Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

WELCOME TO

Ethical Hacking Training

The rapid and dramatic advances in information


technology (IT) in recent years have undoubtedly
generated tremendous benefits. However, they have
also introduced significant and unprecedented risks
to operations. As a result, computer security has
become critically important, requiring all levels of
an organization to implement information systems
security measures to prevent data tampering,
fraud, disruptions in critical operations, and the
inappropriate use of sensitive information.

Following the boom in networking and software


jobs, the past two years have seen a sharp rise in the
field of information security. Information Security and
Ethical Hacking have become the latest buzzwords in
the industry. Over the past five years, the incidence of
hacking crimes, data thefts, data losses, viruses, and
other cybercrimes has increased exponentially.

www.tlcgroup.org.in
all rights reserved to TLC
9100484799|surendraa456@gmail.
com
Takeaways

Key Factors

Practical : Theory Ratio


8:2

Course Objectives
At the end of this course, participants will be able to:

» Understand, perform, and protect themselves from various kinds of hacking attacks.
» Recognize email attacks and protect their email and social networking accounts from
such threats.
» Identify web application attacks and apply patches to create secure web applications.
» Comprehend the security architecture of mobile platforms.

Eligibility
* Undergraduate and postgraduate students from Computer Science, Information
Technology, and Electronics, as well as students from other backgrounds who are
passionate about technology, are encouraged to participate. Additionally, all Computer
Science and Electronics faculty members of the institution are welcome to participate.

Infrastructure Needed
Seminar Hall with Audio-Visual Equipment:
» Projector and speaker with microphone system
» Internet (LAN/Wifi) Connection for live demos.

Prerequisites
Basic Knowledge of Computers & Internet.

www.tlcgroup.org.in
all rights reserved to TLC
9100484799|surendraa456@gmail.
com
Course Curriculum

Prevention
INTRODUCTION TO ETHICAL HACKING
Introduction to Ethical Hacking & Cyber Security ANTI VIRUS
Types Hackers Introduction to
Kinds of Hackers Anti VirusTypes of
Phases of Hacking Anti Virus
Types of Ethical Hacking Certifications Importance of Anti Virus Updates
Security Triangle
Conclusion

BASICS OF NETWORKING
Introduction to Networks
Types of Networks
Internet Protocal
Public IP & Private IP
Static & Dynamic IP
Proxies, VPNs
Network Ports
Anonymous IP Tracking
Network Environment Analysis
Conclusion

BUILDING VIRUTUAL LAB


Introduction to Virtualization
Installation of VMWare
Configuring XP OS in Virtual Machine
Configuring WIN 7 OS in Virtual Machine
ConfiguringKAILLINUXOSinVirtualMachine
Installation of VMWare tools
Conclusion

SPOOFING ATTACK
Introduction to spoofing
Email Spoofing Attack
Call Spoofing Attack
MAC Spoofing Attack
SMS Spoofing Attack
Case Studies of Spoofing Attacks
www.tlcgroup.org.in
all rights reserved to TLC
9100484799|surendraa456@gmail.
com
MALWARES Introduction to Google for Hacking
Introduction to MalwareTypes Using various operators of Google
of Malwares Shodan search engine
Virus Making Finding Network Webcams, Target Networks
Virus Attack and PreventionWorm and vulnerable websites
Making Conclusion
Worm Attack and Prevention
BASIC ATTACKS AND SECURITY
Creating BackDoor
Introduction to Phishing
Hack Windows by BackDoor
Prevention of BackDoor Creating Phishing Attack (Facebook/Gmail Hacking)
Trojan IDN Homograph Attack
Trojan Attack and PreventionTypes DNS Poisoning Attack
of Keylogger Email Header Analysis
Keylog-Attack & Prevenction Social Engineering Techniques
Prevention
DIGITAL FORENSICS
IDS, FIREWALL AND HONEYPOTS
How Data Stores in MemoryHow
Data Recovery Works Recovering Introduction
Lost Data Securing the Data WorkingofIDS,Firewall,Honeypotsystem
Conclusion Detection of Honeypots
Countermeasures & Evading tools
GOOGLE HACKS Conclusion

DENIAL OF SERVICE
Introducion to DOS Attack
DOS Attack Techniques
DDOSProtectionToolsandCountermeasures
Conclusion

STEGANOGRAPHY
Introduction to steganography
Types of steganography
Using steganography tools
Extract hidden files and text
NTFS Alternate Data Streams
Conclusion

MOBILE HACKING
IntroductiontoarchitectureofvariousMobile
Mobile Spy Using Malwares
Security Measures
Conclusion

WEB APPLICATION ATTACKS


Introduction to the Web Architecture
www.tlcgroup.org.in
all rights reserved to TLC
9100484799|surendraa456@gmail.
com
Security Misconceptions
SQL Basics
Types of SQL Injection
Cross Site Scripting Vulnerability
Session Hijacking
Conclusion

CRYTPOGRAPHY
Data Encryption
Data Encryption using Hash Calc, MD5 Calc,
Using various tools for for encryption
& decryption and Tables
Conclusion

WIRELESS ATTACKS
Introduction to wireless architecture
Types of Wireless Networks
Introduction to Kali Linux
WEP/WPA hacking using Kali Linux
WiFi Deauth using IoT
Conclusion

CYBER LAWS AND SECURITY


Cyber Laws in India
Online Security Precautions
Conclusion - End of the Session

www.tlcgroup.org.in
all rights reserved to TLC
9100484799|surendraa456@gmail.
com

You might also like