Ethical Hacking & Information S Ecurity - Government Of India

Transcription

National Institute of Electronics & Information TechnologyGorakhpur – Extension Centre Lucknow(Under Ministry of Electronics and Information Technology, Govt. of India)MMMUT Campus, Deoria Road, r/ Ethical Hacking & Information Security4 Weeks. (3 Hrs. per day)Medium of Instruction: Bilingual (English& Hindi)Ethical Hacking and Information Security4 Weeks Online CourseThis course introduces the concepts of Ethical Hacking and gives the learner theopportunity to learn about different tools and techniques in Ethical hacking andsecurity and to identify and analyze the stages an ethical hacker requires to takein order to compromise a target system as well as will apply preventive,corrective and protective measures to safeguard the system. After thecompletion of this course, candidate would be able to identify tools andtechniques to carry out a penetration testing and critically evaluate securitytechniques used to protect system and user data and it will also help todemonstrate systematic understanding of the concepts of security at the levelof policy and strategy in a computer system.ObjectiveB.E*/B.Tech.* / B.Sc. - M.Sc. / Graduate / Diploma in any stream withBasic Knowledge of Programming or B.C.A*. / M.C.A. pursuing or qualifiedor NIELIT O-Level / NIELIT A-Level Qualified or 10 2 qualified withknowledge of programming. (Note: *pursuing candidate can also apply)PrerequisitesEligibility Candidate must have latest computer/laptop with preferably4 GB RAM or higher Internet connection with good speed(preferably 2 Mbps or higher).Rs. 3700/- incl. GST & all other charges.Course FeesHard Copy of Certificate will be provided to the participants, based onminimum 75% attendance and on performance (minimum 50% marks)in the online test, conducted at the end of the course.Certificate Instructor-led live classes.Instructor-led hands-on lab sessions using Virtual Lab.Content Access through e-Learning portal.Assessment and CertificationMethodologyStep-1: Read the course structure & course requirements carefully.How to ApplyStep-2: Visit the Registration portal and click on apply button.Step-3: Create your login credentials and fill up all the details, see thepreview and submit the form.Step-4: Login with your credentials to verify the mobile number, email IDand then upload the documents, Lock the profile and Pay the Fees online,using ATM-Debit Card / Credit Card / Internet Banking / UPI etc.

National Institute of Electronics & Information TechnologyGorakhpur – Extension Centre Lucknow(Under Ministry of Electronics and Information Technology, Govt. of India)MMMUT Campus, Deoria Road, r/Course ContentDayTopicDayDay#01NETWORKPRIMER 10IP SPOOFING &DENIAL OF KPRIMER –IIIDay#06PASSWORD CRACKINGDay#08Day#11NETWORKPRIMER –IISNIFFING, ARP CACHEPOISONING & MITMATTACKS.TROJAN, BACKDOOR ANDVIRUSSECURING E-MAILCOMMUNICATIONWEB APPLICATIONSECURITY –IIDay#14WEB APPLICATIONSECURITY -IIIDay#15NETWORK TRAFFICENCRYPTIONINTRUSIONDETECTION SYSTEMPENETRATIONTESTING USINGMETASPLOIT -IDay#17NETWORK SECURITY-IDay#18NETWORK SECURITY-IIDay#20PENETRATION TESTING USING METASPLOIT-IIE-MAIL SECURITYDay#09Day#12STEGANOGRAPHYWEB APPLICATIONSECURITY –ICourse CoordinatorSh. Abhinav Mishra (Scientist D),NIELIT Gorakhpur,Email: abhinav@nielit.gov.inMobile Number: 8317093868Sh. Pawan Verma,STONIELIT Lucknow,Email: pawanverma@nielit.gov.inMobile Number: 7706009310CLICK HERE TO REGISTER

National Institute of Electronics & Information TechnologyGorakhpur – Extension Centre LucknowCourse ContentsDayDay1(Under Ministry of Electronics and Information Technology, Govt. of India)MMMUT Campus, Deoria Road, r/Detailed Conceptual TopicNETWORK PRIMER -IWhat is Networking, Benefits of Network, Basic Components needed for NetworkCommunication, Client/Server Model, Types of Servers, Role of A Network Administrator,Network segmentation, LAN traffic congestionEthernet, CSMA/CD, Internetworking Basics,Broadcast domain, Collision DomainHub, Switch & Router , Repeaters, Ethernet Cabling: - Straight-Through Cable, CrossoverCable, Rolled Cable, Internet Protocols: - TCP/IP Model, OSI Reference Model, PortNumbers,TCP/IP, TCP/UDP, MAC Address,IP Addressing, IP Terminology, IP Addressing SchemeNETWORK PRIMER -IIDay2Sub netting Basics, How to Create Subnets, Subnet Masks, Classless Inter-DomainRouting (CIDR), Sub netting Class C Addresses, Sub netting Class B Addresses, PhysicalVs Logical Address, Public & Private IP AddressesHands On labStudy of Ethernet Cabling:- Straight-Through Cable,Crossover Cable, RolledCablePractice on IP Subnettingon CLASS A,B & Cnetworks.NETWORK PRIMER –IIIDay3Day4Hands-on lab on WhoisDomain Lookup,Whois IPlookup,Nslookup ,TCP/IPUtilities, hostname, Arp,Ping, tracert / traceroute,Netstat,Getmac,NslookupINFORMATION GATHERINGHands-on lab onIntroduction to Ethical Hacking,What is hacking?,Definition of Hackin, Types of Hackers Information GatheringIntroduction to Information Security, CIA Triad, Services & Techniques, Actives andand its countermeasuresPassive Threats and Exploit, etc.TCP/IP Troubleshooting utilities, Troubleshooting IP Addressing, hostname, Arp, Ping,tracert / traceroute, Netstat, getmac, Nslookup.IANA, IANA Root Zone Database, IANA Number Resources, local Internet registry(LIR),National Internet Registry (NIR), AfriNIC, APNIC, ARIN, LACNIC, RIPE NCC,Regional Internet Registry (RIR),Internet, Who Controls the Internet?, Network Registrarfor .EDU.IN, .RES.IN, .AC.IN, .GOV.IN in INDIA, List of Root Servers, Applications ofInternet, ERNET, National Informatics Centre (NIC).Introduction to Information Gathering, Phases of Information Gathering,Reconnaissance, Banner Grabbing, Web Ripping, Website at Offline Mode, DownloadingServer Side Code, Foot Printing,Name Space Lookup,Trace Routing Techniques, WhoisLookup Query, FingerprintingRegistration details of the website, contact details. Finding out the target IP address,Finding out DNS record , sub domains, Operating system, Finding login pages, Findingout sensitive, directory, Find out any known vulnerabilityNetwork Scanning, Network Scanning Techniques and Scanning counter measures.Hands on Lab on TrojanVirus & itsCountermeasuresPASSWORD CRACKINGHands on lab onPassword Hashes, Password Cracking types, Dictionary Attack, Brute Force Attacks, Password crackingCracking Passwords using John the Ripper, Other password Cracking tools, Howpasswords are stored in Linux,/etc/passwd and /etc/shadow,How passwords are stored in techniques and itsWindows, Testing SSH Password and Hardening of SSH,Password Cracking countermeasuresSNIFFING, ARP CACHE POISONING & MITM ATTACKS.Day5Day6Sniffing, ARP Cache Poisoning, Man in the Middle (MITM) Attacks,CountermeasuresHands on lab on IPSpoofing , Denial ofService (DoS) and itscountermeasuresTROJAN ,BACKDOOR AND VIRUSHands on lab on TrojanIntroduction to Virus, What is Trojan?, Types Of Trojans, Different way a Trojan Can Get ,Backdoor and itsInto A System, Trojan, Backdoor, What is Keylogger, Categorization of KeystrokecountermeasuresLoggers& Virus & Countermeasures,STEGANOGRAPHYHands on lab onInformation Hiding, Techniques Steganography, Steganography with CMD, Steganography CMD andSteganography using image file Steghide tool, Scapy tool used for using image fileSteganography,ICMP, Steganography using ICMP Payload Scapy tool used for Hands on lab onSteganographySteganography usingICMP PayloadIP SPOOFING & DENIAL OF SERVICEDay7Day8Day9IP Spoofing, Denial of Service (DoS), TCP SYN Flood Attack using hping3,Detecting TCPSyn Flood attacks using Wireshark,Detecting TCP Syn Flood attacks using netstat,Suggesting & ImplementingCountermeasures

National Institute of Electronics & Information TechnologyGorakhpur – Extension Centre Lucknow(Under Ministry of Electronics and Information Technology, Govt. of India)MMMUT Campus, Deoria Road, r/HandsonlabonConcept of Email,SMTP,POP3 and IMAP, Email Spoofing, Types of Phishing, E- demonstrationonmail Phishing, E-Mail Tracking by Header, Concept of Fake E-mails, Protections, phishing mail and itsSPF,DKIM and DMARC Records, Using nslookup to check SPF/DKIM/DMARC countermeasures.records Concept of Fake E-mailsSECURING E-MAIL COMMUNICATIONHands on lab on SecuringPGP, E-mail Security, Securing E-Mail Communication, PGP,MIME,S/MIME, E-Mail communicationsDifference between PGP and S/MIME, Scenario For E-mail Securityusing PGPWEB APPLICATION SECURITY -IHands on lab on WebWeb Application Primer, Different Types of Web Applications Attacks and Application Security andThreats, Hacking Methodology, Web Application Hacking Tools, its CountermeasuresFirewall,WafW00fWeb Application Vulnerabilities & CountermeasuresWEB APPLICATION SECURITY -IIHands on lab on WebApache Web Server Concepts, Web Server Attacks, Web Server Attacks Application Security andMethodology, Web Server Attack Tools, Countermeasures, Patch Management, its Countermeasures.Web Server Security Tools, Web Server Pen Testing Countermeasures, WebApplication Security Testing Tools, Vulnerability Scanning, Acunetix &W3af,Nikto,WAF Testing, WAFWEB APPLICATION SECURITY -IIIHands on lab on WebBrute Force Attack in Web ApplicationApplication Security andCommand Injection in Web Applicationits Countermeasures.SQL Injection in Web ApplicationXSS Reflected in Web ApplicationXSS Store in Web ApplicationNETWORK TRAFFIC ENCRYPTIONHands-on lab onIP Security, Protocols used in IPSec, Security Architecture of IPSec and Modes of configuring IP SecurityIPSec , VPN, Types of VPN,IP Security, Protocols used in IPSec, SSH Port between 02 HostsForwardingINTRUSION DETECTION SYSTEMHands-on lab onIntroduction to IDS, Types of IDS, Introduction to IDS, ,Architecture of Installing and configuringSnort,Logical components of snort, Placement of Snort, Component used in IDS.Snort ,Implementation Functions of IDS, Rules in snort Tools Of IntrusionDetection, Rule Actions and Protocols, DetectionNETWORK SECURITY-IHands-on lab onIntroduction to Network Security ,Introduction to MAC address, Introduction to preventing CAM FloodingCAM Table,CAM Flooding Attacks ,Introduction to Macof tool, MAC-Port Binding Attacks by using SwitchTypes,Switch Port Violations, Switch Port Security, Preventing CAM Flooding Port Security,Attacks by using Switch Port SecurityNETWORK SECURITY-IIHands-on lab onSecuring DHCP,DHCP Snooping, Preventing unauthorized access to DHCP Server Preventing unauthorizedby using DHCP Snooping, MAC Spoofing, IP Source Binding, Preventing MAC access to DHCP Server bySpoofing by using IP Source Binding,Port Mirroringusing DHCP Snooping,and IP Source Binding,PENETRATION TESTING USING METASPLOITHands-on lab onIntroduction to Penetration Testing, Penetration testing methodology, Types of Penetration Testing usingpenetration testing, Pen Testing Techniques, Penetration Testing Tools, MetasploitExamples of Free and Commercial Tools, Limitations of Pentest tools.Introduction to Penetration Testing, Penetration testing methodology, Types ofpenetration testing, Pen Testing Techniques, Penetration Testing Tools,Examples of Free and Commercial Tools, Limitations of Pentest tools. MetasploitGUIs,MSF Community Edition, ArmitageBinary Payloads, Client Side Exploits, Social Engineering Toolkit, Client sideAttack and Privilege Escalation with Meterpreter using Social Engineer ToolkitE-MAIL SPOOFING and y18Day19Day20

National Institute of Electronics & Information TechnologyGorakhpur – Extension Centre Lucknow(Under Ministry of Electronics and Information Technology, Govt. of India)MMMUT Campus, Deoria Road, r/DayDay1Ethical Hacking ans Information SecurityTopics to be covered.Theory (2:00 PM -3:00 PM)Practical(3:00 PM -5:00 PM)ContentName ofContentInstructorNETWORKAbhinav Mishra Study of Ethernet Cabling: - Straight-Through Cable,PRIMER -ICrossover Cable, Rolled CableName ofInstructorAbhinav MishraNETWORKPRIMER -IIAbhinav MishraPractice on IP Subnetting on CLASS A,B & C networks.Abhinav MishraNETWORKPRIMER –IIIAbhinav MishraHands-on lab on Whois Domain Lookup,Whois IP lookup,Nslookup ,Nmap Scanning TCP/IP Utilities, hostname, Arp,Ping, tracert / traceroute, Netstat, Getmac, NslookupAbhinav MishraINFORMATIONGATHERINGAbhinav MishraShweta VermaAbhinav MishraDay6SNIFFING,ARPCACHE POISONING &MITM ATTACKS.PASSWORDCRACKINGHands-on lab on Information Gathering and itscountermeasuresHands On Lab On Sniffing, ARP Cache Poisoning & MITMAttacks & Its CountermeasuresShweta VermaDay7IPSPOOFING&DENIAL OF SERVICEAbhinav MishraHands on lab on Password cracking techniques and itscountermeasuresHands on lab on IP Spoofing , Denial of Service (DoS) and itscountermeasuresTROJAN ,BACKDOORAND VIRUSSTEGANOGRAPHYAbhinav MishraHands on lab on Trojan ,Backdoor and its countermeasuresShweta VermaShweta VermaHands on lab on Steganography CMD and using image file,Hands on lab on Steganography using ICMP PayloadShweta VermaDay10E-MAILSPOOFING,PHISHINGAbhinav MishraHands on lab on demonstration on phishing mail and itscountermeasures.Shweta VermaDay11SECURINGE-MAILCOMMUNICATIONAbhinav MishraHands on lab on Securing E-Mail communications using PGPShweta VermaDay12WEBAPPLICATIONSECURITY -IAjay VermaHands on lab on Web Application Security and itsCountermeasuresAjay VermaDay13WEBAPPLICATIONSECURITY -IIAjay VermaHands on lab on Web Application Security and itsCountermeasures.Ajay VermaDay14WEBAPPLICATIONSECURITY -IIIAjay VermaHands on lab on Web Application Security and itsCountermeasures.Ajay VermaAbhinav MishraHands-on lab on configuring IP Security between 02 HostsShweta VermaDay16NETWORK TRAFFICENCRYPTIONINTRUSIONDETECTION SYSTEMAbhinav MishraHands-on lab on Installing and configuring IDS.Shweta VermaDay17NETWORKSECURITY-IAbhinav MishraShweta VermaDay18NETWORKSECURITY-IIAbhinav MishraHands-on lab on preventing CAM Flooding Attacks by usingSwitch Port Security,Hands-on lab on Preventing unauthorized access to DHCPServer by using DHCP Snooping, and IP Source Binding,PENETRATIONTESTINGUSINGMETASPLOITShweta VermaHands-on lab on Penetration Testing Using MetasploitShweta VermaDay19PENETRATIONTESTINGUSINGMETASPLOITShweta VermaHands-on lab on Penetration Testing Using MetasploitShweta VermaDay20Day2Day3Day4Day5Day8Day9Day15Abhinav MishraShweta VermaShweta VermaShweta Verma

Ethical Hacking and Information Security 4 Weeks Online Course . Introduction to Penetration Testing, Penetration testing methodology, Types of penetration testing, Pen Testing Techniques, Penetration Testing Tools, . Hands-on lab on Penetration Testing using