Workshop on Ethical Hacking and Cyber Security

Ethical Hacking as the name suggests, means hacking into something ethically. Ethical Hacking workshops are the best selling course we have and almost every college in India organizes it every year for their students. This workshop is something which can create interest amongst students towards learning how to hack and find bugs in the prevailing systems, networks, database, computers, servers etc.

Ethical hacking helps you to learn a lot about hacking as well as what precautions to be taken to save yourselves from being hacked. This workshop is designed in such a way that the trainer will use two laptops and one would be working as Victim and one as hacker and he will show real time demos on how to do attacks on the computer of the victim.

We hereby also state that the tips and tricks shared during the workshop will only help you create interest, no one can become hacker in two days workshop but yes with practice you can surely hack into big and blasting systems and servers. We also recommend not to use this skill to hurt somebody but to help somebody specially Government and Defence in research purpose.

This is just 2 days course content, if you need training content for Faculty Development Program or for 5/7/10/15/30/45/180 Days training, Click Here.

Introduction to Ethical Hacking

  • What is Information Security?
  • Problems faced by the Corporate World
  • Why Corporate needs Information Security? Who is a Hacker?
  • Type of Ethical Hackers
  • Classification of Hackers
  • Phases of Hacking
  • Basic Terminologies
  • Vulnerability Research

Networking and Basics

  • IP Address, Finding a Remote IP Address
  • Tracing an IP Address
  • MAC Addresses Spoofing

Google Hacking: Advisories and server vulnerabilities , finding Login Page,Hacking Live Webcam, Printer etc

Facebook Hacking: Passing the security mechanisms from the authenticated entries and passages.

Footprinting

  • What is Footprinting?
  • Types of Footprinting
  • DNS brute forcing with fierce
  • Domain Information Groper
  • NsLookup — it's there when you need it
  • Search for People
  • Search for Company’s Information
  • Finding Internal URL of Website
  • Gather public information
  • Network Reconnaissance
  • Archive Pages
  • Mirroring of Websites

Scanning

  • Definition of Scanning
  • Types of Scanning
  • Difference between Port and Network Scanning
  • Network Scanning
  • Use of NMAP
  • Advanced Port Scanner
  • Port Scanning
  • Daemon Banner Grabbing
  • OS Fingerprinting
  • Vulnerability Scanning
  • Nessus Tool

Android Phone Hacking: Introduction to Android, Gaining Access to Android Phone, APK File Package, Securing you Mobile

Trojan 

  • Purpose of Trojan
  • Types of Trojan
  • Purpose of Trojan inventor
  • Detecting Trojan Attacks
  • Ports used by Trojans
  • Beast & Dark Comet
  • Wrapper
  • Icon Changer
  • Network Activity Detection
  • Process Monitoring Tools
  • Suspicious Files and Folders Detection

Virus & Worm

  • Working of Virus & Worm
  • Stages of Virus
  • Creating Virus by programming and automate tools
  • Virus Analysis
  • Difference between Worm & Virus
  • Virus Detection Method
  • Spyware
  • Internet and E-mail Spyware
  • Adware

Wireless Hacking

  • Introduction of Wireless Network
  • Types of Wireless Network ,Wireless Technology
  • Advantages and Disadvantages of Wireless Network
  • Wireless Cracking WEP,WPA,WPA2
  • Wireless Security
  • Wireless Intrusion Detection System
  • Tips to Secure Wireless Network

Email Hacking: All the possible ways

Keylogger

  • What is Keylogger?
  • Categorization of Keystroke Loggers
  • Advanced Keylogger
  • Keylogger: Spytech SpyAgent
  • Keylogger: Perfect Keylogger
  • Hardware Keylogger

USB Hacking & Browser Hacking

  • USB Hacking USB for Coping Data
  • Blocking USB Devices
  • Browser Security
  • Manta Browser
  • Beef

Stenography

  • Art of Hiding
  • How Steganography Works
  • Steganography Today
  • Steganography With CMD
  • Steganography Tools
  • Steganalysis

Crypotography

  • Introduction to Cryptography
  • Advantages and uses of Cryptography
  • Symmetric Algorithms Asymmetric Algorithms
  • Encryption
  • Cipher

DOS And DDOS

  • Concept: Denial of Service
  • Introduction to Distributed Denial of Service Attacks?
  • Working of Distributed Denial of Service Attacks?
  • Symptoms of a DOS Attack
  • Impact DDOS/DOS Attack Difference of DDOS & DOS
  • Introduction to Botnet

Social Engineering attacks Through SET - Set Social Engineering toolkit.

SQL Injection Concepts

  • Basics of SQL
  • Web Application Working
  • Introduction to Server Side Technologies
  • SQL injection
  • Identifying SQL Injection via Error Messages
  • Advanced SQL Injection Attacks
  • SQL Injection using Kali SQLMAP
  • Types of SQL Injection
  • Simple SQL Injection Attack
  • Union SQL Injection Example
  • SQL Injection Error Based

Social Engineering

  • What is Social Engineering?
  • Techniques of Social Engineering
  • Attempt Using Phone, E-mail, Traditional Mail, In person, Dumpster Diving, Websites, Shoulder surfing, Third Person Approach.
  • Spam Emails
  • Social Engineering with Computer

Firewalls & Honeypots

  • What Does a Firewall Do?
  • What a Firewall cannot do
  • How does a Firewall work?
  • Types of Firewall
  • Working of Firewall
  • Advantages and Disadvantages of Firewall
  • Test firewall using firewalking tool
  • Concept of Honeypots
  • Purpose and working of Honeypots
  • Advantages and Disadvantages of Honeypots
  • Types and uses of Honeypots

Penetration Testing

  • Pen Testing Concepts
  • Types of Pen Testing
  • Pen Testing Phases & Tools

 

Miscellaneous techniques:

  • How to fake call
  • How to fake mail
  • How to trace both of the aforementioned techniques
  • How to enter into any email with self made permutation machines
  • Lateral thinking methods
  • Also there will be Case Studies of various real time hacks!

The workshop content has approximately equal mixture of lecture and hands-on lab. This will be a minimum of two days workshop.

Recommendation: It is strongly recommended to bring your own LAPTOP during the training on which you can install and run programs if you would like to do the optional, hands-on experiments/exercises after the trainings/ workshops.

Certificates will be provided by ISO 9001:2008 certified I-Medita Learning Solutions Pvt. Ltd. Company which is registered with Ministry of Corporate Affairs for providing IT Trainings all over India and IBNC India which is a trademark championship that has already been executed in 106 Engineering colleges till March 2015.

  • Participation Certificate: Given to each candidate who participate in the workshop
  • Appreciation Certificate: Given to the College/ Institution who help in conducting the workshop.
  • Excellence Certificate: Given to the winner of the Zonal Center Championship.
  • Coordination Certificate: Given to those active & strong students and faculty coordinators who help in making the workshop and training successful.

IBNC Team gives you freedom to ask your relationship manager at IBNC India for certificate samples in advance so that you could be aware of the certificate you will be receiving before hand the trainings/workshops.

IBNC DVD to each participant to help them learn more about Ethical Hacking after the training.
Softwares to be used:
  • SQL Injection Concepts
  • Firewalls & Honeypots
  • Penetration Testing
  • One on one interaction in the class with the Trainer.
  • Study material designed by panel of experts from industry.
  • Lead trainer will also have supporting trainers with him/her so that they can help you fall in love with the technology.
  • We believe in learning with fun!
  • The skills we develop are those that employers within the industry are looking for.
  • Covering theoretical and practical concepts in such a way that it is fun to learn the technology and easy to make unique projects.
  • Your skills and certifications are recognized anywhere in the world your career takes you.
  • Successfully trained over 15000 students in India till now.
  • Watch video testimonials given by students: www.youtube.com/ibncindia
  • Check out our facebook page to see live comments from our prestigious students.
  • IBNC makes sure that you should get the full worth of the money you have paid during the trainings anywhere in India.
 
Please contact IBNC India Team to know more about careers in this technology.