
Product 1- (Market Cost 2K)
1K/student 4Weeks – 36hrs (4Days/week, 2hrs/day) (Min. 70-100 students)
- Module 1. Threat Analysis
- Module 2. Auditing, Documentation, and
- Logs
- Module 3. Operate, Maintain, and Install
- Module 4. Infrastructure and Deployment
- Module 5. Identification, Authentication, and Authorization
- Module 6. Cryptography
Product 2 – (Market Cost 8K)
2K/student 4Weeks – 48hrs (4Days/week, 3hrs/day) (Min. 70-100 students)
- Module 1: Introduction to Information Security
- Module 2: Masking your System
- Module 3: Exploration and Investigation
- Module 4: Google Dorking
- Module 5: Social Engineering
- Module 6: Scanning Networks
- Module 7: System Security
- Module 8: Trojan and Virus
- Module 9: Web Application Security
- Module 10: Wi-Fi Attacks
- Module 11: Cryptography
- Module 12: IDS
Product 2.1 – (Market Cost 8K)
2K/student 4Weeks – 48hrs (4Days/week, 3hrs/day) (Min. 70-100 students)
- Module 1: Computer Networking
- Module 2: Linux Fundamentals
- Module 3: Protocols
- Module 4: Cryptography
- Module 5: Password Cracking
- Module 6: Security Devices
- Module 7: Exploration and Investigation
- Module 8: Social Engineering
- Module 9: Google Dorking
- Module 10: Active Reconnaissance
- Module 11:Malwares
- Module 12: Wi-Fi Attacks
Product 3- (Market Cost 10K-12K)
- 2.5K/student 4Weeks – 64hrs (4Days/week, 4hrs/day) (Min. 40 students)
- 3.0K/student 6Weeks – 96hrs (4Days/week, 4hrs/day) (Min. 40 students)
- 3.5K/student 8Weeks – 128hrs (4Days/week, 4hrs/day) (Min. 40 students)
Module 1: Introduction to Information Security
- Why Security?
- The Security, functionality and ease of use Triangle
- Hacking vs. Information
- Security vs. Cracking
- Can Hacking be Ethical?
- Essential Terminology
- Elements of Security
- What does a Malicious Cracker do?
- Types of Security Professionals
- What do Ethical Hackers/ Information Security Professional do?
Module 2: Masking your System
- IP Masking
- MAC Masking
- Browser Masking
- OS Making
- Call Masking
- DNS Masking
- URL Masking
- Email Masking and Tracing
Module 3: Exploration and Investigation
- Defining Foot printing
- Information Gathering Methodology
- IPv4 network range / Mask / subnetting
- How DNS works?
- Tools: URL Extractor, Whois, Nslookup, ARIN, Traceroute, VisualRoute Trace, eMailTrackerPro etc…
- Collecting other Information
- Page Rank, Website Value, Tracing Victim IP address, Anonymous Mailing
- Finding people, Domain Lookup, Website Lookup, Email Bombing, Website Mirroring etc…
Module 4: Google Dorking
- Using Basic Operator in Google Dorking
- Searching anonymously any data based on query
- Searches made by using Logical operators
- CCTV searching
- Software search
- Creating new Google searches
Module 5: Social Engineering
- What is Social Engineering?
- Art of Manipulation
- Human Weakness
- Common Types of Social Engineering
- Human Based Impersonation
- Example of social engineering
- Computer Based Social Engineering
- Reverse Social Engineering
- Policies and procedures
- Security Policies-checklist
Module 6: Scanning Networks
- Definition of Scanning
- Objectives of Scanning
- Scanning Methodology
- Types of scanning
– Port Scanning
– Website Scanning
– Server Scanning
– Application Scanning
– Banner Grabbing - Tools: Nmap, Nessus, Acunetix, wire shark etc…
Module 7: System Security
- Administrator Password Guessing
- Default Password Database
- Introduction to Windows
- Authentication Process
- Windows Password Cracking
- Cracking LM/NTLM hashes
- Creating Backdoors
- Clearing Password
- Brute Forcing Password
- Linux Password Cracking
- Password Cracking using Live OS
- Introduction to Metasploit
- Stenography
Module 8: Trojan and Viruses
- What is Spy Wares?
- Trojan vs. Virus vs. Worms
- History of Virus/ Worm/ Trojan
- Creating Virus
- Creating Trojans
- Installing Key loggers
Module 9: Web Application Security
- Owasp Top 10 (Open Web Application Security Product)
o SOL Injection, CSRF, XSS etc. - Phishing/ Phreaking
Module 10: Wi-Fi Attacks
- • How Wi-Fi Packets are Transfer?
- Sniffing Wi-Fi Packets
- Cracking WEP/ WPA/ WPA2 key
Module 11: Cryptography
- Working of Encryption
- Digital Signature
- Digital Certificate
- Symmetric Key Cryptography
- Asymmetric Key Cryptography
- Symmetric vs Asymmetric
- Private vs Public Key Cryptography
- RSA (Rivest Shamir Adleman)
- DH Algorithm
Module 12: IDS (Intrusion Detection System)
- Intrusion Detection Systems
- Ways to Detect Intrusion
- Types of Intrusion Detection System
- Intrusion Detection Tools
o Snort etc. - How to write rules in snort
- Log Analysis of Snort
Product 4- (Market Cost 15K – 20K)
4K/student 8Weeks – 128hrs (4Days/week, 4hrs/day) (Min. 40 students)
Module 1: Introduction to Information Security
- Why Security?
- The Security, functionality and ease of use Triangle
- Hacking vs. Information Security vs. Cracking
- Can Hacking be Ethical?
- Essential Terminology
- Elements of Security
- What does a Malicious Cracker do?
- Types of Security Professionals
- What do Ethical Hackers/ Information Security Professional do?
Module 2: Masking your System
- IP Masking
- MAC Masking
- Browser Masking
- OS Making
- Call Masking
- DNS Masking
- URL Masking
- File Masking
- Email Masking and Tracing
Module 3: Exploration and Investigation
- Defining Foot printing
- Information Gathering Methodology
- IPv4 network range / Mask / subnetting
- How DNS works?
- Tools:
URL Extractor, Whois, Nslookup, ARIN, Traceroute, VisualRoute Trace, eMailTrackerPro etc… - Collecting other Information
Page Rank, Website Value, Tracing Victim IP address, Anonymous Mailing
Finding people, Domain Lookup, Website Lookup, Email Bombing, Website Mirroring, Way back Machine etc…
Module 4: Google Dorking
- Using Basic Operator in Google Dorking
- Searching anonymously any data based on query
- Searches made by using Logical operators
- CCTV searching
- Software search
- Creating new Google searches
Module 5: Enumeration
- What is Enumeration?
- NetBIOS Null Sessions
- NetBIOS Auditing Tool (NAT)
- NetBIOS Enumeration
- Simple Network Management Protocol (SNMP) Enumeration
- SNMP Enumeration Countermeasures
- Enumerating User Accounts
Module 6: Social Engineering
- What is Social Engineering?
- Art of Manipulation
- Human Weakness
- Common Types of Social Engineering
- Human Based Impersonation
- Example of social engineering
- Computer Based Social Engineering
- Reverse Social Engineering
- Policies and procedures
- Security Policies-checklist
Module 7: Scanning Networks
- Definition of Scanning
- Objectives of Scanning
- Scanning Methodology
- Types of scanning
o Port Scanning
o Website Scanning
o Server Scanning
o Application Scanning
o Banner Grabbing - Tools:Nmap, Nessus, Hping3, Acunetix, Netsparker, Wireshark etc…
Module 8: System Security
- Administrator Password Guessing
- Default Password Database
- Introduction to Windows Authentication Process
- Windows Password Cracking
- Cracking LM/NTLM hashes
- Creating Backdoors
- Clearing Password
- Brute Forcing Password
- Linux Password Cracking
- Password Cracking using Live OS
- Introduction to Metasploit
- Steganography
Module 9: Trojan and Viruses
- What is Spy Wares?
- Trojan vs. Virus vs. Worms
- History of Virus/ Worm/ Trojan
- Creating Virus
- Creating Trojans
- Installing Key loggers
- Detecting Trojan/Viruses
Module 10: Web Application Security
- Owasp Top 10 (Open Web Application Security Product)
o Includes Top 10 Vulnerabilities
o SOL Injection, CSRF, XSS etc. (with Advanced Techniques) - Phishing/ Phreaking
Module 11: Web Sever Attacks
- What is web server?
- How Web server works
- DOS
- DDOS
- DNS Zone Transfer
- How web server are compromised
- Web server Attacks
- Using Metasploit Framework
- Armitage
Module 12: Wi-Fi Attacks
- How Wi-Fi Packets are Transfer?
- Sniffing Wi-Fi Packets
- Cracking WEP/ WPA/ WPA2 key
- Cracking Hidden Networks
Module 13: Sniffing and Session Hijacking
- Wireshark
- Packet Tracing
Analysing each Packet - Sniffing Network
- Mac Flooding Attacks
- ARP/RARP Protocol
- Session Hijacking
- SSl Strip
- Cracking Vul. Protocols for Sniffing
Module 14: Buffer Overflow
- What is Buffer?
- Heap vs. Buffer
- What is Stack?
- Working with C Programs
- C Pointers Implementation
- Unix based C programs / Compilation
- Buffer Overflow Attack on Vul. Programs
Module 15: Evading IDS/ Firewall/ Honeypot
- Intrusion Detection Systems
- Ways to Detect Intrusion
- Types of Intrusion Detection System
- Intrusion Detection Tools
o Snort etc. - Steps to perform after an IDS detects an intrusion
- Evading IDS systems
- Introduction to Firewalls
- Firewall Identification
- Fire walking
- Banner Grabbing
- Breaching Firewalls
- Breach Firewall
- Introduction to Honeypots
- Honeypot Project
Module 16: Cryptography
- Working of Encryption
- Digital Signature
- Digital Certificate
- Symmetric Key Cryptography
- Asymmetric Key Cryptography
- Symmetric vs Asymmetric
- RSA (Rivest Shamir Adleman)
- RSA Attacks
- Brute forcing RSA factoring
- Esoteric attack
- Chosen cipher text attack
- Low encryption exponent attack
- Error analysis
- MD5
- SHA (Secure Hash Algorithm)
- SSL (Secure Socket Layer)
- RC5
- What is SSH?
- Government Access to Keys (GAK)
- RSA Challenge
- PGP (Pretty Good Privacy)
- Code Breaking Methodologies
- Using Brute Force
Module 17: Android OS Attacks
- Rooting Android
- Taking Privilege Forcefully
- Bypassing Pattern Lock
- Physical Hacking/Social Engg.
- Tracing Whole Phone Data
- Android based Network Attacks
- Metasploit on android
- Android Trojans/ Virus
Module 18: Data Forensics/ Recovery
- How to recover Data from Pen Drive
- Recovery From Hard Disk
- Recovery from m/m card etc.
Module 19: Physical Security
- Security statistics
- Physical Security breach incidents
- Understanding Physical Security
- What is the need of Physical Security?
- Who is Accountable for Physical Security?
- Factors affecting Physical Security
- Physical Security checklist
- Company surroundings
- Premises
Reception - Server
- Workstation Area
- Wireless Access Points
- Access Control
- Computer Equipment Maintenance
- Wiretapping
- Remote access
- Spying Technologies
Module 20: Reverse Engg.
- Understanding reversing
- Assembly Language mnemonics
- Understanding Program Coding
- Debugging Code
- Dissembling Code
- Analysing Processor Register
- File Processing Unit(FPU)
- Memory Addressing
- Analysing each instruction
- Analysing Messages Strings
- Analysing Flags
- Reversing the code
- Creating Patch
0 responses on "Summer Internship 2019"