2023 2024 Student Forum > Management Forum > Main Forum

 
  #2  
6th April 2016, 05:20 PM
Super Moderator
 
Join Date: May 2012
Re: Ethical Hacking Training In Mumbai

Yes buddy Institute of Information Security also conduct Ethical Hacking program for students in Mumbai for that I will get the information so that you can have idea about it.

An Ethical Hacker is a technology expert; typically employed by an organization to assess the security system of the organization in order to discover vulnerabilities that can be exploited. Ethical hackers may use the same methods as the black hat hackers

Here is the program structure
Week 1: Information Security - What & Why?
Introduction to Information security
Overview IT Act
E-Crimes & Penalties
Understanding PenTest methodologies (black/white/gray - box)
Introduction to Computer Networks
Major Topologies in Networks
Network Design & Components
IP addressing
Network protocols

Week 2: Network Basics
Concept of routing and switching
OSI reference model
TCP/IP model
Diving into OSI layers in details
TCP v/s UDP services
Common TCP and UDP services
Understanding ICMP messages

Week 3: Protocol Analysis
Understanding things in the packet layer
Wireshark-The packet analyzer
Analyzing the host-to-host packet transmission
synchronizations of hosts
termination of hosts
finishing of host

Week 4: Operating System Basics
Introduction to Windows Server - 2008
Active Directory Fundamentals
Operational Units
Concept of ACL
Linux system architecture
File system implementation
Backtrack files and folders walkthrough
Diving into the Pentest folder - Backtrack
Understanding Linux shell
Working with Linux shell commands

Week 5: Breaking into Networks
Portscan - Beginner to Expert level
Mastering Nmap
Working with LUA
Cooking custom Nmap scripts
Concept of fingerprinting and footprinting
Google Hacking
Enumeration of services
Banner Grabbing

Week 6: Exploiting the target
Finding vulnerability - Automated methods
Using Vulnerability Scanners (Nessus & GFI)
Interpreting the automated scanner report
Getting into the system
Working with exploit code - Exploitation Framework (msf)
Attacking LAN
Firewall Evasion
Firewall introduction & types
Detection methodologies
Fire-walking
Evasion Methodologies
Packet crafting
Understanding Overflow
Buffer Overflow (Stack & Heap)
Exploiting Windows & Linux
Protection Mechanisms

An Ethical Hacker should do

Obtain prior written approval from senior management before testing the security of organization

STRICTLY work within the project scope boundaries as defined in the engagement letter

Carry out responsible disclosure; means whatever weaknesses are discovered during the penetration testing, they are dutifully informed to senior management and technical team
Carry out security scans ONLY during scheduled time (usually during non-peak business hours). They should NEVER be done before or after.

Point out potential security risks that may impact business operations. They must be rated properly on severity levels

Put forward the recommendations to address those potential security risks

Respect the individual's or company's privacy and only go looking for security issues.

Report all security vulnerabilities responsibly you detect to the company, not leaving anything open for you or someone else to come in at a later time.

Let the software developer or hardware manufacturer know of any security vulnerabilities you locate in their software or hardware if not already known by the company.

Dynamically update the knowledge and encourage transferring the same to the peers to build a secured environment

Address:-
Institute of Information Security
201 & 204, Ecospace IT Park,
Old Nagardas Road, Near Andheri Subway,
Andheri(E), Mumbai - 400 069.
India

Phone:-
+91-22-4295-3158


Quick Reply
Your Username: Click here to log in

Message:
Options

Thread Tools Search this Thread



All times are GMT +5. The time now is 04:10 AM.


Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
SEO by vBSEO 3.6.0 PL2

1 2 3 4