Signup as a Tutor

As a tutor you can connect with more than a million students and grow your network.

Information Security and Hacking

3 Reviews

Course type: Online Instructor led Course

Platform: WebEx

Course ID: 26526

Course type: Online Instructor led Course

Platform: WebEx

Students Interested 5 (Seats Left 0)

₹ 30,000

3 Reviews

Date and Time

Not decided yet.

Chaitanya Krishna

Independent Information Security Consultant

4 Years of Experience

About Chaitanya Krishna

I am passionate geek and a programmer. I like to contribute to the information security community by blogging about recent threats on various blogs. My interests include Network Penetration testing and Exploit development.I have 6 year dedicated experience in Information Security with expertise in penetration testing, vulnerability assessments, security policy and procedures, firewalls and technical security documentation.

Specialties:
Hands on experience with Vulnerability Assessment, Network Security and Ethical Hacking Techniques.
A

Abhaychandra Bhaskar Chede

Attended Information Security and Hacking

Chaitanya Krishna is a talented professional and having huge knowledge in Penetration testing. The way he teach to his student is awesome, systematic and easily understandable by students. Currently, I am trained under his guidance.

Dev Prasad

Attended Information Security and Hacking

Chaitanya Krishna has in depth knowledge about Information security which he leverages to the students in a very simplified and understandable manner. He also gives real times scenarios which are useful in understanding the concepts better. I have searched other institutions too but were too commercial. His way of teaching doesn't appear to be commercial instead he wants his students to learn the subject.

S

Swathi

Attended Information Security and Hacking

Mr Chaitanya Krishna is a stupendous instructor to work and Learn with. The immense knowledge he has and imparts with his students, is invaluable vast and accurate, I really recommend him. He also has supported me during the project, he has helped me by giving real time examples. If you are looking for a perfect guidance he is a correct person.

About the Course

The Program covers all aspects of Information Security and Ethical Hacking, enabling one to become an Information Security Expert. The current training course is mainly focused at providing concept oriented and hands-on practice with real time scenarios which includes latest updates in InfoSec


Topics Covered


Introduction to Hacking Hacking History of Hacking Necessity of Hacking Hacking as a Career Hacking as a Career Exploit Research/Developer Reverse-Engineering Web Application Malware Analyst Mobile Network Penetration Testing Programming Algorithmic Approach Methodology of hacking Phases of hacking Reconnaissance Scanning Exploitation Post-exploitation Track Clearance Reconnaissance Introduction to Reconnaissance Reconnaissance and Foot printing Open source intelligence gathering Automating Reconnaissance using scripts Scanning Introduction to Scanning Applying Reconnaissance in Scanning phase Port scanners, network mappers, sweepers, and vulnerability scanners Applying Scanning phase on Different platforms Exploitation Introduction to Exploits and Payloads Types of Exploits Exploits and Exploitation Evading Antiviruses, IDS and IPS Systems Exploiting fully patched Operating systems Packing and Encoding Backdooring executable Maintain Access Persistence backdoors Maintain persistence on target machine Connect back backdoors Post-Exploitation Extending attack Pivoting Running Scripts for profit and fun on target machine Track Clearance Clearing Tracks on victims machine Automating Clearing Tracks using scripts Metasploit Framework Introduction to Metasploit Framework Basic Exploitation Exploiting Windows Exploiting Linux Autopwning Auxiliary Modules Meterpreter Meterpreter Scripting Railguns Adding DLL's and Functions on Fly Trojans-Bots-Malwares-Viruses Introduction to Trojans-Bots-Malwares-Viruses Writing Custom Malware and Trojans Backdoors Making Persistence Backdoors Installing Backdoors on Target machines Firewall and Anti-virus Evasion Wireless Hacking Introduction to WLAN Hacking Buzz Words Encryption Types Basics of WLAN Hacking From Dummy to virtuoso in Wireless Hacking Web Application Hacking Introduction to Web Application Hacking OWASP TOP 10 Database hacking Server Hacking Client and Server side Hacks Reverse Engineering Introduction to Reverse Engineering Compilation Process Process of Reverse Engineering Uses of Reverse Engineering Tools for Trade Introduction to Intel x86 Data Register Layout Registers Working on Mnemonics Structure Alignment and Structure storage Function Calls Binary Disassembly Basics Reversing Binaries Writing Keygens Analyze malwares Buffer Overflow Introduction to Buffer Overflow Buffer Overflow in Linux and Windows Stack smashing Writing and executing sample shell code snippets Memory management How to smash Canary Guards SSP Static analysis Safe libraries Memory address randomization Exploiting program Performing Sample Penetration Test on the Target Machine Exploit Writing Introduction to Exploit Writing Writing Shell code for windows and Linux Buffer Overflow exploitation Heap Overflows Browser exploitation Bypassing DEP ASLR Format String Attacks Kernel exploitation Advanced Exploitation Scripting and Coding Introduction to scripting Languages Coding Snippets Coding Scripts for automation


Who should attend


students from Students from Computer Science / IT / Electronics, People who are having passion towards Learning of Information Security Education Can Enroll in this course.


Pre-requisites


TCP/IP Concepts Operating Systems Familiar with any one programming Language


What you need to bring


Students are required to bring their own laptops with a minimum 4 GB RAM installed. VMware Workstation / Virtual Box Wired / Wireless Network Support At least 40 GB HD free USB 2 or higher support


Key Takeaways


The course includes Complex labs where students will be provided with Pre-configured Virtual Machines, Entire Course Labs are been hosted in cloud running on different Operating Systems to our students with different set of network configuration. Students need to solve each and every module which is assigned by the instructor and need to submit back to him after the end of the every module. At the end of the course Student will be assigned with target where the student need to solve the task within the allotted time.

Reviews (3) See all Reviews

A

Abhaychandra Bhaskar Chede

Attended Information Security and Hacking

Chaitanya Krishna is a talented professional and having huge knowledge in Penetration testing. The way...

Dev Prasad

Attended Information Security and Hacking

Chaitanya Krishna has in depth knowledge about Information security which he leverages to the students...

S

Swathi

Attended Information Security and Hacking

Mr Chaitanya Krishna is a stupendous instructor to work and Learn with. The immense knowledge he has...

Discussions

Students Interested 5 (Seats Left 0)

₹ 30,000

Post your requirement and let us connect you with best possible matches for Ethical Hacking & Cyber Security Training Post your requirement now
₹ 30,000 Enquire

Enquire

Submit your enquiry for Information Security and Hacking

Please enter valid question or comment

Please enter your name.

Please enter valid Phone Number

Please enter the Pin Code.

By submitting, you agree to our Terms of use and Privacy Policy

Connect With Truescenda

You have reached a limit!

We only allow 20 Tutor contacts under a category. Please send us an email at support@urbanpro.com for contacting more Tutors.

You Already have an UrbanPro Account

Please Login to continue

Please Enter valid Email or Phone Number

Please Enter your Password

Please Enter valid Password or OTP

Forgot Password? Resend OTP OTP Sent

Sorry, we were not able to find a user with that username and password.

We have sent you an OTP to your register email address and registered number. Please enter OTP as Password to continue

Further Information Received

Thank you for providing more information about your requirement. You will hear back soon from the trainer