ETHICAL HACKING CYBER SECURITY



Similar documents
Ethical Hacking & Cyber Security Workshop

Detailed Description about course module wise:

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

CRYPTUS DIPLOMA IN IT SECURITY

FORBIDDEN - Ethical Hacking Workshop Duration

Course Title: Course Description: Course Key Objective: Fee & Duration:

CYBERTRON NETWORK SOLUTIONS

RMAR Technologies Pvt. Ltd.

Loophole+ with Ethical Hacking and Penetration Testing

Certified Cyber Security Analyst VS-1160

Ethical Hacking Course Layout

Course Content: Session 1. Ethics & Hacking

Certified Cyber Security Expert V Web Application Development

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

CEH Version8 Course Outline

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Workshop Designed & Powered by TCIL IT, Chandigarh

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Certified Cyber Security Analyst VS-1160

Introduction to Cyber Security / Information Security

EC Council Certified Ethical Hacker V8

EC-Council Ethical Hacking and Countermeasures

[CEH]: Ethical Hacking and Countermeasures

Student Tech Security Training. ITS Security Office

EC-Council. Certified Ethical Hacker. Program Brochure

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Certified Ethical Hacker (CEH)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

EC-Council Certified Security Analyst (ECSA)

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

SONDRA SCHNEIDER JOHN NUNES

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0

Hackers are here. Where are you?

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

CHAPTER 10: COMPUTER SECURITY AND RISKS

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Understanding Security Testing

EC-Council. Program Brochure. EC-Council. Page 1

Section 12 MUST BE COMPLETED BY: 4/22

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited


If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

FSP-201: Ethical Hacking & IT Security

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

InfoSec Academy Pen Testing & Hacking Track

Description: Objective: Attending students will learn:

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

Penetration Testing with Kali Linux

GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V

Introduction to Ethical Hacking and Network Defense. Objectives. Hackers

ASK PC Certified Information Systems Security Expert - CISSE

Principles of Information Assurance Syllabus

CH EHC EC-Council Ethical Hacking and Countermeasures [v.9]

Hackers are here. Where are you?

CS Ethical Hacking Spring 2016

Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document

Penetration Testing Service. By Comsec Information Security Consulting

CIS 4204 Ethical Hacking Fall, 2014

Introduction. PCI DSS Overview

Computer Security DD2395

Module 5: Analytical Writing

LINUX / INFORMATION SECURITY

Ethical Hacking and Countermeasures 5.0 Course ECEH5.0 5 Days COURSE OVERVIEW AUDIENCE OBJECTIVES OUTLINE

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Build Your Own Security Lab

Targeted attacks: Tools and techniques

Executable Integrity Verification

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Cyber Security, Cyber Crimes and Cyber Laws

Keystroke Encryption Technology Explained

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws

ICANWK406A Install, configure and test network security

Web application testing

Certified Secure Computer User

The Key to Secure Online Financial Transactions

Application Security Testing

Global Partner Management Notice

InfoSec Academy Application & Secure Code Track

Transcription:

ETHICAL HACKING & CYBER SECURITY (Winter Training Program 2013-14) PRESENTED BY In association with Magniva Technology Pvt. Ltd. Office: 217, Murli Bhawan, 10A Ashok Marg, Hazratganj, Lucknow, (U.P.) Email: info@magnivatech.com Website: www.magnivatech.com Office: +91-0522-4074359 Copyright Magniva Technology Pvt. Ltd. 2013. All rights reserved

Course Name : Certification : by Magniva Technology Pvt. Ltd. in association with Megalith 14 IIT-Kharagpur Study Material : Course content, CDs and Project Reports Free to each participant Ethical Hacking Toolkit : Free to Each Participant Fees & Duration: For Fees : Rs 4,500/- Per Participant Duration : 15 Days/30 hrs DAYS TOPICS DURATION Day 1 Introduction Fundamental of Ethical Hacking Hacking Vs. Ethical Hacking Types of Hackers Skill Profile of a Hacker Some Famous Hackers and Groups Cyber World Advantage and Disadvantage of Cyber world Cyber World as a Home of hackers Day 2 Overview of Cyber Law Introduction To Cyber Law Cyber Laws Indian Technical Aspect Of Indian Cyber Law IT ACT 2000 & 2008 Internet Crimes And Frauds Cyber Law Cases In India Organization Under Cyber Laws Advantages Of Cyber Laws www.magnivatech.com Page 1

Day 3 Information Gathering What Is Information Gathering & Why Hackers Need This? Types Of Information Gathering Information Gathering Using Websites Information Gathering Using Software Information Gathering Using Add-Ons Search Engines- Smart Way Of Information Gathering Scanning And Enumeration Tracing - E-Mail, Mobile Phone, Intruder Day 4 Virtualization & System Cloning Introduction Of Virtualization Need & Use Of Virtualization Virtual box Installing OS On Virtual Machines Networking In Virtual Machines System Cloning Troubleshooting Other Tools For Virtualization Day 5 Windows Hacking & Security (Win 8 & Win 7) Windows OS & Security Hacking Into System By Changing Passwords Getting Access To System By Elevating Privileges Finding Out The Passwords Of Windows Bypassing The Windows Security Hack from Guest to Admin Password in Plain Text Directly Hacking By USB Devices Mitigation Of System Attacks Setting Up A Secure System www.magnivatech.com Page 2

Day 6 Password Cracking Techniques What is Password Cracking Types of Password Cracking Techniques How Different Password Crackers Work Windows Password Cracking FTP / Network Password Cracking Zip/ RAR Password Cracking Doc & PDF Password Cracking Using GPU For Password Cracking Password Security Day 7 Data Hiding Techniques What Is Steganography How Attacker Hides His Data In Images And Other Formats How To Find Data Which Are Hidden What Is Cryptography Advanced Cryptography Tools How Are Programs And Data Wrapped Secure Measures To Protect Our Data Day 8 Hacking By Batch Programming & Scripting Basics Of Scripting Languages Used In Scripting Writing Your First Program Malacious Program Scripting Session Hijacking Using Batch Scripting Data Theft Using Batch Script Automation Using Scripting Designing Tools Using Scripting Developing Security Tools Using Scripting. www.magnivatech.com Page 3

Day 9 Hacking by Viruses, Trojans, Keyloggers & Spywares What is Trojan? Trojans Attack Big Famous Cases Types Of Trojans Different way a Trojan Can Get Into A System How We Create A Trojan and Control System How Attacker Bypass Your Antivirus By Trojans Analysis Of Trojans/Virus How we remove Trojans Manually Security Against Trojans Day 10 Malware Analysis & Fake Antivirus Detections Introduction of Malware Types of Malware Common Malwares In Cyber Types of Malware Analysis Manual Malware Analysis Tools for Malware Analysis Countermeasures Day 11 IDS, IPS and Honeypots Overview of IDS, IPS & Honeypot Use of IDS & IPSAssignment & Revision Installation of IDS & IPS Prevention & Detection Honeypot & its Types Implementation Honeypots Honeypot Tools www.magnivatech.com Page 4

Day 12 Proxy Server & Virtual Private Network (VPN) Technology Proxy And Types Of Proxies Why Hackers Use Proxy? How To Hide IP Address While Chatting How To Open Block Website In College/Companies Convert Your Machine As Proxy Server With HTTPS Proxy Advantage And Disadvantage Of Proxy Analyzing Proxy Bug Day 13 Hack Password How Proxy Hack Your Passwords Etc What Is Better Than Proxy What Is VPN? Why We Use VPN Advantage & Disadvantage Of VPN Free VPN Countermeasures Day 14 Google Database Hacking Introduction And Working Of Search Engines List Of Common Search Engines On Web Comparing And Choosing Best Search Engine Dorks For Hacking Search Engines Tools For Search Engines Hacking Web Ripping Finding Admin Pages And Weakness In Site Security Against Search Engine Hacking Day 15 PROJECTS / ASSINGMENT ETHICAL HACKING & CYBER SECURITY Software CD & Study Materials www.magnivatech.com Page 5

Why Training from Magniva Technology? Lot of Major Projects will be covered in this training. Our syllabus is professionally designed to cover Basic as well as Advance aspects of Ethical Hacking & Cyber Security. Each day of our training is well planned to provide you the Theoretical as well as Practical Knowledge of the module. Each day will come up with New Practical s & Projects which makes the training interesting and exciting. Time to time Practical Assignments will be provided to the students, which will help them in doing practice at home. 6. Revision Time & Query Sessions are provided to the students which help them in clearing their all previous doubts. 7. Exam will be conducted at the end of basic as well as Advance module to test the knowledge level of the students. 8. Time for Project Work will be provided to the students, in which students will develop a project of their own choice. This will encourage Innovative Ideas among students. Pre-Requisites 1. Passion to learn new creative things. 2. Having basic knowledge of Computers. Who Could Attend this Training? Students from B.E/B.Tech/M.Tech/Diploma (ECE/EEE/CSE/IT/MECH) can join this. Anyone who have interest in this field and have pre-requisite knowledge. www.magnivatech.com Page 6