Need Help? Call us Today (91) 9540188877

Summer Internship 2019

Product 1- (Market Cost 2K)

1K/student 4Weeks – 36hrs (4Days/week, 2hrs/day) (Min. 70-100 students)

  • Module 1. Threat Analysis
  • Module 2. Auditing, Documentation, and
  • Logs
  • Module 3. Operate, Maintain, and Install
  • Module 4. Infrastructure and Deployment
  • Module 5. Identification, Authentication, and Authorization
  • Module 6. Cryptography

Product 2 – (Market Cost 8K)

2K/student 4Weeks – 48hrs (4Days/week, 3hrs/day) (Min. 70-100 students)

  • Module 1: Introduction to Information Security
  • Module 2: Masking your System
  • Module 3: Exploration and Investigation
  • Module 4: Google Dorking
  • Module 5: Social Engineering
  • Module 6: Scanning Networks
  • Module 7: System Security
  • Module 8: Trojan and Virus
  • Module 9: Web Application Security
  • Module 10: Wi-Fi Attacks
  • Module 11: Cryptography
  • Module 12: IDS

Product 2.1 – (Market Cost 8K)

2K/student 4Weeks – 48hrs (4Days/week, 3hrs/day) (Min. 70-100 students)

  • Module 1: Computer Networking
  • Module 2: Linux Fundamentals
  • Module 3: Protocols
  • Module 4: Cryptography
  • Module 5: Password Cracking
  • Module 6: Security Devices
  • Module 7: Exploration and Investigation
  • Module 8: Social Engineering
  • Module 9: Google Dorking
  • Module 10: Active Reconnaissance
  • Module 11:Malwares
  • Module 12: Wi-Fi Attacks

Product 3- (Market Cost 10K-12K)

  1. 2.5K/student 4Weeks – 64hrs (4Days/week, 4hrs/day) (Min. 40 students)
  2. 3.0K/student 6Weeks – 96hrs (4Days/week, 4hrs/day) (Min. 40 students)
  3. 3.5K/student 8Weeks – 128hrs (4Days/week, 4hrs/day) (Min. 40 students)

Module 1: Introduction to Information Security

  • Why Security?
  • The Security, functionality and ease of use Triangle
  • Hacking vs. Information
  • Security vs. Cracking
  • Can Hacking be Ethical?
  • Essential Terminology
  • Elements of Security
  • What does a Malicious Cracker do?
  • Types of Security Professionals
  • What do Ethical Hackers/ Information Security Professional do?

Module 2: Masking your System

  • IP Masking
  • MAC Masking
  • Browser Masking
  • OS Making
  • Call Masking
  • DNS Masking
  • URL Masking
  • Email Masking and Tracing

Module 3: Exploration and Investigation

  • Defining Foot printing
  • Information Gathering Methodology
  • IPv4 network range / Mask / subnetting
  • How DNS works?
  • Tools: URL Extractor, Whois, Nslookup, ARIN, Traceroute, VisualRoute Trace, eMailTrackerPro etc…
  • Collecting other Information
  • Page Rank, Website Value, Tracing Victim IP address, Anonymous Mailing
  • Finding people, Domain Lookup, Website Lookup, Email Bombing, Website Mirroring etc…

Module 4: Google Dorking

  • Using Basic Operator in Google Dorking
  • Searching anonymously any data based on query
  • Searches made by using Logical operators
  • CCTV searching
  • Software search
  • Creating new Google searches

Module 5: Social Engineering

  • What is Social Engineering?
  • Art of Manipulation
  • Human Weakness
  • Common Types of Social Engineering
  • Human Based Impersonation
  • Example of social engineering
  • Computer Based Social Engineering
  • Reverse Social Engineering
  • Policies and procedures
  • Security Policies-checklist

Module 6: Scanning Networks

  • Definition of Scanning
  • Objectives of Scanning
  • Scanning Methodology
  • Types of scanning
    – Port Scanning
    – Website Scanning
    – Server Scanning
    – Application Scanning
    – Banner Grabbing
  • Tools: Nmap, Nessus, Acunetix, wire shark etc…

Module 7: System Security

  • Administrator Password Guessing
  • Default Password Database
  • Introduction to Windows
  • Authentication Process
  • Windows Password Cracking
  • Cracking LM/NTLM hashes
  • Creating Backdoors
  • Clearing Password
  • Brute Forcing Password
  • Linux Password Cracking
  • Password Cracking using Live OS
  • Introduction to Metasploit
  • Stenography

Module 8: Trojan and Viruses

  • What is Spy Wares?
  • Trojan vs. Virus vs. Worms
  • History of Virus/ Worm/ Trojan
  • Creating Virus
  • Creating Trojans
  • Installing Key loggers

Module 9: Web Application Security

  •  Owasp Top 10 (Open Web Application Security Product)
    o SOL Injection, CSRF, XSS etc.
  • Phishing/ Phreaking

Module 10: Wi-Fi Attacks

  • • How Wi-Fi Packets are Transfer?
  • Sniffing Wi-Fi Packets
  • Cracking WEP/ WPA/ WPA2 key

Module 11: Cryptography

  • Working of Encryption
  • Digital Signature
  • Digital Certificate
  • Symmetric Key Cryptography
  • Asymmetric Key Cryptography
  • Symmetric vs Asymmetric
  • Private vs Public Key Cryptography
  • RSA (Rivest Shamir Adleman)
  • DH Algorithm

Module 12: IDS (Intrusion Detection System)

  • Intrusion Detection Systems
  • Ways to Detect Intrusion
  • Types of Intrusion Detection System
  • Intrusion Detection Tools
    o Snort etc.
  • How to write rules in snort
  • Log Analysis of Snort

Product 4- (Market Cost 15K – 20K)

4K/student 8Weeks – 128hrs (4Days/week, 4hrs/day) (Min. 40 students)

Module 1: Introduction to Information Security

  • Why Security?
  • The Security, functionality and ease of use Triangle
  • Hacking vs. Information Security vs. Cracking
  • Can Hacking be Ethical?
  • Essential Terminology
  • Elements of Security
  • What does a Malicious Cracker do?
  • Types of Security Professionals
  • What do Ethical Hackers/ Information Security Professional do?

Module 2: Masking your System

  • IP Masking
  • MAC Masking
  • Browser Masking
  • OS Making
  • Call Masking
  • DNS Masking
  • URL Masking
  • File Masking
  • Email Masking and Tracing

Module 3: Exploration and Investigation

  • Defining Foot printing
  • Information Gathering Methodology
  • IPv4 network range / Mask / subnetting
  • How DNS works?
  • Tools:
    URL Extractor, Whois, Nslookup, ARIN, Traceroute, VisualRoute Trace, eMailTrackerPro etc…
  • Collecting other Information
    Page Rank, Website Value, Tracing Victim IP address, Anonymous Mailing
    Finding people, Domain Lookup, Website Lookup, Email Bombing, Website Mirroring, Way back Machine etc…

Module 4: Google Dorking

  • Using Basic Operator in Google Dorking
  • Searching anonymously any data based on query
  • Searches made by using Logical operators
  • CCTV searching
  • Software search
  • Creating new Google searches

Module 5: Enumeration

  • What is Enumeration?
  • NetBIOS Null Sessions
  • NetBIOS Auditing Tool (NAT)
  • NetBIOS Enumeration
  • Simple Network Management Protocol (SNMP) Enumeration
  • SNMP Enumeration Countermeasures
  • Enumerating User Accounts

Module 6: Social Engineering

  • What is Social Engineering?
  • Art of Manipulation
  • Human Weakness
  • Common Types of Social Engineering
  • Human Based Impersonation
  • Example of social engineering
  • Computer Based Social Engineering
  • Reverse Social Engineering
  • Policies and procedures
  • Security Policies-checklist

Module 7: Scanning Networks

  • Definition of Scanning
  • Objectives of Scanning
  • Scanning Methodology
  • Types of scanning
    o Port Scanning
    o Website Scanning
    o Server Scanning
    o Application Scanning
    o Banner Grabbing
  • Tools:Nmap, Nessus, Hping3, Acunetix, Netsparker, Wireshark etc…

Module 8: System Security

  • Administrator Password Guessing
  • Default Password Database
  • Introduction to Windows Authentication Process
  • Windows Password Cracking
  • Cracking LM/NTLM hashes
  • Creating Backdoors
  • Clearing Password
  • Brute Forcing Password
  • Linux Password Cracking
  • Password Cracking using Live OS
  • Introduction to Metasploit
  • Steganography

Module 9: Trojan and Viruses

  • What is Spy Wares?
  • Trojan vs. Virus vs. Worms
  • History of Virus/ Worm/ Trojan
  • Creating Virus
  • Creating Trojans
  • Installing Key loggers
  • Detecting Trojan/Viruses

Module 10: Web Application Security

  • Owasp Top 10 (Open Web Application Security Product)
    o Includes Top 10 Vulnerabilities
    o SOL Injection, CSRF, XSS etc. (with Advanced Techniques)
  • Phishing/ Phreaking

Module 11: Web Sever Attacks

  • What is web server?
  • How Web server works
  • DOS
  • DDOS
  • DNS Zone Transfer
  • How web server are compromised
  • Web server Attacks
  • Using Metasploit Framework
  • Armitage

Module 12: Wi-Fi Attacks

  • How Wi-Fi Packets are Transfer?
  • Sniffing Wi-Fi Packets
  • Cracking WEP/ WPA/ WPA2 key
  • Cracking Hidden Networks

Module 13: Sniffing and Session Hijacking

  • Wireshark
  • Packet Tracing
    Analysing each Packet
  • Sniffing Network
  • Mac Flooding Attacks
  • ARP/RARP Protocol
  • Session Hijacking
  • SSl Strip
  • Cracking Vul. Protocols for Sniffing

Module 14: Buffer Overflow

  • What is Buffer?
  • Heap vs. Buffer
  • What is Stack?
  • Working with C Programs
  • C Pointers Implementation
  • Unix based C programs / Compilation
  • Buffer Overflow Attack on Vul. Programs

Module 15: Evading IDS/ Firewall/ Honeypot

  • Intrusion Detection Systems
  • Ways to Detect Intrusion
  • Types of Intrusion Detection System
  • Intrusion Detection Tools
    o Snort etc.
  • Steps to perform after an IDS detects an intrusion
  • Evading IDS systems
  • Introduction to Firewalls
  • Firewall Identification
  • Fire walking
  • Banner Grabbing
  • Breaching Firewalls
  • Breach Firewall
  • Introduction to Honeypots
  • Honeypot Project

Module 16: Cryptography

  • Working of Encryption
  • Digital Signature
  • Digital Certificate
  • Symmetric Key Cryptography
  • Asymmetric Key Cryptography
  • Symmetric vs Asymmetric
  • RSA (Rivest Shamir Adleman)
  • RSA Attacks
  • Brute forcing RSA factoring
  • Esoteric attack
  • Chosen cipher text attack
  • Low encryption exponent attack
  • Error analysis
  • MD5
  • SHA (Secure Hash Algorithm)
  • SSL (Secure Socket Layer)
  • RC5
  • What is SSH?
  • Government Access to Keys (GAK)
  • RSA Challenge
  • PGP (Pretty Good Privacy)
  • Code Breaking Methodologies
  • Using Brute Force

Module 17: Android OS Attacks

  • Rooting Android
  • Taking Privilege Forcefully
  • Bypassing Pattern Lock
  • Physical Hacking/Social Engg.
  • Tracing Whole Phone Data
  • Android based Network Attacks
  • Metasploit on android
  • Android Trojans/ Virus

Module 18: Data Forensics/ Recovery

  • How to recover Data from Pen Drive
  • Recovery From Hard Disk
  • Recovery from m/m card etc.

Module 19: Physical Security

  • Security statistics
  • Physical Security breach incidents
  • Understanding Physical Security
  • What is the need of Physical Security?
  • Who is Accountable for Physical Security?
  • Factors affecting Physical Security
  • Physical Security checklist
  • Company surroundings
  • Premises
    Reception
  • Server
  • Workstation Area
  • Wireless Access Points
  • Access Control
  • Computer Equipment Maintenance
  • Wiretapping
  • Remote access
  • Spying Technologies

Module 20: Reverse Engg.

  • Understanding reversing
  • Assembly Language mnemonics
  • Understanding Program Coding
  • Debugging Code
  • Dissembling Code
  • Analysing Processor Register
  • File Processing Unit(FPU)
  • Memory Addressing
  • Analysing each instruction
  • Analysing Messages Strings
  • Analysing Flags
  • Reversing the code
  • Creating Patch

contact

March 17, 2019

0 responses on "Summer Internship 2019"

Leave a Message

Your email address will not be published.

2014 - 2022 © EISCP. A division of Shree Tech Solutions. All rights reserved.
X