Click here to load reader
Upload
dodan
View
214
Download
1
Embed Size (px)
Citation preview
BASIC ETHICAL HACKINTG & CYBER SECURITY
TRAINING.
TOPICS COVERED IN ETHICAL HACKING & CYBER SECURITY TRAINING. Course Curriculum
Module I
Introduction to Ethical Hacking
Network Basics
Ethical Hacking Start Up Basics
Information Gathering
Basics of Web Development
Phishing
Module II
Fake Mail
Further practical
DNS Spoofing
Man In The Middle Attack
Cross site scripting attack
WIFI Hacking
Also there are end numbers of topics which are covered in
ethical hacking it depends upon the courses you select in this
see the table for more info.
SR.NO
PROGRAM NAME DURATION MODE CERTIFIED BY MATERIAL IF ANY
1 Basic Ethical Hacking
(Networking &
Information Security)
15 Days or
30 Hrs
Virtual AICRA Soft tool kit
2 Advanced Certificate in
Ethical Hacking
(Networking &
Information Security)
30 Days or
60 Hrs
Virtual AICRA Soft tool kit
3 Ethical Hacking
(Training & Internship)
30 Days Virtual AICRA Soft tool kit
Advanced Ethical Hacking Course.
Ethical hacking provides an objective analysis of the business’s security. An
organization engaged in ethical hacking usually has no knowledge of the business’s
systems except those which they can easily tap.
These hackers typically scan for weaknesses, prioritize targets, test entry points, as
well as create a strategy which can best put their resources in a great advantage. After
the security measures are assessed, the ethical hacking company can then prescribe
re-mediation advice for the business’s unique security objectives, capabilities, and IT
environment.
The business entity can do fine-tuning of their security tools, make adjustments on
their security policy and efforts, as well as identify any required training.
This training will significantly benefit security officers, network administrators,
firewall administrators, auditors, security professionals, site administrators,students
and anybody who is concerned about the integrity of their network infrastructure.
MODULES 1
Introduction to Ethical Hacking
Basics of operating systems, databases and networking
Ethical hacking - How To
Concepts of TCP/IP and OSI model
Detail IP/MAC spoofing & security
Foot-printing
Web search hacking
Scanning and types
Password cracking and system security
Pentesting with Backtrack & Kali Linux
Social engineering attacks & security
Cryptography
Steganography (audio,video,text and image)
Bypassing firewalls
IDS/IPS and honeypot
SQL injections(SQLI) manual, automated and security.
MODULES 2
Cross site scripting(XSS) manual, automated and Security
DDOS attacks, buffer and stack overflow
Mobile E-hacking and security
Spamming attacks
Concept of ATM security and hacking
Live demonstration on dedicated server - (How Hackers Hack)
USB hacking technique / switch blades
Credit card and debit card hack attacks
Protocols vulnerabilities and exploiting through sniffers
Email hacking and security
Virus, trojan, worms and security
Reverse engineering and security
Wi-Fi security
Physical security threats
Understanding ISO 27001 standards
Cyber laws in India
The trainer which we have for ethical hacking is teaching this latest topics of ethical hacking tour Mumbai police with all the project , practials and theory.