i3indya Ethical Hacking & Cyber Security (iEHCS)
Participation Certificate by i3indya™ Technologies
For India: Rs 1650/- For Other Countries: Rs 3500/-
Cyber Case Studies and Ethical Hacking Practicals & Projects will be covered
Study Material (Set of 3 E-Books) and Software's (Ethical Hacking Tools)
DLK will be send to you within 1 working day after receiving your payment
If you don't have time for regular classes, don't worry! Now you can learn Ethical Hacking & Cyber Security at your home, with i3indya's Distance Learning Kit for Ethical Hacking & Cyber Security. It is a 15 days module and it will cover following Topics:
Day | Topics | Duration |
---|---|---|
1 |
Fundamental of Ethical Hacking Hacking Vs. Ethical Hacking Types of Hackers Skill Profile of a Hacker Some Famous Hackers and Groups Cyber World Advantage and Disadvantage of Cyber world Cyber World as a Home of hackers |
3 Hours |
2 |
Introduction To Cyber Law Cyber Laws Indian Technical Aspect Of Indian Cyber Law IT ACT 2000 & 2008 Internet Crimes And Frauds Cyber Law Cases In India Organization Under Cyber Laws Advantages Of Cyber Laws |
2 Hours |
3 |
What Is Information Gathering & Why Hackers Need This? Types Of Information Gathering Information Gathering Using Websites Information Gathering Using Software Information Gathering Using Add-Ons Search Engines- Smart Way Of Information Gathering Scanning And Enumeration Tracing - E-Mail, Mobile Phone, Intruder |
5 Hours |
4 |
Virtualization & System Cloning Introduction Of Virtualization Need & Use Of Virtualization Virtualbox Installing OS On Virtual Machines Networking In Virtual Machines System Cloning Troubleshooting Other Tools For Virtualization |
3 Hours |
5 |
Windows Hacking & Security (Win 8 & Win 7) Windows OS & Securit Hacking Into System By Changing Passwords Getting Access To System By Elevating Privileges Finding Out The Passwords Of Windows Bypassing The Windows Security Hack from Guest to Admin Password in Plain Text Directly Hacking By USB Devices Mitigation Of System Attacks Setting Up A Secure System |
5 Hours |
6 |
What is Password Cracking Types of Password Cracking Techniques How Different Password Crackers Work Windows Password Cracking FTP / Network Password Cracking Zip/ RAR Password Cracking Doc & PDF Password Cracking Using GPU For Password Cracking Password Security |
3 Hours |
7 |
What Is Steganography How Attacker Hides His Data In Images And Other Formats How To Find Data Which Are Hidden What Is Cryptography Advanced Cryptography Tools How Are Programs And Data Wrapped Secure Measures To Protect Our Data |
3 Hours |
8 |
Hacking By Batch Programming & Scripting Basics Of Scripting Languages Used In Scripting Writing Your First Program Malacious Program Scripting
Session Hijacking Using Batch Scripting Data Theft Using Batch Script Automation Using Scripting Designing Tools Using Scripting Developing Security Tools Using Scripting. |
3 Hours |
9 |
Hacking by Viruses, Trojans, Keyloggers & Spywares What is Trojan? Trojans Attack Big Famous Cases Types Of Trojans Different way a Trojan Can Get Into A System How We Create A Trojan and Control System How Attacker Bypass Your Antivirus By Trojans Analysis Of Trojans/Virus How we remove Trojans Manually Security Against Trojans |
4 Hours |
10 |
Malware Analysis & Fake Antivirus Detections Introduction of Malware Types of Malware Common Malwares In Cyber Types of Malware Analysis
Manual Malware Analysis Tools for Malware Analysis Countermeasures |
3 Hours |
11 |
Overview of IDS, IPS & Honeypot Use of IDS & IPSAssignment & Revision Installation of IDS & IPS Prevention & Detection Honeypot & its Types Implementation - Honeypots Honeypot Tools |
3 Hours |
12 |
Proxy Server & Virtual Private Network (VPN) Technology Proxy And Types Of Proxies Why Hackers Use Proxy? How To Hide IP Address While Chatting How To Open Block Website In College/Companies Convert Your Machine As Proxy Server With HTTPS Proxy Advantage And Disadvantage Of Proxy Analyzing Proxy Bug How Proxy Hack Your Passwords Etc What Is Better Than Proxy What Is VPN? Why We Use VPN Advantage & Disadvantage Of VPN Free VPN Countermeasures |
3 Hours |
13 |
Introduction And Working Of Search Engines List Of Common Search Engines On Web Comparing And Choosing Best Search Engine Dorks For Hacking Search Engines Tools For Search Engines Hacking Web Ripping Finding Admin Pages And Weakness In Site Security Against Search Engine Hacking |
3 Hours |
14 |
- |
|
15 |
Exam – Theory & Practical |
- |