CYBRAIN INFOSEC

what will you learn

Become an ethical hacker that can hack computer systems like black hat hackers and secure them like security experts.
What Will You Learn?
1. Introduction to Hacking & Process

CIA
What is Hacking
Types of Hackers
Classes of Hackers
Difference between ethical hacker and hacker
Skill of an Ethical Hacker
Testing
Top Hackers
History of Hacking

2. Network Basics, Operating systems and Databases
Basics of Networking
Types of Operating systems used in hacking
Types of databases used in hacking
Linux file systems and basic commands
Windows file systems and understanding secpol.msc
Databases types

3. Concepts of TCP/IP and OSI model and process
TCP/IP model in detail
OSI model in detail
UDP in detail
TCP 3-way handshake theorem
UDP 2-way handshake theorem
Wireshark

4. Detail IP & MAC – Spoofing & security
What is IP
Types of IP
Classes of IP
IP masking techniques
IP address tracing
What id MAC address
MAC address masking
VPN
How to secure your network with VPN

5. Foot-printing / Information Gathering
What is Footprinting
Crawling the website and mirroring the pages
Who.is lookup
Email extraction from websites
Email id email information gathering
Phone numbers information gathering
Website archive

6. Web search / Google hacking
Working of google
Advanced searching techniques in google
Google search operators
Google Hack tool

7. Scanning & Types
What is scanning
Types of scanning
Why scanning is important
Network scanning
Netcut
Angryipscanner
Whoismywifi
Nessus
Port scanning
Nmap and top 30 commands
Web application scanning
Acunetix
Netsparker

8. Password cracking and system security
Windows file structure
Linux file structure
Pogostick password cracker
Syskey
Windows security

9. Brief of Kali Linux & Pentesting with Kali Linux

What is Kali linux
Pentesting with kali linux
Metasploit the art of exploitation
Armitage

10. Social engineering attacks & security
What is Social engineering
Types of social engineering attacks
Social engineering toolkit

11. Email hacking & Security
Phishing
Key-loggers
Email tracing
Email Spoofing
Self-destructing emails
Email Security

12. Cryptography
Encryption
Decryption
Key
Secure Line
Public Line
Symmetric Cipher
Public Key Cryptography
One Time Pad
Steganography
Md5
Sha2
Sending encrypted emails
Encrypting your disk with Bitlocker

13. Steganography
What is Steganography?
What is Steganalysis?
Hiding text behind images
Detection of hidden items
Oursecret
Hiderman

14. Firewalls, IDS/IPS and Honeypots

Firewall
Types of firewalls
Bypassing filters of firewall
Details of IDS and IPS
Honeypots
Types of Honeypots
KFsensor

15. Owasp Top 10
What is OWASP Top 10
Injection
Broken Authentication and Session Management
Cross Site Scripting (XSS)
Insecure Direct Object References
Security Misconfiguration
Sensitive Data Exposure
Missing Function Level Access Control
Cross Site Request Forgery (CSRF)
Using Components with Known Vulnerabilities
Unvalidated Redirects and Forwards

16. Website Security

DWVA
SQL injection & working
SQL Injection automated
SQL Injection manual
Havij
Sqlmap
XSS (Cross Site Scripting)
Reflected XSS
Stored XSS
Dom Based XSS
BeEF Browser exploitation

17. DDOS attacks, buffer and stack overflow
What is DDOS & types?
DDOS attacks
Protecting DDOS attacks
What is buffer and stack overflow attacks
Prevention of buffer and stack overflow attacks
Exploiting target with DDOS and stack overflow by using kali linux

18. ATM, Credit card and Debit card attacks & Security
Luhn rule
ATM and credit card frauds
Keypad jamming frauds
Card swapping
Skimming
Leaked card numbers websites Case study
Prevention of credit, debit and atm card fauds

19. USB hacking technique / switch blades

Hacking data by using pen-drives
USB Grabber
USB Security

20. Protocols vulnerabilities
Protocols
Types of Protocols
MITM attack.
Security

21. Virus, Trojans, worms, Ransomwares and security
Virus
Worms
Trojans
Njrat
JPvirus kit
Ransomwares
Types of ransomwares
How to protect yourself from ransomwares

22. Reverse engineering
Concept of Reverse Engineering
Application of Reverse Engineering
DMCA ACT
Disassembler
Decompilers
Program Obfuscation
.NET Obfuscator
Java Byte code Decompilers
How to reverse a software

23. Mobile E-hacking and security
Android
Features of Android
APK
Android Malware list
WebKit
Using Proxies in Android
iPhone/iOS Security
Spying applications
Whatsapp Hacking & Security

24. Wi-Fi Security
Wireless Technology
Basic Terminologies
Types of Wireless Network
Detecting a Wireless Network
Advantages of Wireless Technology
Disadvantage of Wireless Network
Antennas
SSIDs
Access Point Positioning
Wireless Security Standard
Wireless Intrusion Detection System
Tips to Secure Wireless Network

25. Security Compliance and Auditing
Security Compliance
Need for Security Compliance
Standards for Security Compliance
ISO 27001:2013c
PCI-DSS
Introduction to IT Auditing
What is Security Auditing?
Need for Security Auditing
Relation of Auditing and Compliance
Importance of Risk Management

26. Physical security threats

Physical Security Measures
Need for Physical Security?
Factors Affecting Physical Security
Physical Security Checklist

27. Cyber laws in India

Please wait...
Book Now