Академический Документы
Профессиональный Документы
Культура Документы
By Hitesh Choudhary
Day - 1
Information Security
Cyber Ethics
Introduction
Types Of Hacker
Importance of Vulnerability research
Vulnerability Research References
Trojans, Backdoors
Types of Trojan
Famous Trojans
Binding Trojans with another file
Undetection process of Trojans from antivirus
How to detect Trojan and backdoor
Removal of Trojans from your computer
Analysis of Trojans and Viruses
0.5
Email Security
Understanding Emails
Tracing an email
Fake mailers
Mail bombing
Spam or suspicious emails0.5
Use of Steganagraphy
Securing the data
Key loggers and spy wares
Introduction to key loggers
Installing the key loggers
Steeling password using key logger
Countermeasures
Wireless Security
Wireless Protocols
Wireless Routers-Working
Securing Wireless Routers from hackers(WEP)
Countermeasures
Cyber Crime Investigation
10
11
Investigation Methodologies
Different Logging Systems
Investigating Emails ( Email Tracing)
Investigating Phishing Cases
Investigating Data Theft Cases
Investigating Facebook Profile Impersonation Cases
Cyber Law & IT Act,2000
1.0
For the very first time, in India, we present a special 1 day learning
program of penetration testing on BACKTRACK. Special Attraction
BARCODE hacking.
Particulars
Duration (hours)
Introduction to BACKTRACK
What is BACKTRACK
What so special about it
Why BACKTRACK is HACKERs choice 0.5
Installing BACKTRACK
Live cd mode
Live pendrive mode
Installation to hard disk
Problems regarding installation
Countermeasures 1.0
General command introduction
Login
Ubuntu commands
Starting up of network
0.5
Note: These are just the major aspects that we will be discussing,
each point will be elaborated in detail with demonstrations of the
tools and techniques.
Hands on Demonstrations of Latest Hacking Techniques & Tools.
&
Workshop Trainer: