Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security HTML PHP Database Linux Operating System and Networking: LINUX NETWORKING Information Gathering: Doxing Website/ IP information Gathering Network Mapping Google Hacking Scanning & Enumeration: Discovering IP Range and Open Port Identifying Target Operating System and Services Secure Bypassing Firewalls while Scanning Proxy Servers and Anonymity: Learning Various Methods to Use Proxies Hiding yourself behind VPN Using Proxies and VPN for Hacking Tools i.e Scanning Configuring TOR with Backtrack and Nmap for Invisible Scanning Using Tunneling methods for IP hide
Email Security & Social Engineering: Types of Email Addresses. Security measures for Phishing. Security measures for Social Engineering. Security measures for Brute force. Security measures for Keynoters and Rating. Security measures for Password Guessing. Security measures for Mobile Phone. Cryptography & Steganography: Cryptography and Encryption Basics Understanding various Hashes and Encryption Algorithms Creating Digital Signatures on Backtrack and SSL cert. Cryptography attacks Rainbow table to Crack Passwords Using various Steganography tools on Backtrack System Hacking & Security: Hacking Windows Passwords using various methods & Security Cracking SAM file Protecting SAM file from hack Privilege Escalation in windows and Linux Using Stealers, Key loggers and Remote Administrations Tools (RATs) Creating Undetectable Viruses using Crypters, Binders and Assembly Codes. Protection against Trojans, Worms and Malwares
Website/Server Hacking & Security Techniques: Advance SQL Injection Cross Site Scripting Local File Inclusion (LFI) Remote File Inclusion (RFI) Parameter Manipulation Session and Cookies Hijacking Click Jacking Shell Injection Brute force Attacks against Website login pages Website / Server Hacking & Security Techniques: Using various Web based Vulnerabilities to hack servers Rooting Servers Remote Code Execution Buffers Overflows Brute force against Servers Using Dos, DDos and Creating Botnets Using various Exploits and Exploits Databases
Website / Server Hacking & Security Techniques: Understanding Wireshark, Cain & Abel and TCP Dump Man in the middle attacks Router Hacking Sniffing Data and Passwords ARP, DNS, DHCP Spoofing attacks DNS poising, DOS attack against an IP address Flood the LAN with random MAC addresses Packet Injection Wireless Hacking and Penetration Testing: Understanding Wireless Networks Deauthentication attack Fragmentation Attacks Chop Chop attack Fake authentication Evil Twin Attack Cafe-latte attack Reveal Hidden SSID s WEP password attacks WPA and WPA2 wireless password hacking techniques Cracking Wireless Passwords using Rainbow tables, Brute force techniques!
Vulnerability Assessment and Penetration Testing (VAPT) : Using Acunetix, Wikto, Nessus, skipfish, w3af, SQLmap Websecurify for vulnerability Scanning and Exploiting Wordpress-scan, Drupal scan, Joomscan, cms-explorer for CMS Hacking and Pentesing Vulnerability Assessment and Penetration Testing (VAPT) : Using Metasploit Framework for Exploitation Websploit, SET, Fast-Track SQL Pwnage, Winautopwn for various System/ Network/web Attacks Firewalls, IDS and Honeypots: Using IP tables and Firewalls Policies to Protect Network/ System Installing and Configuring Honeypots to trap hackers Installing and Configuring IDS (Intrusion Detection System) Log Analysis Computer Forensics and Incident Management: Computer Investigation Process and Collecting Digital Evidences. Cyber Crime Investigation and Understanding various trace back Techniques. Acquiring data, duplicating data and Recovering deleted Files. Understanding Boot Process and Important System Files. Investigating Network Traffic Cyber Crimes and Laws Understanding Various Corporate Threats Case Studies Note: These are just major aspects that we will be discussing, each point will be elaborated with demonstration of tools and techniques.