Professional Documents
Culture Documents
Ethical Hacking & Cyber Security Course - Massmatic Cyber Forensic & Information Security
Ethical Hacking & Cyber Security Course - Massmatic Cyber Forensic & Information Security
Home
Workshop Registration
Mail Login
Contact Us
This is an introductory course that is developed with the objective of laying the foundation stone which can potentially transform into a
career in the cyber security space. In this training which start with the fundamentals of computer science where we make a student
understand and write programmes in different computer languages, popularly used in corporate setup. At the end you can expect a
hands-on training experience which can act as a launchpad for future specialized courses in cyber security.
if you are interested to make your career in Ethical Hacking and Cyber Security, than get in touch using the contact us form or you can
directly email us at info@massmatic.biz / massmaticcyberforensic@gmail.com or use the phone numbers to contact us. Call Now +91-
9311159707, 7859999944,9910291005, 9811128610, 9312659707.
Beginner Level
Investigator Level
• Characterstics of Computers.
• Components of Computer Systems
• Hardware V/s Software
• Inside a Computer
• Input & Output Devices
• Processing of Storage Devices
• Types of Printers
• Units of Memory
• Advantages & Disadvantages of Computers
• Different types of Computers
• Brief about Operating System & Types of Operating Systems
• Types of File Extensions
• Setting up a Computer
• Cloud Computing
• Definition of Dos
• Dos Commands
• About Bios
• Brief About Motherboards & Ram
• Overview of Pc Expansion Cards & Storage Devices
• Power Supplies & Removable Media
• Installaing & Upgrading Windows
• Maintaining & Troubleshoot Windows
• Software Troubleshooting
• About Internet
• About Domain Name & Hosting Briefs
Beginner Level Module 04: COMPTIA N+ Computer Networking
• About Networking
• Brief About Networking & Benefits of Networking
• Media of Networking
• Types of Networking & Cabling
• Protocols & OSI Layers
• TCP/IP & IP Addressing
• Topologies
• Difference Between Switch, Hub & Router
• Disk Quota
• Networking Commands
• Compression & Encryption
• Backup & Restore
Beginner Level Module 06: Ec-Council Ethical Hacking & Cyber Security
• Student Introduction
• CEH v9 Module 01 Introduction to Ethical Hacking
• CEH v9 Module 02 Hacking Laws
• CEH v9 Module 03 Information Gathering
• CEH v9 Module 04 Google Database Hacking
• CEH v9 Module 05 Operating System Hacking & Security
• CEH v9 Module 06 Hacking By Trojans & Backdoors
• CEH v9 Module 07 Sniffers, Keyloggers & Spywares
• CEH v9 Module 08 Analysis : Virus, Worms & Spywares
• CEH v9 Module 09 Hacking Email Accounts
• CEH v9 Module 10 Data Hiding Techniques
• CEH v9 Module 11 Proxy Server & Virtual Private Network (VPN) Technology
• CEH v9 Module 12 Phishing
• CEH v9 Module 13 Lab Creation VIrtual Lab
• CEH v9 Module 14 Denial of Service Attack
• CEH v9 Module 15 Honey Pots
• CEH v9 Module 16 Social Engineering
• CEH v9 Module 17 Mobile Hacking
• CEH v9 Module 18 Credit Card Fraud & Cases
• CEH v9 Module 19 Website & Database Hacking Attacks
• CEH v9 Module 20 Hacking Wireless Networks & Countermeasures
• CEH v9 Module 21 Cryptography
• CEH v9 Module 28 Writing Virus Codes
• CEH v9 Module 29 Privacy on Internet
• CEH v9 Module 30 Securing Laptops & Computers
• CEH v9 Module 31 Preventing Data Loss
• CEH v9 Module 32 Understanding Satellites
Intermediate Level
• Definition of Dos
• Dos Commands
• About Bios
• Brief About Motherboards & Ram
• Overview of Pc Expansion Cards & Storage Devices
• Power Supplies & Removable Media
• Pc hardware support skills
• OS support skills
• Understanding the Computer Architecture, Parts and Storage Devices
• Practical Assembling of Computer and its Hardware
• Partitioning and Formatting Hard Disk
• Software and Antivirus Installation
• Understanding the Components in Laptop
• Maintenance and Assembling Laptops
• Troubleshooting & Networking Concepts
• Different Type of Motherboard
• Understanding Slots and Components of Motherboard
• Understanding the Chipset in Motherboard
• Installaing & Upgrading Windows
• Maintaining & Troubleshoot Windows
• Software Troubleshooting
• About Internet
• About Domain Name & Hosting Briefs
• About Networking
• Brief About Networking & Benefits of Networking
• Understanding Local Area Network (LAN)
• Understanding Wide Area Networks (WAN)
• Understanding Global Area Networks (GAN)
• Understanding Metropolitan Area Network (MAN)
• Media of Networking
• Types of Networking & Cabling
• Protocols & OSI Layers
• TCP/IP & IP Addressing
• Topologies (Tree,Star, Mesh,Bus, Ring)
• OSI & DOD Model
• Networking Standards and Topologies
• Creating Subnets and IP Addressing
• Managing Domain, Users and Groups
• Window Server Networking
• Understanding Print Server
• How to Configure Access Points and Wireless LAN Cards
• Different IP Classes
• Understanding Octet Format
• How to Use Subnet Mask
• Understanding Ping
• Types of Protocols (TCP/IP, UDP, Net BEUI, IPS & SPX, Apple-Talk)
• Different Networking Services (DHCP, DNS, SMTP, FTP, POP, HTTP and HTTPS, IMAP, SNMP)
• Understanding IP Address (Logical Addressing)
• Understanding the MAC Address (Physical Adressing)
• Role of Subnet Mask
• Understanding the role of Gateway
• How Host Address Work?
• Difference between Unshielded and Shielded Twisted Pair
• Different Cables including Fiber Optic and Coaxial
• Network Interface Cards
• Switches and Routers
• Repeaters
• Brides (LAN Extender)
• Firewalls
• Modems
• Lease Line
• Lease line Point to Point
• Internet and ISP Services
• Voice Connectivity
• Metro Ethernet
• MPLS
• VPN
• Frame Relay
• GPRS
• Video Conferencing
• Bridge Calling
• Hosting
• Media Converters (E1 to V.35, E1 to Ethernet, V.35 to Ethernet, Fiber to Ethernet)
• Classification of IP Address
• Difference Between Switch, Hub & Router
• Disk Quota
• Networking Commands
• Compression & Encryption
• Backup & Restore
How does internet work.
• What is network ?
• Countermeasures of network.
• What is IP and? types of IP ?
• What is Mac ?
• What is Cookie and Cache ? .
• Domain Name System
• DNS Poisoning
• Name Server
• Electronic Mail
• Architecture and Services
• Mail Access Protocols
• Introduction of Ports
• Introduction to Web Browser
• Detail Study on Buffer or Packets
• Detail Study on Internet and Intranet
• Detail Study on Firewall
• Concept of Routing and Switching
Intermediate Level Module 06: Ec-Council Ethical Hacking & Cyber Security
• Student Introduction
• CEH v9 Module 01 Introduction to Ethical Hacking
• CEH v9 Module 02 Hacking Laws
• CEH v9 Module 03 Information Gathering
• CEH v9 Module 04 Google Database Hacking
• CEH v9 Module 05 Operating System Hacking & Security
• CEH v9 Module 06 Hacking By Trojans & Backdoors
• CEH v9 Module 07 Sniffers, Keyloggers & Spywares
• CEH v9 Module 08 Analysis : Virus, Worms & Spywares
• CEH v9 Module 09 Hacking Email Accounts
• CEH v9 Module 10 Data Hiding Techniques
• CEH v9 Module 11 Proxy Server & Virtual Private Network (VPN) Technology
• CEH v9 Module 12 Phishing
• CEH v9 Module 13 Hacking By USB & Live Devices
• CEH v9 Module 14 Denial of Service Attack
• CEH v9 Module 15 Honey Pots
• CEH v9 Module 16 Social Engineering
• CEH v9 Module 17 Mobile Hacking
• CEH v9 Module 18 Credit Card Fraud & Cases
• CEH v9 Module 19 Website & Database Hacking Attacks
• CEH v9 Module 20 Hacking Wireless Networks & Countermeasures
• CEH v9 Module 21 Cryptography
• CEH v9 Module 28 Writing Virus Codes
• CEH v9 Module 29 Reverse Engineering
• CEH v9 Module 30 Metasploit Framework, Metasploit on Windows and Kali Linux
• CEH v9 Module 31 Penetration Testing with Kali Linux
• CEH v9 Module 32 Configuring and setting up Metasploit Remote Attacks
• CEH v9 Module 33 Searching Vulnerabilities using Metasploit
• CEH v9 Module 34 Web application Penetration testing
• CEH v9 Module 35 Setting and running up SQL Ninja
• CEH v9 Module 36 Setting and running up SQL Injections
• CEH v9 Module 37 Breaking the Windows Security
• CEH v9 Module 38 Entering into another system without permission
• Overview to Cyber Laws
• Indian Cyber Laws
• Crimes and Frauds over Internet
• How Cyber cell works?
• Benefits of Cyber laws in India
• Understanding password Cracking
• Cracking WPAv2
• Cracking NTLMv2
• Cracking MD5 Hashes
• Cracking Smarter
• Vulnerability Searching
• Mobile Hackign and Forensics training
Computer Forensics in Today's World
• Computer Forensics Investigation Process
• Searching and Seizing Computers
• Digital Evidence
• First Responder Procedures
• Computer Forensics Lab
• Footprinting concepts, threats, attack vectors, and controls
• Footprinting through Search Engines
• Footprinting through Social Networking sites
• Website footprinting
• Competitive Intelligence
• WHOIS Footprinting
• Footprinting tools
• Scanning methodology, techniques, and countermeasures
• Techniques for IDS evasion, scanning, HTTP tunneling, and IP spoofing
• Drawing network diagrams—latest network discovery and mapping tools, network discovery tools for mobile
• Proxy chaining—latest proxy tools, proxy tools for mobile
• Protocols: NetBIOS, SNMP, LDAP, NTP, SMTP, DNS
• Countermeasures
• Techniques Cracking passwords, escalating privileges, executing applications, hiding files and covering tracks
• Steganography—application and classification, tools, methods/attacks on steganography, steganography detection tools
• Introduction to malware
• Trojans—attacks, how to infect a system, crypters, how to deploy, latest types, analysis, countermeasures
• Viruses—stages, types, latest virus maker, analysis, countermeasures
• Worms—types, makers, analysis, countermeasures
• Malware analysis
• Antivirus tools
• Penetration testing
• Attacks: MAC, DHCP, and spoofing
• Poisoning: ARP and DNS
• Tools
• Concepts, techniques, impersonation, identity theft, and countermeasures
• Phases of an attack
• Common targets of an attack
• Impersonation scenario
• Computer based, mobile based, social networking based Concepts, case study, tools, attack techniques, and
countermeasures
• Botnet
• Scanning methods for vulnerable machines
• Detection Techniques and tools Concepts, case study, tools, attack techniques, and countermeasures
• Five stages of a web malware attack
• Application level session hijacking
• Network level session hijacking
• TCP/IP Hijacking
• Webserver market shares
• Web servers
• Web server security issues
• Webserver attacks, attack methodology, attack tools, and countermeasures
• Patch management
• Webserver security tools
• Web server pen testing
• Web application threats
• Concepts, hacking methodology, tools, and countermeasures
• Analyze web applications
• Web application pen testing Concepts, methodologies, types, of SQL injection, advanced SQL injection, and
countermeasures
• Evasion techniques and tools
• Information gathering Concepts, encryption, threats, Bluetooth hacking, methodology, and counter-measures
• Wireless security tools and hacking tools Android OS, IOS, Windows Phone OS, Blackberry
• Mobile device management, security guidelines and tools
• OWASP Mobile Top 10 Risks
• Latest Sniffers
• Latest Jailbreaking tools
• Mobile spyware
• Bring Your Own Device (BYOD)
• Mobile Anti-spyware
• Concepts and countermeasures
• Honeypot, firewalls, IDS for mobile
• Evading IDS, firewalls
• Detecting honeypots
• Concepts, methodologies, examples, detection, and countermeasures
• Separation of responsibilities
• Virtualization
• Threats and attacks
• Cloud Security Control Layers
• Cloud Penetration Testing
• Concepts, encryption algorithms, email encryption, disk encryption, and attacks
• Public key infrastructure (PKI)
• Cryptanalysis and cryptography tools
• Hash calculators for Mobile
• How to Protect Yourself From Hackers
• What is First Step of Hacker
• How can Hackers Hack a Computer From Website Name
• Secrets of World Top Sites Google Yahoo & Facebook
• Control all Websites of World in Your Hands
• Email Which Open Your Secrets
• How To Track Exact Location By Email
• How To Hack Google Vulbernities
• Download Movie In 1 Minute
• How To Hack Email ID Password & How To Hack 5 Lacs IDs & Passwords
• Control & Hack CCTV Cameras of World
• How To Hack Power Systems, UPS & Printers
• DNS Stuff Tutorial
• Hackers Favourite Search Engine
• Hack Complete Website Webcams in 1 Minute
• How To Protect Gmail Account and Make it Unhackable
• How To Secure Your Facebook Account
• How CBI, CID, FBI & CIA Send Secret Password Protected & Encrypted Email Messages
• Track Email Details
• How To Make Self Destructive Messages Which Deletes Automatically after Reading
• IP address Explain in details Secrets behind IP Address
• Secret Behind Local Host & Secret IP Address
• Proxy Server Explain In Detail
• How to Become Anonymous on Internet & how to Use proxy. Run Restricted And Blocked Website without Permission
• How to Use Free Proxy Servers
• How to Use Proxifier Step By Step
• Proxy Bouncing & Use of Proxy Switcher
• How to Use VPN Explain Step By Step
• Tor Browser Expalin Step By Step
• Reverse IP Engineering
• How Ethical Hackers Creates Lab For Practical
• How to Install Virtual Box on Windows 7 Step By Step
• How to Install Operating System On Virtual box Step By Step
• How to Install windows 7 on Virtual Box Step By Step
• kali linux Explain Step By Step
• Installation Kali Linux Step By Step on Virtual Box
• Hackers Operating System
• How to Install Parrot Security Step By Step
• Define Scanning Hackers Second Step
• Port Scanning Practical Step By Step
• How To Close Open Ports
• Pendrive Hacking
• Nework Scanning Practical
• Advance Network Scanning
• Vulnerability Scanning
• What Is Banner Grabbing
• Advance Banner Grabbing Explain With Practical
• Advance Banner Grabbing With Netcat
• Top Softwares Use In Hacking
• Cookie Stealing Explain
• Hack Using Cookie
• What Is Web Monitoring Ethical Hackers Impotant Step
• Website Monitoring Practical Step By Step
• How To Disable Banner Grabbing
• Enumeration Explain
• Different Ways of Enumeration
• What Is SMTP and DNS Enumeration
• What Is Protocol
• What Is SSL and DHCP Protocols
• Netbios Hacking Practical
• How To Disable Banner Grabbing
Benefit of Course
Red Hat Linux is very simple to set up and can conveniently be used by beginners as well. It is very user friendly and one
will have no problem to set it up and make good use of the same. Every individual should look for options that provide
this certification so that it brightens their career options and makes job placements easier for them. If one knows how to
operate red hat Linux it is extremely useful in the networking and hardware industry. Knowledge of red hat Linux opens
up doors to an amazing future.
Intermediate Level Module 07: Penetration Testing & Ethical Hacking With Kali Linux
For Enquiry
Click Here