The emphasis of this course is first on securing yourself in the digital world , securing your office networks & also mastering the basics of Ethical Hacking. The knowledge of this course can be used in any company as this course sets the foundations of setting up & securing IT SYSTEM of any company. It would be a tremendous value add to any person pursing their careers in the field of IT. Duration: It’s going to be a full 100 % practical course, where the students themselves will have to do most of the things on the computers. At the most only 2 students will be allowed per computer. They will also get a chance to work on live projects. Plus all the topics will taught practically on live systems e.g. How to configure a firewall. How to secure a WI-FI system, & office networks. Basically the course focuses on the real world practical tools & hacking techniques. Prerequisites: Anyone having a sound knowledge of computers & using the internet regularly. 50 hours, 2 days a week or on weekends, 2 hours a day. Certification: Upon completion of the course students will receive a certificate from our company SKYNET SECURE. “SKYNET SECURE CERTIFIED ETHICAL HACKER & IT SECURITY EXPERT”, We also provide GOVT CERTIFICATION for the same course, those students who wish to avail of the Govt Certificate will need to pay some Govt fees & clear an exam taken by the Govt dept., then only they will be entitled to receive the Govt certificate(Govt Certified ETHICAL HACKER & IT SECURITY EXPERT) . So at the end the students can get dual certification for the same course.
Topics Covered
Course contents 1) Ethical Hacking Introduction 2) Surveying/Gathering Data 3) Understanding IP & MAC addresses 4) Website Info. Gathering/Vulnerabilities Assessments 5) Tracking Emails Communications Email Hacking, Security& Recovery 6) Concepts of TCP/IP 7) Vulnerability Scanning’s in Websites, Networks 8) Passwords Cracking 9) Ethical Hacking methods(using various tools) 10) Hacking thru Social Engineering 11) Protecting/Safeguarding your PC/networks 12) Windows OS Security MEASURES 13)Cryptography 14)Digital Signatures 15) WI-FI Security 16) Mastering Firewalls /IDS/HONEYPOTS 17) USB HACKING 18) Basic preview of other hacking methods Denial of Service. Hacking Web Servers. SQL Injection Buffer Overflow 19) Understanding Backtrack 20) Mobile Hacking & Security 21) Understanding ISO 27001 STANDARDS 22) The Information Technology ACT, 2008(brief preview)
Who should attend
It is a must for persons aspiring to have a career in the IT SECURITY, Students, IT Managers, professionals, Auditors, security professionals & anyone who is concerned about the integrity of the network infrastructure.
Pre-requisites
Anyone having a sound knowledge of computers & using the internet regularly.
What you need to bring
pen
Key Takeaways
The knowledge of this course can be used in any company as this course sets the foundations of setting up & securing IT SYSTEM of any company. It would be a tremendous value add to any person pursing their careers in the field of IT.