For Upto 100% Scholarship test For 6 months industrial Training.   Call us +91-9876795015


Image alt
Image
Image
Image

IT Security & Ethical Hacking Training in Chandigarh

IT Security & Ethical Hacking

Ethical hacking is hacking that is performed to identify the potential threats on a computer or a system. No wonder there is such a high demand of ethical hacking in today's world where security of accounts and systems is of top most priority. An ethical hacker is a penetration testing expert who makes the systems of the whole organization secure by protecting them against external attacks and data loss. In a world where companies generate and handle huge amount of critical information, certified hackers are needed by all companies. An exam needs to be cleared for certification and proper training needs to be undertaken for this.

Even though it is a crime, yet techniques of ethical hacking can and are being used for malicious purposes. Training helps differentiate between the legal and the illegal ways of hacking so that the IT Security experts can make use of the security techniques within the boundaries of law. The complete penetration mechanism along with the pros and cons of conducting a penetration test can be learnt about during the training.

If you are interested in ethical hacking and are looking for the best possible training by a certified company, your search ends at TCL-IT Chandigarh, a well known company in Northern region. This company provides training in all IT and Telecom fields. Experts with in depth knowledge about the concepts of security and a long experience in the industry provide training for ethical hacking. Their expert guidance will help develop skills and boost your confidence that will enable you to work like a professional.

Technical languages like HTML, C, C++, etc. are needed for ethical hacking and our experts give all the needed guidance about these too. Our training programs are always up to date and we incorporate the latest concepts and technologies in our program. The training also includes some modules for enhancement of skills. Experts at TCL-IT Chandigarh are always available to guide you if you want to become a certified ethical hacker and aim at a successful career in this field.

 
Module 1: Ethical Hacking Introduction
  • Introduction
  • Introduction to all Underground Ethical Hacking Community
  • Cyber Laws In India & Abroad
Module 2: Practical Aspects of Networking
  • Knowing the Basics of IP Address
  • Knowing Remote System IP Address
  • Hiding Your IP address (Proxy Server)
  • Be Anonymous in Cyber World VPN and Proxy Servers
  • VPN (Virtual Private Network)
  • Tracing an IP Address
Module 3: Attack Scanning & Virtual Lab Preparation
  • Network Reconnaissance
  • Port Scanning, Daemon Banner Grabbing
  • OS Detection & Firewall Enumeration
  • Sniffing
  • Making Virtual Lab using VMware or Oracle Virtual Box
  • Active and Passive Information Gathering
  • Configuring and Testing Your Network
  • Live Firewall Implementation
Module 4: Ethical Hacking Windows
  • Introduction
  • Making USB Pendrive Bootable
  • Ethical Hacking Window Administrative Password. (XP, Window 7, Window 8)
  • Introduction to Backtrack/Kali Operating System
  • Exploiting With Metasploit Framework 4.0
  • Securing the Windows Account with SAM Lock Tool
  • More on Securing Window Administrative Password
Module 5: Email Ethical Hacking
  • What is Email Ethical Hacking
  • Tracing Email
  • Email Forging
  • How to Secure your Email Accounts
Module 6: Google Ethical Hacking
  • Introduction to Google Ethical Hacking
  • Using Google Dorks on Google Search Engine
  • Demonstration of leaking of confidential information on vulnerable website
  • Securing a website from Google Ethical Hacking
Module 7: Website Ethical Hacking Attacks & Security (Important Module)
  • Introduction
  • CMS Ethical Hacking Introduction
  • 10+ Website Ethical Hacking Techniques (First Time Ever In World) & Countermeasures
  • SQL Injection (Basic & Advance)
  • Denial of Services Attack (DDOS Attack)
  • OWASP
  • Website Security
Module 8: Input Validation Attack
  • Brute Force attack
  • Other Input Validation Attack
Module 9: Important Theft Techniques
  • Demonstration of E-Hacker Virus
  • Keylogger, Spyware Software
  • Trojan and Backdoors Attack
  • Virus, Worm & Trojan
  • Binders and Cryptors
  • Spamming Attacks
  • Session Hijacking
  • Protocols Vulnerabilities and Exploiting through Sniffers
  • USB Ethical Hacking Technique
  • Implementing security against Important Theft Techniques
Module 10: Social Engineering Attack
  • Ethical Hacking Anyone without even using a single tool
  • Physical Security Threats
Module 11: Digital Forensics Science
  • Recover data from the USB Pendrives , Hard Disk Drive – Police Forensic way
Module 12: Secure Socket Layer (SSL) Torn Apart
  • Determining whether your connection is secure or not
  • SSL: How it works
Module 13: Cryptography, Firewalls and Error Messages
Module 14: Steganography (Hide data into images)
Module 15: Penetration Testing
  • Introduction to Penetration Testing
  • How to do Penetration Testing
  • Preparing the Report
Module 16: Banking Ethical Hacking & Security
  • Concept of ATM Ethical Hacking & Security
  • Credit Card & Debit Card Hack Attacks & Security
Module 17: Wi-Fi Ethical Hacking & Security
  • Ethical Hacking on Wi-Fi Passwords on Wi-Fi router with WEP|WPA|WPA2 encryption
  • Securing Wi-Fi Router from being hacked
Module 18: Advance Ethical Hacking Technique
  • Ethical Hacking IIS Server
  • Sniffing the Network to E-Hack passwords
  • Penetration Testing using Backtrack/Kali
  • Advance Email Ethical Hacking Techniques
  • Shell Ethical Hacking (Website Ethical Hacking)
  • Server routing and Countermeasures (Website Ethical Hacking)
  • Live Ethical Hacking Demonstration on Dedicated Server in US or at other Country
Module 19: Android Ethical Hacking & Security
  • Ethical Hacking Practical on Smartphone
  • Securing your Android mobile from being hacked
  • Securing your family with Android Apps
Module 20: Important Concepts of Networking
Module 21: Discussion on Cyber Crime Cases
Module 22: Kali linux
  • Finding your way around Backtrack
  • Backtrack Services
  • DHCP
  • Static IP Assignment
  • SSHD
  • Apache
  • FTP
  • TFTPD
  • VNC Server
  • Additional Resources
  • Exercise
  • The Bash Environment
  • Simple Bash Scripting
  • Sample Exercise
  • Sample Solution
  • Additional Resources
  • Net cat the Almighty
  • Connecting to a TCP/UDP port with Net cat
  • Listening on a TCP/UDP port with Net cat
  • Transferring files with Net cat
  • Remote Administration with Net cat
  • Using Wire shark
  • Peeking at a Sniffer
  • Capture and Display filters
  • Following TCP Streams
  • Additional Resources
Module 23: Information Gathering Techniques
  • Open Web Information Gathering
  • Google Hacking
  • Miscellaneous Web Resources
  • Other search engines
  • Net craft
  • Who is Reconnaissance
Module 24: Open Services Information Gathering
  • DNS Reconnaissance
  • Interacting with a DNS server
  • Automating lookups
  • Forward lookup brute force
  • Reverse lookup brute force
  • DNS Zone Transfers
  • SNMP reconnaissance
  • Enumerating Windows Users
  • Enumerating Running Services
  • Enumerating open TCP ports
  • Enumerating installed software
  • SMTP reconnaissance
  • Microsoft NetBIOS Information Gathering
  • Null sessions
  • Scanning for the NetBIOS Service
  • Enumerating Usernames/ Password policies
  • Malt Ego
  • Network Infrastructure
  • Social Infrastructure
Module 25: Port Scanning
  • TCP Port Scanning Basics
  • UDP Port Scanning Basics
  • Port Scanning Pitfalls
  • Nmap4
  • Network Sweeping
  • OS fingerprinting
  • Banner Grabbing / Service Enumeration
  • Nmap Scripting Engine
  • PBNJ
  • Unicorn Scan
Module 26: ARP Spoofing
  • The Theory
  • Doing it the hard way
  • Ettercap
Module 27: Buffer Overflow Exploitation
  • Looking for Bugs
  • Fuzzing
  • Exploiting Windows Buffer Overflows
  • Replicating the Crash
  • Controlling EIP
  • Locating Space for our Shell code
  • Redirecting the execution flow
  • Finding a return address
  • Basic shell code creation
  • Getting our shell
Module 28: Exploiting Linux Buffer Overflows
  • Setting things up
  • Controlling EIP
  • Landing the Shell
  • Avoiding ASLR
Module 29: Working With Exploits
  • Looking for an exploit on Backtrack
  • Looking for exploits on the web
Module 30: Transferring Files
  • The non interactive shell
  • Uploading Files
  • Using TFTP
  • Using FTP
  • Inline Transfers
Module 31: Exploit frameworks
  • Meta Spoilt
  • Interesting Payloads
  • Meterpreter Payload
  • Binary Payloads
  • Other Framework v3.x features
  • Core Impact
Module 32: Client Side Attacks
  • Client side attacks
  • CVE-2009-0927
  • MS07-017 – From POC to Shell
  • MS06-001
  • Client side exploits in action
Module 33: Port Fun
  • Port Redirection
  • SSL Encapsulation – Stunnel
  • HTTP CONNECT Tunneling
  • Proxy Tunnel 11.5 SSH Tunneling
  • What about content inspection
Module 34: Password Attacks
  • Online Password Attacks
  • Hydra
  • FTP Brute force
  • POP3 Brute force
  • SNMP Brute force
  • Microsoft VPN Brute force
  • Hydra GTK
  • Password profiling
  • CEWL
  • Offline Password Attacks
  • Windows SAM
  • Windows Hash Dumping – PWDump / FGDump
  • John the Ripper
  • Rainbow Tables
  • “Windows does WHAT????”
  • Physical Access Attacks
  • Resetting Microsoft Windows
  • Resetting a password on a Domain
  • Resetting Linux Systems
  • Resetting a Cisco Device
Module 35: Web Application Attack vectors
  • Cross Site Scripting
  • Browser redirection / I Frame injection
  • Stealing Cookies / Abusing Sessions
  • Local and Remote File Inclusion
  • 3 SQL Injection in PHP / MYSQL
  • Authentication Bypass
  • Enumerating the Database
  • Code Execution
  • SQL Injection in ASP / MSSQL
  • Identifying SQL Injection Vulnerabilities
  • Enumerating Table Names
  • Enumerating the column types
  • Fiddling with the Database
  • Microsoft SQL Stored Procedures
  • Code execution
  • Web Proxies
Module 36: Trojan Horses
  • Binary Trojan Horses
  • Open source Trojan horses
  • World domination Trojan horses
Module 37: Windows Oddities
  • Alternate NTFS data Streams
  • Registry Backdoors
Module 38: Root kits
  • Aphex Root kit
  • HXDEF Root kits