Workshop ISOEH
Workshop ISOEH
(1 day x 8 hours)
Organised by
With the kids introduced to the Internet quite early in age, IT Security education is a must among the elders so that they can guide their children to stay protected. TOI, 20th December 2011:
The workshop curriculum is designed to teach the techniques used by hackers to assess and attack corporate networks. Beginning with an ethical part of Hacking, covering legal issues, reasons why one must perform ethical hack, common attack types & vulnerabilities and their countermeasures.
Program Benefits
The workshop will benefit fresher Engineering student to working Professionals. It will teach participants how to stay secure from hackers in todays digital world, be it online or offline It will teach how to harden ones software code, database & network from cyber criminals. PowerPoint Presentation, Live Demos, Interactive Question & Answer Sessions and Comprehensive Reading Materials & tool-kit presented to each participant. 2
Particulars
Introduction to Ethical Hacking Defining hackers Why you need to Hack Your Own Systems Understanding the Dangers Your Systems Face Steps to conduct Ethical Hacking Network infrastructure attacks Operating system attacks Application and other specialized attacks How Hackers Hide their identity while performing the attack
System Hacking and protection Hacking Windows password Hacking Linux password Advanced password recovery Building strong password policy Hiding messages behind images Hiding and encrypting drive, folder and data Threats your system faces Protection from threats
II
Information Gathering Get to know how hacker gather information about victim on internet Information gathering of websites & networks Scanning & Structuring of websites Finding Admin Panel of websites
III
Google Hacking
IV
Using Google as hacking tool Advanced operators of Google Finding Vulnerable websites using Google Finding Target networks using Google Attacks on Network Network penetration using Metasploit Top 10 Network Security Mistakes 3
Web Application Attacks Web Application Overview Web Application Attacks using Backtrack Linux OWASP Top 10 Vulnerabilities Trojans on websites SQL injection attacks XSS attacks 20 dangerous programming mistakes by web developers Countermeasure for Web attacks Wireless Security Wireless Protocols Attacks on Wireless Routers Securing routers from Hackers Countermeasures
VI
VII
Duration:
1 Day (8 hours)
Cost:
Rs. 1500/- per student (Includes Ethical Hacking Toolkit and Course Materials)
Certification:
Certificate of participation of Ethical Hacking and Information Security workshop will be provided to all participants.
Credits:
o Published details of Encryption vulnerability on Apple Website http://hackingheart.wordpress.com/2011/12/09/apple-site-vulnerabilityexposed-by-abir-atarthy o Sikkim Manipal University login breach discovered & reported to SMU. http://www.thehackerslibrary.com/?p=905 o IGNOU website SQL Injection, Weak Authentication Vulnerabilities found & reported to IGNOU authority. http://www.thehackerslibrary.com/?p=996 o BSNL- Dotsoft (Admin) Auth Bypass Vulnerability, calcuttatelephones.com Database Disclosure. http://www.thehackerslibrary.com/?p=1017 o Forbes Site encryption issues published: http://hackingheart.wordpress.com/2011/08/29/even-forbes-site-is-notsecure
ISOEH on PRESS:
We have frequently published & conducted tutorials / articles on the newspaper & TV channels, apart from our disclosure news which were published from time to time on several Newspapers.
AajKaal : 17th July 2010 Sikkim Manipal University Data exposure Vulnerability
The Telegraph 9th January 2012 Mentioned ISOEH as best place to learn Ethical Hacking