Ethical Hacking And Cyber Security

Ethical Hacking And Cyber Security

Introduction to Ethical Hacking & Cyber Security

The field of Ethical hacker training in Jaipur is organized by Techienest this winter to achieve a successful career and it will just develop as a greater amount of the business world discovers its home on computer systems that are open to the general population, either coincidentally or by the wonder destination.

Our Training Program Details

Ethical Hacking
Course : Ethical Hacking & Cyber Security
Certification By : TechieNest, An ISO 9001:2008 Certified Company
Study Material : Book free to each participant (Soft Copy)
Fee : 11,000/-
Duration : 15 Days/ 90 Hours

Course Details


Ethical Hacking & Cyber Security
DAY TOPIC DURATION
Day 1

 

  •  Introduction to Security
  • Cyber Laws & Legitimity
  • Section 14,15,65,66(A/B/C/D/E),67A,69,70,75
  • Introduction to VAPT
  • Job & Income Scopes
  • Why we bother about security?
  • Who are the Victims?
  • Why you should stay secure?

Set your intention & get control over your security & privacy online

  •  Attack Management
  • Host Based Security
  • Exploitation Life Cycle
  • BYOD in organization
  • Network Terminologies 1:-
  • Introduction to Network, Netwrork Protocol
  • IP Address, IP Subnet
  • NAT, DHCP Server

Delete Old Account & Factory Wipe Old Devices

  •  Network Terminologies 2:-
  • Ports
  • DNS, VPN
  • Proxy Server
  • DNS Server

Protect your home network & Setup guest network

6 Hours
 Day 2
  •  Introduction to Linux/Unix
  • Linux Architecture
  • Linux Configuration & Commands
  • Root Structure Hierarchy

Who is On My Network?

  •  Users & Groups Management In Linux
  • Permissions
  • Introduction to Kali linux
  • Tarball, Gzip Data & Security

Setting up encryption & lock Screen

  •  Information Gathering & Foot Printing
  • Whois Information
  • Device Recon
  • ShodenIO
  • Web Server Information Gathering

Find My Device & Auto Updating

6 Hours
Day 3
  • AKA Advance Phishing Attack
  • IDN Homographic Attack
  • Social Engineering Attack

Req/Res Bluetooth/NFC/Wireless on your Device

  • Apache Web Server in Kali
  • UserDir mod in Apache
  • CGI in Apache

Anti-Virus & Anti-Malware Security Trends

  • Fundamental of PHP/HTML
  • TCP Tunneling to Apache
  • Cookies & Session Hijacking
  • Threat to WEB Application
  • Threat to WEB Server
  • Secure yourself on Internet

Better browser & browsing…it’s about time!

6 Hours
Day 4
  • Kali Security & Services
  • SSH Service in Kali Linux
  • Attack Management
  • Zero Day Exploit & Attachements

Setup Privacy & Security extension in Browser

  • OS Introduction
  • System Hacking
  • Malware illustration-Virus, Worms & Trojons

Proper Internet Hygeine

  • Scan System for Malicious application
  • Introduction to authentication method
  • Tool to defeat authentication
  • OS login bypass

Setup privacy for concious smartphone application

6 Hours
Day 5
  •  Introduction to N/W attacks
  • M-I-T-M Attack
  • ARP poisoning

Set up privacy friendly cloud backup solution

  •  Understand HTTPS & HSTS security
  • Understand GET & POST requests
  • SSL stripping

Setup a Password manager

  •  DHCP Snooping
  • Ettercap filter program
  • Network traffic Manipulation

Create custom ettercap filter for network traffic manipulation

6 Hours
Day 6
  •  De-jargonize DNS
  • DNS Spoofing
  • Phishing integration with spoofing
  • Security countermeasures for MITM

Setup two factor authentication

  •  Understanding Proxy & Transparent proxy
  • MITM proxy
  • CA-Cert In Mobile Devices

Setup VPN

  •  MITB [Man-In-The-Browser]
  • BeEF-XSS [Browser Exploitation Framework]

Clean out your friends list

6 Hours
Day 7
  •  MITMf [Man-In-The-Middle] Framework
  • BeEF integration with MITMf

3rd party app permission & OAUTH services

  •  Introduction to Network Sniffing
  • Packet Sniffing-Wireshark
  • Packet Analysis

Clean up social network privacy [Twitter, SnapChat, Youtube, Google]

  •  Display & Capture Filters
  • DOS & DDOS attack

Clean up social network privacy [Facebook, Instagram, Linkdin & Other]

6 Hours
Day 8
  •  AAA Security
  • Authentication, Authorization & Access

Have I been Pwned?

  •  Security control when performing
  • Account Management

Email privacy & security

  •  Practice for Account Management
  • CUPP LAB
  • Cewl LAB
  • ShodenIO LAB
  • XPLICO LAB

Set-up PGP private/public key pair

6 Hours
Day 9
  •  Introduction to Mobile Security
  • Security Architecture
  • Android Exploitation Framework

Spot phishing email or facebook fake page

  •  Introduction to Android Reverse Engineering
  • Understanding Android Menifest
  • Classes.dex to Java source code

Spot fake support calls

  •  Identifying APK Signature [RSA & DSA]
  • What is Smali & Backsmali?

Vishing and Smishing attacks

6 Hours
Day 10
  •  Decode Source of APK
  • Rebuild APK with own Sign
  • Resign APK

Spot ATM Skimmers

  •  Introduction to Metasploit Framework
  • Metasploit Framework Architecture
  • Complete Setup of MSF in Linux

Freeze Credit History

  •  MSF OS Detection
  • Open Port & Service Detection

Opt out of public database information

6 Hours
Day 11
  •  Various Interface of Metasploit Framework
  • Basic Terminologies
  • Vulnerability Analysis

RFID Blocking Wallet

  •  Windows Exploitation Framework
  • Windows Post Exploitation Framework
  • Privilege Escalation

Survellience Self Defence

  •  Android Exploitation Framework
6 Hours
Day 12
  •  Linux Exploitation Framework
  • HSTS Post Exploitation
  • Metasploit Encoding
  • Metasploit Script Automation
  • Environment Setup for Burp Suite
  • Proxy Module
  • Repeater Module
6 Hours
Day 13
  •  Target & Spider Module
  • Intruder Module
  • Web Traffic Injection using burp
  • Payment Gateway Manipulation in burp
  • GET/POST req header injection
  • Variable Intruder Attack
6 Hours
Day 14
  •  Cyber Threats: Assessment & Analysis
  • Cyber Security vs. Information Assurance
  • What is Unifies Threat Management (UTM)?
  • UTM Appliance Comparison
  • What is the Defense Threat Reduction Agency?
  • Internet Communication: Social Media, Email, Blogs
  • Information Technology as a Means for Cybercrime
  • How Technology has Changed Crime?
6 Hours
Day 15
  •  Ethical Issues in Managing Technology in Business
  • Impact of Technology on Privacy
  • Information Privacy: Laws & Examples
  • Using Privacy Settings in Social Media
  • Customers and Legal Agreements
  • Pre Penetration Testing Checklist
  • Scope Analysis

Penetration Testing Deliverables and Conclusion

6 Hours

Step 1

Register online for any desired course, duration & location of your training course & obtain a Registration-ID. Registration-ID is a Unique Registration Number which is generated by our system after successful registration for training A student can have multiple IDs for multiple courses & batches. It is displayed while successful registration and it is also mailed to you immediately after registration by our server. if you don’t find it in your mail then, please check your SPAM folder or junk folder of your mail ID.

Step 2

Please deposit your Course fee to any one of our payment gateway/ Bank Account/ paytm.

Payment Gateway link: Pay through PayUmoney

Bank Account Details
A/C Name: TechieNest Pvt. Ltd.
Bank A/C No: 201000689491
IFSC: INDB0000592
Bank Name: Indusind Bank Limited
Address: Malviya Nagar, Jaipur ( Rajasthan)
Paytm Number9251494002

Step 3

Update us regarding your fee payment by sending picture/scan copy of bank receipt to: training@techienest.in and you will receive a confirmation mail on your mail id.

SUMMER TRAINING OFFERS:

When someone says yes you can do it….it means you can achieve it and when you decide to take an action we come with the surprising offers:

1) Branch toppers up to 30% off

Offer code: TNBT30

For Branch toppers we have the superb fascinating offer 30% off on summer training Courses.

T&C apply:

  • This offer can be redeemed by only two candidates i.e. 1 male and 1 female candidate.
  • Certification proof is mandatory for the validation of branch toppers.

E.g.: Photo-print of Result or Provisional Mark sheet from University

2) On the basis of 12th result, upto Rs. 2000/- off

Offer code: TN12-2000

Upto Rs. 2000/- off will be awarded in all the courses offered in summer training to those Students who had scored more than 85% in 12th

T&C apply:

  • Certification proof of 12th is mandatory to validate the percentage.

3) Group Discount:

Offer code: TNGD-10

Offer code: TNGD-20

Offer code: TNGD-25

  • If a group size is of: 5 -10 then 10% discount on training

10-20 then 20% discount on training

20 and above then 25% discount on training

4) Referral Offer:

Offer code: TNR3

Offer code: TNR5

  • 3% additional discount to the person who is referring
  • 5% additional discount to the one who is being referred

5) For Former students up to 30% off:

Offer code: TNFS30

  • There will be upto 30% discount on students who already did training

6) Nobel Cause students Rs. 1000/- off:

Offer code: TNNC1000

  • Discount of Rs. 1000/- will be given to students who has worked for Noble cause and proof of all certifications related to that span of work are need to be shown.

7) 5% additional Discount for Campus Ambassador:

Offer code: TNA5

  • Additional 5% discount will be given on training program

8) Previous Workshop attended students 10% off:

Offer code: TNPW10

  • For this category students discount of 10% on summer training

9) IIT, NIT students Rs. 2000/- off:

Offer code: TNIN2000

Students belongs to IIT and NIT will be getting off up to Rs. 2000/- on training programs.

NOTE- All the discounts are applicable to the courses whose course fee worth above Rs 5500/-.

Certification

All participants will get Certificate from TechieNest Pvt. Ltd. in association with Aavriti’18 IIT Bombay

Why TechieNest

  • Vast experience of having conducted Big Outreach Workshop collaborating with over 300+ colleges in all over India including IIT Bombay, IIT Hyderabad, IIT Bhubaneswar, IIT Jodhpur, IIT Mandi, NIT Raipur, MNIT Jaipur, MANIT Bhopal, NIT Jalandhar, NIT Patna, NIT Srinagar, IIIT Kalyani, BITS Pilani and likewise.
  • Trained more than 20,000 students in the field of EMBEDDED SYSTEMS & ROBOTICS, MATLAB & Machine Vision, Internet of Things, PLC_SCADA, PYTHON, C/C++, Andriod, VLSI & VHDL, JAVA and such top notch courses.
  • Our trainers are efficient in Raspberry pi, Arduino, PLCs, etc. which forms essential hardware in Electronic Industries nowadays.
  • Outreach workshop partner of Sanchaar-Wissenaire’18, IIT Bhubaneswar, 2017-18
  • Zonal workshop partner of Techkriti’18 IIT Kanpur, 2017-2018
  • Outreach workshop partner of Techfest’15 IIT Bombay & Techfest’16 IIT Bombay
  • Zonal workshop partner of Techkriti’17 IIT Kanpur, 2016-2017
  • Outreach workshop & Training partner of nVision’17 IIT Hyderabad, 2016-17
  • Outreach workshop partner of Ignus’17 IIT Jodhpur, 2016-17
  • AIRC’18 (All India Robotics Championship) in association with Techkriti’18 IIT Kanpur.
  • AIRC’17 (All India Robotics Championship) in association with nVision’17 IIT Hyderabad, 2016-17
  • Offering Project Based Training, Projects on Demand, Corporate Projects, Commercial Projects, and Consultancy in Engineering Projects.
    Dedicated 24×7 R&D lab.
  • Trained over 50+ international students in TechieNest Technology Transfer Program 2014-15.
  • TechieNest has Research Engineers having excellent research aptitude, teaching pedagogy who illustrates their finding through practical demos during workshop/training.
  • Manufacturer of Electronic products delivering the same across the country.

Training Kit- will be updated soon

Course
Ethical Hacking
Course : Ethical Hacking & Cyber Security
Certification By : TechieNest, An ISO 9001:2008 Certified Company
Study Material : Book free to each participant (Soft Copy)
Fee : 11,000/-
Duration : 15 Days/ 90 Hours

Course Details


Ethical Hacking & Cyber Security
DAY TOPIC DURATION
Day 1

 

  •  Introduction to Security
  • Cyber Laws & Legitimity
  • Section 14,15,65,66(A/B/C/D/E),67A,69,70,75
  • Introduction to VAPT
  • Job & Income Scopes
  • Why we bother about security?
  • Who are the Victims?
  • Why you should stay secure?

Set your intention & get control over your security & privacy online

  •  Attack Management
  • Host Based Security
  • Exploitation Life Cycle
  • BYOD in organization
  • Network Terminologies 1:-
  • Introduction to Network, Netwrork Protocol
  • IP Address, IP Subnet
  • NAT, DHCP Server

Delete Old Account & Factory Wipe Old Devices

  •  Network Terminologies 2:-
  • Ports
  • DNS, VPN
  • Proxy Server
  • DNS Server

Protect your home network & Setup guest network

6 Hours
 Day 2
  •  Introduction to Linux/Unix
  • Linux Architecture
  • Linux Configuration & Commands
  • Root Structure Hierarchy

Who is On My Network?

  •  Users & Groups Management In Linux
  • Permissions
  • Introduction to Kali linux
  • Tarball, Gzip Data & Security

Setting up encryption & lock Screen

  •  Information Gathering & Foot Printing
  • Whois Information
  • Device Recon
  • ShodenIO
  • Web Server Information Gathering

Find My Device & Auto Updating

6 Hours
Day 3
  • AKA Advance Phishing Attack
  • IDN Homographic Attack
  • Social Engineering Attack

Req/Res Bluetooth/NFC/Wireless on your Device

  • Apache Web Server in Kali
  • UserDir mod in Apache
  • CGI in Apache

Anti-Virus & Anti-Malware Security Trends

  • Fundamental of PHP/HTML
  • TCP Tunneling to Apache
  • Cookies & Session Hijacking
  • Threat to WEB Application
  • Threat to WEB Server
  • Secure yourself on Internet

Better browser & browsing…it’s about time!

6 Hours
Day 4
  • Kali Security & Services
  • SSH Service in Kali Linux
  • Attack Management
  • Zero Day Exploit & Attachements

Setup Privacy & Security extension in Browser

  • OS Introduction
  • System Hacking
  • Malware illustration-Virus, Worms & Trojons

Proper Internet Hygeine

  • Scan System for Malicious application
  • Introduction to authentication method
  • Tool to defeat authentication
  • OS login bypass

Setup privacy for concious smartphone application

6 Hours
Day 5
  •  Introduction to N/W attacks
  • M-I-T-M Attack
  • ARP poisoning

Set up privacy friendly cloud backup solution

  •  Understand HTTPS & HSTS security
  • Understand GET & POST requests
  • SSL stripping

Setup a Password manager

  •  DHCP Snooping
  • Ettercap filter program
  • Network traffic Manipulation

Create custom ettercap filter for network traffic manipulation

6 Hours
Day 6
  •  De-jargonize DNS
  • DNS Spoofing
  • Phishing integration with spoofing
  • Security countermeasures for MITM

Setup two factor authentication

  •  Understanding Proxy & Transparent proxy
  • MITM proxy
  • CA-Cert In Mobile Devices

Setup VPN

  •  MITB [Man-In-The-Browser]
  • BeEF-XSS [Browser Exploitation Framework]

Clean out your friends list

6 Hours
Day 7
  •  MITMf [Man-In-The-Middle] Framework
  • BeEF integration with MITMf

3rd party app permission & OAUTH services

  •  Introduction to Network Sniffing
  • Packet Sniffing-Wireshark
  • Packet Analysis

Clean up social network privacy [Twitter, SnapChat, Youtube, Google]

  •  Display & Capture Filters
  • DOS & DDOS attack

Clean up social network privacy [Facebook, Instagram, Linkdin & Other]

6 Hours
Day 8
  •  AAA Security
  • Authentication, Authorization & Access

Have I been Pwned?

  •  Security control when performing
  • Account Management

Email privacy & security

  •  Practice for Account Management
  • CUPP LAB
  • Cewl LAB
  • ShodenIO LAB
  • XPLICO LAB

Set-up PGP private/public key pair

6 Hours
Day 9
  •  Introduction to Mobile Security
  • Security Architecture
  • Android Exploitation Framework

Spot phishing email or facebook fake page

  •  Introduction to Android Reverse Engineering
  • Understanding Android Menifest
  • Classes.dex to Java source code

Spot fake support calls

  •  Identifying APK Signature [RSA & DSA]
  • What is Smali & Backsmali?

Vishing and Smishing attacks

6 Hours
Day 10
  •  Decode Source of APK
  • Rebuild APK with own Sign
  • Resign APK

Spot ATM Skimmers

  •  Introduction to Metasploit Framework
  • Metasploit Framework Architecture
  • Complete Setup of MSF in Linux

Freeze Credit History

  •  MSF OS Detection
  • Open Port & Service Detection

Opt out of public database information

6 Hours
Day 11
  •  Various Interface of Metasploit Framework
  • Basic Terminologies
  • Vulnerability Analysis

RFID Blocking Wallet

  •  Windows Exploitation Framework
  • Windows Post Exploitation Framework
  • Privilege Escalation

Survellience Self Defence

  •  Android Exploitation Framework
6 Hours
Day 12
  •  Linux Exploitation Framework
  • HSTS Post Exploitation
  • Metasploit Encoding
  • Metasploit Script Automation
  • Environment Setup for Burp Suite
  • Proxy Module
  • Repeater Module
6 Hours
Day 13
  •  Target & Spider Module
  • Intruder Module
  • Web Traffic Injection using burp
  • Payment Gateway Manipulation in burp
  • GET/POST req header injection
  • Variable Intruder Attack
6 Hours
Day 14
  •  Cyber Threats: Assessment & Analysis
  • Cyber Security vs. Information Assurance
  • What is Unifies Threat Management (UTM)?
  • UTM Appliance Comparison
  • What is the Defense Threat Reduction Agency?
  • Internet Communication: Social Media, Email, Blogs
  • Information Technology as a Means for Cybercrime
  • How Technology has Changed Crime?
6 Hours
Day 15
  •  Ethical Issues in Managing Technology in Business
  • Impact of Technology on Privacy
  • Information Privacy: Laws & Examples
  • Using Privacy Settings in Social Media
  • Customers and Legal Agreements
  • Pre Penetration Testing Checklist
  • Scope Analysis

Penetration Testing Deliverables and Conclusion

6 Hours

How to Enroll

Step 1

Register online for any desired course, duration & location of your training course & obtain a Registration-ID. Registration-ID is a Unique Registration Number which is generated by our system after successful registration for training A student can have multiple IDs for multiple courses & batches. It is displayed while successful registration and it is also mailed to you immediately after registration by our server. if you don’t find it in your mail then, please check your SPAM folder or junk folder of your mail ID.

Step 2

Please deposit your Course fee to any one of our payment gateway/ Bank Account/ paytm.

Payment Gateway link: Pay through PayUmoney

Bank Account Details
A/C Name: TechieNest Pvt. Ltd.
Bank A/C No: 201000689491
IFSC: INDB0000592
Bank Name: Indusind Bank Limited
Address: Malviya Nagar, Jaipur ( Rajasthan)
Paytm Number9251494002

Step 3

Update us regarding your fee payment by sending picture/scan copy of bank receipt to: training@techienest.in and you will receive a confirmation mail on your mail id.

Fee & Discount

SUMMER TRAINING OFFERS:

When someone says yes you can do it….it means you can achieve it and when you decide to take an action we come with the surprising offers:

1) Branch toppers up to 30% off

Offer code: TNBT30

For Branch toppers we have the superb fascinating offer 30% off on summer training Courses.

T&C apply:

  • This offer can be redeemed by only two candidates i.e. 1 male and 1 female candidate.
  • Certification proof is mandatory for the validation of branch toppers.

E.g.: Photo-print of Result or Provisional Mark sheet from University

2) On the basis of 12th result, upto Rs. 2000/- off

Offer code: TN12-2000

Upto Rs. 2000/- off will be awarded in all the courses offered in summer training to those Students who had scored more than 85% in 12th

T&C apply:

  • Certification proof of 12th is mandatory to validate the percentage.

3) Group Discount:

Offer code: TNGD-10

Offer code: TNGD-20

Offer code: TNGD-25

  • If a group size is of: 5 -10 then 10% discount on training

10-20 then 20% discount on training

20 and above then 25% discount on training

4) Referral Offer:

Offer code: TNR3

Offer code: TNR5

  • 3% additional discount to the person who is referring
  • 5% additional discount to the one who is being referred

5) For Former students up to 30% off:

Offer code: TNFS30

  • There will be upto 30% discount on students who already did training

6) Nobel Cause students Rs. 1000/- off:

Offer code: TNNC1000

  • Discount of Rs. 1000/- will be given to students who has worked for Noble cause and proof of all certifications related to that span of work are need to be shown.

7) 5% additional Discount for Campus Ambassador:

Offer code: TNA5

  • Additional 5% discount will be given on training program

8) Previous Workshop attended students 10% off:

Offer code: TNPW10

  • For this category students discount of 10% on summer training

9) IIT, NIT students Rs. 2000/- off:

Offer code: TNIN2000

Students belongs to IIT and NIT will be getting off up to Rs. 2000/- on training programs.

NOTE- All the discounts are applicable to the courses whose course fee worth above Rs 5500/-.

Certification

Certification

All participants will get Certificate from TechieNest Pvt. Ltd. in association with Aavriti’18 IIT Bombay

Why TechieNest

  • Vast experience of having conducted Big Outreach Workshop collaborating with over 300+ colleges in all over India including IIT Bombay, IIT Hyderabad, IIT Bhubaneswar, IIT Jodhpur, IIT Mandi, NIT Raipur, MNIT Jaipur, MANIT Bhopal, NIT Jalandhar, NIT Patna, NIT Srinagar, IIIT Kalyani, BITS Pilani and likewise.
  • Trained more than 20,000 students in the field of EMBEDDED SYSTEMS & ROBOTICS, MATLAB & Machine Vision, Internet of Things, PLC_SCADA, PYTHON, C/C++, Andriod, VLSI & VHDL, JAVA and such top notch courses.
  • Our trainers are efficient in Raspberry pi, Arduino, PLCs, etc. which forms essential hardware in Electronic Industries nowadays.
  • Outreach workshop partner of Sanchaar-Wissenaire’18, IIT Bhubaneswar, 2017-18
  • Zonal workshop partner of Techkriti’18 IIT Kanpur, 2017-2018
  • Outreach workshop partner of Techfest’15 IIT Bombay & Techfest’16 IIT Bombay
  • Zonal workshop partner of Techkriti’17 IIT Kanpur, 2016-2017
  • Outreach workshop & Training partner of nVision’17 IIT Hyderabad, 2016-17
  • Outreach workshop partner of Ignus’17 IIT Jodhpur, 2016-17
  • AIRC’18 (All India Robotics Championship) in association with Techkriti’18 IIT Kanpur.
  • AIRC’17 (All India Robotics Championship) in association with nVision’17 IIT Hyderabad, 2016-17
  • Offering Project Based Training, Projects on Demand, Corporate Projects, Commercial Projects, and Consultancy in Engineering Projects.
    Dedicated 24×7 R&D lab.
  • Trained over 50+ international students in TechieNest Technology Transfer Program 2014-15.
  • TechieNest has Research Engineers having excellent research aptitude, teaching pedagogy who illustrates their finding through practical demos during workshop/training.
  • Manufacturer of Electronic products delivering the same across the country.
Training Kit

Training Kit- will be updated soon

Center

Request call From Us

Drop an email at query@techienest.in

or

Raise a Query Here

Express Fee Payment System for Training Program Netbanking/Debit Card/Credit Card

For Assistance Call

+91-9251094002, +91-7340033091

Pay Instantly with Credit Card/ Debit Card/ Net Banking from any of the following gateway

For Assistance Mail

Mail us : training@techienest.in

We’ll be glad to help
Contact us

Jaipur
+91-7340033094
Hyderabad
+91-9251094002
Raipur
+91-9251494002
Email ID
query@techienest.in
Register for Training
Online Payment