+91- 84000 84111
Summer Training Program 2017

Ethical Hacking Course for Summer Training Batch

Recomended for: Students , Entrepreneurs

Course Objectives
    The Course will allow learners
  • Improve your CV & Apply for more right job interviews.
  • Learn what others will learn later.
  • High career growth with advanced skills.
  • Work part time as a freelancer along with your studies
  • Have increased self esteem and respect from fellows.
  • Give companies extra reasons to hire you.
  • Secure your personal data.

Syllabus Overview
Lesson 1
  • Fundamental of Ethical Hacking
  • Hacking Vs. Ethical Hacking
  • Types of Hackers
  • Skill Profile of a Hacker
  • Some Famous Hackers and Groups
  • Cyber World
  • Advantage and Disadvantage of Cyber world
  • Cyber World as a Home of hackers
Lesson 2
  • Overview of Cyber Law
  • Introduction To Cyber Law
  • Cyber Laws Indian
  • Technical Aspect Of Indian Cyber Law
  • IT ACT 2000 & 2008
  • Internet Crimes And Frauds
  • Cyber Law Cases In India
  • Organization Under Cyber Laws
  • Advantages Of Cyber Laws
Lesson 3
  • Information Gathering
  • What Is Information Gathering & Why Hackers Need This?
  • Types Of Information Gathering
  • Information Gathering Using Websites
  • Information Gathering Using Software
  • Search Engines- Smart Way Of Information Gathering
  • Scanning And Enumeration
  • Tracing - E-Mail, Mobile Phone, Intruder
Lesson 4
  • Virtualization & System Cloning
  • Introduction Of Virtualization
  • Need & Use Of Virtualization
  • Virtualbox
  • Installing OS On Virtual Machines
  • Networking In Virtual Machines
  • System Cloning
  • Troubleshooting
  • Other Tools For Virtualization
Lesson 5
  • Windows Hacking & Security (Win 8 & Win 7)
  • Windows OS & Security
  • Hacking Into System By Changing Passwords
  • Getting Access To System By Elevating Privileges
  • Finding Out The Passwords Of Windows
  • Bypassing The Windows Security
  • Hack from Guest to Admin
  • Password in Plain Text Directly
  • Hacking By USB Devices
  • Mitigation Of System Attacks
  • Setting Up A Secure System
Lesson 6
  • Password Cracking Techniques
  • What is Password Cracking
  • Types of Password Cracking Techniques
  • How Different Password Crackers Work
  • Windows Password Cracking
  • FTP / Network Password Cracking
  • Zip/ RAR Password Cracking
  • Doc & PDF Password Cracking
  • Using GPU For Password Cracking
  • Password Security
Lesson 7
  • Data Hiding Techniques
  • What Is Steganography
  • How Attacker Hides His Data In Images And Other Formats
  • How To Find Data Which Are Hidden
  • What Is Cryptography
  • Advanced Cryptography Tools
  • How Are Programs And Data Wrapped
  • Secure Measures To Protect Our Data
Lesson 8
  • Hacking By Batch Programming & Scripting
  • Basics Of Scripting
  • Languages Used In Scripting
  • Writing Your First Program
  • Malacious Program Scripting
  • Session Hijacking Using Batch Scripting
  • Data Theft Using Batch Script
  • Automation Using Scripting
  • Designing Tools Using Scripting
  • Developing Security Tools Using Scripting.
Lesson 9
  • Hacking by Viruses, Trojans, Keyloggers & Spywares
  • What is Trojan?
  • Trojans Attack Big Famous Cases
  • Types Of Trojans
  • Different way a Trojan Can Get Into A System
  • How We Create A Trojan and Control System
  • How Attacker Bypass Your Antivirus By Trojans
  • Analysis Of Trojans/Virus
  • How we remove Trojans Manually
  • Security Against Trojans
Lesson 10
  • Malware Analysis & Fake Antivirus Detections
  • Introduction of Malware
  • Types of Malware
  • Common Malwares In Cyber
  • Types of Malware Analysis
  • Manual Malware Analysis
  • Tools for Malware Analysis
  • Countermeasures
Lesson 11
  • IDS, IPS and Honeypots
  • Overview of IDS, IPS & Honeypot
  • Use of IDS & IPS
  • Installation of IDS & IPS
  • Prevention & Detection
  • Honeypot & its Types
  • Implementation - Honeypots
  • Honeypot Tools
Lesson 12
  • Proxy Server & Virtual Private Network (VPN) Technology
  • Proxy And Types Of Proxies
  • Why Hackers Use Proxy?
  • How To Hide IP Address While Chatting
  • How To Open Block Website In College/Companies
  • Convert Your Machine As Proxy Server With HTTPS Proxy
  • Advantage And Disadvantage Of Proxy
  • Analyzing Proxy Bug
  • How Proxy Hack Your Passwords Etc
  • What Is Better Than Proxy
  • What Is VPN?
  • Why We Use VPN
  • Advantage & Disadvantage Of VPN
  • Free VPN
  • Countermeasures
Lesson 13
  • Google Database Hacking
  • Introduction And Working Of Search Engines
  • List Of Common Search Engines On Web
  • Comparing And Choosing Best Search Engine
  • Dorks For Hacking Search Engines
  • Tools For Search Engines Hacking
  • Web Ripping
  • Finding Admin Pages And Weakness In Site
  • Security Against Search Engine Hacking
Lesson 14
  • Email Hacking & Security Issues
  • World Famous Big Email Hacking Cases
  • IIT Bombay Alumni, Anil Ambani, Rahul, Gandhi, Facebook CEO Mark Zuckerberg (Case Study)
  • Analysis Email Attacks (Live Demo) Manually & Automatic
  • Cookies Stealing (Session Hijacking) of All Big Mail Servers
  • Phishing Attacks ( Normal & Advanced )
  • Tab Nabbing Attack
  • Social Engineering Attack
  • Analyzing the Vulnerabilities of Email Servers
  • Analyzing Fake & Real Profiles & Email Accounts
  • Fake Mailing Attack
  • Email & Fake Profile Tracing
  • Hacker Email Backdoor Installing Technique For Future Access
  • Email Password Stealing By Plugins, Extensions Etc.
  • Email Hacking By Keylogger, Spywares & Malicious Softwares
  • Countermeasures
Lesson 15
  • Facebook Hacking, Security & Forensic
  • World Famous Big Facebook Hacking Cases
  • Cookies Stealing of Facebook Accounts
  • Facebook Phishing Attacks
  • Facebook Tab Nabbing Attack
  • Facebook Social Engineering Attack
  • Analyzing Fake & Real Profile of Facebook
  • Delete Spam Messages on Facebook
  • Facebook Fake Messaging Attack
  • Facebook Tracing Method Techniques (Basic & Advanced)
  • Facebook Backdoor Installing Technique For Future Access
  • Facebook Password Stealing By Plugins, Extensions Etc.
  • How to find if your Facebook Account has been hacked or not
  • Facebook Account security with Email & SMS Notifications
  • How to Hack Password using Facebook Hacker
  • Hack Facebook account password with key logger
  • Facebook Security & Forensics
Lesson 16
  • Clickjacking & Tabnabbing Attacks
  • What Is Clickjacking
  • How Does A Clickjacking Work
  • Facebook Likejacking
  • How Hacker Use Clickjacking
  • Execution Of Malicious Code Into Machine
  • Possibilities Of Clickjacking
  • Clickjacking Killer - The IFRAME Buster
  • How Protect From Being Clickjacked
Lesson 17
  • Advanced Methodology for Privacy on Internet
  • Staying Safe in the Internet
  • Email Privacy
  • Malicious Link Security
  • Website Visit Privacy
  • Block Malicious Contents On Web
  • Antivirus Privacy
  • Automatic analyzing of Malicious Links
  • Internet Privacy Tools
Lesson 18
  • Social Engineering
  • Introduction to Social Engineering
  • Types of Social Engineering
  • World's Biggest Social Engineering Cases
  • Web based Social Engineering
  • Vulnerability in Social Engineering
  • Analyzing a Social Engineering Attack
  • Security against Social Engineering
Lesson 19
  • Android Hacking, Security & Forensics
  • Introduction to Android
  • Android OS Structure
  • Overview of Android Apps
  • Android Rooting
  • Application Cracking of Android
  • Cracking PIN of Android Devices
  • Pattern Unlock Cracking
  • Android Security
  • Android Forensics
  • Countermeasures
Lesson 20
  • Credit Card Frauds & Cases
  • Introduction of Plastic Money
  • Some Big Credit Card Cases Solved by i3indya Team
  • Type of Credit Card
  • Hacker's Credit card Theft Techniques
  • Online & Offline Credit Card Generators
  • Vulnerability In Credit Card & Payment Gateway
  • Big Credit Card Fraud Website on Internet
  • Detection of Credit Card Fraud
  • Security Against Credit Card Fraud
  • Countermeasures
Lesson 21
  • Website & Database Hacking Attacks
  • Introduction of Websites & Database
  • Authentication Process Of Web Application
  • Attack on Website & Web Application
  • SQL Injection Attacks
  • PHP Injection Attacks
  • Java Script Injection
  • Scripting Attacks
  • RFI & LFI Attacks
  • Countermeasures
Lesson 22
  • Web Server Hacking & Security
  • Introduction of Webserver
  • Types of Webserver
  • Setting up a Webserver
  • Webserver Exploits
  • Shell ( Control Panel ) Designing & Uploading
  • Web Server Routing
  • Backdoor Installation on Server
  • Server Passwords Hacking
  • Web Server Security Against Attacks
Lesson 23
  • Vulnerability Assessment & Penetration Testing Tools & Methodologies
  • What is VA & PT
  • Difference between VA & PT
  • Need of VA & PT
  • Penetration Testing Methodology
  • Types of Penetration Testing
  • Scope of Pen-testing
  • Why Penetration Testing
  • Manual VA-PT
  • Tool Based VA-PT
  • Reporting a VA-PT
  • Available VA-PT Platforms
  • Closed Source Platform
  • Open Source Platforms
  • Benefits of Open Source Over Closed Source
  • Backtrack - VA-PT
  • Bugtraq - VA-PT
  • Some Other Recommended VA-PT Tools
Lesson 24
  • Wireless Hacking & Countermeasures
  • Wireless Standards
  • Common Vulnerabilities in Wireless Devices
  • Encryption Standards Used in Wi-Fi
  • WEP Cracking
  • WPA/WPA2 Cracking
  • WPS Cracking
  • Countermeasures

Close
Select Your Training Location

Type your e-mail address and we'll send you new password

Submit