loading......

coming soon

Coming Soon

We are in process of building the inventory of good professionals in this category

Got it!

Where do you need ?

location

Please select a Location.

Enquire

Submit your enquiry for Information Security and Hacking

Please enter valid question or comment

Please enter your name.

Please enter valid email

Please enter valid Phone Number

Please enter the Pin Code.

By submitting, you agree to our Terms of use and Privacy Policy

Connect With Chaitanya

You have reached a limit!

We only allow 20 Tutor contacts under a category. Please send us an email at support@urbanpro.com for contacting more Tutors.

You Already have an UrbanPro Account

Please Login to continue

Please Enter valid Email or Phone Number

Please Enter your Password

Please Enter valid Password or OTP

Forgot Password? Resend OTP OTP Sent

Sorry, we were not able to find a user with that username and password.

We have sent you an OTP to your register email address and registered number. Please enter OTP as Password to continue

Further Information Received

Thank you for providing more information about your requirement. You will hear back soon from the trainer

Share

Information Security and Hacking

Information Security and Hacking

Online Instructor led Course

Platform: WebEx

18,000

2 Reviews
5 Interested

About the Course


The Program covers all aspects of Information Security and Ethical Hacking, enabling one to become an Information Security Expert. The current training course is mainly focused at providing concept oriented and hands-on practice with real time scenarios which includes latest updates in InfoSec

Topics Covered

Introduction to Hacking
Hacking
History of Hacking
Necessity of Hacking
Hacking as a Career
Hacking as a Career
Exploit Research/Developer
Reverse-Engineering
Web Application
Malware Analyst
Mobile
Network Penetration Testing
Programming

Algorithmic Approach
Methodology of hacking
Phases of hacking
Reconnaissance
Scanning
Exploitation
Post-exploitation
Track Clearance
Reconnaissance
Introduction to Reconnaissance
Reconnaissance and Foot printing
Open source intelligence gathering
Automating Reconnaissance using scripts
Scanning
Introduction to Scanning
Applying Reconnaissance in Scanning phase
Port scanners, network mappers, sweepers, and vulnerability scanners
Applying Scanning phase on Different platforms

Exploitation
Introduction to Exploits and Payloads
Types of Exploits
Exploits and Exploitation
Evading Antiviruses, IDS and IPS Systems
Exploiting fully patched Operating systems
Packing and Encoding
Backdooring executable

Maintain Access
Persistence backdoors
Maintain persistence on target machine
Connect back backdoors

Post-Exploitation
Extending attack
Pivoting
Running Scripts for profit and fun on target machine
Track Clearance
Clearing Tracks on victims machine
Automating Clearing Tracks using scripts

Metasploit Framework
Introduction to Metasploit Framework
Basic Exploitation
Exploiting Windows
Exploiting Linux
Autopwning
Auxiliary Modules
Meterpreter
Meterpreter Scripting
Railguns
Adding DLL's and Functions on Fly



Trojans-Bots-Malwares-Viruses
Introduction to Trojans-Bots-Malwares-Viruses
Writing Custom Malware and Trojans
Backdoors
Making Persistence Backdoors
Installing Backdoors on Target machines
Firewall and Anti-virus Evasion

Wireless Hacking
Introduction to WLAN Hacking
Buzz Words
Encryption Types
Basics of WLAN Hacking
From Dummy to virtuoso in Wireless Hacking

Web Application Hacking
Introduction to Web Application Hacking
OWASP TOP 10
Database hacking
Server Hacking
Client and Server side Hacks



Reverse Engineering
Introduction to Reverse Engineering
Compilation Process
Process of Reverse Engineering
Uses of Reverse Engineering
Tools for Trade
Introduction to Intel x86
Data Register Layout
Registers
Working on Mnemonics
Structure Alignment and Structure storage
Function Calls
Binary Disassembly Basics
Reversing Binaries
Writing Keygens
Analyze malwares

Buffer Overflow
Introduction to Buffer Overflow
Buffer Overflow in Linux and Windows
Stack smashing
Writing and executing sample shell code snippets
Memory management
How to smash
Canary Guards
SSP
Static analysis
Safe libraries
Memory address randomization
Exploiting program
Performing Sample Penetration Test on the Target Machine

Exploit Writing
Introduction to Exploit Writing
Writing Shell code for windows and Linux
Buffer Overflow exploitation
Heap Overflows
Browser exploitation
Bypassing DEP ASLR
Format String Attacks
Kernel exploitation
Advanced Exploitation

Scripting and Coding
Introduction to scripting Languages
Coding Snippets
Coding Scripts for automation

Who should attend

students from Students from Computer Science / IT / Electronics, People who are having passion towards Learning of Information Security Education Can Enroll in this course.

Pre-requisites

TCP/IP Concepts
Operating Systems
Familiar with any one programming Language

What you need to bring

Students are required to bring their own laptops with a minimum 4 GB RAM installed.
VMware Workstation / Virtual Box
Wired / Wireless Network Support
At least 40 GB HD free
USB 2 or higher support

Key Takeaways

The course includes Complex labs where students will be provided with Pre-configured Virtual Machines, Entire Course Labs are been hosted in cloud running on different Operating Systems to our students with different set of network configuration. Students need to solve each and every module which is assigned by the instructor and need to submit back to him after the end of the every module. At the end of the course Student will be assigned with target where the student need to solve the task within the allotted time.
Reviews

Recommendations & reviews from previous Customers:

Dev Prasad

"Chaitanya Krishna has in depth knowledge about Information security which he leverages to the students in a very simplified and understandable manner. He also gives real times scenarios which are useful in understanding the concepts better. I have searched other institutions too but were too commercial. His way of teaching doesn't appear to be commercial instead he wants his students to learn the subject. "

attended Information Security and Hacking


Swathi

"Mr Chaitanya Krishna is a stupendous instructor to work and Learn with. The immense knowledge he has and imparts with his students, is invaluable vast and accurate, I really recommend him. He also has supported me during the project, he has helped me by giving real time examples. If you are looking for a perfect guidance he is a correct person. "

attended Information Security and Hacking


Questions and Comments

Thousands of experts Tutors, Trainers & other Professionals are available to answer your questions

Comment ?

Questions Guidelines

  • Start your question with simple statements like "what", "when", "where", or "how".
  • Ensure your question or answer is not offensive or insensitive - it may be voted down or banned.
  • Please provide as much detail as possible as this will allow our members to better understand and respond to your question.
  • Take some time to categorize your question. This will greatly help other users find the question.


You can add upto 6 Images

Ask


Recommendations & reviews from previous Customers:

Dev Prasad

"Chaitanya Krishna has in depth knowledge about Information security which he leverages to the students in a very simplified and understandable manner. He also gives real times scenarios which are useful in understanding the concepts better. I have searched other institutions too but were too commercial. His way of teaching doesn't appear to be commercial instead he wants his students to learn the subject. "

attended Information Security and Hacking


Swathi

"Mr Chaitanya Krishna is a stupendous instructor to work and Learn with. The immense knowledge he has and imparts with his students, is invaluable vast and accurate, I really recommend him. He also has supported me during the project, he has helped me by giving real time examples. If you are looking for a perfect guidance he is a correct person. "

attended Information Security and Hacking


Date and Time

Not decided yet.

About the Trainer

Chaitanya Krishna picture

Chaitanya Krishna

Independent Information Security Consultant


I'm passionate geek and a programmer. I like to contribute to the information security community by blogging about recent threats on various blogs. My interests include Network Penetration testing and Exploit development.I have 4 year dedicated experience in Information Security with expertise in penetration testing, vulnerability assessments, security policy and procedures, firewalls and technical security documentation.

Specialties
Hands on experience with Vulnerability Assessment, Network Security and Ethical Hacking Techniques.
Seats Left-

Students Interested 5

Course Id: 26526