Search results for:
No result found! Try with different keywords!

ETHICAL HACKING-CYBER SECURITY WORKSHOP IN MUMBAI

Jan 25, 2020 - Jan 26, 2020

ETHICAL HACKING-CYBER SECURITY WORKSHOP IN MUMBAI

Time Sat Jan 25 2020 at 10:10 am to Sun Jan 26 2020 at 06:00 pm

Wework Andheri, Mumbai, India

INR 3,000 Tickets

ETHICAL HACKING-CYBER SECURITY WORKSHOP IN MUMBAI


 DESCRIPTION

Hacking is not about the illegal things it's all about how to secure your cyberspace and system from attacks. In this workshop cyber ethics, email hacking & security, malware attacks, windows system attacks,online data Investigation,credit card frauds & Cases, playing with google by google hacking, android mobile hacking etc. topics will be covered. This workshop aims to give Technocrats a basic knowledge of hacking and how to protect your system against hazardous effects


WHAT WILL YOU GET

CERTIFICATE OF COMPLETION 

BOOKS ,TOOLS AND SOFTWARE.

What Will You Learn?



1.  Introduction to Hacking & Process

CIA

What is Hacking

Types of Hackers

Classes of Hackers

Difference between ethical hacker and hacker

Skill of an Ethical Hacker

Testing

Top Hackers

History of Hacking


2. Network Basics, Operating systems and Databases

Basics of Networking

Types of Operating systems used in hacking

Types of databases used in hacking

Linux file systems and basic commands

Windows file systems and understanding secpol.msc

Databases types


3. Concepts of TCP/IP and OSI model and process

TCP/IP model in detail

OSI model in detail

UDP in detail

TCP 3-way handshake theorem

UDP 2-way handshake theorem

Wireshark


4. Detail IP & MAC - Spoofing & security

What is IP

Types of IP

Classes of IP

IP masking techniques

IP address tracing

What id MAC address

MAC address masking

VPN

How to secure your network with VPN


5. Foot-printing / Information Gathering

What is Footprinting

Crawling the website and mirroring the pages

Who is lookup

Email extraction from websites

Email id email information gathering

Phone numbers information gathering

Website archive


6. Web search / Google hacking

Working of google

Advanced searching techniques in google

Google search operators

Google Hack tool


7. Scanning & Types

What is scanning

Types of scanning

Why scanning is important

Network scanning

Netcut

Angryipscanner

Whoismywifi

Nessus

Port scanning

Nmap and top 30 commands

Web application scanning

Acunetix

Netsparker


8. Password cracking and system security

Windows file structure

Linux file structure

Pogostick password cracker

Syskey

Windows security


9. Brief of Kali Linux & Pentesting with Kali Linux

What is Kali linux

Pentesting with kali linux

Metasploit the art of exploitation

Armitage


10. Social engineering attacks & security

What is Social engineering

Types of social engineering attacks

Social engineering toolkit


11. Email hacking & Security

Phishing

Key-loggers

Email tracing

Email Spoofing

Self-destructing emails

Email Security


12. Cryptography

Encryption

Decryption

Key

Secure Line

Public Line

Symmetric Cipher

Public Key Cryptography

One Time Pad

Steganography

Md5

Sha2

Sending encrypted emails

Encrypting your disk with Bitlocker


13. Steganography

What is Steganography?

What is Steganalysis?

Hiding text behind images

Detection of hidden items

Oursecret

Hiderman


14. Firewalls, IDS/IPS and Honeypots

Firewall

Types of firewalls

Bypassing filters of firewall

Details of IDS and IPS

Honeypots

Types of Honeypots

KFsensor


15. Owasp Top 10

What is OWASP Top 10

Injection

Broken Authentication and Session Management

Cross Site Scripting (XSS)

Insecure Direct Object References

Security Misconfiguration

Sensitive Data Exposure

Missing Function Level Access Control

Cross Site Request Forgery (CSRF)

Using Components with Known Vulnerabilities

Unvalidated Redirects and Forwards


16. Website Security

DWVA

SQL injection & working

SQL Injection automated

SQL Injection manual

Havij

Sqlmap

XSS (Cross Site Scripting)

Reflected XSS

Stored XSS

Dom Based XSS

BeEF Browser exploitation


17. DDOS attacks, buffer and stack overflow

What is DDOS & types?

DDOS attacks

Protecting DDOS attacks

What is buffer and stack overflow attacks

Prevention of buffer and stack overflow attacks

Exploiting target with DDOS and stack overflow by using kali linux


18. ATM, Credit card and Debit card attacks & Security

Luhn rule

ATM and credit card frauds

Keypad jamming frauds

Card swapping

Skimming

Leaked card numbers websites Case study

Prevention of credit, debit and atm card fauds


19. USB hacking technique / switch blades

Hacking data by using pen-drives

USB Grabber

USB Security


20. Protocols vulnerabilities

Protocols

Types of Protocols

MITM attack.

Security


21. Virus, Trojans, worms, Ransomwares and security

Virus

Worms

Trojans

Njrat

JPvirus kit

Ransomwares

Types of ransomwares

How to protect yourself from ransomwares


22. Reverse engineering

Concept of Reverse Engineering

Application of Reverse Engineering

DMCA ACT

Disassembler

Decompilers

Program Obfuscation

.NET Obfuscator

Java Byte code Decompilers

How to reverse a software


23. Mobile E-hacking and security

Android

Features of Android

APK

Android Malware list

WebKit

Using Proxies in Android

iPhone/iOS Security

Spying applications

Whatsapp Hacking & Security


24. Wi-Fi Security

Wireless Technology

Basic Terminologies

Types of Wireless Network

Detecting a Wireless Network

Advantages of Wireless Technology

Disadvantage of Wireless Network

Antennas

SSIDs

Access Point Positioning

Wireless Security Standard

Wireless Intrusion Detection System

Tips to Secure Wireless Network


25. Security Compliance and Auditing

Security Compliance

Need for Security Compliance

Standards for Security Compliance

ISO 27001:2013c

PCI-DSS

Introduction to IT Auditing

What is Security Auditing?

Need for Security Auditing

Relation of Auditing and Compliance

Importance of Risk Management


26. Physical security threats

Physical Security Measures

Need for Physical Security?

Factors Affecting Physical Security

  1. Physical Security Checklist, 
  2. Cyber law and Cyber Security 


Report a problem

Date & Time

Sat Jan 25 2020 at 10:10 am to Sun Jan 26 2020 at 06:00 pm

Location

Wework Andheri, Mumbai, India