Modules to be covered
1. Introduction to InfoSec World
The Module is designed to give an introduction to the fundamentals of internet and its primary concepts from origin to the current trending concepts of information security world.
For beginners course offers a complete knowledge of basic security concepts, principles, and the key terms associated with information security and cyber World.
2. Networking Fundamentals
Module will cover concepts of Domain name system, Servers, Connection mechanism and in depth knowledge of OSI model and TCP/IP model and how data is transmitted through network, along with various Protocols used at each layer with focus on Networking Layers, Network design and implementation and what devices are used for the data transmission i.e. hardware associated with networking like switches, router, hub etc along with types of network, internet protocol v4 & v6, ports & protocols, sub netting concepts, domain name system and its working, Network architecture and standards.
Course aims to implement understanding of how virtual machines are separated inside the same physical host and how they communicate with lower hardware levels, working of virtualization technology and components involved and the essentials to setup a lab for further modules in this course like web application hacking, malware analysis.
4. Open Source Intelligence
The module is designed to give insight of OSI methods and techniques i.e. various ways to collect information from publically available resources like e-Mail spoofing, Fake mail Tracing and provide elementary knowledge about advance search techniques in various search engines used by security professionals, cyber criminals. Introduction to social engineering technique like phishing for email id hacking, desktop phishing, remote phishing and how it is essential in information gathering.
Basic concepts of cryptography including secret key and public key systems, encoding and decoding. Difference between encryption and encoding along with techniques and methods of decryption also demonstrate how Hash Values are created using cryptographic hash function by studying hash techniques and also how to crack hash and how cryptography applies complex mathematics and logic to design strong encryption methods.
6. Network Attacks:
Introduction of loopholes in protected wi-fi networks and its testing method to test security of a protected wifi network. In the later phase module will include hands on demonstration of internal network attacks like sniffing, MITM, DNS cache poisoning. Introduction of misconfigurations and loopholes in router security, internal security concepts like firewalls, IDS, IDP, Scanning networks for live systems and their open ports and operating system finger printing and grabbing banners of running services on remote system and scanning of known vulnerabilities.
7. Malware : Attacks and detection
The course will cover basic terminologies and concept of Malware - definition, why and how it is affecting the network and the system, key tools and techniques of malware attacks.
Students will be briefed about creating Malware and various types of malware (virus, worms, trojans, keyloggers etc. )Concepts of antivirus and their working along with it techniques to identify Malwares which are not detected by AVs will be taught.
8. Web Application Attacks
Introductory knowledge of database and working with database using SQL queries along with installation and working for local server’s and testing for different type of loopholes in web application security. Fundamentals of web application including some client side and server side scripting and possible web application attacks like SQL Injection, cross site scripting, local file inclusions and remote file inclusions and also medium level attacks like click jacking etc. They will also be able to patch loopholes in web application.
Metasploit is a framework which allows a security tester to arrange their exploits and launch them easily and how metasploit cover different types of pre build exploits. The scope of exploitation after compromising a particular system and its effect on network and user.
The module cover exploitation techniques for different types of systems like windows, android, MAC.
10. Digital Forensics
Almost every case of cyber crime involves a very strong element of system based evidence i.e phone, smart phones and computer etc.
The module will cover basics of forensics and Introduction to basic concept of data recovery from different types of storage devices and image creation for any storage device for data recovery.
Clarity on concepts of data like data deletion possibilities of recovery and dependencies for the same.
11. Exploit Development
In this module basic C and Python language will be discussed with students. This module will also cover the techniques used by testers to create exploits.
Participants will be able to create their own exploits using Buffer Overflow vulnerabilities
12. Cyber Crime Investigation
This session will include various cyber crime cases and criminal modus operands. Also will be discussed various cyber crime cases handled by cyberops along with investigation procedure.
Methods to handle cyber crime cases and Dos and Don’ts of handling cyber crime cases will be discussed. Indian IT act with reference to case studies from cyberops will be discussed.
Who should attend?
Technical background students – B.Tech Students ( CS / IT), BCA,MCA,BSC (IT),MSC(IT)
At the end of the course you will be able to:
The Course will help Participants to understand the security terminology .Participants will learn to design, implement, and support networked devices which will help them to understand how information and network security support cyber security and along with the installation of virtual servers and workstations.
In the later modules Course will discuss various security technologies, including anti-malware, firewalls, and intrusion detection systems. How cryptography applies complex mathematics and logic to design strong encryption methods. Methods to collect information from centralized database system like IP where the site is hosted, server information, mail server information
Exploitation techniques and capabilities for penetration testing how to conduct investigations to correctly gather analyze and present digital evidence to both business and legal audiences. Course will end with Cyber crime investigation will give an insight on various cyber crime cases and criminal modus operandi and live cases handling for real time experiencing.
Benefits of the Summer Training:
Summer Training provides the students with the benefit of real-world experience. When the students will be facing their first job interviews summer training is the most important experience that is taken into account. During the term of summer training students are exposed with the actual organizational culture of an environment and also work on projects to ensure real time learning.
Practical exam after the course is entitled for certification aiming at how participants use skills, expertise and knowledge gained throughout course to detect possible attacks and methods to penetrate, hence to be specialized for the modules covered candidates are required to clear the set performance criteria for certification.
We use Simulation test method to provide real time challenge which will help participants to use skills , expertise and knowledge acquired during the entire course.
Passing Criteria: 80% and above
Duration of test: 5 hrs
Performance Give outs:
Participant with highest Score in batch will be awarded with Cyberops award of performance Excellency – CAPE Medal and certification of Merit.
Participants scoring 80% and above will be awarded with Certification of Merit.
Training Package Includes
- Software Application Toolkit
- A DVD containing e-books and video Tutorials created by cyberops Team on information Security
- VIP account access to our exclusively developed test beds.
Mail us at: email@example.com