Upload
indiancyberarmy
View
161
Download
7
Tags:
Embed Size (px)
Citation preview
INDIAN CYBER ARMY™
INTERNATIONAL ASSOCIATION OF DISTANCE LEARNING,
CERTIFICATIONS ON ETHICAL HACKING
INDIAN CYBER ARMY™NOIDA
Website: Email: [email protected]
INDIAN CYBER ARMY™
TRAINING WING
In Association With
INTERNATIONAL ASSOCIATION OF DISTANCE LEARNING,
LONDON, UK
PRESENTS
CATIONS ON ETHICAL HACKING
INDIAN CYBER ARMY™ NOIDA – 201301 (UTTAR PRADESH)
Website: www.indiancyberarmy.org [email protected] | Helpline: +91 78 3877 3877
INTERNATIONAL ASSOCIATION OF DISTANCE LEARNING,
CATIONS ON ETHICAL HACKING
| Helpline: +91 78 3877 3877
Copyright 2012-INDIAN CYBER ARMY- All Rights Reserved
WE WORK IN THE DARK WE DO WHAT WE CAN
WE GIVE WHAT WE HAVE OUR DOUBT IS OUR PASSION, AND OUR PASSION IS OUR TASK
THE REST IS THE MADNESS OF ART. -- INDIAN CYBER ARMY --
“NO GREAT GENIUS HAS EVER EXISTED WITHOUT SOME TOUCH OF MADNESS”
-- KISLAY CHAUDHARY --
“DON’T LEARN TO HACK, PLEASE HACK TO LEARN”
TO CATCH A THIEF, THINK LIKE A THIEF
HACK!!! TO BEAT HACKER’S MIND, CREATE CYBER SAFE INDIA
-- INDIAN CYBER ARMY --
Copyright 2012-INDIAN CYBER ARMY- All Rights Reserved
MESSAGE BY DIRECTOR
“Computer crimes have become a dangerous problem over the past few years that governments and private Organizations worldwide have begun to crack down on one of the most common types of computer crime known as hacking.” Establishment of Indian Cyber Army, way back in 2011, with the goal Digitally Secured India, along with Some Printed Papers and short but dedicated team, we marked a vision that would change the life of Cyber World. We will make it most secured and crime free. In today’s scenario India is having the fastest growing cyber society in the world. At the same time Indian Cyber Army with its immense effect in uplifting the standards of Cyber Security, Research and Investigations over cyber crime for the Individuals, Corporate and Law and Enforcement Agencies who wants cyber crime free society on internet life. I welcome you all to the family of juvenile and energetic professionals in Indian Cyber Army [ICA]. Indian Cyber Army nurture and shape young minds to help them continuously meet the challenges of the ever evolving Cyber Crimes. We take pride in our ability to help numerous professionals across the country chart their road to success and soar to new horizons. Today, we can say with pride that Team Indian Cyber Army is second to none. With all this and a special emphasis on quality of Services combined with community-oriented focus, The Indian Cyber Army has grown into a responsible Organization of Cyber Security, Research, Cyber Crime Investigation and Hi-Tech Training with social concerns. We are, thus, committed to empower our Students and Clients with knowledge, skills and vision to meet the challenges and opportunities of a rapidly changing world. I personally welcome all those hard working young men and women who keenly desire to pursue quality Hi-Tech Training and Research to join this Organization and assure them that our Services will meet all their legitimate needs to fulfill their needs. I would like to welcome you all again to join ICA family of independent learners, Professionals and ensure your future with knowledge and success.
Copyright 2012-INDIAN CYBER ARMY- All Rights Reserved
INDIAN CYBER ARMY - THE ORGANIZATION Indian Cyber Army is the largest group of ethical hackers and cyber security experts
involved into social service. Its sole aim is to research, analyze, train and develop
technology. We are a team of Ethical Hacker, Security Experts, and Programmers from
across the globe involved into creating awareness in the field of cyber security and to
reduce the increasing Cyber Crimes. Apart from creating awareness, we do researches in
the field of IT security & ethical hacking, discovering vulnerabilities/loopholes in websites,
networks, developing exploits and providing the advisories to overcome the exploit or
loopholes.
OBJECTIVES OF ORGANIZATION
Indian Cyber Army focuses on advancing the Information Security and Ethical Hacking. The
objectives of the company, inter-alias include;
• Research, Analyze, Train and Develop Technology
• Discovering vulnerabilities/loopholes in websites, networks, developing exploits and
providing the advisories to overcome the exploit or loopholes.
• Protecting the National Information Heritage, Financial freedom, privacy of the individuals
and the intellectual property from the global menace of unseen cyber criminals is a social
necessity.
• Organize conferences, workshops (HackinTech), Training and brainstorming (Boot Camps)
sessions involving all concerned professionals, students and industry associations for the
advancement of the Information Security and Ethical Hacking.
• Provide a forum for discussion on new changes, threats, loopholes and to provide suitable
inputs to create Cyber Safe India.
• Promote and conduct live Hacking Sessions to show the real threats on India.
• Stimulate research and development.
• Bring out quality publications (Hackcrypt: Magazine for Hackers) and Books on Information
Security for all levels of readership.
• Honors outstanding professionals.
• Conducting Computer Training for Financially Weak Children.
Copyright 2012-INDIAN CYBER ARMY- All Rights Reserved
WHY INDIAN CYBER ARMY PROGRAMMES
INDIAN CYBER ARMY is a Professional Cyber Security Organization Aimed with Digitally Secured
India, which is providing its services to government and Indian Police. It is the only Organization in
India which is providing INTERNATIONAL ASSOCIATION OF DISTANCE LEARNING, UK.
Indian Cyber Army Replaced EC Council, ISC2, and SANS today! Currently Indian Cyber Army has
grown over 300% in 2011.
We have CYBOARMOURER vs. CEH, CYBODETECTIVE vs. CHFI, CYBOTESTER vs. LPT, and much more.
So why should a student go for Indian Cyber Army Programs We think the following summarizes
the plethora of reasons why Indian Cyber Army Program is a dream for every Information Security
and Ethical Hacking enthusiast:
• Indian Cyber Army is supported by Government, Alumni’s from IITs, Veterans of Cyber Security World and Ex-Army men and Corporate.
• Partner Organization with Microsoft, Intel, Symantec (Norton Antivirus), IBM
India, GFI, MacAfee Antivirus and Many More Organizations Working in the field of Cyber Security.
• Receive an unparalleled education on the art of computer security with personal
one-on-one attention from the Indian Cyber Army Cyber Security Team.
• Toppers of each batch to be personally interviewed by Indian Cyber Army and will receive a chance to work with them on security projects at Cyber Crime Investigation
Bureau, New Delhi- A Private Cyber Crime Investigation Agency or Indian Information
Security Research Organization (IISRO) - A Private Info Sec Research Center under Indian Cyber Army Student Partners Program (ICASP).
• Indian Cyber Army Ethical Hacking & Information Security Software Tool Kit with Manual for each student. Study materials prepared by the legends of hacking world.
• Authorized Certificate, recognized in the security industry globally after the
completion of Any Program.
• Free Membership to “Indian Cyber Army” – India’s first White Hat Hacker’s Team.
• One Year Free Subscription to “Hackcrypt” Magazine (E-Copy)
The Major benefits of Training Programs by Indian Cyber Army™ is the fact that you'll be put on live Projects. Once you've completed your training sessions, and have cleared the certification examination you will be put as an understudy on the live projects being executed at Indian Cyber Army™ (www.indiancyberarmy.org), Indian Information Security Research Organization (www.iisro.com), and Cyber Crime Investigation Bureau (www.ccibindia.com). These include penetration testing projects, compliance projects, security audits, cyber crime investigations and researches etc.
Copyright 2012-INDIAN CYBER ARMY- All Rights Reserved
THE PROGRAMS
ON
ETHICAL HACKING
Copyright 2012-INDIAN CYBER ARMY- All Rights Reserved
CERTIFIED ETHICAL HACKER: CYBOARMOURER
COURSE CODE: 422 - 306
DESCRIPTION: The CYBOARMOURER is a program designed to make you an expert consultant in the domain of information security. While most certification programs are geared towards purely technical know-how, the CYBOARMOURER also arms you with the necessary consulting skills in Order to help you make your mark in this exciting field. The best part about the CYBOARMOURER is the fact that you get hands-on practical training on live projects. It covers a wide variety of topics, starting right from the basics, and then leading up to compliance standards, and even forensics and cyber crime investigations. The course content is developed with the support of Security Experts, Black Hat Hackers,
Ministry of Communications and IT, Government of India and Various Universities of India
that can assure you that it is designed specifically to make you an expert consultant in the
domain of information security.
COURSE MODULES:
• Introduction to Information Security and
Ethical Hacking
• Ports and Protocols
• Steps to Hacking
• Detecting Live System
• Trojans, Worms & Viruses
• Hacking into Email
• Windows Systems Hacking
• Website Hacking
• Linux Fundamentals
• Linux Hacking
• Crypto Graphy
• Buffer Overflow Attacks
• Vulnerability Assessments
• Penetration Testing
• Pen Testing Wireless Networks
• Cyber Laws and IT Acts
• Cyber Crime & Forensics Investigation
ELIGIBILITY:
• Basic Knowledge of Computers/ Internet etc.
• Network & System Administrators
• Information Security Officers
• Students of B.E/B.Tech/ME/B.Sc/M.Sc.
• IT professionals and Security Consultants, Security and Hacking enthusiasts
DURATION: 3 months (1 month training + 2 months Research and Live Projects), 12 CREDITS
Copyright 2012-INDIAN CYBER ARMY- All Rights Reserved
CERTIFIED PENETRATION TESTER: CYBOTESTER
COURSE CODE: 422-108
DESCRIPTION: The CYBOTESTER course is a state-of-the-art cutting-edge hands-on intensive training on hacking tools and techniques. It goes much beyond the usual ethical hacking courses with a strong focus on Databases, Web Applications (including Web 2.0), WLANs, and even blue jacking. The major USP of the course is its focus on learning the fundamentals of Networks, Systems, and Databases Applications before learning how to hack them. This Program will immerse the participant into an interactive environment where they will be shown how to scan, test, hack and secure systems. The lab intensive environment gives each participant in-depth knowledge and practical experience with the current essential security systems. Participants will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Participants then learn how intruders escalate privileges and what steps can be taken to secure a system. When a participant leaves this intensive 5 day class they will have hands on understanding and experience in internet security.
COURSE MODULES:
• Introduction to Penetration Testing
• Ports and Protocols
• Steps to Hacking
• Detecting Live System
• Trojans, Worms & Viruses, Malware
Analysis
• Windows Systems Hacking
• Linux Fundamentals
• Linux Hacking
• Networks, Sniffing, IDS
• Attacking Web Technologies
• Injecting the Database
• Advanced Exploitation Techniques
• Vulnerability Assessments
• Pen Testing Wireless Networks
ELIGIBILITY:
• Basic Knowledge of Computers/ Internet etc.
• Network & System Administrators
• Information Security Officers
• Students of B.E/B.Tech/ME/B.Sc/M.Sc.
• IT professionals and Security Consultants, Security and Hacking enthusiasts
DURATION: 6 MONTHS (3 months training + 3 months Research and Live Projects), 24 CREDITS.
Copyright 2012-INDIAN CYBER ARMY- All Rights Reserved
CERTIFIED FORENSICS EXPERT: CYBODETECTIVE
COURSE CODE: 422 – 603
DESCRIPTION: Understanding network security and incident response is not enough for today’s investigative, intelligence, and response professionals. Forensics and Cyber Crime Investigation is designed to fulfill this role. This is an intensive introduction to forensic computing geared toward technical professionals who need to hit the ground running without being tied to a particular tool or methodology. Individuals preparing for the CHFI or other forensic exam will be well prepared by attending this class. This course covers what forensic computing is, how to conduct electronic discovery, how to analyze data collected, and how to prepare reports.
The course content is developed with the support of Security Experts, Black Hat Hackers, Ministry of Communications and IT, Government of India and Various Universities of India that can assure you that it is designed specifically to make you an expert consultant in the domain of information security.
COURSE MODULES:
• Introduction to Information Security and
Ethical Hacking
• Cyber Laws and IT Acts
• Cyber Investigation Essentials
• Digital Evidence in Computer Devices
• Cyber Forensics Essentials
• Investigating Emails
• Penetration Testing
• Investigating Server Logs
• Investigating Financial Crimes
• Windows Forensics
• Linux Forensics
• Social Networking Forensics
• Malware Forensics
• Apps Forensics
• Mobile Forensics
• Computer Security Incident Response
• Handling Real World Investigations
ELIGIBILITY:
• Basic Knowledge of Computers/ Internet etc.
• Network & System Administrators
• Students of B.E/B.Tech/ME/B.Sc/M.Sc.
• Information Security Officers & IT professionals and Security Consultants, Security and Hacking
enthusiasts
DURATION: 6 MONTHS (3 months training + 3 months Research and Live Projects), 24 CREDITS.
Copyright 2012-INDIAN CYBER ARMY- All Rights Reserved
ADVANCE DIPLOMA IN CYBER SECURITY
COURSE CODE: 422 - 504 DESCRIPTION: Advanced Diploma in Cyber Security Certificate Program provides participants the advanced skills needed to learn how to protect networks, secure electronic assets, prevent attacks, ensure the privacy of your customers, and build secure infrastructures through this six-course certificate program. COURSE MODULES:
1. Introduction to Ethical Hacking
2. Hacking into Email
3. Windows Systems Hacking
4. Website Hacking
5. Linux Hacking
6. Cyber Laws and IT Acts
7. Vulnerability Assessments
8. Penetrating Testing
ELIGIBILITY: • Bachelor’s Degree in any stream. • Good Knowledge in Computers/ Internet etc.
Duration: 12 Months [SEM-1 + SEM-2]
Copyright 2012-INDIAN CYBER ARMY- All Rights Reserved
POST GRADUATE DIPLOMA IN CYBER SECURITY
COURSE CODE: 422 - 540
DESCRIPTION: A Post Graduate diploma in Cyber Security certificate is an additional credential that demonstrates your desire to master your field or seek new knowledge as you pursue new challenges. A Post Graduate diploma in Cyber Security certificate can also provide knowledge about a new area of interest or field, boosting your resume and making you an even more valuable employee. In tough economic times, such enhanced learning can help you stand out in a competitive labor market.
COURSE MODULES:
1. Introduction to Information Security and Ethical Hacking
2. Hacking into Email
3. Windows Systems Hacking
4. Website Hacking
5. Linux Hacking
6. Cyber Laws and IT Acts
7. Vulnerability Assessments
8. Penetrating Testing
9. Financial Crimes
10. Cyber Crime Investigation
11. Windows & Linux Forensics
12. Investigation on Digital Devices
ELIGIBILITY: • Bachelor’s Degree in any stream. • Good Knowledge in Computers/ Internet etc. Duration: 18 Months [Sem-1 + Sem-2 + Sem-3]
Copyright 2012-INDIAN CYBER ARMY- All Rights Reserved
THE FEE STRUCTURE
THE ADMISSION PROCESS
• Fill up the Registration Form with Correct Information attached with this Brochure. PAYMENT OPTION
- NET BANKING (NEFT/RTGS)/ CASH DEPOSIT: Transfer Full Amount by Net Banking /Cash Deposit to Account no.010783800002248 in name of INDIAN CYBER ARMY (Add Rs.250 for Bank Charges, in case of Cash Deposit) in any Yes Bank across the country (Our Branch Laxmi Nagar, New Delhi, India. IFSC Code: - YESB0000107)
• E Mail the Educational Documents and Govt. ID Proof (zipped format) to
[email protected] with Subject as your Unique Registration Number.
• After we receive your payment confirmation, we would give you a call to confirm your batch
date, timings and other details.
THE EXAMINATIONS - AIMING FOR PRECISION
• Students are allowed to appear for the examinations at http://www.indiancyberarmy.org
with their registered login information only.
• Each Examination paper will carry 100 objective type multiple choice questions of one mark
each. & Duration will be 120 minutes.
• Students have to secure 50% marks in each Exam and overall pass percentage will be 70%
for each subject.
COURSES Distance Mode Classroom Mode FOREIGN STUDENTS
CERTIFIED ETHICAL HACKER 10,000/- 15,000/- $ 500
CERTIFIED FORENSICS EXPERT 15,000/- 20,000/- $ 1000
CERTIFIED PENETRATION TESTER 15,000/- 20,000/- $ 1000
ADVANCE DIPLOMA IN CYBER SECURITY 25,000/- - $ 2,700
PG DIPLOMA IN CYBER SECURITY 30,000/- - $ 3,000