+91 865-596-6336 || info@dcodetech.in
logo
logo
logo

Our Training Process

Pg Diploma In Cyber Security (Ethical Hacking / Cyber Forensic Tools)

  • Overview of Cyber Security, Internet Governance – Challenges and Constraints, Cyber Threats; Cyber Warfare, Cyber Crime, Cyber terrorism, Cyber Espionage
  • Need for a Comprehensive Cyber Security Policy, Need for a Nodal Authority, Need for an International convention on Cyberspace
  • Essential Terminologies: CIA, Risks, Breaches, Threats, Attacks, Exploits, Information Gathering (Social Engineering, Foot Printing & Scanning). Open Source/ Free/ Trial Tools: nmap, zenmap, Port Scanners, Network scanners
  • Introduction to Cryptography, Symmetric key Cryptography, Asymmetric key Cryptography, Message Authentication, Digital Signatures, Applications of Cryptography
  • Overview of Firewalls - Types of Firewalls, User Management, VPN Security
  • Security Protocols: Security at the Application Layer, PGP and S/MIME, Security at Transport Layer - SSL and TLS, Security at Network Layer-IPSec
  • Python programming environment Overview
  • Introduction to System Security, Server Security, OS Security, Physical Security
  • IIntroduction to Networks, Network packet Sniffing, Network Design Simulation
  • DOS/DDOS attacks. Asset Management and Audits, Vulnerabilities and Attacks
  • Intrusion detection and Prevention Techniques, Host based Intrusion prevention Systems, Security Information Management, Network Session Analysis, System Integrity Validation.
  • Internet Security, Cloud Computing & Security, Social Network sites security, Cyber Security
  • Vulnerabilities - Overview, vulnerabilities in software, System administration, Complex Network Architectures, Open Access to Organizational Data, Weak Authentication, Authorization, Unprotected Broadband communications, Poor Cyber Security Awareness.
  • Cyber Security Safeguards - Overview, Access control, IT Audit, Authentication, Biometrics, Cryptography, Deception, Denial of Service Filters, Ethical Hacking, Firewalls, Intrusion Detection Systems, Response, Scanning, Security policy, Threat
  • Open Web Application Security Project (OWASP), Web Site Audit and Vulnerabilities assessment.
  • Open Source/Free/Trial Tools: Win Audit, Zap proxy (OWASP), burp suite, DVWA kit. Hands on project and mini project
  • Explanation of Malware, Types of Malware: Virus, Worms, Trojans, Rootkits, Robots, Adware’s, Spywares, Ransom wares, Zombies etc., OS Hardening (Process Management, Memory Management, Task Management, Windows Registry/services another configuration)
  • Malware Analysis. Open Source/Free/Trial Tools: Antivirus Protection, Anti Spywares, System tuning tools, Anti Phishing. Hands on Cyber security and Framework
  • Security in Evolving Technology
  • Web server configuration and Security, Introduction, Basic security for HTTP Applications and Services
  • Basic Security for Web Services like SOAP, REST etc., Identity Management and Web Services
  • Authorization Patterns, Security Considerations, Challenges. Open Source/Free/Trial Tools: adb for android, xcode for ios, Implementation of REST/ SOAP web services and Security implementations
  • Introduction to Cyber Forensics, Need of Cyber Forensics, Cyber Evidence, Documentation and Management of Crime Sense, Image Capturing and its importance, Partial Volume Image, Web Attack Investigations, Denial of Service Investigations, Internet Crime Investigations, Internet Forensics, Steps for Investigating Internet Crime, Email Crime Investigations.
  • Handling Preliminary Investigations, Controlling an Investigation, Conducting disk-based analysis, Investigating Information-hiding, Scrutinizing E-mail, Validating E-mail header information, Tracing Internet access, Tracing memory in real-time.
  • Introduction to Cyber Security Regulations, Roles of International Law, the state and Private Sector in Cyberspace, Cyber Security Standards. The INDIAN Cyberspace, National Cyber Security Policy 2013.
  • LINUX and Networking, Doxing, Website/IP information gathering, Network Mapping, Google Hacking, Discovering IP Range and Open Port
  • Identifying Target Operating System and Services, Secure Bypassing Firewalls while Scanning, Understanding Wireless Networks, De-authentication attack, Fragmentation attacks,,Chop Chop attack, Fake authentication, Evil Twin Attack, Cafe-latte attack, Reveal Hidden SSID’s, WPA and WPA2 wireless password
  • Hacking techniques, Cracking Wireless Passwords using Rainbow tables, Brute force techniques. Wordpress-scan, Drupal scan, Joomscan, cms-explorer for CMS Hacking and Pentesing, Websploit, SET, Fast-Track SQL Pwnage, Winautopwn for various System
  • Learning Various Methods to Use Proxies, Hiding yourself behind VPN, Using Proxies and VPN for Hacking Tools i.e Scanning, Configuring TOR with Backtrack and Nmap for Invisible Scanning, Using Tunneling methods for IP hide
  • Types of Email Addresses, Security measures for Phishing, Security measures for Password Guessing, Security measures for Mobile Phone, Hacking Windows Passwords using various methods & Security, Cracking SAM file, Protecting SAM file from hack
  • Privilege Escalation in windows and Linux, Using Stealers, Key loggers and Remote Administrations Tools (RATs), Creating Undetectable Viruses using Crypters, Binders and Assembly Codes
  • Protection against Trojans, Worms and Malwares, Advance SQL Injection, Cross Site Scripting, Router Hacking, Sniffing Data and Passwords, ARP , DNS, DHCP Spoofing attacks. DNS poising , DOS attack against an IP address Flood the LAN with random MAC addresses.
  • Computer Investigation Process and Collecting Digital Evidences
  • Cyber Crime Investigation and Understanding various trace back Techniques
  • Acquiring data, duplicating data and Recovering deleted Files
  • Understanding Boot Process and Important System Files Investigating Network Traffic, Cyber Crimes and Laws
  • Understanding Various Corporate Threats. Case Studies. Setup lab with bWAPPSet up Burp Suite - Configure Firefox, certificate mapping and scoping website spidering active and passive scanning.
  • Scanner options and demo introduction to password security Intruder
  • Intruder attack types Payload settings, Intruder settings
  • Implementation to gather information from any PC’s connected to the LAN using whois, port scanners, network scanning, Angry IP scanners etc
  • Implementation of Symmetric and Asymmetric cryptography
  • Implementation of Steganography
  • Implementation of MITM - attack using wireshark/network sniffers
  • Implementation of Windows security using firewall and other tools
  • Implementation to identify web vulnerabilities, using OWASP project
  • Implementation of IT Audit, malware analysis and Vulnerability assessment and generate the report
  • mplementation of OS hardening and RAM dump analysis to collect the Artifacts and other information
  • Implementation of Mobile Audit and generate the report of the existing Artifacts
  • Implementation of Cyber Forensics tools for Disk Imaging, Data acquisition, Data extraction and Data Analysis and recovery.
JOIN THIS TRAINING
  • Starts
    2022
  • Duration
    3 Months , 2 hrs / daily
  • Institution
    DCODETECH
  • Level
    Intermediate
  • Seats Available
    15

SHARE THIS PAGE

JOB PROFILE FOR CYBER SECURITY

  • Network security analyst
  • Security analyst
  • Soc analyst
  • Vulnerability assessment analyst
  • Penetration tester

CYBER SECURITY TOOLS

  • Nmap
  • Nessus
  • Nikto
  • sqlmap
  • vega
  • wireshark
  • kali
  • burpsuite

JOB PROFILE FOR FORENSIC

  • Malware analyst
  • Incident handler
  • Cyber forensic analyst

FORENSIC TOOLS

  • Ftk
  • Osforensic
  • Encase
  • Autopsy