Ethical Hacking Training in Chandigarh – Cyber Defence Intelligence

 

ethical-hacking-1-638

 

6 Months Ethical Hacking Training

Cyber Defence Intelligence is offering 6 Months Ethical Hacking Training to students and IT professionals. The name of the course is Certified Information Security Expert (CISE). This course has 6 different parts. The attendees will learn all the topics related to these specified course parts. The candidates will experience a detailed study of cyber security. The details are as given below:

 

1.Network Security

  • Basics of Linux
  • Basics of Network and Protocols
  • OS and Services Detection By Mastering Nmap Scanner
  • Scapy, Hping2, Hping 3 (Packet Crafting)
  • Network Firewall (Installation, Vulnerability Exploitation, Rule Sets, Security)
  • Metasploit
  • Network Vulnerability Scanning
  • Exploiting Network Vulnerabilities (Hacking into a network)
  • Taking Down a Server (Server Hacking)
  • Wi-Fi Hacking and Security
  • Possible Network Attacks and Countermeasures
  • Best Practices To Design a Secure Network

 

 

2.OS and Database Security

  • File System of Linux and Windows OS
  • Possible Cyber Threats to Linux and Windows OS
  • Security Techniques to Prevent Windows and Linux OS From Cyber Attacks
  • Remote OS Hacking
  • Best Practices to Design a Secure Windows Architecture
  • Windows Server Hardening
  • Linux Server Hardening

 

 

3.Web Application Security

  • Basic of Web Architecture
  • Data Tempering and Data Interception (BurpSuite)
  • OWASP Top 10 Attacks
  • SQL Injection Attack and Best Security Practices
  • XSS (Cross Site Scripting) Attack and Best Security Practices
  • Session Hijacking and Cookies Theft
  • Security Mis-configuration Vulnerabilities
  • CSRF Attack (Cross Site Request Forgery)
  • DOS Attack and Protection
  • Remote File Inclusion and Local File Inclusion Attack
  • Best Practices to Design a Secure Website and Database
  • Live Projects

 

 

4.Cyber Forensics

  • 6 A’s of Forensics & Chain of Custody
  • Collecting Digital Evidences of a Particular Case
  • USB and Browser Forensics
  • Disk Based Forensics
  • Memory Forensics
  • OS Forensics
  • Network Forensics
  • Digital Forensics
  • Disk Imaging (Encase & Volatility)

 

 

5.Compliance

  • Basic Principles of Assessment & Auditing
  • IT Laws and ACTS
  • ISO 27001:2005 
  • PCI DSS
  • Risk Assessment

 

 

6.Final Exam and Report Making

  • 3 Hours Final Exam
  • VAPT Report

 

For More Details Write US: Contact

Join Social Network of Ethical Hackers and Cyber Security Experts: Click Here