Professional Documents
Culture Documents
TRAINING
Profile:-
1. Associate Member at National Cyber Safety and
Security Standards.
2. Cyber Crime Advisor at Gujarat Police.
3. Certified Penetration Tester Profession.
4. Certified Information Security Profession.
5. ISC2 Certified Cloud Security Profession.
6. Certified Ethical Hacker.
7. Cyber Security Researcher.
Courses which should be provided:-
I. Certified Cyber Security Expert.
II. Certified Forensics Expert.
III. Certified Network & System Security Expert.
Courseware:-
Contents:-
I. Introduction.
II. Footprinting & Reconnaissance.
III. Scanning Networks.
IV. Enumeration.
V. System Hacking.
VI. Malware Threats.
VII. Sniffing,
VIII. Social Engineering.
IX. Denial of Service.
X. Session Hijacking.
XI. SQL Injection.
XII. Web Servers Attacks.
XIII. Web Application Attacks.
XIV. Mobile Security.
XV. Evading IDS, Firewalls and Honeypot.
XVI. Cloud Computing.
XVII. Cryptography.
Contents:-
I. Computer Forensics In Today’s World.
II. Computer Forensics Investigations Process.
III. Understanding Hard Disks and File Systems.
IV. Data Acquisition and Duplication.
V. Defeating Anti-Forensics Techniques.
VI. Operating System Forensics.
VII. Network Forensics.
VIII. Investigating Web Attacks.
IX. Database Forensics.
X. Cloud Forensics.
XI. Malware Forensics.
XII. Investigating Email Crimes.
XIII. Mobile Forensics.
XIV. Forensics Report Writing and Presentation.
Contents:-
1. Introduction of Penetration 24.system password hacking.
Testing.
2.Advance googling. 25.external system hacking.
3.Introduction of network 26.System penetration
topologies &server. testing.
4.Internal Network 27.Trojan attack.
penetration testing.
5.Network Scanning. 28.Trojan attack detection.
6.Network discovery 29.GPS location Tracing.
penetration testing.
7.Network and system utility. 30.Exploit system using
backtrack and meta spoilt.
8.Port penetration testing. 31.Using meta spoilt to
exploit a web server
vulnerability.
9.Network packet tracing. 32.Social engineering attack
using SET.
10.Network penetration 33.Website cloning.
testing.
11.Web cracking. 34.Bluetooth hacking for
selected model.
12.Phishing attack & 35.Smart phone security
penetration testing. hacking.
13.ntroduction of wifi lan 36.Android PC remote.
technology.
14.Wi-Fi forensics. 37.PC monitor by android.
15.Data Packets sniffing. 38.Android remote control.
16.Wireless penetration 39.Hack pc by android.
testing
17.web server penetration 40.Hack android phone by PC.
testing.
18.call spoofing. 41.Antihack network in
android.
19.SMS spoofing. 42.Whatsapp Hacking.
20.Password stealing. 43.Android rooting.
21.Folder security hacking. 44.Phone hacking.
22.Firewall penetration 45.Android Hacking.
testing.
23.system password 46.Smart phone penetration
recovery. testing.