Vous êtes sur la page 1sur 7

ETHICAL HACKING

&
CYBER SECURITY
(Winter Training Program 2013-14)

PRESENTED BY



In association with


Magniva Technology Pvt. Ltd.
Office: 217, Murli Bhawan, 10A Ashok Marg,
Hazratganj, Lucknow, (U.P.)

Email: info@magnivatech.com
Website: www.magnivatech.com
Office: +91-0522-4074359

Copyright Magniva Technology Pvt. Ltd. 2013. All rights reserved

WINTER TRAINING PROGRAM 2013-14
Ethical Hacking & Cyber Security


Course Name : Ethical Hacking & Cyber Security
Certification : by Magniva Technology Pvt. Ltd. in association with Megalith14 IIT-Kharagpur
Study Material : Course content, CDs and Project Reports Free to each participant
Ethical Hacking Toolkit : Free to Each Participant

Fees & Duration:
For Ethical Hacking & Cyber Security
Fees : Rs 4,500/- Per Participant
Duration : 15 Days/30 hrs

DAYS TOPICS DURATION
Day 1
Introduction
Fundamental of Ethical Hacking
Hacking Vs. Ethical Hacking
Types of Hackers
Skill Profile of a Hacker
Some Famous Hackers and Groups
Cyber World
Advantage and Disadvantage of Cyber world
Cyber World as a Home of hackers
2 hours
Day 2
Overview of Cyber Law
Introduction To Cyber Law
Cyber Laws Indian
Technical Aspect Of Indian Cyber Law
IT ACT 2000 & 2008
Internet Crimes And Frauds
Cyber Law Cases In India
Organization Under Cyber Laws
Advantages Of Cyber Laws
2 hours










www.magnivatech.com Page 1

WINTER TRAINING PROGRAM 2013-14
Ethical Hacking & Cyber Security


Day 3
Information Gathering
What Is Information Gathering & Why Hackers Need This?
Types Of Information Gathering
Information Gathering Using Websites
Information Gathering Using Software
Information Gathering Using Add-Ons
Search Engines- Smart Way Of Information Gathering
Scanning And Enumeration
Tracing - E-Mail, Mobile Phone, Intruder
2 hours
Day 4
Virtualization & System Cloning
Introduction Of Virtualization
Need & Use Of Virtualization
Virtual box
Installing OS On Virtual Machines
Networking In Virtual Machines
System Cloning
Troubleshooting
Other Tools For Virtualization
2 hours
Day 5
Windows Hacking & Security (Win 8 & Win 7)
Windows OS & Security
Hacking Into System By Changing Passwords
Getting Access To System By Elevating Privileges
Finding Out The Passwords Of Windows
Bypassing The Windows Security
Hack from Guest to Admin
Password in Plain Text Directly
Hacking By USB Devices
Mitigation Of System Attacks
Setting Up A Secure System
2 hours







www.magnivatech.com Page 2

WINTER TRAINING PROGRAM 2013-14
Ethical Hacking & Cyber Security


Day 6
Password Cracking Techniques
What is Password Cracking
Types of Password Cracking Techniques
How Different Password Crackers Work
Windows Password Cracking
FTP / Network Password Cracking
Zip/ RAR Password Cracking
Doc & PDF Password Cracking
Using GPU For Password Cracking
Password Security
2 hours
Day 7
Data Hiding Techniques
What Is Steganography
How Attacker Hides His Data In Images And Other
Formats
How To Find Data Which Are Hidden
What Is Cryptography
Advanced Cryptography Tools
How Are Programs And Data Wrapped
Secure Measures To Protect Our Data
2 hours
Day 8
Hacking By Batch Programming & Scripting
Basics Of Scripting
Languages Used In Scripting
Writing Your First Program
Malacious Program Scripting
Session Hijacking Using Batch Scripting
Data Theft Using Batch Script
Automation Using Scripting
Designing Tools Using Scripting
Developing Security Tools Using Scripting.
2 hours







www.magnivatech.com Page 3

WINTER TRAINING PROGRAM 2013-14
Ethical Hacking & Cyber Security


Day 9
Hacking by Viruses, Trojans, Keyloggers & Spywares
What is Trojan?
Trojans Attack Big Famous Cases
Types Of Trojans
Different way a Trojan Can Get Into A System
How We Create A Trojan and Control System
How Attacker Bypass Your Antivirus By Trojans
Analysis Of Trojans/Virus
How we remove Trojans Manually
Security Against Trojans
2 hours
Day 10
Malware Analysis & Fake Antivirus Detections
Introduction of Malware
Types of Malware
Common Malwares In Cyber
Types of Malware Analysis
Manual Malware Analysis
Tools for Malware Analysis
Countermeasures
2 hours
Day 11
IDS, IPS and Honeypots
Overview of IDS, IPS & Honeypot
Use of IDS & IPSAssignment & Revision
Installation of IDS & IPS
Prevention & Detection
Honeypot & its Types
Implementation Honeypots
Honeypot Tools
2 hours











www.magnivatech.com Page 4

WINTER TRAINING PROGRAM 2013-14
Ethical Hacking & Cyber Security


Day 12 Proxy Server & Virtual Private Network (VPN) Technology
Proxy And Types Of Proxies
Why Hackers Use Proxy?
How To Hide IP Address While Chatting
How To Open Block Website In College/Companies
Convert Your Machine As Proxy Server With HTTPS Proxy
Advantage And Disadvantage Of Proxy
Analyzing Proxy Bug

2 hours
Day 13 Hack Password
How Proxy Hack Your Passwords Etc
What Is Better Than Proxy
What Is VPN?
Why We Use VPN
Advantage & Disadvantage Of VPN
Free VPN
Countermeasures
2 hours
Day 14
Google Database Hacking
Introduction And Working Of Search Engines
List Of Common Search Engines On Web
Comparing And Choosing Best Search Engine
Dorks For Hacking Search Engines
Tools For Search Engines Hacking
Web Ripping
Finding Admin Pages And Weakness In Site
Security Against Search Engine Hacking
2 hours
Day 15
PROJECTS / ASSINGMENT
2 hours


ETHICAL HACKING & CYBER SECURITY
Software
CD & Study Materials




www.magnivatech.com Page 5

WINTER TRAINING PROGRAM 2013-14
Ethical Hacking & Cyber Security


Why Ethical Hacking & Cyber Security Training from Magniva Technology?

Lot of Major Projects will be covered in this training.

Our syllabus is professionally designed to cover Basic as well as Advance aspects of Ethical
Hacking & Cyber Security.

Each day of our training is well planned to provide you the Theoretical as well as Practical
Knowledge of the module.

Each day will come up with New Practicals & Projects which makes the training
interesting and exciting.
Time to time Practical Assignments will be provided to the students, which will help them
in doing practice at home.

6. Revision Time & Query Sessions are provided to the students which help them in clearing
their all previous doubts.

7. Exam will be conducted at the end of basic as well as Advance module to test the
knowledge level of the students.

8. Time for Project Work will be provided to the students, in which students will develop a
project of their own choice. This will encourage Innovative Ideas among students.


Pre-Requisites

1. Passion to learn new creative things.
2. Having basic knowledge of Computers.


Who Could Attend this Training?

Students from B.E/B.Tech/M.Tech/Diploma (ECE/EEE/CSE/IT/MECH) can join this.
Anyone who have interest in this field and have pre-requisite knowledge.













www.magnivatech.com Page 6

Vous aimerez peut-être aussi