Ethical Hack Course

Embed Size (px)

Citation preview

  • 7/27/2019 Ethical Hack Course

    1/7

    1

    CyberCure Solutions

  • 7/27/2019 Ethical Hack Course

    2/7

    2

    Certified Information Security Specialist2 (16 Hrs. 8 hrs/Day) Days Workshop Course Curriculum

    Ethical Hacking: Legal or illegal?

    Concepts of Hackingo Ethical Hacking and Information Security : Definitiono Who is hacker (Security Expert)?o How to become a Hacker?o Why do we need hackers?o Case Studies: Hackers Methodology and Innovationo Difference between hacker and cracker?

    Types of Hackers(As per Knowledge)o Coderso Adminso Script Kiddies

    Types of Hackers(As per Working)o White hat hackerso Black hat hackerso Grey hat hackerso Hacktivists (Cyber Terrorists)

    How to secure yourself from Attackers How to Stop Attackers Indian Cyber Law

    o Real Scenarioo Types of Cyber Crimeo Indian IT Act 2000

    E-Mails: exploitation and Security

    What is an E-mail Working of E-mail Traveling of an E-Mail Email Servers

    o Definitiono Usage

    E-mail Forgeryo Anonymous Mailing techniques

    Using Websites Using Self Developed PHP Script

    o E-Mail Bombers Security to Anonymous Mailing

    o Can User stop Receiving Fake Mails?

  • 7/27/2019 Ethical Hack Course

    3/7

    3

    o Tracing an Attackero Proving a Fake Mail

    Attacks on E-Mail Passwordo Attackers Anatomy and Psychology while hacking the passwordso Technical Attacks

    Using Fake Websites: Phishing Keyloggers

    o Non-Technical Attacks Shoulder Surfing Dumpster Diving Social Engineering

    Securing the E-Mail Passwords

    o Password Policieso Benefits of SSL Certificate for a User.o Anti Trust Policies

    Email Forensicso E-Mail Header Analysiso WhoisLookUp Queryo Tracing a Sender of an E-Mail

    Tracing Senders IP Address Tracing Senders Location

    Inside Threats: Operating System Hacking and Security

    Introduction to System Softwareso Windowso Ubuntu(Linux)o Back Track(Live OS)

    Windows Security Components and Workingo Windows Security Componentso User Account Login Process

    Implementation of Virtualizationo VM Ware Workstation

    Installation and Usage Windows Linux

    o Oracle Virtual Boxo MS Virtual PC

    Attacks on Windows Login Passwordo Resetting Windows login password without the old password

  • 7/27/2019 Ethical Hack Course

    4/7

    4

    o Removing Windows login password without the old password Other Security Measure

    o BIOS User and Supervisory passwordo Biometrico Implementing Syskey File Encryption

    Windows Inbuilt Flaws and Security Loopholeso Hidden Accountso Backdoor Via Sticky Keyso Administrator Escalation on Limited accounts

    Invading into Computer Systemo Recovering BIOS Passwordo

    Recovering Biometric Password

    o Disabling Syskey File Encryption Optimizing Windows Computer System

    o Steganography Hiding Files behind an Image

    Restrict Hackers into boxo Restricting Access to Files & Folders

    ACLs Calculationo Configuring Strong Passwordo Changing Boot Ordero BIOS Passwordo Physical Security

    Malwares: Trojan, Viruses & Worms

    What are malwares? Trojans

    o What is a Trojan?o Types of Trojans

    Trojan Attack Methodso Direct Connectiono Reverse Connection

    Some Knows Trojans Detection of Trojan

    o Using Anti-Trojan Softwareo Manual Detection

    TCP View Process Viewer Process Explorer

    Viruses Working and Functionality of Viruses Development

  • 7/27/2019 Ethical Hack Course

    5/7

    5

    o Batch Programming Programming

    Development of Folder lockers Developing Professional Security tools

    Compilation and EXE Generation Detection and Manual Removal

    o Detecting Viruseso Process Monitoringo Manual Removal of Viruses

    Playing with Networks

    Introduction to the LAN(Local Area Networks)o What is Network?o What is networking?o Understanding Network Deviceso Wireless Hacking( Wi-Fi WEP Key Cracking)

    Flaws and Securityo Attacks on Networks

    Sniffing MITM(ARP Poisoning)

    Live Demonstration Secure Network Configuration

    o Configuring Anti-Snifferso MAC Filtering Restrictionso Configuration of WPA2 Keys

    Internet World Wide Web attacks

    Introduction to Web Application Securityo What is Web Servero What is Database Serverso The Web Login Processo What is Web application Securityo Why is Web application Security Important

    Understanding Attack Vectorso Vulnerabilities & Evolving Threatso Exploit Analysis

    Web Application Attackso SQL Injection

    Basic Injection Advance Injections

    o Google Dorks Using Google as an Expert

  • 7/27/2019 Ethical Hack Course

    6/7

  • 7/27/2019 Ethical Hack Course

    7/7

    7

    o Manipulating the Code of EXEs Dis-assemblers & Debuggers

    o Olly DBGo Windows Dis-assembler

    Software Cracking & Serial Key Phishingo Analysing Assembly Code of Softwareo Tracing the Error Messageo Setting Break Pointo Stepping the Assembly Codeo Checking the Registers for the Key

    Software Patchingo Disassembling a Softwareo Error Tracingo Decoding the Instructionso

    Generating Patch to inject the instruction

    o Running the Patch Applying Application Security

    o Introduction to Application Encryptiono Using the Setup Encrypterso Applying strong Serial Key Algorithms