Excellence through Innovation.. Summer Training on Information Security and Cyber Forensics MISSION Our primary objective is to eradicate the cyber crimes. We want to ensure that confidential information stored in websites remains confidential; that people who prey on unsecured web pages are captured in our “web security cages”; and that every patron of the internet can use the web freely, without the nagging thought that his data could easily fall into the wrong hands and be abused. We provide training on cyber security to the individuals & corporates & help them to be Cyber Secure. Innovative Ideas Infotech Excellence through Innovation.. VISION We are using internet almost every day. In the cyber world the cyber criminals are also increasing day by day. So we need to be smart enough to save ourselves from them. This, we will accomplish by strengthening our clients’ websites, and also by disseminating instructions to students through our workshops. We want to provide services that make the internet a virtual utopia – a place where knowledge is nestled in a package that is beautiful yet strong, and where that knowledge is completely safe from prying eyes and devious hackers. Innovative Ideas Infotech Excellence through Innovation.. WHY INNOVATIVE IDEAS TRAINING? Our objective at Innovative Ideas is to arm students and corporations with the skill set necessary to enjoy on a continuous basis a secure web experience. Our trainers are well experienced in conducting workshops designed to achieve this very objective. We have travelled nearly 2200 institutions, teaching cyber security to thousands of students. We have exposed to them the frailties of websites they visit regularly. We have shown them how vulnerable their confidential information is without safety measures. In the process, we may have scared them a little, but have made everyone aware of the lurking threats and armed everyone with the necessary knowledge to effectively neutralize those threats. Without intricate and confounding pedagogy, in a user friendly and engaging style, you will learn how you can plug the loopholes and browse the web fearlessly and confidently. Our experienced web-security trainers actively participate in our field support, web security consulting and solution implementation. This brings real-life experience to the classroom environment. Innovative Ideas Infotech Excellence through Innovation.. Our Associations /Affiliations Innovative Ideas is an with associations with numerous global organizations, IEEE, UPTU, PNB, SBI, UP POLICE, CBI Academy, MP Police and many others. Our team comprises trainers with the experience of more than 15,000 training hours under their belts. These hours have been spent teaching the nuances of information security to about 60,000 students in more than 2000 colleges globally. The set of skills possessed by the Innovative Ideas Team has also come to the aid of many law enforcement agencies. Agents belonging to CID, STF, CBI and Dubai Police have been trained extensively by our crew. Thus, we have imparted to them some of the know how required to solve both cyber and non- cyber crimes. Innovative Ideas Infotech Excellence through Innovation.. Contents Of The Course Session 1 Module Cyber Ethics Importance of the Information Security Introduction to the Hackers and Hacking Terminologies Communities and Types of the Hackers Fundamental of Ethical Hacking Hacking Vs. Ethical Hacking Types of Hackers Skill Profile of a Hacker Some Famous Hackers and Groups Cyber World Advantage and Disadvantage of Cyber world Cyber World as a Home of hackers 2 Cyber laws & Basics Of Web Technology Overview of Cyber Law Introduction To Cyber Law Cyber Laws Indian Technical Aspect Of Indian Cyber Law IT ACT 2000 & 2008 Internet Crimes And Frauds Cyber Law Cases In India Organization Under Cyber Laws Advantages Of Cyber Laws Innovative Ideas Infotech Excellence through Innovation.. Contents Of The Course Session Module Introduction Network Terminologies IP Addressing Ports Proxy Servers Virtual Private Networks NAT Web Application Terminologies HTML Basics PHP Basics Conclusion 3 Information Gathering What Is Information Gathering & Why Hackers Need This? Types Of Information Gathering Information Gathering Using Websites Information Gathering Using Software Search Engines- Smart Way Of Information Gathering Scanning And Enumeration Tracing - E-Mail, Mobile Phone, Intruder People Search Website Scanner Innovative Ideas Infotech Excellence through Innovation.. Contents Of The Course Session 4 Module Virtualization & System Cloning What Is Information Gathering & Why Hackers Need This? Types Of Information Gathering Information Gathering Using Websites Information Gathering Using Software Search Engines- Smart Way Of Information Gathering Scanning And Enumeration Tracing - E-Mail, Mobile Phone, Intruder 5 E-mail Attacks Creating Fake G-mail Pages Hacking G-mail Accounts Security of G-mail Social Engineering Techniques IDN homograph attack Sending Fake Mails Identifying and Tracing the Fake Emails Innovative Ideas Infotech Excellence through Innovation.. Contents Of The Course Session 6 Module Trojans and Backdoors Introduction to the Virus, Worms & Trojans Trojan Creation Evading Anti-Viruses Reverse Connection of Trojan Servers Identify Trojans in the system Removing Trojans Analysis of Trojans/Virus 7 Windows Hacking & Security (Win 8 & Win 7) Creating Fake Facebook & G-mail Pages Hacking Facebook & G-mail Accounts Security of Facebook & G-mail Social Engineering Techniques IDN homograph attack Sending Fake Mails Identifying and Tracing the Fake Emails Innovative Ideas Infotech Excellence through Innovation.. Contents Of The Course Session 8 Module Reverse Engineering & Buffer Overflow Understanding the architecture of an executable file Learning how to debug a file Cracking a live application to make a 14 day trial period to a lifetime validity product Basic understanding of the assembly language 9 Virus, Trojan, Worm & Backdoors Introduction to the Virus, Worms & Trojans Trojan Creation Evading Anti-Viruses Reverse Connection of Trojan Servers Identify Trojans in the system Removing Trojans Analysis of Trojans/Virus What is Trojan? Trojans Attack Big Famous Cases Types Of Trojans Different way a Trojan Can Get Into A System How We Create A Trojan and Control System How Attacker Bypass Your Antivirus By Trojans Analysis Of Trojans/Virus Innovative Ideas Infotech Excellence through Innovation.. Contents Of The Course Session 10 Module IDS, IPS and Honeypots Overview of IDS, IPS & Honeypot Use of IDS & IPS Installation of IDS & IPS Prevention & Detection Honeypot & its Types Implementation - Honeypots Honeypot Tools 11 Google Hacking & Google Dorks Introduction And Working Of Search Engines List Of Common Search Engines On Web Comparing And Choosing Best Search Engine Dorks For Hacking Search Engines Tools For Search Engines Hacking Web Ripping Finding Admin Pages And Weakness In Site Security Against Search Engine Hacking Using Google as hacking tool Advanced operators of Google and Google Dorks Finding Vulnerable websites using Google Finding Target networks using Google Innovative Ideas Infotech Excellence through Innovation.. Contents Of The Course Session 12 Module Proxy Server & Virtual Private Network (VPN) Technology Proxy And Types Of Proxies Why Hackers Use Proxy? How To Hide IP Address While Chatting How To Open Block Website In College/Companies Convert Your Machine As Proxy Server With HTTPS Proxy Advantage And Disadvantage Of Proxy Analyzing Proxy Bug How Proxy Hack Your Passwords Etc What Is Better Than Proxy What Is VPN? Why We Use VPN Advantage & Disadvantage Of VPN Free VPN Countermeasures Innovative Ideas Infotech Excellence through Innovation.. Contents Of The Course Session 13 Module Facebook Hacking, Security & Forensic World Famous Big Facebook Hacking Cases Cookies Stealing of Facebook Accounts Facebook Phishing Attacks Facebook Tab Nabbing Attack Facebook Social Engineering Attack Analyzing Fake & Real Profile of Facebook Delete Spam Messages on Facebook Facebook Fake Messaging Attack Facebook Tracing Method Techniques (Basic & Advanced) Facebook Backdoor Installing Technique For Future Access Facebook Password Stealing By Plugins, Extensions Etc. How to find if your Facebook Account has been hacked or not Facebook Account security with Email & SMS Notifications How to Hack Password using Facebook Hacker Hack Facebook account password with key logger Facebook Security & Forensics Innovative Ideas Infotech Excellence through Innovation.. Contents Of The Course Session 15 to 20 Module Web Application Attacks Introduction to the Web Architecture Security Misconceptions Web Application Vulnerabilities SQL Basics Types of SQL Injection Authentication Bypass Vulnerability Union Based Injection Error Based Injection Blind Injection – Union Based Blind Injection – Error Based Code Execution Vulnerability Cross Site Scripting Vulnerability Cross Frame Scripting Vulnerability Cross Site Reference Forgery Session Hijacking attacks Testing the Web Application Firewalls WAF Evasion Types of Control Panels Uploading Control Panel Innovative Ideas Infotech Excellence through Innovation.. Contents Of The Course Session 21 Module Mobile Phone Hacking & Security SMS & SMSC Introduction SMS forging & Countermeasures Sending & Tracking Fake SMS VoIP Introduction Installing VoIP Server Live CALL FORGING using VoIP 22 Andriod Hacking & Whatsapp Hacking Introduction to Android Android OS Structure Overview of Android Apps Android Rooting Application Cracking of Android Cracking PIN of Android Devices Pattern Unlock Cracking Android Security Android Forensics Whatsapp Hacking & Security Countermeasures Innovative Ideas Infotech Excellence through Innovation.. Contents Of The Course Session 23 Module Wifi Hacking & Security Wireless Standards Common Vulnerabilities in Wireless Devices Encryption Standards Used in Wi-Fi WEP Cracking WPA/WPA2 Cracking WPS Cracking Countermeasures Exam – Theory & Practical 24 Metasploit Frameworks System Introduction to the Metasploit Framework Architecture of Metasploit Framework Basic Terminologies Exploitation Techniques Identifying Vulnerability and Exploits Exploitation on different platforms Evading the Firewall & Antivirus Scripting Innovative Ideas Infotech Excellence through Innovation.. Contents Of The Course Session 25 Module Cyber Forensic Investigation & Evidence Recovery Introduction to Forensics Incidence Response and Computer Forensic Windows Live Response Linux Live Response Web Browser Forensics Network Forensic Disk Imaging Data Recovery Using Tools Forensic Analysis & Chain of Custody Form Innovative Ideas Infotech Excellence through Innovation.. Contents Of The Course Session 25 Module Cyber Crime Investigation Session by Deputy S.P. of U.P. Police Introduction of Cyber Crime Need of Cyber Crime Investigation in Cyber World Types of Cyber Crime Online Crime Investigation Offline Crime Investigation Solving Different Cyber Cases Email Hacking Case System Hacking Cases Credit Card Cases Privacy & Data Theft Cases Fake Profile Cases Software Piracy Cases Pornography Cases Identity Theft Cases Etc., Innovative Ideas Infotech Excellence through Innovation.. Contents Of The Course Session 26 Module Examination & Certificate Distribution by I.P.S. Officer Examination Training Certificate from Innovative Ideas Infotech 4 Toolkit D.V.D. from Innovative Ideas Infotech Book & Study Material Collection of 100 E-books Guest lecture by I.P.S. Officer Innovative Ideas Infotech Excellence through Innovation.. TRAINING SCHEDULE Information Security & Cyber Forensics DURATION One Month (75 hours) STARTS ON ENDS ON 15 June 2015 15 July 2015 FEE ` 7800.00 • Discount of 10% for students who join our summer training program on information security & cyber forensics Innovative Ideas Infotech Excellence through Innovation.. Innovative Ideas has Successfully conducted Training on Cyber Security at .... Indian Institute of Technology, BHU ( IIT-BHU ) National Institute of Technology, Allahbad ( NIT – Allahbad National Institute of Technology, Jaipur ( MNIT – Jaipur ) Indian Institute of Technology, Delhi ( IIT-D) Indian Institute of Technology, Bombay ( IIT-B) Indian Institute of Technology, Kanpur ( IIT-K) Indus Institute, Kanpur Amity University, Lucknow IIMT Meerut HBTI, Kanpur Galgotia Institute, Greater Noida Ideal Institute, Ghaziabad Axis Institute, Kanpur Innovative Ideas Infotech Excellence through Innovation.. Innovative Ideas has Successfully conducted Training on Cyber Security at .... United College of Engineering & Management, Allahabad United Institute of Technology, Allahabad Shambhunath Institute of Engineering & Technology, Allahabad SVIT Vasad, Gujrat SRMS Bareielly SRMS Unnao IMT Ghaziabad TMU Moradabad Vidya College of Engineering, Meerut IFTM University Moradabad Prem Prakash Gupta Institute, Bareilly Future Institute, Bareilly Khandelwal College of Management & Technology, Bareilly Innovative Ideas Infotech Excellence through Innovation.. Innovative Ideas has Successfully conducted Training on Cyber Security at .... RBMI Bareilly Sagar Institute Barabanki IET Lucknow UPTU Lucknow Khalsa College of Engineering and Technology, Amritsar And various other colleges Innovative Ideas Infotech Excellence through Innovation.. Innovative Ideas has Successfully conducted Training on Cyber Crime Investigation for... Lucknow Police Allahabad Police Saharanpur Police Kanpur Police Meerut Police Bareilly Police Moradabad Police Ghaziabad Police Pratapgarh Police Rampur Police Hapur Police CONTACT US Innovative Ideas Infotech Camp Office, : Uttar Pradesh Tulip Tower, Near Gulachin Temple Vikas Nagar, Lucknow For workshop related queries, feel free to contact us +91-9161999900 +91-9554999925 +91-7080259900 Website : http://i2infotech.in E-mail : queries@i2infotech.in ayushi@i2infotech.in Innovative Ideas Infotech Excellence through Innovation.. Innovative Ideas Infotech Excellence through Innovation.. ©Innovative Ideas Infotech All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation is strictly prohibited without the prior written consent of Innovative Ideas. No part of this document may be reproduced in any form or by any means without the prior written authorization of Innovative Ideas. While every precaution has been taken in the preparation of this document, Innovative Ideas assumes no responsibility for errors or omissions.
© Copyright 2024