Upload
nikhilgupta21121991
View
219
Download
0
Embed Size (px)
Citation preview
7/27/2019 Ethical Hack Course
1/7
1
CyberCure Solutions
7/27/2019 Ethical Hack Course
2/7
2
Certified Information Security Specialist2 (16 Hrs. 8 hrs/Day) Days Workshop Course Curriculum
Ethical Hacking: Legal or illegal?
Concepts of Hackingo Ethical Hacking and Information Security : Definitiono Who is hacker (Security Expert)?o How to become a Hacker?o Why do we need hackers?o Case Studies: Hackers Methodology and Innovationo Difference between hacker and cracker?
Types of Hackers(As per Knowledge)o Coderso Adminso Script Kiddies
Types of Hackers(As per Working)o White hat hackerso Black hat hackerso Grey hat hackerso Hacktivists (Cyber Terrorists)
How to secure yourself from Attackers How to Stop Attackers Indian Cyber Law
o Real Scenarioo Types of Cyber Crimeo Indian IT Act 2000
E-Mails: exploitation and Security
What is an E-mail Working of E-mail Traveling of an E-Mail Email Servers
o Definitiono Usage
E-mail Forgeryo Anonymous Mailing techniques
Using Websites Using Self Developed PHP Script
o E-Mail Bombers Security to Anonymous Mailing
o Can User stop Receiving Fake Mails?
7/27/2019 Ethical Hack Course
3/7
3
o Tracing an Attackero Proving a Fake Mail
Attacks on E-Mail Passwordo Attackers Anatomy and Psychology while hacking the passwordso Technical Attacks
Using Fake Websites: Phishing Keyloggers
o Non-Technical Attacks Shoulder Surfing Dumpster Diving Social Engineering
Securing the E-Mail Passwords
o Password Policieso Benefits of SSL Certificate for a User.o Anti Trust Policies
Email Forensicso E-Mail Header Analysiso WhoisLookUp Queryo Tracing a Sender of an E-Mail
Tracing Senders IP Address Tracing Senders Location
Inside Threats: Operating System Hacking and Security
Introduction to System Softwareso Windowso Ubuntu(Linux)o Back Track(Live OS)
Windows Security Components and Workingo Windows Security Componentso User Account Login Process
Implementation of Virtualizationo VM Ware Workstation
Installation and Usage Windows Linux
o Oracle Virtual Boxo MS Virtual PC
Attacks on Windows Login Passwordo Resetting Windows login password without the old password
7/27/2019 Ethical Hack Course
4/7
4
o Removing Windows login password without the old password Other Security Measure
o BIOS User and Supervisory passwordo Biometrico Implementing Syskey File Encryption
Windows Inbuilt Flaws and Security Loopholeso Hidden Accountso Backdoor Via Sticky Keyso Administrator Escalation on Limited accounts
Invading into Computer Systemo Recovering BIOS Passwordo
Recovering Biometric Password
o Disabling Syskey File Encryption Optimizing Windows Computer System
o Steganography Hiding Files behind an Image
Restrict Hackers into boxo Restricting Access to Files & Folders
ACLs Calculationo Configuring Strong Passwordo Changing Boot Ordero BIOS Passwordo Physical Security
Malwares: Trojan, Viruses & Worms
What are malwares? Trojans
o What is a Trojan?o Types of Trojans
Trojan Attack Methodso Direct Connectiono Reverse Connection
Some Knows Trojans Detection of Trojan
o Using Anti-Trojan Softwareo Manual Detection
TCP View Process Viewer Process Explorer
Viruses Working and Functionality of Viruses Development
7/27/2019 Ethical Hack Course
5/7
5
o Batch Programming Programming
Development of Folder lockers Developing Professional Security tools
Compilation and EXE Generation Detection and Manual Removal
o Detecting Viruseso Process Monitoringo Manual Removal of Viruses
Playing with Networks
Introduction to the LAN(Local Area Networks)o What is Network?o What is networking?o Understanding Network Deviceso Wireless Hacking( Wi-Fi WEP Key Cracking)
Flaws and Securityo Attacks on Networks
Sniffing MITM(ARP Poisoning)
Live Demonstration Secure Network Configuration
o Configuring Anti-Snifferso MAC Filtering Restrictionso Configuration of WPA2 Keys
Internet World Wide Web attacks
Introduction to Web Application Securityo What is Web Servero What is Database Serverso The Web Login Processo What is Web application Securityo Why is Web application Security Important
Understanding Attack Vectorso Vulnerabilities & Evolving Threatso Exploit Analysis
Web Application Attackso SQL Injection
Basic Injection Advance Injections
o Google Dorks Using Google as an Expert
7/27/2019 Ethical Hack Course
6/7
7/27/2019 Ethical Hack Course
7/7
7
o Manipulating the Code of EXEs Dis-assemblers & Debuggers
o Olly DBGo Windows Dis-assembler
Software Cracking & Serial Key Phishingo Analysing Assembly Code of Softwareo Tracing the Error Messageo Setting Break Pointo Stepping the Assembly Codeo Checking the Registers for the Key
Software Patchingo Disassembling a Softwareo Error Tracingo Decoding the Instructionso
Generating Patch to inject the instruction
o Running the Patch Applying Application Security
o Introduction to Application Encryptiono Using the Setup Encrypterso Applying strong Serial Key Algorithms