Secure Java Development - Innovative Ideas Infotech

Excellence through Innovation..
Summer Training on
Information Security and Cyber Forensics
MISSION
Our primary objective is to eradicate the cyber crimes.
We want to ensure that confidential information stored in websites remains
confidential; that people who prey on unsecured web pages are captured in our “web
security cages”; and that every patron of the internet can use the web freely, without the
nagging thought that his data could easily fall into the wrong hands and be abused. We
provide training on cyber security to the individuals & corporates & help them to be
Cyber Secure.
Innovative Ideas Infotech
Excellence through Innovation..
VISION
We are using internet almost every day. In the cyber world the cyber criminals
are also increasing day by day. So we need to be smart enough to save
ourselves from them.
This, we will accomplish by strengthening our clients’ websites, and also by
disseminating instructions to students through our workshops. We want to
provide services that make the internet a virtual utopia – a place where
knowledge is nestled in a package that is beautiful yet strong, and where that
knowledge is completely safe from prying eyes and devious hackers.
Innovative Ideas Infotech
Excellence through Innovation..
WHY INNOVATIVE IDEAS TRAINING?
Our objective at Innovative Ideas is to arm students and corporations with the skill set
necessary to enjoy on a continuous basis a secure web experience. Our trainers are
well experienced in conducting workshops designed to achieve this very objective.
We have travelled nearly 2200 institutions, teaching cyber security to thousands of
students. We have exposed to them the frailties of websites they visit regularly. We
have shown them how vulnerable their confidential information is without safety
measures. In the process, we may have scared them a little, but have made everyone
aware of the lurking threats and armed everyone with the necessary knowledge to
effectively neutralize those threats. Without intricate and confounding pedagogy, in a
user friendly and engaging style, you will learn how you can plug the loopholes and
browse the web fearlessly and confidently.
Our experienced web-security trainers actively participate in our field support, web
security consulting and solution implementation. This brings real-life experience to
the classroom environment.
Innovative Ideas Infotech
Excellence through Innovation..
Our Associations /Affiliations
Innovative Ideas is an with associations with numerous global organizations,
IEEE, UPTU, PNB, SBI, UP POLICE, CBI Academy, MP Police and many
others. Our team comprises trainers with the experience of more than
15,000 training hours under their belts. These hours have been spent
teaching the nuances of information security to about 60,000 students in
more than 2000 colleges globally.
The set of skills possessed by the Innovative Ideas Team has also come to
the aid of many law enforcement agencies. Agents belonging to CID, STF,
CBI and Dubai Police have been trained extensively by our crew. Thus, we
have imparted to them some of the know how required to solve both cyber
and non- cyber crimes.
Innovative Ideas Infotech
Excellence through Innovation..
Contents Of The Course
Session
1
Module
Cyber Ethics
Importance of the Information Security
Introduction to the Hackers and Hacking Terminologies
Communities and Types of the Hackers
Fundamental of Ethical Hacking
Hacking Vs. Ethical Hacking
Types of Hackers
Skill Profile of a Hacker
Some Famous Hackers and Groups
Cyber World
Advantage and Disadvantage of Cyber world
Cyber World as a Home of hackers
2
Cyber laws & Basics Of Web Technology
Overview of Cyber Law
Introduction To Cyber Law
Cyber Laws Indian
Technical Aspect Of Indian Cyber Law
IT ACT 2000 & 2008
Internet Crimes And Frauds
Cyber Law Cases In India
Organization Under Cyber Laws
Advantages Of Cyber Laws
Innovative Ideas Infotech
Excellence through Innovation..
Contents Of The Course
Session
Module
Introduction
Network Terminologies
IP Addressing
Ports
Proxy Servers
Virtual Private Networks
NAT
Web Application Terminologies
HTML Basics
PHP Basics
Conclusion
3
Information Gathering
What Is Information Gathering & Why Hackers Need This?
Types Of Information Gathering
Information Gathering Using Websites
Information Gathering Using Software
Search Engines- Smart Way Of Information Gathering
Scanning And Enumeration
Tracing - E-Mail, Mobile Phone, Intruder
People Search
Website Scanner
Innovative Ideas Infotech
Excellence through Innovation..
Contents Of The Course
Session
4
Module
Virtualization & System Cloning
What Is Information Gathering & Why Hackers Need This?
Types Of Information Gathering
Information Gathering Using Websites
Information Gathering Using Software
Search Engines- Smart Way Of Information Gathering
Scanning And Enumeration
Tracing - E-Mail, Mobile Phone, Intruder
5
E-mail Attacks
Creating Fake G-mail Pages
Hacking G-mail Accounts
Security of G-mail
Social Engineering Techniques
IDN homograph attack
Sending Fake Mails
Identifying and Tracing the Fake Emails
Innovative Ideas Infotech
Excellence through Innovation..
Contents Of The Course
Session
6
Module
Trojans and Backdoors
Introduction to the Virus, Worms & Trojans
Trojan Creation
Evading Anti-Viruses
Reverse Connection of Trojan Servers
Identify Trojans in the system
Removing Trojans
Analysis of Trojans/Virus
7
Windows Hacking & Security (Win 8 & Win 7)
Creating Fake Facebook & G-mail Pages
Hacking Facebook & G-mail Accounts
Security of Facebook & G-mail
Social Engineering Techniques
IDN homograph attack
Sending Fake Mails
Identifying and Tracing the Fake Emails
Innovative Ideas Infotech
Excellence through Innovation..
Contents Of The Course
Session
8
Module
Reverse Engineering & Buffer Overflow
Understanding the architecture of an executable file
Learning how to debug a file
Cracking a live application to make a 14 day trial period to a lifetime validity product
Basic understanding of the assembly language
9
Virus, Trojan, Worm & Backdoors
Introduction to the Virus, Worms & Trojans
Trojan Creation
Evading Anti-Viruses
Reverse Connection of Trojan Servers
Identify Trojans in the system
Removing Trojans
Analysis of Trojans/Virus
What is Trojan?
Trojans Attack Big Famous Cases
Types Of Trojans
Different way a Trojan Can Get Into A System
How We Create A Trojan and Control System
How Attacker Bypass Your Antivirus By Trojans
Analysis Of Trojans/Virus
Innovative Ideas Infotech
Excellence through Innovation..
Contents Of The Course
Session
10
Module
IDS, IPS and Honeypots
Overview of IDS, IPS & Honeypot
Use of IDS & IPS
Installation of IDS & IPS
Prevention & Detection
Honeypot & its Types
Implementation - Honeypots
Honeypot Tools
11
Google Hacking & Google Dorks
Introduction And Working Of Search Engines
List Of Common Search Engines On Web
Comparing And Choosing Best Search Engine
Dorks For Hacking Search Engines
Tools For Search Engines Hacking
Web Ripping
Finding Admin Pages And Weakness In Site
Security Against Search Engine Hacking
Using Google as hacking tool
Advanced operators of Google and Google Dorks
Finding Vulnerable websites using Google
Finding Target networks using Google
Innovative Ideas Infotech
Excellence through Innovation..
Contents Of The Course
Session
12
Module
Proxy Server & Virtual Private Network (VPN) Technology
Proxy And Types Of Proxies
Why Hackers Use Proxy?
How To Hide IP Address While Chatting
How To Open Block Website In College/Companies
Convert Your Machine As Proxy Server With HTTPS Proxy
Advantage And Disadvantage Of Proxy
Analyzing Proxy Bug
How Proxy Hack Your Passwords Etc
What Is Better Than Proxy
What Is VPN?
Why We Use VPN
Advantage & Disadvantage Of VPN
Free VPN
Countermeasures
Innovative Ideas Infotech
Excellence through Innovation..
Contents Of The Course
Session
13
Module
Facebook Hacking, Security & Forensic
World Famous Big Facebook Hacking Cases
Cookies Stealing of Facebook Accounts
Facebook Phishing Attacks
Facebook Tab Nabbing Attack
Facebook Social Engineering Attack
Analyzing Fake & Real Profile of Facebook
Delete Spam Messages on Facebook
Facebook Fake Messaging Attack
Facebook Tracing Method Techniques (Basic & Advanced)
Facebook Backdoor Installing Technique For Future Access
Facebook Password Stealing By Plugins, Extensions Etc.
How to find if your Facebook Account has been hacked or not
Facebook Account security with Email & SMS Notifications
How to Hack Password using Facebook Hacker
Hack Facebook account password with key logger
Facebook Security & Forensics
Innovative Ideas Infotech
Excellence through Innovation..
Contents Of The Course
Session
15 to 20
Module
Web Application Attacks
Introduction to the Web Architecture
Security Misconceptions
Web Application Vulnerabilities
SQL Basics
Types of SQL Injection
Authentication Bypass Vulnerability
Union Based Injection
Error Based Injection
Blind Injection – Union Based
Blind Injection – Error Based
Code Execution Vulnerability
Cross Site Scripting Vulnerability
Cross Frame Scripting Vulnerability
Cross Site Reference Forgery
Session Hijacking attacks
Testing the Web Application Firewalls
WAF Evasion
Types of Control Panels
Uploading Control Panel
Innovative Ideas Infotech
Excellence through Innovation..
Contents Of The Course
Session
21
Module
Mobile Phone Hacking & Security
SMS & SMSC Introduction
SMS forging & Countermeasures
Sending & Tracking Fake SMS
VoIP Introduction
Installing VoIP Server
Live CALL FORGING using VoIP
22
Andriod Hacking & Whatsapp Hacking
Introduction to Android
Android OS Structure
Overview of Android Apps
Android Rooting
Application Cracking of Android
Cracking PIN of Android Devices
Pattern Unlock Cracking
Android Security
Android Forensics
Whatsapp Hacking & Security
Countermeasures
Innovative Ideas Infotech
Excellence through Innovation..
Contents Of The Course
Session
23
Module
Wifi Hacking & Security
Wireless Standards
Common Vulnerabilities in Wireless Devices
Encryption Standards Used in Wi-Fi
WEP Cracking
WPA/WPA2 Cracking
WPS Cracking
Countermeasures
Exam – Theory & Practical
24
Metasploit Frameworks System
Introduction to the Metasploit Framework
Architecture of Metasploit Framework
Basic Terminologies
Exploitation Techniques
Identifying Vulnerability and Exploits
Exploitation on different platforms
Evading the Firewall & Antivirus
Scripting
Innovative Ideas Infotech
Excellence through Innovation..
Contents Of The Course
Session
25
Module
Cyber Forensic Investigation & Evidence Recovery
Introduction to Forensics
Incidence Response and Computer Forensic
Windows Live Response
Linux Live Response
Web Browser Forensics
Network Forensic
Disk Imaging
Data Recovery Using Tools
Forensic Analysis & Chain of Custody Form
Innovative Ideas Infotech
Excellence through Innovation..
Contents Of The Course
Session
25
Module
Cyber Crime Investigation Session by Deputy S.P. of U.P. Police
Introduction of Cyber Crime
Need of Cyber Crime Investigation in Cyber World
Types of Cyber Crime
Online Crime Investigation
Offline Crime Investigation
Solving Different Cyber Cases
Email Hacking Case
System Hacking Cases
Credit Card Cases
Privacy & Data Theft Cases
Fake Profile Cases
Software Piracy Cases
Pornography Cases
Identity Theft Cases Etc.,
Innovative Ideas Infotech
Excellence through Innovation..
Contents Of The Course
Session
26
Module
Examination & Certificate Distribution by I.P.S. Officer
Examination
Training Certificate from Innovative Ideas Infotech
4 Toolkit D.V.D. from Innovative Ideas Infotech
Book & Study Material
Collection of 100 E-books
Guest lecture by I.P.S. Officer
Innovative Ideas Infotech
Excellence through Innovation..
TRAINING SCHEDULE
Information Security & Cyber Forensics
DURATION
One Month
(75 hours)
STARTS ON
ENDS ON
15 June 2015
15 July 2015
FEE
` 7800.00
• Discount of 10% for students who join our summer training program on information security
& cyber forensics
Innovative Ideas Infotech
Excellence through Innovation..
Innovative Ideas has Successfully conducted Training on Cyber Security at ....
Indian Institute of Technology, BHU ( IIT-BHU )
National Institute of Technology, Allahbad ( NIT – Allahbad
National Institute of Technology, Jaipur ( MNIT – Jaipur )
Indian Institute of Technology, Delhi ( IIT-D)
Indian Institute of Technology, Bombay ( IIT-B)
Indian Institute of Technology, Kanpur ( IIT-K)
Indus Institute, Kanpur
Amity University, Lucknow
IIMT Meerut
HBTI, Kanpur
Galgotia Institute, Greater Noida
Ideal Institute, Ghaziabad
Axis Institute, Kanpur
Innovative Ideas Infotech
Excellence through Innovation..
Innovative Ideas has Successfully conducted Training on Cyber Security at ....
United College of Engineering & Management, Allahabad
United Institute of Technology, Allahabad
Shambhunath Institute of Engineering & Technology, Allahabad
SVIT Vasad, Gujrat
SRMS Bareielly
SRMS Unnao
IMT Ghaziabad
TMU Moradabad
Vidya College of Engineering, Meerut
IFTM University Moradabad
Prem Prakash Gupta Institute, Bareilly
Future Institute, Bareilly
Khandelwal College of Management & Technology, Bareilly
Innovative Ideas Infotech
Excellence through Innovation..
Innovative Ideas has Successfully conducted Training on Cyber Security at ....
RBMI Bareilly
Sagar Institute Barabanki
IET Lucknow
UPTU Lucknow
Khalsa College of Engineering and Technology, Amritsar
And various other colleges
Innovative Ideas Infotech
Excellence through Innovation..
Innovative Ideas has Successfully conducted Training on Cyber Crime Investigation for...
Lucknow Police
Allahabad Police
Saharanpur Police
Kanpur Police
Meerut Police
Bareilly Police
Moradabad Police
Ghaziabad Police
Pratapgarh Police
Rampur Police
Hapur Police
CONTACT US
Innovative Ideas Infotech
Camp Office, : Uttar Pradesh
Tulip Tower, Near Gulachin Temple
Vikas Nagar, Lucknow
For workshop related queries, feel free to contact us
+91-9161999900
+91-9554999925
+91-7080259900
Website : http://i2infotech.in
E-mail : [email protected]
[email protected]
Innovative Ideas Infotech
Excellence through Innovation..
Innovative Ideas Infotech
Excellence through Innovation..
©Innovative Ideas Infotech
All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation is strictly prohibited without the prior
written consent of Innovative Ideas. No part of this document may be reproduced in any form or by any means without the prior written authorization of Innovative Ideas.
While every precaution has been taken in the preparation of this document, Innovative Ideas assumes no responsibility for errors or omissions.