You are here - Home - Training - Winter Training - Ethical Hacking & Cyber Security

Share  

i3indya winter training 2015 - 2016 on ethical hacking and cyber security

i3indya™ Technologies presents Winter Training on "i3indya Ethical Hacking & Cyber Security (iEHCS)" (15 Days).

The rapid and dramatic advances in information technology (IT) in recent years have without question generated tremendous benefits. However, they have created significant and unprecedented risks to operations. Computer security has, in turn, become much more important as all levels of an organization to utilize information systems security measures to avoid data tampering, fraud, disruptions in critical operations, and inappropriate of sensitive information.

After the boom in Networking and Software jobs, the past two year have seen a sharp rise in the field of information security. Information Security and Ethical Hacking is the latest buzzword in the industry. In the past five years, the percentage of hacking crimes, data thefts, data losses, viruses and other cyber crimes have increased exponentially.

If you want to know how hackers are attacking your websites, emails, servers & computer remotely or how you can protect yourself or your organization from all these attacks then this is the right course for you.

 

Course Highlights

Course : i3indya Ethical Hacking & Cyber Security (Advance Module 1.1)
Certification : Certificate of Completion by i3indya™ Technologies
Study Material : Books & CD Free to each participant
Topics : 13 Topics Covered in 15 Days

Fees & Duration

Fee : 5,700/- (including taxes) per candidate
Duration : 15 Days/45 hrs

Do This Course At Your Home

Yes! You can do this course at your home by purchasing our distance learning kit. See details Here

Training Modules

ADVANCE MODULE 1.1 - iEHCS   (15 Days)

DAY

TOPICS

DURATION

1

Fundamental of Ethical Hacking
Hacking Vs. Ethical Hacking
Types of Hackers
Skill Profile of a Hacker
Some Famous Hackers and Groups
Cyber World
Advantage and Disadvantage of Cyber world
Cyber World as a Home of hackers

3 Hour

2

Overview of Cyber Law
Introduction To Cyber Law
Cyber Laws Indian
Technical Aspect Of Indian Cyber Law
IT ACT 2000 & 2008
Internet Crimes And Frauds
Cyber Law Cases In India
Organization Under Cyber Laws
Advantages Of Cyber Laws

3 Hour

3

Information Gathering
What Is Information Gathering & Why Hackers Need This?
Types Of Information Gathering
Information Gathering Using Websites
Information Gathering Using Software
Information Gathering Using Add-Ons
Search Engines- Smart Way Of Information Gathering
Scanning And Enumeration
Tracing - E-Mail, Mobile Phone, Intruder

3 Hour

4

Virtualization & System Cloning
Introduction Of Virtualization
Need & Use Of Virtualization
Virtualbox
Installing OS On Virtual Machines
Networking In Virtual Machines
System Cloning
Troubleshooting
Other Tools For Virtualization

3 Hour

5

Windows Hacking & Security (Win 8 & Win 7)
Windows OS & Security
Hacking Into System By Changing Passwords
Getting Access To System By Elevating Privileges
Finding Out The Passwords Of Windows
Bypassing The Windows Security
Hack from Guest to Admin
Password in Plain Text Directly
Hacking By USB Devices
Mitigation Of System Attacks
Setting Up A Secure System

3 Hour

6

Password Cracking Techniques
What is Password Cracking
Types of Password Cracking Techniques
How Different Password Crackers Work
Windows Password Cracking
FTP / Network Password Cracking
Zip/ RAR Password Cracking
Doc & PDF Password Cracking
Using GPU For Password Cracking
Password Security

3 Hour

7

Data Hiding Techniques
What Is Steganography
How Attacker Hides His Data In Images And Other Formats
How To Find Data Which Are Hidden
What Is Cryptography
Advanced Cryptography Tools
How Are Programs And Data Wrapped
Secure Measures To Protect Our Data

3 Hour

8

Hacking By Batch Programming & Scripting
Basics Of Scripting
Languages Used In Scripting
Writing Your First Program
Malacious Program Scripting
Session Hijacking Using Batch Scripting
Data Theft Using Batch Script
Automation Using Scripting
Designing Tools Using Scripting
Developing Security Tools Using Scripting.

3 Hour

9

Hacking by Viruses, Trojans, Keyloggers & Spywares
What is Trojan?
Trojans Attack Big Famous Cases
Types Of Trojans
Different way a Trojan Can Get Into A System
How We Create A Trojan and Control System
How Attacker Bypass Your Antivirus By Trojans
Analysis Of Trojans/Virus
How we remove Trojans Manually
Security Against Trojans

3 Hour

10

Malware Analysis & Fake Antivirus Detections
Introduction of Malware
Types of Malware
Common Malwares In Cyber
Types of Malware Analysis
Manual Malware Analysis
Tools for Malware Analysis
Countermeasures

3 Hour

11

IDS, IPS and Honeypots
Overview of IDS, IPS & Honeypot
Use of IDS & IPSAssignment & Revision
Installation of IDS & IPS
Prevention & Detection
Honeypot & its Types
Implementation - Honeypots
Honeypot Tools

3 Hour

12

Proxy Server & Virtual Private Network (VPN) Technology
Proxy And Types Of Proxies
Why Hackers Use Proxy?
How To Hide IP Address While Chatting
How To Open Block Website In College/Companies
Convert Your Machine As Proxy Server With HTTPS Proxy
Advantage And Disadvantage Of Proxy
Analyzing Proxy Bug
How Proxy Hack Your Passwords Etc
What Is Better Than Proxy
What Is VPN?
Why We Use VPN
Advantage & Disadvantage Of VPN
Free VPN
Countermeasures

3 Hour

13

Google Database Hacking
Introduction And Working Of Search Engines
List Of Common Search Engines On Web
Comparing And Choosing Best Search Engine
Dorks For Hacking Search Engines
Tools For Search Engines Hacking
Web Ripping
Finding Admin Pages And Weakness In Site
Security Against Search Engine Hacking

3 Hour

WHY iEHCS ?

»   12 Live Cyber Cases, 10 Case Studies, 3 Hacking Projects will be covered
»   Latest and Updated Topics are covered
»   New Topics like Hacking & Securing Linux, Android, Mac, Web Servers are taught
»   We concentrate not only on Hacking but also on Security of all Topics
»   Forensics on almost all platforms and devices are taught
»   Hands on training with live demonstrations
»   Well experienced Trainers
»   Tied up with several Government Organizations for Training and Consultancy
»   Trained more than 30,000 professionals from all over India
»   Providing training to CBI, NIA and State Police across India
»   We limit our tool usage from third-party and we provide manual approach for each Technique
»   We also design our own tools

Pre Requisite

»   Basics of Computer
»   Knowledge of how to use internet
»   Basics of Networking

Recommendation

It is strongly recommended to bring your own LAPTOP during the training so that you can easily practice the exercises at home.

Who Could Attend ?

»   College students seeking career in Cyber Security Industry.
»   Person having interest in Hacking & Security.
»   Education Faculty & Staff.
»   IT Professionals, Web Developers, Network Engineers.
»   Students from any branch can join the training.

Program Benefits & Highlights

»   Learn & Interact with renowned Industry Experts.
»   Receive an unparalleled education on the art of computer security with personal one-on-one attention.
»   Hands on Demonstrations of Latest Hacking Techniques & Tools.
»   Hands on Demonstrations of various cases solved by our trainer.
»   Power Point Presentation, Live Demos, Interactive Question & Answer sessions and comprehensive
reading material.
»   FREE - Book & CD Free to each participant

WHO ATTENDED iEHCS ?

who-attended-iehcs

Training Centers

Delhi

i3indya Technologies
G-85, 3rd Floor above Bata Showrrom
Metro Pillar no. 81, Preet Vihar, New Delhi - 110092

Contact : +91 - 956060 5666 (Ext: 2)

Batch Details

For Delhi Center

Date Timing Schedule
10-Dec-2015 09:20 am - 12:20 pm
28-Dec-2015 12:40 pm - 03:40 pm
04-Jan-2016 03:50 pm - 06:50 pm
18-Jan-2016 09:20 am - 12:20 pm
08-Feb-2016
07-Mar-2016
04-Apr-2016

Registration Procedure

To complete your Registration for i3indya Winter Training program, kindly follow the following steps:

»    Step 1 : Register yourself online for Winter Training. Click Here
    After you register online, you will get a confirmation mail of your registration along with your Token Number.


»   Step 2 : Download the Training Registration Form here   
 

»   Step 3 : Pay Training Fee (See Modes of Payment Below)

»   Step 4 : Send us following documents  :

    1) 1 ID proof copy (Driving License/Voter ID Card)
    2) Training Registration Form (completely filled & signed)
    3) Fee Payment Receipt (transaction screenshot/cash deposit receipt)

    to the following address:

i3indya Technologies
G-85, 3rd Floor above Bata Showrrom
Metro Pillar no. 81, Preet Vihar, New Delhi - 110092
Contact: +91 - 956060 5666 (Ext: 2)

or mail the above documents at training@i3indya.com

Note : Your Seat will be confirmed only once we receive your Training Registration Form and Fees. You will get a e-Receipt as a confirmation of your registration.

Modes of Payment

»  Mode 1 - Via Net-banking (NEFT or IMPS) : Transfer the amount directly to following bank account no. via IMPS/NEFT. Keep screenshot of transaction successful page as payment receipt.

»   Mode 2 - Cash Deposit in Bank A/C : Submit your fees via Cash into Company's Bank Account and keep copy of cash deposit receipt as payment receipt.


    Bank account details are as follows:


Open Yes Bank Branch List
Bank Name YES BANK LTD
Account Name I THREE INFOTECH PVT.LTD.
Account Number 023683900000560
Branch Name Preet Vihar New Delhi
IFSC Code YESB0000236
Zone Preet Vihar New Delhi


»   Mode 3 - Submit your cash at Our Training Center

»   Mode 4 - Pay Instantly with Credit Card/ Debit Card/ Net Banking

To Pay Instantly

For More Information

Contact : +91 - 956060 5666 (Extension : 2)

WANT UTCALL YOU ?

Fill Quick Enquiry Form below


    

Study Material

Ethical Hacking and Cyber Security Study Material

i3indya GROUP VIDEO

about-i3indya-group

OUR CLIENT'S TESTIMONIAL


 

LOCATE US

G-85, Preet Vihar
New Delhi - 110092
Phone : +91 - 956060 5666

info@i3indya.com

© Copyright 2011-2012. All rights reserved by i3indya™ Technologies.
A Unit of  I THREE INFOTECH PVT. LTD.
Designed by i3indya WebSolutions

About i3indya Group