O'Reilly logo
live online training icon Live Online training

Ethical Hacking and Information Security

Get started with ethical hacking and begin your journey in Cyber Security

Rizwan Shaikh

This live course is the comprehensive, practically-oriented, hands-on Ethical Hacking and Information Security training program, which covers entire aspects of defense and attacks in the Cyber World. This training course covers 3 pillars of IT Security, which are as follows - Network Security, Email Security, and Web Security. For every topic in this course, it starts from basics and goes to advanced. Every topic has detailed methodology in which the hack attack is displayed & taught practically, after which the countermeasure and investigation part of the same is revealed.

What you'll learn-and how you can apply it

  • Know the do’s & don’ts of computer security
  • Learn how hackers gather information on their target before hacking
  • Learn how globally IP addresses are allocated
  • Know how to use 3rd party hacking softwares
  • Be able to secure yourself online
  • Understand the workings of Domain & DNS
  • Learn how to stay anonymous
  • Learn how to send spoof emails and identify the same
  • Be able to create small malwares
  • Learn to break passwords and countermeasures
  • Learn the basics of Web Security
  • Use Google more efficiently
  • Know how to hack mobile phones and protect them
  • Know Indian Cyber Law

This training course is for you because...

This course is for beginners who are interested in cybersecurity as well as professionals such as security experts, system administrators, and IT professionals who want to make their systems secure and become an Ethical Hacker.

Prerequisites

  • Basic Computer and Internet Knowledge

Required Hardware & Softwares:

  • Decent configuration Laptop / Desktop
  • Windows OS (Windows 7 preferred)
  • Virtualbox with Kali Linux OS (optional)
  • Nmap, cPorts, BruteForcer, etc.

About your instructor

  • The session will be conducted by Asia's renowned Ethical Hacker, Information Security Researcher and Cyber Crime Consultant - Mr. Rizwan Shaikh. He is one of India's renowned Ethical Hacker, Information Security Researcher, and Cyber Crime Consultant actively involved in providing Ethical Hacking and Information Security training & services. He is the Founder & CTO of Pristine InfoSolutions and has trained over 20,000 individuals in Colleges, Corporates, and Government Departments. He has been featured in various print media and TV news channels to impart expertise on the issues of cybersecurity.

Schedule

The timeframes are only estimates and may vary according to how the class is progressing

DAY 1

Section 1: Computer Security - Basics (15 min)

  • Introductions
  • Types of Hacker
  • Common Keywords
  • File Securing Techniques

Lab 1: Using CMD and ASCII (10 min)

  • Create folder, make it nameless and iconless using ASCII character
  • Using attrib command to hide

Section 2: Network Security (30 min)

  • IANA, Allotment of IP Address
  • IPv4 and IPv6
  • Foot-Printing
  • Ping and Ping Sweep
  • Nmap tool
  • Cyber Crime Investigation method

Lab 2: Foot-Printing (25 min)

  • Creating free IP logging website and reviewing the log
  • Installing Nmap
  • Information Gathering

Break (10 mins)

Section 3: Port Scanning (15 min)

  • Types of Ports
  • Virtual Port numbers
  • Detecting open Ports

Section 4: Malware (30 min)

  • Types of Malwares
  • Trojan
  • Virus & bat file scripting
  • Keyloggers
  • Countermeasures

Lab 3: Scripting & testing (10 min)

  • Creating harmful batch file script
  • Testing Malware online

Break (15 mins)

Section 5: Domain Name & DNS (30 min)

  • ICANN & Top Level Domain
  • Lifecycle of gTLD
  • Domain and Hosting Panels

Section 6: Identity Attacks (30 min)

  • Introduction
  • Staying Anonymous
  • Web Proxy
  • Proxy Bouncing
  • Tow Browser
  • Deep Web

Lab 4: Anonymity (15 min)

  • Proxy Bouncing Task

Q&A (5 mins)

DAY 2

Section 7: Email Security (25 min)

  • Types of Email ID
  • Email Protocols
  • Email Spoofing
  • Email Headers
  • Domain and IP Blacklisting
  • Finding details of recipient

Lab 5: Email investigation (25 min)

  • Send spoof email
  • Review email header
  • Use mail tracker

Section 8: Password Cracking & Prevention (30 min)

  • Stealing & Cracking
  • BruteForce attack
  • Introduction to Kali Linux
  • Countermeasures

Break (10 mins)

Section 9: Website hacking (30 min)

  • Ways to hack a website
  • Using Google Dorks
  • Finding Admin Panel of website
  • SQL Injection basics

Lab 6: Hacking live website (20 min)

  • Using Google Dorks and performing SQL Injection

Break (10 mins)

Section 10: Mobile Security (15 min)

  • Introduction
  • Mobile Malware
  • Case study

Section 11: Cyber Crime Cases and Reporting (35 min)

  • 419 scam
  • Spamming email ID
  • Phishing websites
  • Inappropriate content on website
  • Fake profiles
  • Introduction to Cyber Law

Section 12: Blogs and Monetization (20 min)

  • SEO basics
  • Social Media Branding

Q&A (20 mins)