CYBER FUTURE BUILD CAREER ONLINE Call us + 91 9091156095 The more you learn the more you earn Get the right start to your career h t t ps:/ / elear n in g.ceh poin t .co.in / Introduction - Introduction to ethical hacking - Introduction to cybersecurity - Career opportunity in cybersecurity - Introduction to job opportunity Com pu t er Secu r it y Basics - Defining Computer Security - Understand and apply concepts of confidentiality, integrity and availability M ost Com m on At t ack s - DOS and DDOS Attacks - Backdoor Shell - Buffer Overflow - OS Kernel Exploitation - Google Hacking - Active directory attacks - Hacking by Key loggers - Revolutionary Web Hacking Technique - Exfiltration - Trojan attack and countermeasure Secu r it y St an dar ds - NIST - PCIDSS - HIPPA - SOX - BASEL - ISO 27001 - Develop, docu m en t , an d im plem en t secu r it y policy, st an dar ds, pr ocedu r es, an d gu idelin es Net w or k in g Basics an d Secu r it y - Understanding the Basic Security Concepts of Network - IANA, Allotment of IP Address - TCP & IP , OSI MODEL - VLAN - Ping and Ping Sweep - Network penetration testing - Tools used by network engineers and attackers PART 1 PART 2 Recon n aissan ce Tech n iqu es - Passive footprinting - Active footprinting - OSINT - Investigation with maltego Det ect in g Vict im 's OS - How to Know Victim Operating System DNS Delegat ion - Understanding Domain Name and DNS - Intro to DNS Delegation - Trace DNS Delegation - delegate responsibility Fir ew all & IDS - Introduction - Advanced Nmap & Detecting and Subverting Firewalls - Intrusion Detection Systems Vu ln er abilit y Assessm en t s - Automatic attacks - Pentesting Content Management Systems (CMS) - Pentesting NoSQL databases and NoSQL-related APIs / NoSQL injections - Start from Web Application Attacks and land to Network and Infrastructure Penetration Testing PART 3 Por t Scan n in g & At t ack in g - Detecting Open Ports & Attacking Pr oxy Ser ver & secu r it y - VPN & VPS - Defending against DoS and other attacks - Creating a Proxy Webserver Cyber Law an d Con su lt in g - Intellectual Property Theft - IT Act, 2000 - Cyber Forensics - Investigations - Case Studies Ext r a M odu les - Earning Money Online - Adsense and Adwords. - Freelanceing - Basic programming PART 4 Em ail Secu r it y - Possible Threats - Everything about email security Passw or d Cr ack in g - Multiple password hacking method - Learn countermeasures that may be taken to secure your passwords - Protect your own password from hackers - Password penetration testing Cr ypt ogr aph y - Introduction to cryptography - Key concepts of cryptography - Cipher text - Cryptool - PKIs and Encryption - Symmetric Cryptography - Cryptographic Controls - Cryptographic protocol - Information security - Common cryptographic errors - Implementing cryptography in real field of infosec WAPT - Advance post-exploitation - Wide coverage of OWASP? s TOP 10 - Master Burp Suite - In-depth Web application analysis, information gathering and enumeration - XSS & SQL Injection - Session related vulnerabilities - LFI/RFI Web an d M obile Applicat ion Developm en t In t er n sh ip Cyber secu r it y r esear ch in t er n sh ip M ain In t er n sh ip Pr ogr am : Web Applicat ion Pen et r at ion Test in g COURSE DURATION Par t 1- 20 h ou r s Par t 3- 20 h ou r s Par t 2- 20 h ou r s Par t 4- 20 h ou r s 1 month 1 month 1 month 1 month Special classes f or w eak st u den t s INSTRUCTOR LED TRAINING SCHEDULE Day 1 12PM-5PM On lin e & Of f lin e 12:00pm-1:00pm ? INTRODUCTION TO INFOSEC 4:00pm-5:00pm ? SECURE COMPUTER USER Day 2 10AM-11PM On lin e & Of f lin e 10:00am-12:00pm ? CYBERSECURITY FRAMEWORK 9:50pm ? 11pm ? CYBER SECURITY & DIGITAL FORENSIC Day 3 12PM-6PM On lin e & Of f lin e 12:00pm-1:30pm - LINUX FUNDAMENTAL 3:00pm-4:00pm - WAPT 4:30pm-5:30pm - VAPT Day 4 12PM-5PM On lin e & Of f lin e 12:00pm-1:30pm - ETHICAL HACKING 3:00pm-3:50pm - NETWORK SECURITY 4:00pm-4:30pm - INTERVIEW PREPARATION