HACKING ESSENTIALS WORKSHOP

55 downloads 5184 Views 115KB Size Report
7. Demo: SQL Injection Attacks. 8. Overview of Various Wireless. Attacks. 9. Demo: Cracking a WEP Key using aircrack.ng. 10. Understanding Threats to Mobile.
HACKING ESSENTIALS WORKSHOP PREREQUISITES FOR THE WORKSHOP: 1. Basic networking knowledge 2. Basic internet knowledge 3. Problem solving skills 4. Skills to analyse WHO SHOULD ATTEND: 1. All B.Tech Students BENEFITS TO THE PARTICIPANTS: 1. Knowledge and awareness about Information Security 2. Guidance on where and how to fit in information security industry based on interest and skills 3. Certificate of Attendance from world’s leading Information Security certification body which has trained and certified members from DOD, FBI, Leading Fortune 500 companies etc., 4. Free DVD kit which consists of several hacking tools and whitepapers

WORKSHOP CONTENT: DAY 1 – SESSION-I: OVERVIEW OF CYBER SECURITY SCENARIO: 1. The need to focus on Cyber Security 2. Understanding Cyber War and its Threats 3. Hacking - What & Why? 4. Industry Facts 5. Understand the psyche of a hacker 6. Hacking Vs. Ethical Hacking DAY1 – SESSION-II: UNDERSTANDING ATTACK VECTORS AND HOW TO PROTECT YOURSELF - PART-1: 1. Overview of Various System Hacking Techniques 2. Demo: Extracting SAM hashes using PWdump7 tool 3. Demo: Creating the Rainbow Tables using Winrtgen 4. Demo: Password Cracking using Rainbow Crack 5. Demo: Extracting Administrator Passwords Using L0phtCrack 6. Demo: Password Cracking using Ophcrack 7. Demo: Hack Windows 7 using Metasploit 8. Understanding Malware Threats to Information Security 9. Demo: Creating a Trojan Using the ProRat Tool 10. Understanding Social Engineering Techniques and Counter measures 11. An Overview of Social Networking Threats

12. Demo: Social Engineering Penetration Testing using Social Engineering Toolkit (SET).

DAY 2 – SESSION I: UNDERSTANDING ATTACK VECTORS AND HOW TO PROTECT YOURSELF - PART-2: 1. Understanding Sniffing Attacks 2. Demo: Sniffing Passwords using Wireshark 3. Demo: Sniffing Password from Captured Packets using Sniff –O– Matic 4. An Overview of Session Hijacking Attacks 5. Demo: Performing Man-In-TheMiddle Attack using Cain & Abel 6. Perils of insecure programming 7. Demo: SQL Injection Attacks. 8. Overview of Various Wireless Attacks 9. Demo: Cracking a WEP Key using aircrack.ng 10. Understanding Threats to Mobile Platforms

11. Demo: Lab sessions in i-Lab and exposure to our resources DAY 2 – SESSION II: MAKING CAREER IN CYBER SECURITY: 1. Measures taken by Governments and Organizations to secure themselves from getting hacked 2. Job opportunities and profiles available 3. Roles of CEH, CHFI, ECIH, CISO & ECSP 4. Individual steps to safeguard your country? 5. Salary Trends 6. Recruiters

7. Career roadmap