Ethical Hacking and Cyber Security Certification Training


         As there is the increase in demand of hackers these days, in fact from the past few decades there is ultimate need of hackers. These hackers are popularly known as “white hat hacker” or “penetration testers”.
        As many business organizations or government sectors want their network or data protected there is need of ethical hackers. With the help of them, they can protect their data or network. later we will discuss Best Websites To Learn Ethical Hacking.

         Ethical hackers or white hat hackers identify weaknesses in data computer security for business and organizations across the globe, to protect them from hackers or criminals with less honest motives. This not only helps them earn a good and honest living but also keeps them away from facing prison time.

Course Description
          This is a penetration Testing & Information Security Training Program. The training provides you an intensive session which will empower you’re with knowledge in a simplified and easily graspable manner.
        
           In the training, we teach our students how hackers break into the systems, network, mobiles and website s as t make them aware f the possible loopholes and therefore, making them proficient in reverse-penetrating. By ding s, they are able to create a virtual wall between their data and the hackers.
         
           This training will enable you to carry up attacking as well as defensive methodologies which will help you and your organization to not only protect but also assess the safety and vulnerability rate.




Curse objectives



At the end of this curse, participants will be able to:


             Understand and perform Information Gathering Digital Foot Prints


             Understand Email attacks and will be able to protect their email accounts as well as social networking accounts from these attacks


             Analyse Malwares from a computer system and remove them manually

             Understand Web Application Attacks and will be able to patch them to produce a secure web application.

             Understand windows memory management and assembly language to perform basic Reverse Engineering

             Understand Enterprise Network Security Architecture

             Understand Exploitation

             Understand Wireless Security

             Understand Security Architecture of mobile Platforms
    Target audience
    • This course can be attended by security officers, auditors, security professionals, website  
     administrators, anyone who is concerned about the security of their network infrastructure and 
      everyone who want to have a promising career in cyber security.
    Prerequisites
     • Basic knowledge of computers and internet technologies.
     Hands-on
     • The curse includes practical hands-n exercises that enable you to test your acquired skills during  
          the training and understand its usage in a live environment
     Introduction to Information Security                                             1 Hour
·         Introduction
·         Need of Information Security
·         Ethical Side f Hacking
·         Steganography
·         Latest Test Cases
·         Cyber Law & Indian IT Acts
·         Conclusion
       Basics of Network & Web Technology                                           4 Hours
·         Introduction
·         IP Address
·         NAT
·         IP Subnets
·         DHCP Server
·         Ports
·         DNS
·         Proxy Servers
·         Virtual Private Networks
·         DNS Server
·         SI Model
·         Web Architecture
·         Server Configuration
·         HTML Basics
·         PHP Basics
       Information Gathering & Ft printing                                               1 Hour
·         Digital Foot Print
·         Information Gathering
·         Who Is Information
·         Web Server Details
·         Reverse IP Mapping People Search
·         Tools to perform Digital Foot printing
   Email Security                                                                                 3 Hours
·         Phishing Attacks - Desktop Phishing, Spear Phishing
·         IDN Homograph Attack
·         Social Engineering
·         Fake Emails
·         Identify Fake Emails
·         Key Loggers
·         Email Encryption
·         Security Counter Measures
   Goggle Hacking Database                                                             1 Hour
·         Use Goggle to craft attacks
·         Advanced operators of Goggle
·         Find Vulnerabilities using Goggle
·         Security Countermeasures
   IDS, Firewalls & Honey Pots                                                                                2 Hours
·         Introduction t Firewalls
·         Network Firewalls
·         Web Application Firewalls
·         Weakness in Firewalls
·         Intrusion Detection Systems and weakness
·         Intrusion Prevention Systems and weakness
·         Honey Pts and Security Misconfiguration

  Web Application Vulnerability Assessment & Penetration Testing      15 Hours


·         Introduction t Web Architecture

·         Web Security Generic Misconceptions

·         Introduction to DBMS - MySQL, MS SQL, oracle, DB2

·         Introduction to SQL

·         WASP Top 10 Attacks

·         Sensitive Data Exposure

·         Insecure Direct object References

·         SQL Injections

·         Authenticating Bypass Injection

·         Blind Injections

·         Error Based injection

·         Union Based injection

·         Stacked Query injection

·         Time Based injection

·         Cross Site Scripting (XSS)

·         Broken authentication and Session Management

·         CSRF

·         Missing Function Level Access Control

·         Invalidated Redirects and Forwards

·         Security Misconfiguration

·         Using Components with Known Vulnerabilities

·         Brute Forcing Attack

·         Heartbleed Attack

·         Shell / Bash bug

·         HTTP Response Splitting

·         Denial f Service Attacks

·         Vulnerability Analysis using Burp suite

·         Arbitrary File Upload

·         Applications to Automated VAPT
 System Hacking                                                                              4 Hours
                    OS Login Bypass
                    Introduction to Authentication Mechanisms
                    Tools to Defeat Authentication Malware Illustration - Virus, Worms, Trojans Create Virus
                    Create Trojans
                    Evade Antivirus & Firewalls
                    Scan System for Malicious Applications
Linux Basics                                                                                     2 Hours
                    Install and setup
                    Introduction to Linux based Pen testing OS
                    System Architecture
                    Network Configuration
                    Essential Commands
Network Attacks                                                                            2 Hours
                    Introduction to Network Attacks Man in the Middle Attack
                    ARP Poisoning o SSL Stripping
Wireless Security                                                                           4 Hours
                    Introduction to Wireless Technology
                    MAC Filtering
                    Packet Encryption
                    Packet Sniffing
                    Types of Authentication
                    Types of Attacks
                    ARP Replay Attack
                    Fake Authentication Attack
                    De-Authentication Attack
                    Security Countermeasures
                     
Mobile Security                                                                              1 Hour
                    Introduction to Mobile Platforms Security
                    Architecture of Mobile Platforms Introduction to VoIP
                    VoIP Calls from any number to any number - Fake Calls
                    Android Exploitation Framework
 
 
Bound Tech Solutions
044 - 42 63 42 42
9500092050
boundtechsolutions@gmail.com
Best Online training Institute
Best Portal for Learning Technologies

Click here to Register for Free Demo


Comments

Popular posts from this blog

Workday Course Content

Angular JS Training with Project