RMAR Technologies Pvt. Ltd.



Similar documents
Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

CRYPTUS DIPLOMA IN IT SECURITY

Ethical Hacking Course Layout

CYBERTRON NETWORK SOLUTIONS

Detailed Description about course module wise:

CEH Version8 Course Outline

Course Content: Session 1. Ethics & Hacking

[CEH]: Ethical Hacking and Countermeasures

Ethical Hacking & Cyber Security Workshop

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Certified Cyber Security Expert V Web Application Development

FSP-201: Ethical Hacking & IT Security

ETHICAL HACKING CYBER SECURITY

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Title: Course Description: Course Key Objective: Fee & Duration:

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0


EC-Council Ethical Hacking and Countermeasures

EC Council Certified Ethical Hacker V8

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

SONDRA SCHNEIDER JOHN NUNES

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Certified Ethical Hacker (CEH)

June 2014 WMLUG Meeting Kali Linux

Learn Ethical Hacking, Become a Pentester

CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security

Ethical Hacking and Countermeasures 5.0 Course ECEH5.0 5 Days COURSE OVERVIEW AUDIENCE OBJECTIVES OUTLINE

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Audience. Pre-Requisites

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

The Value of Physical Memory for Incident Response

Web Applications The Hacker s New Target

Loophole+ with Ethical Hacking and Penetration Testing

A Systems Engineering Approach to Developing Cyber Security Professionals

Full version is >>> HERE <<<

How To Classify A Dnet Attack

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

FORBIDDEN - Ethical Hacking Workshop Duration

Security Awareness. Wireless Network Security

Build Your Own Security Lab

Principles of Information Assurance Syllabus

Information Technology Career Cluster Advanced Cybersecurity Course Number:

Vulnerability Assessment and Penetration Testing

Client logo placeholder XXX REPORT. Page 1 of 37

Virtual Learning Tools in Cyber Security Education

Application Security Testing

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

LINUX / INFORMATION SECURITY

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

2016 TÜBİTAK BİLGEM Cyber Security Institute

INFORMATION SECURITY TRAINING CATALOG (2016)

Section 12 MUST BE COMPLETED BY: 4/22

Securing end devices

Certified Cyber Security Analyst VS-1160

McAfee Certified Assessment Specialist Network

Penetration Testing with Kali Linux

LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS

Ethical Hacking v7 40 H.

Microsoft Technologies

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

Metasploit ing the target machine is a fascinating subject to all security professionals. The rich list of exploit codes and other handy modules of

Attacks from the Inside

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

Quick Start Guide to Ethical Hacking

Certified Cyber Security Analyst VS-1160

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Securing Cisco Network Devices (SND)

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

INFORMATION SECURITY TRAINING

CH EHC EC-Council Ethical Hacking and Countermeasures [v.9]

Networking: EC Council Network Security Administrator NSA

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

Information Security. Training

Workshop Designed & Powered by TCIL IT, Chandigarh

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Additional information >>> HERE <<< Online, Download Free ebook Address Search - ebook

Chapter 15: Computer and Network Security

Network Security: Introduction

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

Professional Penetration Testing Techniques and Vulnerability Assessment ...

FortKnox Personal Firewall

SCP - Strategic Infrastructure Security

CYBER SECURITY. II. SCANDALOUS HACKINGS To show the seriousness of hacking we have included some very scandalous hacking incidences.

APT Advanced Persistent Threat Time to rethink?

10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group

COMPUTER NETWORK TECHNOLOGY (300)

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Transcription:

Course Name : StartXHack V2.0 Ethical Hacking & Cyber Security Course Duration : 2 Days (8Hrs./day) Course Fee : INR 1000/participant Course Module : 1. Introduction to Ethical Hacking a. What is Ethical Hacking? b. Who are Hackers? c. Types of Hackers d. Various Hacking Attacks Overview i. SQLi (SQL Injection) ii. XSS (Cross Site Scripting) iii. System Hacking Attacks 1. Offline Attacks 2. Online Attacks iv. Wireless Hacking v. Metasploit vi. RAT e. What is Hacktivism f. Case Study of Hacking Crimes g. Opportunities in the field of Cyber Security Domain 2. Basics of Networking & Internet a. What is IP? b. Classes of IP i. Public & Private IP ii. Dynamic & Static IP c. Introduction to CMD i. Ping Command ii. Tracing Route

iii. Address Resolution Protocol (ARP) iv. TTL (time to live) v. Network Statistics d. Introduction to DHCP e. Introduction to Virtual Machine i. NAT and Bridge Mode ii. Installing Operating System over Virtual Machine f. What are port numbers in computing 3. System Hacking a. Information at Hand Before System Hacking Stage b. System Hacking: Goals c. Hacking Methodology d. System Hacking Steps e. Cracking Passwords f. Password Cracking using Kali Linux g. Password Cracking using OPHCrack h. Offline Password Cracker i. Trinity Rescue Kit j. Konboot k. Any Linux Password Cracking l. Escalating Privileges m. Keyloggers n. Executing Applications o. Hiding Files p. Covering Tracks q. Countermeasures 4. Introduction to Metasploit a. What is Metasploit b. Basics of Metasploit

c. Introduction to Meterpreter i. Webcam Hacking ii. Remote Keylogger iii. Stdapi iv. Remote Desktop v. Mozilla password, cookies, history hacking vi. Timestomp d. Hacking Windows XP & 7 5. Introduction to Digital Forensics a. What is Digital Forensics b. File Carving 6. Email and Social Networking Sites Account Hacking a. What is Email? b. How Email Works? c. Make your machine SMTP Server d. Email Spoofing e. Email Bombing f. Phishing i. What is Phishing? ii. Facebook, Gmail, Twitter, Yahoo account hacking using phishing iii. Phishing using Kali Linux iv. Desktop Phishing g. Countermeasures 7. Wireless Hacking a. Wireless Concepts b. Wireless Encryptions c. Wireless Threats d. Wireless Hacking Methodology e. Wifi Discovery

f. Wireless Traffic Analysis g. Launch Wireless Attacks h. Cracking Wifi Encryption i. Cracking WEP Encryption ii. Cracking WPA Encryption i. Wireless Hacking Tools 8. Website Hacking a. SQL Injection i. Normal SQLi ii. Query based SQLi b. XSS Attack c. Web Ripping i. HTTrack ii. BlackWidow d. Web Backdoor Shell e. Countermeasures 9. Denial of Service (DoS) Attack a. DHCP DoS Attack i. Dhcp Starvation Attack b. Introduction to DDoS (Distributed Denial of Service) Attack i. BanglaDoS c. Countermeasures 10. Honeypot a. What is Honeypot b. Types of Honeypot c. Configuration and Installation of Valhala Honeypot

11. Virus, Trojans and Backdoors a. What is Virus? b. Types of Viruses c. Difference between Virus and Worm d. Making Virus using batch programming i. App Bomber ii. System Crasher iii. Shutdown virus e. What is Trojan? f. Types of Trojan i. Direct Connection ii. Reverse Connection g. Injection system with Beast Trojan h. Making backdoors and accessing the system i. Countermeasures 12. Mobile Hacking a. Fake Calling i. Softphones ii. Websites 13. Social Engineering a. Shoulder Surfing b. SET in Kali Linux c. Mail Attachments d. Website Faking 14. Reverse Engineering a. What is Reverse Engineering b. Disassembling of Software i. Ollydbg

ii. Win disassembler c. Trial Version to Full version conversion d. Counter Measures 15. RMAR Research Paper Discussion a. Free Online Shopping from Ebay b. Introduction to Hacking Credit Cards and performing Carding (Verbal) c. Countermeasures