GOVERNMENT CERTIFICATE COURSE IN CYBER SECURITY AND ETHICAL HACKING
Thane | Kharghar
Drop your details to get a callback from us
Our Training Process
ETHICAL HACKING & CYBER SECURITY
Hacking has been a part of computing for almost five decades and it is a very broad discipline, which covers a
wide range of topics. The first known event of hacking had taken place in 1960 at MIT and at the same time, the
term "Hacker" was originated.
Hacking is the act of finding the possible entry points that exist in a computer system or a computer network and
finally entering into them. Hacking is usually done to gain unauthorized access to a computer system or a computer
network, either to harm the systems or to steal sensitive information available on the computer.Hacking is usually
legal as long as it is being done to find weaknesses in a computer
or network system for testing purpose. This sort of hacking is what we call Ethical Hacking.
A computer expert who does the act of hacking is called a "Hacker". Hackers are those who seek knowledge, to
understand how systems operate, how they are designed, and then attempt to play with these systems.
GOVERNMENT CERTIFICATE COURSE IN CYBER SECURITY AND ETHICAL HACKING CURRICULUM
Overview of Cyber Security, Internet Governance – Challenges and Constraints,
Cyber Threats; Cyber Warfare, Cyber Crime, Cyber terrorism, Cyber Espionage
Need for a Comprehensive Cyber Security Policy, Need for a Nodal Authority,
Need for an International convention on Cyberspace
Essential Terminologies: CIA, Risks, Breaches, Threats, Attacks, Exploits,
Information Gathering (Social Engineering, Foot Printing & Scanning). Open
Source/ Free/ Trial Tools: nmap, zenmap, Port Scanners, Network scanners
Introduction to Cryptography, Symmetric key Cryptography, Asymmetric key
Cryptography, Message Authentication, Digital Signatures, Applications of
Cryptography
Overview of Firewalls - Types of Firewalls, User Management, VPN Security
Security Protocols: Security at the Application Layer, PGP and S/MIME, Security
at Transport Layer - SSL and TLS, Security at Network Layer-IPSec
Python programming environment Overview
Introduction to System Security, Server Security, OS Security, Physical Security
Introduction to Networks, Network packet Sniffing, Network Design Simulation
DOS/DDOS attacks. Asset Management and Audits, Vulnerabilities and Attacks
Intrusion detection and Prevention Techniques, Host based Intrusion prevention
Systems, Security Information Management, Network Session Analysis, SystemIntegrity Validation.
Internet Security, Cloud Computing & Security, Social Network sites security,
Cyber Security
Vulnerabilities - Overview, vulnerabilities in software, System administration,
Complex Network Architectures, Open Access to Organizational Data, Weak
Authentication, Authorization, Unprotected Broadband communications, Poor
Cyber Security Awareness.
Cyber Security Safeguards - Overview, Access control, IT Audit, Authentication,
Biometrics, Cryptography, Deception, Denial of Service Filters, Ethical Hacking,
Firewalls, Intrusion Detection Systems, Response, Scanning, Security policy,
Threat
Open Web Application Security Project (OWASP), Web Site Audit and
Vulnerabilities assessment.
Open Source/Free/Trial Tools: Win Audit, Zap proxy (OWASP), burp suite,
DVWA kit. Hands on project and mini project
Explanation of Malware, Types of Malware: Virus, Worms, Trojans, Rootkits,
Robots, Adware’s, Spywares, Ransom wares, Zombies etc., OS Hardening
(Process Management, Memory Management, Task Management, Windows
Registry/services another configuration)
Malware Analysis. Open Source/Free/Trial Tools: Antivirus Protection, Anti
Spywares, System tuning tools, Anti Phishing. Hands on Cyber security and
Framework
Biometrics, Mobile Computing and Hardening on android and ios, IOT Security
Web server configuration and Security, Introduction, Basic security for HTTP
Applications and Services
Basic Security for Web Services like SOAP, REST etc., Identity Management and
Web Services
Authorization Patterns, Security Considerations, Challenges. Open
Source/Free/Trial Tools: adb for android, xcode for ios, Implementation of
REST/ SOAP web services and Security implementations
Reviews and Conclusion
Introduction to Cyber Forensics, Need of Cyber Forensics, Cyber Evidence,
Documentation and Management of Crime Sense, Image Capturing and its
importance, Partial Volume Image, Web Attack Investigations, Denial of Service
Investigations, Internet Crime Investigations, Internet Forensics, Steps for
Investigating Internet Crime, Email Crime Investigations.
Handling Preliminary Investigations, Controlling an Investigation, Conducting
disk-based analysis, Investigating Information-hiding, Scrutinizing E-mail,
Validating E-mail header information, Tracing Internet access, Tracing memory
in real-time.
Introduction to Cyber Security Regulations, Roles of International Law, the state
and Private Sector in Cyberspace, Cyber Security Standards. The INDIAN
Cyberspace, National Cyber Security Policy 2013.
LINUX and Networking, Doxing, Website/IP information gathering, Network
Mapping, Google Hacking, Discovering IP Range and Open Port
Identifying Target Operating System and Services, Secure Bypassing Firewalls
while Scanning, Understanding Wireless Networks, De-authentication attack,
Fragmentation attacks,,Chop Chop attack, Fake authentication, Evil Twin Attack,
Cafe-latte attack, Reveal Hidden SSID’s, WPA and WPA2 wireless password
Hacking techniques, Cracking Wireless Passwords using Rainbow tables, Brute
force techniques. Wordpress-scan, Drupal scan, Joomscan, cms-explorer for CMS
Hacking and Pentesing, Websploit, SET, Fast-Track SQL Pwnage, Winautopwn for
various System
Learning Various Methods to Use Proxies, Hiding yourself behind VPN, Using
Proxies and VPN for Hacking Tools i.e Scanning, Configuring TOR with Backtrack
and Nmap for Invisible Scanning, Using Tunneling methods for IP hide
Types of Email Addresses, Security measures for Phishing, Security measures for
Password Guessing, Security measures for Mobile Phone, Hacking Windows
Passwords using various methods & Security, Cracking SAM file, Protecting SAM
file from hack
Privilege Escalation in windows and Linux, Using Stealers, Key loggers and
Remote Administrations Tools (RATs), Creating Undetectable Viruses using
Crypters, Binders and Assembly Codes
Protection against Trojans, Worms and Malwares, Advance SQL Injection, Cross
Site Scripting, Router Hacking, Sniffing Data and Passwords, ARP , DNS, DHCP
Spoofing attacks. DNS poising , DOS attack against an IP address Flood the LAN
with random MAC addresses.
Computer Investigation Process and Collecting Digital Evidences
TCyber Crime Investigation and Understanding various trace back Techniques
Acquiring data, duplicating data and Recovering deleted Files
Understanding Boot Process and Important System Files Investigating Network
Traffic, Cyber Crimes and Laws
Understanding Various Corporate Threats. Case Studies. Setup lab with
bWAPPSet up Burp Suite - Configure Firefox, certificate mapping and scoping
website spidering active and passive scanning.
Scanner options and demo introduction to password security Intruder