While empowering the next-generation enterprises, telcos and operators need to safeguard their critical infrastructure and their customers from external cyber threats that are exponentially growing everyday.
The Biggest threats to the world following land, sea, air, and space is Cyber. The biggest threat within the Cyber front are Cyber Terrorism, Cyber Warfare and Cyber Espionage. With cyber threats in a state of rapid and continuous evolution, keeping pace in cyber security strategy and operations is a major challenge to governments and private enterprise as well, given the threat to intellectual property and privately-held critical infrastructure. In their most disruptive form, cyber threats take aim at secret, political, military, or infrastructural assets of a nation, or its people.
ICT Cyber Training program is designed for the elite teams of technical security professionals who are part of the armed forces, Department of Defence, or other government agencies whose role includes securing systems, reconnaissance, counterterrorism and counter hacks.
Our values are embodied throughout everything we do, both within and outside of the office. We are a family, working together to help the world to be safe, secure and sophisticated.
Any Individual or Professional having basic knowledge on Computers can enroll for Cyber Training.
Cybersecurity is an in-demand field. Growing cyber attacks, demand for safe and secure data, and other concerns mean that companies need professionals to keep their information safe. There are lots of opportunities in government agencies and defense/aerospace firms, IT Companies and Financial Services Companies for cybersecurity professionals.
Fundamentals of Cyber Security and Elements of Cyber Security, Role of Ethical Hacking in Cyber Security, Fundamentals of Hacking and Ethical hacking, Types of Hackers, Scope & Limitations of Ethical Hacking, Penetration Testing, Vulnerability Auditing, Phases of Hacking
Online Anonymity, Proxy server and working with Proxy Servers, VPN and Working with VPN, TOR network
Foot Printing, Scanning and Enumeration
Objectives of Foot Printing, Collecting Organization Details like Domain name, Sub domains, DNS Information, Servers Details, Email Ids, Network scanning, Objectives of network scanning, Enumeration, SNMP, SMPT, DNS Enumeration, Vulnerability Scanning
Default passwords of network devices and software, Password guessing, Offline password cracking, Brute force cracking, Dictionary based cracking, Hybrid attack, Online password cracking, Man-in-the-middle attack, USB password stealers, What is a keylogger, Deploy a key logger to a remote pc, Defend against a Keylogger
Types of Sniffing, Promiscuous mode, ARP, ARP poison attack, Threats of ARP poison attack, MAC spoofing, MAC Flooding, CAM Table, Defend against MAC Spoofing attacks and Sniffers in network
Kali Linux Operating System
Kali Linux comparison with other Linux distributions, Uses of Kali Linux, Tools for Footprinting, Scanning & Sniffing, Metasploit framework, Metasploit framework to attack on Windows machines, Metasploit framework to attack on Linux Machine, Metasploit framework to attack on Android devices, Metasploit framework to attack using Software Vulnerabilities
Malware, Types of malwares, creation of malware, virus, Worm and Spyware , Rootkit
Hacking Web Servers & Web Applications
Introduction to Web server, hacking of webservers & its consequences, Directory traversal attacks and Website password brute forcing , Defend against web server hacking
Session hijacking, Session hijacking techniques, Cross-Site scripting attack, Session hijacking tools, Defend against session hijacking
SQL Injection and Effects of SQL Injection attacks, Types of SQL Injection attacks, SQL Injection detection tools
What is Phishing, Host a Phishing website, Procedure to attract the victims to access Phishing websites, differentiate a Phishing webpage and original webpage, defend against Phishing attacks
Buffer and usage of buffers in applications, buffer overflow and Sample buffer overflow attack, How to detect a buffer overflow and defend against buffer overflow attacks
Denial of Service
What is a DoS attack and DDoS attack, Symptoms of a Dos attack and techniques, Defending DoS attacks
Types of wireless networks, Types of Wi-Fi authentications and encryptions (WEP, WPA and WPA2), Hardware and software required to crack Wi-Fi networks, Crack WEP, WPA and WPA2 encryption, Defend against Wi-Fi cracking attacks
Counter Measure Techniques for Network Level and Malware attacks
Types of Firewall and Limitations of a Firewall, IDS and IPS and Difference between IDS & IPS, UTM / Next-Generation Firewall and Configuring IPS module in UTM, Types of anti-malwares, Anti-Virus, Anti-Worm, Anti-Trojan, Anti-Rootkit and Internet Security Suites