FORBIDDEN - Ethical Hacking Workshop Duration



Similar documents
Loophole+ with Ethical Hacking and Penetration Testing

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

CYBERTRON NETWORK SOLUTIONS

Ethical Hacking & Cyber Security Workshop

Certified Cyber Security Analyst VS-1160

Detailed Description about course module wise:

Ethical Hacking Course Layout

ETHICAL HACKING CYBER SECURITY

Certified Ethical Hacker Exam Version Comparison. Version Comparison

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

CRYPTUS DIPLOMA IN IT SECURITY

Course Content: Session 1. Ethics & Hacking

A Systems Engineering Approach to Developing Cyber Security Professionals

Student Tech Security Training. ITS Security Office

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Certified Cyber Security Analyst VS-1160

Jort Kollerie SonicWALL

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

CEH Version8 Course Outline

Cybercrime in Canadian Criminal Law

Windows Operating Systems. Basic Security

Defending Against Data Beaches: Internal Controls for Cybersecurity

Professional Penetration Testing Techniques and Vulnerability Assessment ...

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Web Security School Final Exam

Principles of Information Assurance Syllabus


PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

What is Web Security? Motivation

Application Security Testing. Generic Test Strategy

Certified Ethical Hacker (CEH)

EC-Council. Certified Ethical Hacker. Program Brochure

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

Web App Security Audit Services

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

3 day Workshop on Cyber Security & Ethical Hacking

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

The Key to Secure Online Financial Transactions

Certified Cyber Security Expert V Web Application Development

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Build Your Own Security Lab

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

The Information Security Problem

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST


CHAPTER 10: COMPUTER SECURITY AND RISKS

Information Technology Career Cluster Advanced Cybersecurity Course Number:

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Securing Data on Microsoft SQL Server 2012

Web Application Penetration Testing

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Application Security Testing

Common Cyber Threats. Common cyber threats include:

Penetration Testing with Kali Linux

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

EC Council Certified Ethical Hacker V8

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

CompTIA Security+ (Exam SY0-410)

MS-55096: Securing Data on Microsoft SQL Server 2012

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Section 12 MUST BE COMPLETED BY: 4/22

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Check list for web developers

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

Executable Integrity Verification

Course Title: Course Description: Course Key Objective: Fee & Duration:

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking

What Do You Mean My Cloud Data Isn t Secure?

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Network Security Audit. Vulnerability Assessment (VA)

Introduction to Cyber Security / Information Security

Ed Ferrara, MSIA, CISSP Fox School of Business

Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

INFORMATION SECURITY FOR YOUR AGENCY

Workshop Designed & Powered by TCIL IT, Chandigarh

Detecting and Exploiting XSS with Xenotix XSS Exploit Framework

InfoSec Academy Application & Secure Code Track

Transcription:

Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said, "If you want a guarantee, buy a toaster." The only secure system is one that's unplugged, turned off, and in a locked room. As it's not practical to leave our systems turned off, we need to understand the risks to our systems and prepare ourselves to defend them. Preparation begins with understanding and that's where awareness comes in. With all the news stories about hackers, botnets, and breaches involving personal information, it's easy for the security message to sound over-used and tired. It's easy for people to say, "It won't happen here." Yet, studies and surveys repeatedly show that: the human factor (what employees do or don't do) is the biggest threat to information systems and assets. The best way to achieve a significant and lasting improvement in information security is not by throwing more technical solutions at the problem it's by raising awareness and training and educating everyone who interacts with computer networks, systems, and information. Module Structure Loophole+, Ethical Hacking and Penetration Testing workshop, aims to educate users of digital media of the threats, risks and privacy concerns that go with using them. The other goal of this training module is to expose issues and vulnerabilities to drive the digital media industry to create solutions to these problems. Detailed Module Basic Concept of Hacking Introduction to Ethical Hacking Elements of Information Security Information Security Supports the Mission of the Organization Information Security Should Be Cost-Effective Responsibilities and Accountability Should Be Made Explicit Owners Have Security Responsibilities Outside Organizations Roles and Responsibilities Senior Management Program and Functional Managers/Application Owners Users Common Threats: A Brief Overview Fraud and Theft Employee Sabotage Loss of Physical and Infrastructure Support Threats to Personal Privacy Cyber Law of India Information Technology Act 2000-2008 Introduction to IT Act 2000 Amendment 2008 Under Umbrella of IT Act 2000 o Cyber Crimes o Intellectual Property AxpinoTenchologies

o Data Protection and Property Limitations of Indian IT Act

Workshop Course Module Web Server as a Target Introduction to Penetration Testing Legal and Ethical Implications Types of Penetration Testing o White Box Penetration Testing o Black Box Penetration Testing o Grey Box Penetration Testing Setting Up Web Application Penetration Testing Lab Collecting and Installing PenTest Tools Flexible Browser with Security Add-ons Setting up Browser Proxies Beginning Application Penetration Testing Identification of Application Entry Points o Get and Post Parameters Testing for Security Vulnerabilities o SQL Injection o Cross Site Scripting o Session Hijacking o Local and Remote File Inclusion Attacks o Parameter Tampering Concept of Secure Programming Use Cryptography for Application Security Hashes Secure Key Storage Weak Practices in Cryptography Data Validation Strategies Where to include Data Validation Prevent Parameter Tampering o Hidden Fields Encoded Strings o HTML and URL Encoding o Delimiter and Special Characters Session Management Session ID Generation Session Handling o Regeneration of Session Tokens o Session Validation o Session Bruteforcing Session Termination Attacks on Social Media Cyber Social Media Threats Social Engineering o Human Based Social Engineering o Computer Based Social Engineering Fake Emails Keystroke Loggers Phishing Identity Theft Securing Your Cyber Social Life Awareness is the Key Email Security o Detecting Fake Emails o Creating Account Filters Online Account Security o Strong Password Setup o Designing Account Recovery Mechanism Secure Logout Browser Remember Password o Recognizing Phishing Websites AxpinoTenchologies

Google- Friend of Hacker Working of Google and its methodology Introduction to Crawlers, Bots Caching Process of Crawlers Various Roles of Google as a Friend of Hacker Advance Google Search Operators Directory Traversal Tool o Finding Directory Listings o Locating Specific Directories Vulnerable Website Locator o Locating via Company Tags o Locating via Web Applications o Locating via Common Names Various Attacks with the help of Google Password Harvesting Controlling CCTV Camera Virtualization Technique Introduction to Virtual Machines and Virtualization Concept of Virtualization Need and Advantages of Virtualization Installation and Configuration Hardware and Software Requirements Installation and Configuration Performance Optimization o o CPU & Memory Performance Network Performance Optimization Host to Host Networking Host to LAN Networking Storage Performance Windows operating System Hacking Introduction to Windows Security Overview of Windows OS Windows File System Security Architecture in Windows o Local Security Authority o Security Account Manager o Security Reference Monitor User Account Security Password Attacks in Windows o Bruteforcing, Dictionary and Rainbow Table Attacks Account Security Strengthening o Strong Password Policy o Additional Security: Syskey Encryption o User Account Control : Parental Controls o Restricting BIOS Setup Services, Port and Protocol Security Auditing and Monitoring Network Connections Restricting Ports, Protocols and Services Windows Firewall with Advance Restrictions Security Applications in Windows Auditing and Monitoring Windows Auto Startup Defending Windows via Windows Defender Policy Management with MBSA File and Folder Scanning with MSSE Trojan and Viruses Introduction to Computer Malware

Workshop Course Module Overview Malware: Malicious Software Proliferation and Purposes Types of Malware o Virus: Vital Information Resources Under Seize o Worm: Write Once Read Multiple o Trojan Horse, Rootkit o Spyware, Keystroke Logger Virus and Worm: Infectious Malware Significance of Virus and Worm Behavioral Activity of Virus and Worm Virus and Worm Development o By Automated Tools o Coding own Viruses and Worms Trojan Horse: Concealment Overview of Trojan Trojan Attack o Direct Connection o Reverse Connection Injection in System Files Detection and Removal Anti Malware Tools Manual Removal of Malwares Software Key Cracking Introduction to Assembly Language Role of Assembly Language in Reverse Engineering Concept of Debuggers and Dis-assemblers Understanding Data Flow Step Over view of Data flow Step Into view of Data flow Principles of Software Security Encryption Online Key Checking Fake Checking Points DLL Breakpoints Mini ACCESS DENIED Security Challenge Requirements Computer Device (Bring Your Own Device) Windows Operation System Working CD/DVD Drive Removable Storage Media (Pen Drives 1GB) Battery Backup for 60 minutes Challengers will be asked to install Virtual PC in their machines so that they can use the challenge machine. Level 1: Windows Password Cracking Windows virtual machine will be password protected. Challengers will be required to recover the password of the administration user account using the password cracking techniques demonstrated during the workshop. Level 2: Product Key Generation Windows virtual machine will carry a software setup. Challengers will be required to generate a valid product key against their name.target application will be with the Loophole+ Software Toolkit Demonstration AxpinoTenchologies

Winners will be required to demonstrate the solution of both the levels to all the participants of the workshop to declare their win.taking help of Google