Cyber Security & Ethical Hacking

“Cyber Security & Ethical Hacking”

72 Hours Training on “Cyber Security & Ethical Hacking”

For: – 1st, 2nd, 3rd, 4th year B. E. / B. Tech. (ECE, EE, EEE, EIC, CS, IT, ME, Automobile), M. E./ M. Tech., MCA, BCA, B. Sc. – I. T., M. Sc.,B. Arch., M. Tech. & Professionals.

Topics Cover: -
This workshop covers the following topics with practical implementation:

Module 1: Introduction To The Information Security

    • Introduction
    • Need Of The Information Security
    • Latest Test Cases
    • Conclusion

Module 2: Basic Of Information Technology

    • Introduction
    • Network Terminologies
    • IP Addressing
    • Ports
    • Proxy Servers
    • Virtual Private Network
    • NAT
    • Web Application Terminologies
    • HTML Basics
    • Php Basics
    • Conclusion

Module 3: Web Application Security

    • Introduction To Web Application Development
    • Basics Of SQL
    • Mysql, MS-SQL Database
    • Different Types Of Attacks
    • SQL Injections
    • Authentication Bypass Injection
    • Union Based Injection
    • Error Based Injection
    • Xpath Injection
    • Code Injection
    • Blind Injection
    • Cookie Injection
    • Header Based Injection
    • Cross Site Scripting
    • Session Hijacking
    • File Inclusion Vulnerabilities
    • Information Discloser Vulnerabilities
    • Directory Traversal Vulnerabilities
    • Arbitry File Upload Injection
    • Applications To Perform Security Tests
    • Email Attacks
    • Phishing Attacks
    • IDN Homograph Attack
    • Fake Emails
    • Identifying Fake Emails
    • Security Counter Measures

Module 4: Applications Security

    • Reverse Engineering
    • Introduction
    • Debuggers & Dissemblers & Decompiles
    • Cracking
    • Patching
    • Key Gening
    • Security Counter Measures
    • Buffer Overflows
    • Introduction
    • Shell Code
    • Exploitation
    • Security Counter Measures

Module 5: System Security

    • Malware Analysis
    • Introduction To The Virus, Worms & Trojans
    • Trojans Creation
    • Evading Firewalls & Anti Virus
    • Key Loggers
    • Scanning System For The Malicious Application
    • ecurity Counter Measures
    • Login Privileges
    • Bypassing The Windows Login
    • Bypassing The Linux Login
    • Security Counter Measures

Module 6: Mobile Security

    • Introduction To VoIP
    • Call & SMS Forging
    • Security Counter Measures

Module 7: Wireless Security

    • Introduction To The Wireless Technology
    • Types Of Authentication
    • Different Types Of Attacks
    • Cracking The Encryption
    • Application Based Attack
    • Attacking Routers
    • Security Counter Measures

Module 8: Advanced Attacks

    • Metasploit Framework
    • Introduction To The Metasploit Framework
    • Architecture Of Metasploit Framework
    • Basic Terminologies
    • Exploitation Techniques
    • Identifying Vulnerability And Exploits
    • Exploitation On Different-Different Platforms
    • Evading The Firewall & Antivirus
    • Creating Custom API To Test Windows Security
    • Scanning & Finger Printing
    • Analyzing Packets
    • Scanning Methods
    • Basic To Advanced Utilities

Module 9: Data Forensics

    • Introduction
    • Forensics Precautions
    • Analyzing Digital Media
    • Recovering Lost Information For Investigation
    • Analyzing Crime/Tamper
    • Analyzing Logs
    • Latest Test Cases
    • Conclusion

Module 10: Cyber Crime Investigation

    • Introduction To The Cyber Laws
    • Gathering Information
    • Test Cases
    • Credit Card Frauds
    • Nigerian Frauds/Scams
    • Phishing Attacks
    • Log Systems
    • Security Counter Measures
    • Online Protection
    • Conclusion

Project: -
During this training each and every student will perform practical on all above mentioned topics.

For Students: -

    • Participation Kit to every participant.
    • Full Study Material containing:
    • Video Tutorials
    • E-Books
    • Tools
    • Report Matter
    • Course Layout

Faculty Information: -
For this training Lucideus Tech Pvt. Ltd. is our training associates. Their team has great experience of conducting training & workshop on Cyber Security and providing solutions to various organizations. Few testimonials of our associate are mentioned below:

    • The lecture on cyber-crime at CID, West Bengal was outstanding and was attended by senior officers and participants of West Bengal police. I wish them success in their future endeavours.

- Director General of Police, CID, West Bengal

  • He’s a Genius. We need more youngsters like him. May you achieve everything you desire for in the near future./li>
    - Officer Varghees, ACP, Special Task Force
  • Entire session was splendid. Keep it up! I’m honored to be present in the said workshop. You have delivered before the sleuths of an elite Investigating Agency and those are having laurels of detecting some complicated/sensational issues during near past. Yet they are spellbound after attending your workshop. There are lot to learn to make us equipped. God bless you.
  • - Soumya Banerjee – Senior Inspector, Kolkata Police Detective Department