You are here - Home - Training - Distance Learning Share  

i3indya Ethical Hacking and Cyber Security Distance Learning Kit

Learn Ethical Hacking & Cyber Security in 15 Days at Your Home

Learn Hacking Techniques used by Hackers to Secure Yourself

With

i3indya’s Distance Learning Kit (DLK)

for

Ethical Hacking & Cyber Security 1.1

i3indya DKL Program Highlight Video


 

 

Highlights

Course:

Ethical Hacking & Cyber Security

Certification:

Participation Certificate from i3indya Technologies

Fees:

For India: INR 3000/- (including courier charge)
For Other Countries: INR 3000/- + Shipping Charge

Topics:

13 Topics Covered

Delivery:

DLK will be delivered to you in 10 working days after receiving your payment

 

Special Discount Offer

Book your order on 26th November 2015 and get special discount of INR 800

 

Overview

If you don't have time for regular classes, don't worry! Now you can learn Ethical Hacking & Cyber Security at your home, with i3indya's Distance Learning Kit for Ethical Hacking & Cyber Security. It is a 15 days module and it will cover following Topics:

ADVANCE MODULE 1.1 - Ethical Hacking & Cyber Security

DAY

TOPICS

1

Fundamental of Ethical Hacking
Hacking Vs. Ethical Hacking
Types of Hackers
Skill Profile of a Hacker
Some Famous Hackers and Groups
Cyber World
Advantage and Disadvantage of Cyber world
Cyber World as a Home of hackers

2

Overview of Cyber Law
Introduction To Cyber Law
Cyber Laws Indian
Technical Aspect Of Indian Cyber Law
IT ACT 2000 & 2008
Internet Crimes And Frauds
Cyber Law Cases In India
Organization Under Cyber Laws
Advantages Of Cyber Laws

3

Information Gathering
What Is Information Gathering & Why Hackers Need This?
Types Of Information Gathering
Information Gathering Using Websites
Information Gathering Using Software
Information Gathering Using Add-Ons
Search Engines- Smart Way Of Information Gathering
Scanning And Enumeration
Tracing - E-Mail, Mobile Phone, Intruder

4

Virtualization & System Cloning
Introduction Of Virtualization
Need & Use Of Virtualization
Virtualbox
Installing OS On Virtual Machines
Networking In Virtual Machines
System Cloning
Troubleshooting
Other Tools For Virtualization

5

Windows Hacking & Security (Win 8 & Win 7)
Windows OS & Security
Hacking Into System By Changing Passwords
Getting Access To System By Elevating Privileges
Finding Out The Passwords Of Windows
Bypassing The Windows Security
Hack from Guest to Admin
Password in Plain Text Directly
Hacking By USB Devices
Mitigation Of System Attacks
Setting Up A Secure System

6

Password Cracking Techniques
What is Password Cracking
Types of Password Cracking Techniques
How Different Password Crackers Work
Windows Password Cracking
FTP / Network Password Cracking
Zip/ RAR Password Cracking
Doc & PDF Password Cracking
Using GPU For Password Cracking
Password Security

7

Data Hiding Techniques
What Is Steganography
How Attacker Hides His Data In Images And Other Formats
How To Find Data Which Are Hidden
What Is Cryptography
Advanced Cryptography Tools
How Are Programs And Data Wrapped
Secure Measures To Protect Our Data

8

Hacking By Batch Programming & Scripting
Basics Of Scripting
Languages Used In Scripting
Writing Your First Program
Malacious Program Scripting
Session Hijacking Using Batch Scripting
Data Theft Using Batch Script
Automation Using Scripting
Designing Tools Using Scripting
Developing Security Tools Using Scripting.

9

Hacking by Viruses, Trojans, Keyloggers & Spywares
What is Trojan?
Trojans Attack Big Famous Cases
Types Of Trojans
Different way a Trojan Can Get Into A System
How We Create A Trojan and Control System
How Attacker Bypass Your Antivirus By Trojans
Analysis Of Trojans/Virus
How we remove Trojans Manually
Security Against Trojans

10

Malware Analysis & Fake Antivirus Detections
Introduction of Malware
Types of Malware
Common Malwares In Cyber
Types of Malware Analysis
Manual Malware Analysis
Tools for Malware Analysis
Countermeasures

11

IDS, IPS and Honeypots
Overview of IDS, IPS & Honeypot
Use of IDS & IPSAssignment & Revision
Installation of IDS & IPS
Prevention & Detection
Honeypot & its Types
Implementation - Honeypots
Honeypot Tools

12

Proxy Server & Virtual Private Network (VPN) Technology
Proxy And Types Of Proxies
Why Hackers Use Proxy?
How To Hide IP Address While Chatting
How To Open Block Website In College/Companies
Convert Your Machine As Proxy Server With HTTPS Proxy
Advantage And Disadvantage Of Proxy
Analyzing Proxy Bug
How Proxy Hack Your Passwords Etc
What Is Better Than Proxy
What Is VPN?
Why We Use VPN
Advantage & Disadvantage Of VPN
Free VPN
Countermeasures

13

Google Database Hacking
Introduction And Working Of Search Engines
List Of Common Search Engines On Web
Comparing And Choosing Best Search Engine
Dorks For Hacking Search Engines
Tools For Search Engines Hacking
Web Ripping
Finding Admin Pages And Weakness In Site
Security Against Search Engine Hacking

14

More Projects You can do

15

Exam – Theory & Practical

 

DLK Content

DLK will contain the following:

1. DVD Set
2. Book

 

Examination

You can give exam anytime within 6 Month

 

Certification

Certificate of Participation will be given by i3indya Technologies

Note: Certificate will be issued only if you have 60% or above marks in exam

 

How To Order

[+] 1. Fill the DLK Order Form Here

[+] 2. Deposit the amount in Bank Account [account details]

Bank account details are as follows:


Open Indian Bank Branch Locator
Bank Name Name Indian Bank
Account Name I THREE INFOTECH PVT LTD
Account Number 909451555
Branch Name Preet Vihar
IFSC Code IDIB000P156
CBS Code 01618
Zone Delhi

 

To Pay Online

 

[+] 3. Fill the bank deposit details here

 

For More Details

Call Us : +91 - 95 6060 5666 (Extension 3)

 

Or Fill Quick Enquery Form below


 
     
 
     
 
     
 
     
 



     
 
     
 
     
      

 

 

 

i3indya GROUP VIDEO

about-i3indya-group

OUR CLIENT'S TESTIMONIAL



LOCATE US

G-85, Preet Vihar
New Delhi - 110092
Phone : +91 - 95 6060 5666

info@i3indya.com

© Copyright 2011-2012. All rights reserved by i3indya™ Technologies.
A Unit of  I THREE INFOTECH PVT. LTD.
Designed by i3indya WebSolutions

i3indya DLK Highligh Video
About i3indya Group