You are here - Home - Training - Summer Training - i3indya Ethical Hacking & cyber Security

Share 

summer training 2015 ethical hacking & cyber security

i3indya™ Technologies presents Summer Training on "i3indya Ethical Hacking & Cyber Security - iEHCS (30 Days)".

The rapid and dramatic advances in information technology (IT) in recent years have without question generated tremendous benefits. However, they have created significant and unprecedented risks to operations. Computer security has, in turn, become much more important as all levels of an organization to utilize information systems security measures to avoid data tampering, fraud, disruptions in critical operations, and inappropriate of sensitive information.

After the boom in Networking and Software jobs, the past two year have seen a sharp rise in the field of information security. Information Security and Ethical Hacking is the latest buzzword in the industry. In the past five years, the percentage of hacking crimes, data thefts, data losses, viruses and other cyber crimes have increased exponentially.

iEHCS Course Highlight Video

i3indya-ethical-hacking-and-cyber-security-training-2015



 

Course Highlights

Course : i3indya Ethical Hacking & Cyber Security (iEHCS)
Certification : Participation Certificate by i3indya™ Technologies
Study Material : Books & CD Free to each participant
Topics : 12 Live Cyber Cases, 10 Case Studies, 3 Hacking Projects will be covered



 

Fees & Duration

Module Duration Fee
Advance Module 1.1 45 Hrs/15 Days 5,700/- (including taxes) per candidate
Advance Module 1.1+1.2 90 Hrs/30 Days 11,628/- (including taxes) per candidate
Advance Module 1.1+1.2+2.0 120 Hrs/40 Days 16,188/- (including taxes) per candidate



 

special Discount Offer

Submit your fee on or before 1st June, 2016 and get discount of  900 on iEHCS Advance Module 1.1+1.2
 

»  Total fee to submit after discount is  10,649/- 



 

Want TDO THIS COURSE for FREE ?

Here is the Opportunity to Join this course for FREE, Try Your Luck Here  !



 

Do This Course At Your Home

Yes! You can do this course at your home by purchasing our distance learning kit. See details Here



 

Training Modules

DAY

TOPICS

1

Fundamental of Ethical Hacking
Hacking Vs. Ethical Hacking
Types of Hackers
Skill Profile of a Hacker
Some Famous Hackers and Groups
Cyber World
Advantage and Disadvantage of Cyber world
Cyber World as a Home of hackers

2

Overview of Cyber Law
Introduction To Cyber Law
Cyber Laws Indian
Technical Aspect Of Indian Cyber Law
IT ACT 2000 & 2008
Internet Crimes And Frauds
Cyber Law Cases In India
Organization Under Cyber Laws
Advantages Of Cyber Laws

3

Information Gathering
What Is Information Gathering & Why Hackers Need This?
Types Of Information Gathering
Information Gathering Using Websites
Information Gathering Using Software
Search Engines- Smart Way Of Information Gathering
Scanning And Enumeration
Tracing - E-Mail, Mobile Phone, Intruder

4

Virtualization & System Cloning
Introduction Of Virtualization
Need & Use Of Virtualization
Virtualbox
Installing OS On Virtual Machines
Networking In Virtual Machines
System Cloning
Troubleshooting
Other Tools For Virtualization

5

Windows Hacking & Security (Win 8 & Win 7)
Windows OS & Security
Hacking Into System By Changing Passwords
Getting Access To System By Elevating Privileges
Finding Out The Passwords Of Windows
Bypassing The Windows Security
Hack from Guest to Admin
Password in Plain Text Directly
Hacking By USB Devices
Mitigation Of System Attacks
Setting Up A Secure System

6

Password Cracking Techniques
What is Password Cracking
Types of Password Cracking Techniques
How Different Password Crackers Work
Windows Password Cracking
FTP / Network Password Cracking
Zip/ RAR Password Cracking
Doc & PDF Password Cracking
Using GPU For Password Cracking
Password Security

7

Data Hiding Techniques
What Is Steganography
How Attacker Hides His Data In Images And Other Formats
How To Find Data Which Are Hidden
What Is Cryptography
Advanced Cryptography Tools
How Are Programs And Data Wrapped
Secure Measures To Protect Our Data

8

Hacking By Batch Programming & Scripting
Basics Of Scripting
Languages Used In Scripting
Writing Your First Program
Malacious Program Scripting
Session Hijacking Using Batch Scripting
Data Theft Using Batch Script
Automation Using Scripting
Designing Tools Using Scripting
Developing Security Tools Using Scripting.

9

Hacking by Viruses, Trojans, Keyloggers & Spywares
What is Trojan?
Trojans Attack Big Famous Cases
Types Of Trojans
Different way a Trojan Can Get Into A System
How We Create A Trojan and Control System
How Attacker Bypass Your Antivirus By Trojans
Analysis Of Trojans/Virus
How we remove Trojans Manually
Security Against Trojans

10

Malware Analysis & Fake Antivirus Detections
Introduction of Malware
Types of Malware
Common Malwares In Cyber
Types of Malware Analysis
Manual Malware Analysis
Tools for Malware Analysis
Countermeasures

11

IDS, IPS and Honeypots
Overview of IDS, IPS & Honeypot
Use of IDS & IPS
Installation of IDS & IPS
Prevention & Detection
Honeypot & its Types
Implementation - Honeypots
Honeypot Tools

12

Proxy Server & Virtual Private Network (VPN) Technology
Proxy And Types Of Proxies
Why Hackers Use Proxy?
How To Hide IP Address While Chatting
How To Open Block Website In College/Companies
Convert Your Machine As Proxy Server With HTTPS Proxy
Advantage And Disadvantage Of Proxy
Analyzing Proxy Bug
How Proxy Hack Your Passwords Etc
What Is Better Than Proxy
What Is VPN?
Why We Use VPN
Advantage & Disadvantage Of VPN
Free VPN
Countermeasures

13

Google Database Hacking
Introduction And Working Of Search Engines
List Of Common Search Engines On Web
Comparing And Choosing Best Search Engine
Dorks For Hacking Search Engines
Tools For Search Engines Hacking
Web Ripping
Finding Admin Pages And Weakness In Site
Security Against Search Engine Hacking

DAY

TOPICS

14

Email Hacking & Security Issues
World Famous Big Email Hacking Cases
IIT Bombay Alumni, Anil Ambani, Rahul, Gandhi, Facebook CEO Mark Zuckerberg (Case Study)
Analysis Email Attacks (Live Demo) Manually & Automatic
Cookies Stealing (Session Hijacking) of All Big Mail Servers
Phishing Attacks ( Normal & Advanced )
Tab Nabbing Attack
Social Engineering Attack
Analyzing the Vulnerabilities of Email Servers
Analyzing Fake & Real Profiles & Email Accounts
Fake Mailing Attack
Email & Fake Profile Tracing
Hacker Email Backdoor Installing Technique For Future Access
Email Password Stealing By Plugins, Extensions Etc.
Email Hacking By Keylogger, Spywares & Malicious Softwares
Countermeasures

15

Facebook Hacking, Security & Forensic
World Famous Big Facebook Hacking Cases
Cookies Stealing of Facebook Accounts
Facebook Phishing Attacks
Facebook Tab Nabbing Attack
Facebook Social Engineering Attack
Analyzing Fake & Real Profile of Facebook
Delete Spam Messages on Facebook
Facebook Fake Messaging Attack
Facebook Tracing Method Techniques (Basic & Advanced)
Facebook Backdoor Installing Technique For Future Access
Facebook Password Stealing By Plugins, Extensions Etc.
How to find if your Facebook Account has been hacked or not
Facebook Account security with Email & SMS Notifications
How to Hack Password using Facebook Hacker
Hack Facebook account password with key logger
Facebook Security & Forensics

16

Clickjacking & Tabnabbing Attacks
What Is Clickjacking
How Does A Clickjacking Work
Facebook Likejacking
How Hacker Use Clickjacking
Execution Of Malicious Code Into Machine
Possibilities Of Clickjacking
Clickjacking Killer - The IFRAME Buster
How Protect From Being Clickjacked

17

Advanced Methodology for Privacy on Internet
Staying Safe in the Internet
Email Privacy
Malicious Link Security
Website Visit Privacy
Block Malicious Contents On Web
Antivirus Privacy
Automatic analyzing of Malicious Links
Internet Privacy Tools

18

Social Engineering
Introduction to Social Engineering
Types of Social Engineering
World's Biggest Social Engineering Cases
Web based Social Engineering
Vulnerability in Social Engineering
Analyzing a Social Engineering Attack
Security against Social Engineering

19

Android Hacking, Security & Forensics
Introduction to Android
Android OS Structure
Overview of Android Apps
Android Rooting
Application Cracking of Android
Cracking PIN of Android Devices
Pattern Unlock Cracking
Android Security
Android Forensics
Countermeasures

20

Credit Card Frauds & Cases
Introduction of Plastic Money
Some Big Credit Card Cases Solved by i3indya Team
Type of Credit Card
Hacker's Credit card Theft Techniques
Online & Offline Credit Card Generators
Vulnerability In Credit Card & Payment Gateway
Big Credit Card Fraud Website on Internet
Detection of Credit Card Fraud
Security Against Credit Card Fraud
Countermeasures

21

Website & Database Hacking Attacks
Introduction of Websites & Database
Authentication Process Of Web Application
Attack on Website & Web Application
SQL Injection Attacks
PHP Injection Attacks
Java Script Injection
Scripting Attacks
RFI & LFI Attacks
Countermeasures

22

Web Server Hacking & Security
Introduction of Webserver
Types of Webserver
Setting up a Webserver
Webserver Exploits
Shell ( Control Panel ) Designing & Uploading
Web Server Routing
Backdoor Installation on Server
Server Passwords Hacking
Web Server Security Against Attacks

23

Vulnerability Assessment & Penetration Testing Tools & Methodologies
What is VA & PT
Difference between VA & PT
Need of VA & PT
Penetration Testing Methodology
Types of Penetration Testing
Scope of Pen-testing
Why Penetration Testing
Manual VA-PT
Tool Based VA-PT
Reporting a VA-PT
Available VA-PT Platforms
Closed Source Platform
Open Source Platforms
Benefits of Open Source Over Closed Source
Backtrack - VA-PT
Bugtraq - VA-PT
Some Other Recommended VA-PT Tools

24

Wireless Hacking & Countermeasures
Wireless Standards
Common Vulnerabilities in Wireless Devices
Encryption Standards Used in Wi-Fi
WEP Cracking
WPA/WPA2 Cracking
WPS Cracking
Countermeasures

Exam – Theory & Practical

DAY

TOPICS

25

Linux Hacking & Security
Introduction To Linux OS
Installation, Configuration & Maintenance
Resetting Your Linux Password
Grub Password Hacking
FTP & SSH Password Cracking
Security Against Files
Security Against Linux Systems
IP Table Configuration ( Advanced )
OS Hardening
Troubleshooting

26

Macintosh Hacking & Forensic
Introduction of Mac
Architecture of Mac
Mac Password Cracking without any tool.
Mac Password cracking with tool.
Installing Backdoor in Mac
Data Recovery in Mac
Securing Mac System

27

Switch & Router Devices Hacking
Introduction to Switch & Router
Vulnerabilities in Switch & Router
Exploiting Switch & Router Vulnerability
Switch & Router Password Cracking With & Without Tool
Backdoor Installation
Securing Switch & Router

28

Network Security & Hacking
Introduction To Networks ( LAN /WAN )
Understanding Communication Protocols
Sniffing Attacks
DOS & DDOS Attack
Mis-configuration
Firewall Configuration & Maintenance
Network Monitoring & Analysis.
Logs Maintenance

29

Cyber Forensics Investigations & Evidence Recovery
Introduction to Forensics
Incidence Response and Computer Forensic
Windows Live Response
Linux Live Response
Web Browser Forensics
Network Forensic
Disk Imaging
Data Recovery Using Tools
Forensic Analysis & Chain of Custody Form

30

Audio, Video & Image Forensics
Introduction to File formats Analyzing Files Detecting Modified Files Extract Hidden Data from Files Audio & Video Enhancement Integrity Checking

31

Cyber Crime Investigation
Introduction of Cyber Crime
Need of Cyber Crime Investigation in Cyber World
Types of Cyber Crime
»Online Crime investigation
»Offline Crime Investigation
Solving Different Cyber Cases
»Email Hacking Case
»System Hacking Cases
»Credit Card Cases
»Privacy & Data Theft Cases
»Fake Profile Cases
»Software Piracy Cases
»Pornography Cases
»Identity Theft Cases Etc.,

32

Case Study ( Live Demo By i3indya Team )

Exam – Theory & Practical



 

WHY iEHCS ?

»   12 Live Cyber Cases, 10 Case Studies, 3 Hacking Projects will be covered
»   Latest and Updated Topics are covered
»   New Topics like Hacking & Securing Linux, Android, Mac, Web Servers are taught
»   We concentrate not only on Hacking but also on Security of all Topics
»   Forensics on almost all platforms and devices are taught
»   Hands on training with live demonstrations
»   Well experienced Trainers
»   Tied up with several Government Organizations for Training and Consultancy
»   Trained more than 30,000 professionals from all over India
»   Providing training to CBI, NIA and State Police across India
»   We limit our tool usage from third-party and we provide manual approach for each Technique
»   We also design our own tools



 

Pre Requisite

»   Basics of Computer
»   Knowledge of how to use internet
»   Basics of Networking



 

Recommendation

It is strongly recommended to bring your own LAPTOP during the training so that you can easily practice the exercises at home.



 

Who Could Attend ?

»   College students seeking career in Cyber Security Industry.
»   Person having interest in Hacking & Security.
»   Education Faculty & Staff.
»   IT Professionals, Web Developers, Network Engineers.
»   Students from any branch can join the training.



 

Program Benefits & Highlights

»   Learn & Interact with renowned Industry Experts.
»   Receive an unparalleled education on the art of computer security with personal one-on-one attention.
»   Hands on Demonstrations of Latest Hacking Techniques & Tools.
»   Hands on Demonstrations of various cases solved by our trainer.
»   Power Point Presentation, Live Demos, Interactive Question & Answer sessions and comprehensive
reading material.
»   FREE - Book & CD Free to each participant



 

WHO ATTENDED iEHCS ?

who-attended-iehcs



 

Training Centers

Delhi

i3indya Technologies
G 85, Preet Vihar, Vikas Marg, New Delhi - 110092

Contact : +91 - 95 6060 5666 (Ext: 2)



 

Batch Details

Date Timing Schedule
16-May-2016 09:20 am - 12:20 pm
25-May-2016 12:40 pm - 03:40 pm
07-Jun-2016 03:50 pm - 06:50 pm
13-Jun-2016 09:20 am - 12:20 pm
22-Jun-2016 12:40 pm - 03:40 pm
11-Jul-2016 03:50 pm - 06:50 pm



 

Registration Procedure

To complete your Registration for i3indya Summer Training program, kindly follow the following steps:

»    Step 1 : Register yourself online for Summer Training. Click Here
       After you register online, you will get a confirmation mail of your registration along with your Token Number.


»   Step 2 : Download the Training Registration Form here   
 

»   Step 3 : Pay Training Fee (See Modes of Payment Below)

»   Step 4 : Send us following documents  :


    1) 1 ID proof copy (Driving License/Voter ID Card)
    2) Training Registration Form (completely filled & signed)
    3) Fee Payment Receipt (transaction screenshot/cash deposit receipt)

    to the following address:

i3indya Technologies
G 85, Preet Vihar, Vikas Marg, New Delhi - 110092

Contact: +91 - 95 6060 5666 (Ext: 2)

or mail the above documents at training@i3indya.com

Note : Your Seat will be confirmed only once we receive your Training Registration Form and Fees. You will get a e-Receipt as a confirmation of your registration.



 

Modes of Payment

»  Mode 1 - Via Net-banking (NEFT or IMPS) : Transfer the amount directly to following bank account no. via IMPS/NEFT. Keep screenshot of transaction successful page as payment receipt.

»   Mode 2 - Cash Deposit in Bank A/C : Submit your fees via Cash into Company's Bank Account and keep copy of cash deposit receipt as payment receipt.


    Bank account details are as follows:


Open Yes Bank Branch List
Bank Name YES BANK LTD
Account Name I THREE INFOTECH PVT.LTD.
Account Number 023683900000560
Branch Name Preet Vihar New Delhi
IFSC Code YESB0000236
Zone Preet Vihar New Delhi


»   Mode 3 - Submit your cash at Our Training Center

»   Mode 4 - Pay Instantly with Credit Card/ Debit Card/ Net Banking from any of the following gateway:

1. Pay Instantly via Payu



 


For More Information

Contact : +91 - 95 6060 5666 (Extenstion 2)

Or Fill Quick Enquery Form below

    

Study Material

Ethical Hacking and Cyber Security Study Material

i3indya GROUP VIDEO

about-i3indya-group

OUR CLIENT'S TESTIMONIAL


 

LOCATE US

G-85, Preet Vihar
New Delhi - 110092
Phone : +91 - 95 6060 5666

info@i3indya.com

© Copyright 2011-2012. All rights reserved by i3indya™ Technologies.
A Unit of  I THREE INFOTECH PVT. LTD.
Designed by i3indya WebSolutions

About i3indya Group

i3indya Summer Training 2015 Centers

Join i3indya Certified Cyber Security Analyst Course Now !!