Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

Toggle navigation i3indyatechnologies logo

Home
Workshop Registration
Mail Login
Contact Us

Ethical Hacking & Cyber Security Course Description

This is an introductory course that is developed with the objective of laying the foundation stone which can potentially transform into a
career in the cyber security space. In this training which start with the fundamentals of computer science where we make a student
understand and write programmes in different computer languages, popularly used in corporate setup. At the end you can expect a
hands-on training experience which can act as a launchpad for future specialized courses in cyber security.

if you are interested to make your career in Ethical Hacking and Cyber Security, than get in touch using the contact us form or you can
directly email us at info@massmatic.biz / massmaticcyberforensic@gmail.com or use the phone numbers to contact us. Call Now +91-
9311159707, 7859999944,9910291005, 9811128610, 9312659707.

Beginner Level

Ethical Hacking Course Detail (25 Days Course) Rs-1500/-

Basic Ethical Hacking Course For Begineers

• Complete DOS (Disk Operating System)


• How to Open DOS In Windows.
• Commands of DOS
• What is Hacking
• Who are Hackers
• Hacking Law & Punishments
• Types of Hackers
• What is Cyber Crime
• Types of Cyber Crime
• No. of Cyber Crime Cases in India
• What is IP Address
• What is MAC Address
• How to View IP Address & MAC Address of a Computer
• How to create your own Virtual Lab
• Domain Name Information
• How to Get System Information
• History of Website
• Data Breach Chart
• 7 Tips to Stay Safe & Secure
• How to Change your MAC Address on Windows, MAC & Linux
• Proxy
• How to Crack Windows Password
• Secrets Behind 127.0.0.1
• TOR Browser
• Types of Internet (Surface Web, Deep Web & Dark Web)
• Steganography
• Phishing Attacks
• How to create a Strong & Secure Password
• Password Meter (Test Your Password)
• Password Generator
• Useful Websites to Surf
• How to Block a Particular Website
• Google Locations
• Google My Activity
• How to Get Exact Location of Facebook
• Social Engineering
• Social Engineering Techniques
• Trace IP Address From Website
• 20 Run Commands For Every windows
• Ways to Hack Smartphones By Hackers
• We Give Permission For Hacking
• Registry Attacks
• How a Hacker can Profit From Mobile When Sucessfully Compromised
• Batch File Virus
• Basic Commands uSed in Batch Files
• How to Write Batch File Program
• Hacking Mobile Phones Platform
• SMS (Short Message Service) Exploits
• Mobile Protection Tool
• Cryptography
• Hash Calculators For Mobile
• Footprinting
• Scanning

Investigator Level

Ethical Hacking Course Detail (2 Months Course) Rs-15000/-

Investigator Level Module 01: Computer Basics

• Characterstics of Computers.
• Components of Computer Systems
• Hardware V/s Software
• Inside a Computer
• Input & Output Devices
• Processing of Storage Devices
• Types of Printers
• Units of Memory
• Advantages & Disadvantages of Computers
• Different types of Computers
• Brief about Operating System & Types of Operating Systems
• Types of File Extensions
• Setting up a Computer
• Cloud Computing

Beginner Level Module 02: Microsoft DOS Disk Operating System

• Definition of Dos
• Dos Commands

Beginner Level Module 03: COMPTIA A+ Computer Hardware

• About Bios
• Brief About Motherboards & Ram
• Overview of Pc Expansion Cards & Storage Devices
• Power Supplies & Removable Media
• Installaing & Upgrading Windows
• Maintaining & Troubleshoot Windows
• Software Troubleshooting
• About Internet
• About Domain Name & Hosting Briefs
Beginner Level Module 04: COMPTIA N+ Computer Networking

• About Networking
• Brief About Networking & Benefits of Networking
• Media of Networking
• Types of Networking & Cabling
• Protocols & OSI Layers
• TCP/IP & IP Addressing
• Topologies
• Difference Between Switch, Hub & Router
• Disk Quota
• Networking Commands
• Compression & Encryption
• Backup & Restore

Beginner Level Module 05: Computer Language

• About HTML & DHTML


• Brief About Tags About HTML & DHTML

Beginner Level Module 06: Ec-Council Ethical Hacking & Cyber Security

• Student Introduction
• CEH v9 Module 01 Introduction to Ethical Hacking
• CEH v9 Module 02 Hacking Laws
• CEH v9 Module 03 Information Gathering
• CEH v9 Module 04 Google Database Hacking
• CEH v9 Module 05 Operating System Hacking & Security
• CEH v9 Module 06 Hacking By Trojans & Backdoors
• CEH v9 Module 07 Sniffers, Keyloggers & Spywares
• CEH v9 Module 08 Analysis : Virus, Worms & Spywares
• CEH v9 Module 09 Hacking Email Accounts
• CEH v9 Module 10 Data Hiding Techniques
• CEH v9 Module 11 Proxy Server & Virtual Private Network (VPN) Technology
• CEH v9 Module 12 Phishing
• CEH v9 Module 13 Lab Creation VIrtual Lab
• CEH v9 Module 14 Denial of Service Attack
• CEH v9 Module 15 Honey Pots
• CEH v9 Module 16 Social Engineering
• CEH v9 Module 17 Mobile Hacking
• CEH v9 Module 18 Credit Card Fraud & Cases
• CEH v9 Module 19 Website & Database Hacking Attacks
• CEH v9 Module 20 Hacking Wireless Networks & Countermeasures
• CEH v9 Module 21 Cryptography
• CEH v9 Module 28 Writing Virus Codes
• CEH v9 Module 29 Privacy on Internet
• CEH v9 Module 30 Securing Laptops & Computers
• CEH v9 Module 31 Preventing Data Loss
• CEH v9 Module 32 Understanding Satellites

Intermediate Level

Ethical Hacking & Cyber Security Course Detail (1 Year Course)

Intermediate Level Module 01: Computer Basic Knowledge


• Definition of Computers
• Fundamentals
• Characterstics of Computers.
• Components of Computer Systems
• Hardware V/s Software
• Inside a Computer
• Input & Output Devices
• Processing of Storage Devices
• Types of Printers
• Units of Memory
• Advantages & Disadvantages of Computers
• Different types of Computers
• Brief about Operating System & Types of Operating Systems
• Types of File Extensions
• Setting up a Computer
• Cloud Computing

Intermediate Level Module 02: DOS Disk Operating System

• Definition of Dos
• Dos Commands

Intermediate Level Module 03: COMPTIA A+ Computer Hardware

• About Bios
• Brief About Motherboards & Ram
• Overview of Pc Expansion Cards & Storage Devices
• Power Supplies & Removable Media
• Pc hardware support skills
• OS support skills
• Understanding the Computer Architecture, Parts and Storage Devices
• Practical Assembling of Computer and its Hardware
• Partitioning and Formatting Hard Disk
• Software and Antivirus Installation
• Understanding the Components in Laptop
• Maintenance and Assembling Laptops
• Troubleshooting & Networking Concepts
• Different Type of Motherboard
• Understanding Slots and Components of Motherboard
• Understanding the Chipset in Motherboard
• Installaing & Upgrading Windows
• Maintaining & Troubleshoot Windows
• Software Troubleshooting
• About Internet
• About Domain Name & Hosting Briefs

Intermediate Level Module 04: COMPTIA N+ Computer Networking

• About Networking
• Brief About Networking & Benefits of Networking
• Understanding Local Area Network (LAN)
• Understanding Wide Area Networks (WAN)
• Understanding Global Area Networks (GAN)
• Understanding Metropolitan Area Network (MAN)
• Media of Networking
• Types of Networking & Cabling
• Protocols & OSI Layers
• TCP/IP & IP Addressing
• Topologies (Tree,Star, Mesh,Bus, Ring)
• OSI & DOD Model
• Networking Standards and Topologies
• Creating Subnets and IP Addressing
• Managing Domain, Users and Groups
• Window Server Networking
• Understanding Print Server
• How to Configure Access Points and Wireless LAN Cards
• Different IP Classes
• Understanding Octet Format
• How to Use Subnet Mask
• Understanding Ping
• Types of Protocols (TCP/IP, UDP, Net BEUI, IPS & SPX, Apple-Talk)
• Different Networking Services (DHCP, DNS, SMTP, FTP, POP, HTTP and HTTPS, IMAP, SNMP)
• Understanding IP Address (Logical Addressing)
• Understanding the MAC Address (Physical Adressing)
• Role of Subnet Mask
• Understanding the role of Gateway
• How Host Address Work?
• Difference between Unshielded and Shielded Twisted Pair
• Different Cables including Fiber Optic and Coaxial
• Network Interface Cards
• Switches and Routers
• Repeaters
• Brides (LAN Extender)
• Firewalls
• Modems
• Lease Line
• Lease line Point to Point
• Internet and ISP Services
• Voice Connectivity
• Metro Ethernet
• MPLS
• VPN
• Frame Relay
• GPRS
• Video Conferencing
• Bridge Calling
• Hosting
• Media Converters (E1 to V.35, E1 to Ethernet, V.35 to Ethernet, Fiber to Ethernet)
• Classification of IP Address
• Difference Between Switch, Hub & Router
• Disk Quota
• Networking Commands
• Compression & Encryption
• Backup & Restore
How does internet work.
• What is network ?
• Countermeasures of network.
• What is IP and? types of IP ?
• What is Mac ?
• What is Cookie and Cache ? .
• Domain Name System
• DNS Poisoning
• Name Server
• Electronic Mail
• Architecture and Services
• Mail Access Protocols
• Introduction of Ports
• Introduction to Web Browser
• Detail Study on Buffer or Packets
• Detail Study on Internet and Intranet
• Detail Study on Firewall
• Concept of Routing and Switching

Intermediate Level Module 05: Computer Language

• About HTML & DHTML


• Brief About Tags About HTML & DHTML
• Introduction to Cascading Style Sheets • Types of Style Sheets
• Class Selector
• ID Selector
• How to use div for creating a web page?
• How create menu in css?
• How to create dropdown men in css?
• How to insert fonts in css?
• How to use alignment in CSS?
• What is padding and margin in CSS?
• What is PHP?
• How PHP Works?
• How to Create PHP File?
• Basic PHP Syntax
• PHP Statements and Whitespace
• How to Use Comments in PHP?
• What Are PHP Functions?
• Data Types in PHP
• What are Variables in PHP?
• What are Constants in PHP?
• PHP Operators?
• Creating Dynamic Pages
• Single Quotes vs. Double Quotes
• If else Conditions in PHP?
• What are Loops in PHP?
• Types of Loops?
• What are Arrays in PHP?
• How to Including Files?
• How to create register process in php?
• How to create login process in PHP?
• How to get data from forms via emails?
• How to create subscription method in PHP?
• URL rewriting
• How to create select query in PHP?
• How to create insert query in php?
• How to display data in PHP?
• How to Create Search Box in PHP?
• How to create factorization in PHP?
• How to display images in php?
• How to display data in loop?
• How to run sliders in PHP?
• How to create payment gateway?
• Knowledge Resources?

Intermediate Level Module 06: Ec-Council Ethical Hacking & Cyber Security

• Student Introduction
• CEH v9 Module 01 Introduction to Ethical Hacking
• CEH v9 Module 02 Hacking Laws
• CEH v9 Module 03 Information Gathering
• CEH v9 Module 04 Google Database Hacking
• CEH v9 Module 05 Operating System Hacking & Security
• CEH v9 Module 06 Hacking By Trojans & Backdoors
• CEH v9 Module 07 Sniffers, Keyloggers & Spywares
• CEH v9 Module 08 Analysis : Virus, Worms & Spywares
• CEH v9 Module 09 Hacking Email Accounts
• CEH v9 Module 10 Data Hiding Techniques
• CEH v9 Module 11 Proxy Server & Virtual Private Network (VPN) Technology
• CEH v9 Module 12 Phishing
• CEH v9 Module 13 Hacking By USB & Live Devices
• CEH v9 Module 14 Denial of Service Attack
• CEH v9 Module 15 Honey Pots
• CEH v9 Module 16 Social Engineering
• CEH v9 Module 17 Mobile Hacking
• CEH v9 Module 18 Credit Card Fraud & Cases
• CEH v9 Module 19 Website & Database Hacking Attacks
• CEH v9 Module 20 Hacking Wireless Networks & Countermeasures
• CEH v9 Module 21 Cryptography
• CEH v9 Module 28 Writing Virus Codes
• CEH v9 Module 29 Reverse Engineering
• CEH v9 Module 30 Metasploit Framework, Metasploit on Windows and Kali Linux
• CEH v9 Module 31 Penetration Testing with Kali Linux
• CEH v9 Module 32 Configuring and setting up Metasploit Remote Attacks
• CEH v9 Module 33 Searching Vulnerabilities using Metasploit
• CEH v9 Module 34 Web application Penetration testing
• CEH v9 Module 35 Setting and running up SQL Ninja
• CEH v9 Module 36 Setting and running up SQL Injections
• CEH v9 Module 37 Breaking the Windows Security
• CEH v9 Module 38 Entering into another system without permission
• Overview to Cyber Laws
• Indian Cyber Laws
• Crimes and Frauds over Internet
• How Cyber cell works?
• Benefits of Cyber laws in India
• Understanding password Cracking
• Cracking WPAv2
• Cracking NTLMv2
• Cracking MD5 Hashes
• Cracking Smarter
• Vulnerability Searching
• Mobile Hackign and Forensics training
Computer Forensics in Today's World
• Computer Forensics Investigation Process
• Searching and Seizing Computers
• Digital Evidence
• First Responder Procedures
• Computer Forensics Lab
• Footprinting concepts, threats, attack vectors, and controls
• Footprinting through Search Engines
• Footprinting through Social Networking sites
• Website footprinting
• Competitive Intelligence
• WHOIS Footprinting
• Footprinting tools
• Scanning methodology, techniques, and countermeasures
• Techniques for IDS evasion, scanning, HTTP tunneling, and IP spoofing
• Drawing network diagrams—latest network discovery and mapping tools, network discovery tools for mobile
• Proxy chaining—latest proxy tools, proxy tools for mobile
• Protocols: NetBIOS, SNMP, LDAP, NTP, SMTP, DNS
• Countermeasures
• Techniques Cracking passwords, escalating privileges, executing applications, hiding files and covering tracks
• Steganography—application and classification, tools, methods/attacks on steganography, steganography detection tools
• Introduction to malware
• Trojans—attacks, how to infect a system, crypters, how to deploy, latest types, analysis, countermeasures
• Viruses—stages, types, latest virus maker, analysis, countermeasures
• Worms—types, makers, analysis, countermeasures
• Malware analysis
• Antivirus tools
• Penetration testing
• Attacks: MAC, DHCP, and spoofing
• Poisoning: ARP and DNS
• Tools
• Concepts, techniques, impersonation, identity theft, and countermeasures
• Phases of an attack
• Common targets of an attack
• Impersonation scenario
• Computer based, mobile based, social networking based Concepts, case study, tools, attack techniques, and
countermeasures
• Botnet
• Scanning methods for vulnerable machines
• Detection Techniques and tools Concepts, case study, tools, attack techniques, and countermeasures
• Five stages of a web malware attack
• Application level session hijacking
• Network level session hijacking
• TCP/IP Hijacking
• Webserver market shares
• Web servers
• Web server security issues
• Webserver attacks, attack methodology, attack tools, and countermeasures
• Patch management
• Webserver security tools
• Web server pen testing
• Web application threats
• Concepts, hacking methodology, tools, and countermeasures
• Analyze web applications
• Web application pen testing Concepts, methodologies, types, of SQL injection, advanced SQL injection, and
countermeasures
• Evasion techniques and tools
• Information gathering Concepts, encryption, threats, Bluetooth hacking, methodology, and counter-measures
• Wireless security tools and hacking tools Android OS, IOS, Windows Phone OS, Blackberry
• Mobile device management, security guidelines and tools
• OWASP Mobile Top 10 Risks
• Latest Sniffers
• Latest Jailbreaking tools
• Mobile spyware
• Bring Your Own Device (BYOD)
• Mobile Anti-spyware
• Concepts and countermeasures
• Honeypot, firewalls, IDS for mobile
• Evading IDS, firewalls
• Detecting honeypots
• Concepts, methodologies, examples, detection, and countermeasures
• Separation of responsibilities
• Virtualization
• Threats and attacks
• Cloud Security Control Layers
• Cloud Penetration Testing
• Concepts, encryption algorithms, email encryption, disk encryption, and attacks
• Public key infrastructure (PKI)
• Cryptanalysis and cryptography tools
• Hash calculators for Mobile
• How to Protect Yourself From Hackers
• What is First Step of Hacker
• How can Hackers Hack a Computer From Website Name
• Secrets of World Top Sites Google Yahoo & Facebook
• Control all Websites of World in Your Hands
• Email Which Open Your Secrets
• How To Track Exact Location By Email
• How To Hack Google Vulbernities
• Download Movie In 1 Minute
• How To Hack Email ID Password & How To Hack 5 Lacs IDs & Passwords
• Control & Hack CCTV Cameras of World
• How To Hack Power Systems, UPS & Printers
• DNS Stuff Tutorial
• Hackers Favourite Search Engine
• Hack Complete Website Webcams in 1 Minute
• How To Protect Gmail Account and Make it Unhackable
• How To Secure Your Facebook Account
• How CBI, CID, FBI & CIA Send Secret Password Protected & Encrypted Email Messages
• Track Email Details
• How To Make Self Destructive Messages Which Deletes Automatically after Reading
• IP address Explain in details Secrets behind IP Address
• Secret Behind Local Host & Secret IP Address
• Proxy Server Explain In Detail
• How to Become Anonymous on Internet & how to Use proxy. Run Restricted And Blocked Website without Permission
• How to Use Free Proxy Servers
• How to Use Proxifier Step By Step
• Proxy Bouncing & Use of Proxy Switcher
• How to Use VPN Explain Step By Step
• Tor Browser Expalin Step By Step
• Reverse IP Engineering
• How Ethical Hackers Creates Lab For Practical
• How to Install Virtual Box on Windows 7 Step By Step
• How to Install Operating System On Virtual box Step By Step
• How to Install windows 7 on Virtual Box Step By Step
• kali linux Explain Step By Step
• Installation Kali Linux Step By Step on Virtual Box
• Hackers Operating System
• How to Install Parrot Security Step By Step
• Define Scanning Hackers Second Step
• Port Scanning Practical Step By Step
• How To Close Open Ports
• Pendrive Hacking
• Nework Scanning Practical
• Advance Network Scanning
• Vulnerability Scanning
• What Is Banner Grabbing
• Advance Banner Grabbing Explain With Practical
• Advance Banner Grabbing With Netcat
• Top Softwares Use In Hacking
• Cookie Stealing Explain
• Hack Using Cookie
• What Is Web Monitoring Ethical Hackers Impotant Step
• Website Monitoring Practical Step By Step
• How To Disable Banner Grabbing
• Enumeration Explain
• Different Ways of Enumeration
• What Is SMTP and DNS Enumeration
• What Is Protocol
• What Is SSL and DHCP Protocols
• Netbios Hacking Practical
• How To Disable Banner Grabbing
Benefit of Course

Red Hat Linux is very simple to set up and can conveniently be used by beginners as well. It is very user friendly and one
will have no problem to set it up and make good use of the same. Every individual should look for options that provide
this certification so that it brightens their career options and makes job placements easier for them. If one knows how to
operate red hat Linux it is extremely useful in the networking and hardware industry. Knowledge of red hat Linux opens
up doors to an amazing future.

Intermediate Level Module 07: Penetration Testing & Ethical Hacking With Kali Linux

• Introduction To Kali Linux?


• Creating a Virtual Machine
• Installing Kali Linux
• Updating Kali Linux
• Installing Additional Tools on Kali
• Configuring SSH
• Being Anonymous with Tor
• Scan your System for Rootkits
• Network Sniffing
• Social Engineering
• Wi-FiPenetration Testing
• Brute FOrce Attack Testing
• Website Penetration Testing
• Information Gathering
• Advanced Penetration Testing
• Linux Commands Line Base
• Penetration Testing Classification
• Vulnerability Assessment Tools for System
• Methodology of Advance Penetration
• Scanning Target
• Enumerating Target
• Information Discovery
• Exploit Writing
• Privileges Escalation
• Maintaining Access
• Target Exploitation
• Advance Sniffing
• Wireless Penetration Testing
• DOS Attack
• Web Penetration Testing
• Exploits and Client Side Attack
• Firewall Testing
• Social Engineering Toolkit
• Document Management and Reporting
• Evidence Management, Data Collection, and Reporting
• Top Tools in Kali Linux Training:
- Setoolkit
- Android Malware App
- Aircrack-ng
- John the Ripper
- Developing Trojans and Backdoors for Windows using Metasploit
- NetHunter from Kali Linux
• ARP Spoofing MITM
• How to Create a "Pivot Point”?
• Social-Engineer Toolkit SET)
• Taking over HSRP
• DNS Spoofing
• Maltego
• Burp Suite
• Raspberry Pi & Kali Linux
• DTP and 802.1q Attacks
• PWNing a System with MSF
• Ettercap and Xplico
• Virtual Test Environment
• Wireshark
• Custom Password Lists
• Hashes and Cracking Passwords
• Rainbow Tables and Ophcrack
• Detecting Rootkits
• BackTrack Wireless TX Power
• Detecting Hidden SSIDs
• How to Bypass MAC Address Filters?
• Breaking WPA2 Wireless
• Rogue Wireless Access Points
• How to wireless Mis-Association Attacks?
• How to Use Nmap for Scanning?
• MITM Using Wireless Bridging
• CDP Flooding
• DHCP Starvation
• Metasploit Framework

To Enroll For Courses


Click Here

For Enquiry

Click Here

You might also like