#1
6th April 2016, 05:20 PM
| |||
| |||
Ethical Hacking Training In Mumbai
Hey buddy can you please tell me is Institute of Information Security also conduct Ethical Hacking program for students in Mumbai?
|
#2
6th April 2016, 05:20 PM
| |||
| |||
Re: Ethical Hacking Training In Mumbai
Yes buddy Institute of Information Security also conduct Ethical Hacking program for students in Mumbai for that I will get the information so that you can have idea about it. An Ethical Hacker is a technology expert; typically employed by an organization to assess the security system of the organization in order to discover vulnerabilities that can be exploited. Ethical hackers may use the same methods as the black hat hackers Here is the program structure Week 1: Information Security - What & Why? Introduction to Information security Overview IT Act E-Crimes & Penalties Understanding PenTest methodologies (black/white/gray - box) Introduction to Computer Networks Major Topologies in Networks Network Design & Components IP addressing Network protocols Week 2: Network Basics Concept of routing and switching OSI reference model TCP/IP model Diving into OSI layers in details TCP v/s UDP services Common TCP and UDP services Understanding ICMP messages Week 3: Protocol Analysis Understanding things in the packet layer Wireshark-The packet analyzer Analyzing the host-to-host packet transmission synchronizations of hosts termination of hosts finishing of host Week 4: Operating System Basics Introduction to Windows Server - 2008 Active Directory Fundamentals Operational Units Concept of ACL Linux system architecture File system implementation Backtrack files and folders walkthrough Diving into the Pentest folder - Backtrack Understanding Linux shell Working with Linux shell commands Week 5: Breaking into Networks Portscan - Beginner to Expert level Mastering Nmap Working with LUA Cooking custom Nmap scripts Concept of fingerprinting and footprinting Google Hacking Enumeration of services Banner Grabbing Week 6: Exploiting the target Finding vulnerability - Automated methods Using Vulnerability Scanners (Nessus & GFI) Interpreting the automated scanner report Getting into the system Working with exploit code - Exploitation Framework (msf) Attacking LAN Firewall Evasion Firewall introduction & types Detection methodologies Fire-walking Evasion Methodologies Packet crafting Understanding Overflow Buffer Overflow (Stack & Heap) Exploiting Windows & Linux Protection Mechanisms An Ethical Hacker should do Obtain prior written approval from senior management before testing the security of organization STRICTLY work within the project scope boundaries as defined in the engagement letter Carry out responsible disclosure; means whatever weaknesses are discovered during the penetration testing, they are dutifully informed to senior management and technical team Carry out security scans ONLY during scheduled time (usually during non-peak business hours). They should NEVER be done before or after. Point out potential security risks that may impact business operations. They must be rated properly on severity levels Put forward the recommendations to address those potential security risks Respect the individual's or company's privacy and only go looking for security issues. — Report all security vulnerabilities responsibly you detect to the company, not leaving anything open for you or someone else to come in at a later time. — Let the software developer or hardware manufacturer know of any security vulnerabilities you locate in their software or hardware if not already known by the company. — Dynamically update the knowledge and encourage transferring the same to the peers to build a secured environment Address:- Institute of Information Security 201 & 204, Ecospace IT Park, Old Nagardas Road, Near Andheri Subway, Andheri(E), Mumbai - 400 069. India Phone:- +91-22-4295-3158 |