ETHICAL HACKING & CYBER SECURITY (Winter Training Program 2013-14) PRESENTED BY In association with Magniva Technology Pvt. Ltd. Office: 217, Murli Bhawan, 10A Ashok Marg, Hazratganj, Lucknow, (U.P.) Email: info@magnivatech.com Website: www.magnivatech.com Office: +91-0522-4074359 Copyright Magniva Technology Pvt. Ltd. 2013. All rights reserved
Course Name : Certification : by Magniva Technology Pvt. Ltd. in association with Megalith 14 IIT-Kharagpur Study Material : Course content, CDs and Project Reports Free to each participant Ethical Hacking Toolkit : Free to Each Participant Fees & Duration: For Fees : Rs 4,500/- Per Participant Duration : 15 Days/30 hrs DAYS TOPICS DURATION Day 1 Introduction Fundamental of Ethical Hacking Hacking Vs. Ethical Hacking Types of Hackers Skill Profile of a Hacker Some Famous Hackers and Groups Cyber World Advantage and Disadvantage of Cyber world Cyber World as a Home of hackers Day 2 Overview of Cyber Law Introduction To Cyber Law Cyber Laws Indian Technical Aspect Of Indian Cyber Law IT ACT 2000 & 2008 Internet Crimes And Frauds Cyber Law Cases In India Organization Under Cyber Laws Advantages Of Cyber Laws www.magnivatech.com Page 1
Day 3 Information Gathering What Is Information Gathering & Why Hackers Need This? Types Of Information Gathering Information Gathering Using Websites Information Gathering Using Software Information Gathering Using Add-Ons Search Engines- Smart Way Of Information Gathering Scanning And Enumeration Tracing - E-Mail, Mobile Phone, Intruder Day 4 Virtualization & System Cloning Introduction Of Virtualization Need & Use Of Virtualization Virtual box Installing OS On Virtual Machines Networking In Virtual Machines System Cloning Troubleshooting Other Tools For Virtualization Day 5 Windows Hacking & Security (Win 8 & Win 7) Windows OS & Security Hacking Into System By Changing Passwords Getting Access To System By Elevating Privileges Finding Out The Passwords Of Windows Bypassing The Windows Security Hack from Guest to Admin Password in Plain Text Directly Hacking By USB Devices Mitigation Of System Attacks Setting Up A Secure System www.magnivatech.com Page 2
Day 6 Password Cracking Techniques What is Password Cracking Types of Password Cracking Techniques How Different Password Crackers Work Windows Password Cracking FTP / Network Password Cracking Zip/ RAR Password Cracking Doc & PDF Password Cracking Using GPU For Password Cracking Password Security Day 7 Data Hiding Techniques What Is Steganography How Attacker Hides His Data In Images And Other Formats How To Find Data Which Are Hidden What Is Cryptography Advanced Cryptography Tools How Are Programs And Data Wrapped Secure Measures To Protect Our Data Day 8 Hacking By Batch Programming & Scripting Basics Of Scripting Languages Used In Scripting Writing Your First Program Malacious Program Scripting Session Hijacking Using Batch Scripting Data Theft Using Batch Script Automation Using Scripting Designing Tools Using Scripting Developing Security Tools Using Scripting. www.magnivatech.com Page 3
Day 9 Hacking by Viruses, Trojans, Keyloggers & Spywares What is Trojan? Trojans Attack Big Famous Cases Types Of Trojans Different way a Trojan Can Get Into A System How We Create A Trojan and Control System How Attacker Bypass Your Antivirus By Trojans Analysis Of Trojans/Virus How we remove Trojans Manually Security Against Trojans Day 10 Malware Analysis & Fake Antivirus Detections Introduction of Malware Types of Malware Common Malwares In Cyber Types of Malware Analysis Manual Malware Analysis Tools for Malware Analysis Countermeasures Day 11 IDS, IPS and Honeypots Overview of IDS, IPS & Honeypot Use of IDS & IPSAssignment & Revision Installation of IDS & IPS Prevention & Detection Honeypot & its Types Implementation Honeypots Honeypot Tools www.magnivatech.com Page 4
Day 12 Proxy Server & Virtual Private Network (VPN) Technology Proxy And Types Of Proxies Why Hackers Use Proxy? How To Hide IP Address While Chatting How To Open Block Website In College/Companies Convert Your Machine As Proxy Server With HTTPS Proxy Advantage And Disadvantage Of Proxy Analyzing Proxy Bug Day 13 Hack Password How Proxy Hack Your Passwords Etc What Is Better Than Proxy What Is VPN? Why We Use VPN Advantage & Disadvantage Of VPN Free VPN Countermeasures Day 14 Google Database Hacking Introduction And Working Of Search Engines List Of Common Search Engines On Web Comparing And Choosing Best Search Engine Dorks For Hacking Search Engines Tools For Search Engines Hacking Web Ripping Finding Admin Pages And Weakness In Site Security Against Search Engine Hacking Day 15 PROJECTS / ASSINGMENT ETHICAL HACKING & CYBER SECURITY Software CD & Study Materials www.magnivatech.com Page 5
Why Training from Magniva Technology? Lot of Major Projects will be covered in this training. Our syllabus is professionally designed to cover Basic as well as Advance aspects of Ethical Hacking & Cyber Security. Each day of our training is well planned to provide you the Theoretical as well as Practical Knowledge of the module. Each day will come up with New Practical s & Projects which makes the training interesting and exciting. Time to time Practical Assignments will be provided to the students, which will help them in doing practice at home. 6. Revision Time & Query Sessions are provided to the students which help them in clearing their all previous doubts. 7. Exam will be conducted at the end of basic as well as Advance module to test the knowledge level of the students. 8. Time for Project Work will be provided to the students, in which students will develop a project of their own choice. This will encourage Innovative Ideas among students. Pre-Requisites 1. Passion to learn new creative things. 2. Having basic knowledge of Computers. Who Could Attend this Training? Students from B.E/B.Tech/M.Tech/Diploma (ECE/EEE/CSE/IT/MECH) can join this. Anyone who have interest in this field and have pre-requisite knowledge. www.magnivatech.com Page 6