computers and cyber crime, printing counterfeit currency and documents. In addition software piracy and data recovery. Networking for Ethical Hacking: In this module we will discuss about networked computer crimes and unauthorized access and interception. We will Basics of computer viruses and programs, manipulating computer security and Internet. Image Identification: This module is about image processing, tapes, and video image processing and encryption methods. Database Searching: We will discuss basics of bioinformatics and in detail about database searching. Searching for sequence homology and alignment, basics of UNIX database programming and computing concepts. FSP-201: Ethical Hacking & IT Security 01

LEVEL - I 10th Passed from Recognized Board/School and basic knowledge of Science related field. ENTRY REQUIREMENTS LEVEL - II 12th Passed in any discipline from Recognized Board/School/basic knowledge of Science related field. LEVEL - III Graduation Passed from Registered Board/College and basic knowledge of Science related field. HOW TO APPLY 1. First select the course. Then Check the fees and fill up the complete online application form or download the application form. 2. Make sure to sign the application form. Include your complete mailing address and all other details. Please provide telephone number and/or email address and also attach a selfattested photograph of the candidate. 3. Things to be send with application form: Attach photocopies of the Academic qualification certificates duly attested by a notary or a Gazetted Officer (Mandatory); Send three additional passport size photographs along with the application form. Payment: Include the total fee as per the course selected as per your choice. Amount can be deposited in the bank or send a cheque or demand draft (DD) or money order (MO) or banker's cheque in favor of "SIFS INDIA" payable in Delhi. Visit: www.sifsindia.com/payment Post/e-Mail the above required items to- SIFS INDIA, 2443, Basement, Hudson Line, Kingsway Camp, Delhi-110009, India. What You Will Receive: Admission Letter, Online User name and Password to excess the course content, Printed Material (Books / Notes/ CD/DVD/Software's/Tools/Kit) (For Distance Courses Only), Identity Card and Examination Card, Course Completion Certificate, Mark Sheet and Certification. Fee for Online Course FEE STRUCTURE Fee for Distance Course LEVEL-I ` 8,000/- LEVEL-II ` 12,000/- LEVEL-III ` 15,000/- LEVEL-I ` 9,000/- LEVEL-II ` 13,000/- LEVEL-III ` 16,000/- 02 FSP-201: Ethical Hacking & IT Security

COURSE MODULES MODULE-1 MODULE-2 MODULE-3 MODULE-4 MODULE-5 MODULE-6 MODULE-7 MODULE-8 MODULE-9 MODULE-10 MODULE-11 MODULE-12 MODULE-13 MODULE-14 MODULE-15 MODULE-16 MODULE-17 MODULE-18 MODULE-19 MODULE-20 INTRODUCTION TO ETHICAL HACKING FOOTPRINTING AND RECONNAISSANCE SCANNING NETWORK ENUMERATION SYSTEM HACKING TROJANS AND BACKDOORS VIRUSES AND WORMS SNIFFING SESSION HIJACKING SOCIAL ENGINEERING DENIAL OF SERVICE (DOS) HACKING WEBSERVER SQL INJECTION HACKING WIRELESS NETWORKS EVADING IDS, FIREWALLS AND HONEYPOT BUFFER OVERFLOW CRYPTOGRAPHY PENETRATION TESTING MOBILE HACKING STENOGRAPHY

MODULE-1 INTRODUCTION TO ETHICAL HACKING 1.1 What is Hacking? 1.2 Understanding Security 1.3 Understanding Ethical Hacking 1.4 History of Hacking 1.5 Famous Hackers 1.6 Phases of Hacking 1.7 Ethical Hacking Industry Practices 1.8 Difference between Ethical Hacker and Malicious Hacker 1.9 Types of Hackers MODULE-2 FOOTPRINTING AND RECONNAISSANCE 2.1 Footprinting Concepts 2.1.1 Footprinting Terminology 2.1.2 What is Footprinting? 2.1.3 Why Footprinting? 2.1.4 Objectives of Footprinting 2.2 Footprint Methodology 2.2.1 Footprint through Search Engines 2.2.2 Finding Company's External and Internal URLs 2.2.3 Collect Location Information 2.2.4 People Search 2.2.5 People Search Online Services 2.2.6 People Search on Social Networking Services 2.3 Footprinting through Job Sites 2.3.1 Website Footprinting 2.3.2 Website Mirroring Tools 2.3.3 Extract Website Information 2.4 Email Footprinting 2.4.1 Tracking Email Communications 2.4.2 Collecting Information from Email Header 2.4.3 Email Tracking Tools 04 FSP-201: Ethical Hacking & IT Security

2.5 Footprinting using Google 2.5.1 Footprinting using Google Hacking Techniques 2.5.2 What a Hacker can do with Google Hacking? 2.5.3 Google Advance Search Operators 2.5.4 Finding Resources Using Google Advance Operator 2.5.5 Google Hacking Tool: Google Hacking Database (GHDB) 2.6 WHO IS Footprinting 2.6.1 WHO IS Lookup 2.6.2 WHO IS Lookup Result Analysis 2.7 DNS Footprinting 2.7.1 Extracting DNS Information 2.7.2 DNS Interrogation Tools 2.8 Footprinting through Social Engineering 2.8.1 Footprinting through Social Engineering 2.8.2 Collect Information Using Shoulder Surfing and Dumpster Diving 2.9 Footprinting Tools 2.9.1 Maltego 2.9.2 DNSEnum 2.9.3 Dmitr 2.9.4 Additional Footprinting Tools MODULE-3 SCANNING NETWORK 3.1 Introduction to Scanning 3.2 Introduction of Ports and Protocols 3.3 Types of Scanning 3.3.1 Port Scanning 3.3.2 Network Scanning 3.3.3 Vulnerability Scanning 3.4 Objective of Scanning 3.4.1 Detect Live Systems on Network 3.4.2 Discover Open Ports on System 3.4.3 OS Detection FSP-201: Ethical Hacking & IT Security 05

3.4.4 Service Detection and Version Detection 3.4.5 Obtaining IP from Host 3.4.6 Obtaining Host from IP 3.4.7 Discover IP Addresses in Network 3.5 Overview of TCP 3.6 Scanning Tools 3.6.1 Nmap 3.6.2 Host 3.6.3 NBT scan 3.6.4 Fping 3.6.5 Alive6 3.6.6 Netcat 3.6.7 Vega 3.6.8 Nessus MODULE-4 ENUMERATION 4.1 Enumeration Concepts 4.2 What is Enumeration? 4.3 Techniques for Enumeration 4.4 Services and Ports to Enumerate MODULE-5 SYSTEM HACKING 5.1 Information at Hand before System Hacking Stage 5.2 System Hacking 5.2.1 Cracking Password 5.2.2 Window Hacking by Ophcrack 5.2.3 Window Hacking by Hiren Boot 5.2.4 Window Hacking by Cmd 5.2.5 Linux Hacking MODULE-6 TROJANS AND BACKDOORS 6.1 Trojan Concepts 6.1.1 What is a Trojan? 06 FSP-201: Ethical Hacking & IT Security

6.1.2 Purpose of Trojans 6.1.3 What Do Trojan Creators Look For 6.1.4 Indications of a Trojan Attack 6.1.5 Common Ports used by Trojans 6.2 Trojan Infection 6.2.1 How to Infect Systems Using a Trojan 6.2.2 Different Ways a Trojan can Get into a System 6.2.3 How to Deploy a Trojan 6.3 Trojan Tools 6.3.1 Prorat 6.3.2 Cybergate 6.4 Trojan Detection MODULE-7 VIRUSES AND WORMS 7.1 What is Virus? 7.2 What are Worms? 7.3 Difference between Viruses and Worms 7.4 What are Key loggers? 7.5 How to infect system with Key loggers 7.6 Counter-measures 7.6.1 Virus Detection Methods 7.6.2 Virus and Worms Countermeasures 7.6.3 Anti-virus Tools MODULE-8 SNIFFING 8.1 Overview of Sniffing 8.2 Types of Sniffing 8.2.1 Active and Passive 8.3 What is ARP Poisoning? 8.4 What is MITM? 8.5 Sniffing Tools FSP-201: Ethical Hacking & IT Security 07

8.5.1 Ettercap 8.5.2 Cain and Able 8.5.3 Wireshark 8.6 HTTP Sniffing 8.7 SSL Stripping MODULE-9 SESSION HIJACKING 9.1 What is Session Hijacking? 9.2 Difference between Spoofing and Hijacking 9.3 Steps of Session Hijacking 9.4 Types of Session Hijacking 9.5 Brief introduction of TCP three way handshake 9.6 Client-Server Model 9.6.1 Two-tier 9.6.2 Three-tier 9.7 How to prevent Session Hijacking? MODULE-10 SOCIAL ENGINEERING 10.1 Social Engineering Concepts 10.1.1 What is Social Engineering? 10.1.2 Behaviors Vulnerable to Attacks 10.1.3 Factors that Make Companies Vulnerable to Attacks 10.1.4 Why Is Social Engineering Effective? 10.2 Social Engineering Techniques 10.3 Types of Social Engineering 10.3.1 Human Based 10.3.2 System Based 10.3.3 Mobile Based 10.4 How to Detect Phishing Emails 10.5 Phishing with Se Toolkit 10.6 Phishing on Web server 08 FSP-201: Ethical Hacking & IT Security

MODULE-11 DENIAL OF SERVICE (DOS) 11.1 DoS/DDoS Concepts 11.1.1 What is a Denial of Service Attack? 11.1.2 What Are Distributed Denial of Service Attacks? 11.1.3 How Distributed Denial of Service Attacks Work 11.1.4 Symptoms of a DoS Attack 11.1.5 Cyber Criminals 11.2 DDoS Case Study 11.2.1 DDoS Attack 11.2.2 DDoS Attack Tools: 11.2.2.1 LOIC 11.2.2.2 Anonymous MODULE-12 HACKING WEBSERVER 12.1 What is Webserver? 12.2 What is Database? 12.3 Hacking Webserver with Metasploit MODULE-13 SQL INJECTION 13.1 What is SQL Injection? 13.1.1 SQL Injection Attacks 13.1.2 How Web Applications Work? 13.2 Vulnerability Testing for SQL Injection 13.3 SQL Injection Cheat Sheet 13.4 SQL Injection Tools 13.4.1 SQL MAP 13.4.2 Havij 13.5 SQL Injection counter measures MODULE-14 HACKING WIRELESS NETWORKS 14.1 Wireless Concepts 14.1.1 Wireless Networks FSP-201: Ethical Hacking & IT Security 09

14.1.2 Wireless Standards 14.1.3 Service Set Identifier (SSID) 14.1.4 Wi-Fi Authentication Modes 14.1.5 Wi-Fi Authentication Process Using a Centralized Authentication Server 14.2 Wireless Encryption 14.2.1 Types of Wireless Encryption 14.2.2 WEP Encryption 14.2.3 How WEP Works? 14.2.4 What is WPA? 14.2.5 How WPA Works? MODULE-15 EVADING IDS, FIREWALLS AND HONEYPOT 15.1 IDS, Firewall and Honeypot Concepts 15.1.1 Intrusion Detection System (IDS) and their Placement 15.1.2 How IDS Works? 15.1.3 Ways to Detect an Intrusion 15.2 Firewall 15.2.1 Firewall Architecture 15.2.2 Demilitarized Zone (DMZ) 15.2.3 Types of Firewall 15.2.4 Packet Filtering Firewall 15.2.5 Circuit-Level Gateway Firewall 15.3 Honeypot 15.3.1 Types of Honeypots 15.3.2 How to Set Up a Honeypot? MODULE-16 BUFFER OVERFLOW 16.1 Buffer Overflow Concepts 16.2 Buffer Overflows 16.3 Why Are Programs and Applications Vulnerable to Buffer Overflows? 16.4 Buffer Overflow Counter-measures 16.5 Defense against Buffer Overflows 16.6 Preventing BOF Attacks 10 FSP-201: Ethical Hacking & IT Security

MODULE-17 CRYPTOGRAPHY 17.1 Cryptography Concepts 17.2 Cryptography 17.3 Types of Cryptography 17.4 Algorithms 17.4.1 Symmetric 17.4.2 Asymmetric 17.4.3 Hash 17.5 How to create Hash in any file 17.6 How to generate public and private keys MODULE-18 PENETRATION TESTING 18.1 Pen Testing Concepts 18.2 Security Assessments 18.3 Security Audit 18.4 Vulnerability Assessment 18.5 Limitations of Vulnerability Assessment 18.6 Introduction to Penetration Testing 18.7 Penetration Testing 18.8 Why Penetration Testing? 18.9 Comparing Security Audit, Vulnerability Assessment and Penetration Testing 18.10 What should be tested? 18.11 What Makes a Good Penetration Test? 18.12 Types of Pen Testing 18.12.1 Black-box Penetration Testing 18.12.2 Grey-box Penetration Testing 18.12.3 White-box Penetration Testing MODULE-19 MOBILE HACKING 19.1 SIM Cloning 19.2 Call Spoofing 19.3 Message Spoofing FSP-201: Ethical Hacking & IT Security 11

19.4 Hacking Codes 19.5 Hacking Android OS MODULE-20 STENOGRAPHY 20.1 What is Stenography? 20.2 Hiding Text behind Image 20.3 Hiding Image behind Image 20.4 Hiding Video behind Image 20.5 Hiding Text behind Text 20.6 Drive Hiding 20.7 Tools of Stenography Cyber investigator: Electronic evidence is fragile and can easily be modified. Moreover, cyber thieves, criminals, dishonest and even honest employees hide, wipe, disguise, cloak, encrypt and destroy evidence from storage media using a variety of freeware, shareware and commercially available utility programs. Cyber investigator can easily detect it at private level. Ethical Hacker: Ethical Hackers is a term commonly applied to a computer user who intends to gain authorized access to a computer system. Ethical Hackers are skilled computer users who penetrate computer systems to gain knowledge about computer systems and how they work. Placement Agencies: In government sector: Central Bureau of Investigation (CBI), Intelligence Bureau (IB), Central Forensic Science Lab (CFSL), State Forensic Lab (SFL) In private sector: Private Detective Agencies, Banks & Insurance Company, Legal firms and private companies... LIBRARY CAREER PROSPECTS We have online Forensic e-library, which have more than 1000 Forensic Books. We provide membership number with username and password to enrolled students. Students can use this to access our online materials straight away. 12 FSP-201: Ethical Hacking & IT Security

TRAINING & INTERNSHIP After completion of online course we provide Training and Internship which help in making your career as a Forensic Expert. Training includes several practical aspects with real cases and crime scene visit. 2015-16 All right including copyrights reserved with the publishers. No part of this book may be reproduced or Copied in any form of by any means (Graphic, Electronic or Mechanical), or reproduced on any information storage devices, without the written permission of the publishers. Note: Due care has been taken while publishing this book, but the author, Publisher and Printers are not responsible in any manner for any mistake that may have inadvertently crept in. In case of doubts the reader shall cross-check the contents with original Government Publication of Notifications, Any mistakes noted may be brought to our notice which shall be taken care in the next edition. All disputes subject to Delhi Jurisdiction only. CONTACT US Published by 2015-16 SIFS INDIA Office: 2443, Basement, Hudson Line, Kingsway Camp, Delhi-110009, India Phone : +91-11-47074263, +91-9871502343 Email : education@sifs.in, Web : www.sifs.in FSP-201: Ethical Hacking & IT Security 13