Ethical Hacking Cyber Security
Ethical Hacking Cyber Security
Official Partner
Our Clientele/Collaborations
Some of the top institutions and corporates where directly/indirectly we already felt our presence are given below:
Official Partner
Prerequisites
Participants from 1 year/ 2 year / 3 year / 4 year of CSE/IT/MCA/BCA/MSc/BSc-IT/ECE/EE/Other branch/stream will get more
st nd rd th
benefit after joining this program and other interested students can also participate in that as per their requirement.
Official Partner
Session #2
Principles of Ethical hacking
Basic Principle
Commandments of Ethical Hacking
Session #3
Hacking Methodologies
Types of Hacking.
Building the foundation for Ethical hacking
Hacking Phases
Session #4
Role of Ethical Hacker
Types of Hackers
Roles and Responsibilities
Introduction of Red team, Blue Team, White team and Black team.
Session #5
Scope & limitations of hacking.
Advantages & scope for hacking
Drawbacks & Limitation of hacking
Official Partner
Assignment 2: Quiz 1
Project 2: create at list 3 malware and report them.
Official Partner
Module 4: SQL Injection, DOS Attacks, Session hijacking and System hacking [12hours]
Section#15: SQL Injection
Basics to the SQL queries
How Injection Can be done
Cross Site Scripting Attacks
Official Partner
Practical Lab:
1. Conduct detailed reconnaissance using document metadata, search engines, and other publicly available information
sources to build a technical and organizational understanding of the target environment.
2. Network scanning techniques and scanning countermeasures
3. System hacking methodology, steganography, steganalysis attacks, and covering tracks
4. Different types of Trojans, Trojan analysis, and Trojan countermeasures
5. Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
6. Packet sniffing techniques and how to defend against sniffing
7. Social Engineering techniques, identify theft, and social engineering countermeasures
8. Presentation on DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
9. Using tools for Various types of penetration testing, security audit, vulnerability assessment, and penetration testing
roadmap
Assignment: Make a report using any of the above forensic tool on a vulnerable site using the above pen testing tool what are the
vulnerability in it.
Final Test:
1. Quiz 1: Theoretical Quiz
2. Quiz 2: Practical Quiz
3. Analysis report on file applying above techniques as per questions asked.
Disclaimer
Please make sure that this training/internship will be organized by Edu-Vitae Services, it is to note that if any IIT/NIT/Organization is EVS partner then it’s responsible for providing certification
to attending students/professionals, marketing, publicity and rest operations, scheduling, payment processing, training, content development etc. will be taken care by Edu-Vitae Services.
All of the matters/disputes related to internship/training/workshop needs to be addressed to Edu-Vitae Services team only. See our terms and conditions on www.eduvitae.co.in and fees once
paid is non-refundable and non-transferrable. Company reserves full right to withdraw any offer/discount anytime without any prior notification, also it’s important to understand that center
& batches date of internship can be changed as per requirements in India.
Official Partner