Skip to content

Hacking and Cyber Security Training #Chennai

Photo of Brisk Infosec
Hosted By
Brisk I.
Hacking and Cyber Security Training #Chennai

Details

Brisk Information Security Expert:

This course we will explore the foundations of Information security and Ethical Hacking. We will consider important software/Network/Mobile vulnerabilities and attacks that exploit them -- such as Windows hacking, virus,botnet, ssl attacks, SQL injection, Cross site scripting and cyber forensics -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. Importantly, we take a "build security in" mentality, considering techniques at each phase of the development and testing life cycle that can be used to strengthen the security of digital asserts.

About the Course- Register free pass (http://bise.eventbrite.com)

Hacking is everywhere: in laptops and desktops, mobile phones, the power grid ... even our cars and thermostats. Software is increasingly the vehicle that drives our economy and our personal lives. But software’s pervasiveness, and its importance, make it a target: at the root of many security compromises is vulnerable software and applications.

In this course we will look at how to build and test software /Network/Mobile/Pc that is secure.To start, we must know what we are up against. As such, we will examine the most prevalent software design and implementation defects.

We will examine vulnerabilities like buffer overruns and use-after-frees that are present in programs written in low-level programming languages like C and C++, and see how these vulnerabilities can be exploited by a clever attacker. We will also look attacks on applications that are part of the worldwide web -- attacks with names like SQL injection, cross-site scripting, and session hijacking. We will also mention side-channel attacks (such as those based on the size of messages or the time taken to process a request), attacks on the human user (like phishing), and failures of design (like the use of insecure defaults). Examples of these attacks will be taken from the headlines.

Having examined these defects and their role in security compromises, we will look at how to prevent them entirely, or mitigate their effects, by improving the software's design and implementation. We will see that security must appear at all phases in the development lifecycle, including requirements development, system design, implementation, and testing/validation.

Finally, we will look at state-of-the-art tools and techniques for testing and otherwise verifying that software is secure. We will consider how security testing differs from functional testing (it's harder!). We will look at the art of penetration testing, which is the activity of trying to find and exploit weaknesses in a system prior to its deployment. We will also look at an emerging class of program analysis tools that can automatically identify flaws in programs by analyzing their code.

At the conclusion of the course, the student will know how to "build security in" rather than consider it as an afterthought, and will have a plethora of skills, applicable at each phase of the development life cycle, that can be used to strengthen the security of software systems. At end of the course everyone came to know as how to think like a hacker.

Course Syllabus (http://briskinfosec.com/include/BRISk%20info%20sec%20Broucher.pdf)

In addition to a brief introductory sequence, the course is broken into six units, one per week:

Domain 1 - Way for Ethical Hacking

Basics of Information security, Kali Linux, Networking basics, Information gathering, Google hacking System security,

Domain 2 - Windows hacking

virus, Botnets, Malwares, Trojan,Penetration testing, presenting an overview of goals, techniques, and tools of the trade

Domain 3 - Network security

Sniffing, LAN Attacks, WAN Attacks, Wireless attacks, Firewall, IDS/IPS, Honeypots, Secure design principles

Domain 4 - Web security

covering OWASP, attacks like SQL injection, Cross-site scripting (XSS), and Session hijacking, and defenses that have in common the idea of input validation

Domain 5 - Mobile Security

covering ideas like threat modeling and security design principles, including the threads for smart phones and smart phone hacking.

Domain 6 - Cyber Forensics and Investigation

presenting foundations and tradeoffs and forensics methods and principles with proper demo.

Recommended Background

Roughly: A First-year undergraduate / Diploma.

In detail, we expect

Eager to Hacking and Learning Good Exposure on any client side and server side languages

We also expect familiarity with the following (though we will do some review):

Unix/Linux (basic commands using the shell, and basic tools like gcc)the WWW and basic networking concepts (TCP, HTTP, HTML)Willing to learn Linu

Syllabus and Training Methods:

• We know what people want. That is why we classified our course into two main categories and they are as follows,

• Syllabus has been designed based on CEH (https://www.eccouncil.org/portals/0/Images/CEH-brochure.pdf) and OSCP (http://www.offensive-security.com/documentation/penetration-testing-with-backtrack.pdf) certification

• Penetration Testers will be taking care of entire training

• Brief theory delivered in lecture-style with examples.

• Interactive demonstrations of key techniques.

• Exclusive Hands-on hacking with minimum 200+ Practical hacking attacks.

• Conducting International certificate on-line examFull hands on Windows, Back-track and Kali Operating System.

Course Details:

Duration : 48 hours

Total Days : 6 days (8hrs per day)

Tool kits : Text book + 4 DVD +Online Exam + Placement Assistance

Batch Type : Weekend batches (Saturday & Sunday)

Sheduled dates: 7,8,14,15,21,22 February 2015

BISE Fees : Rs 20000/- only

Special Discount for early Bird registration = 10%

Attractive discounts applicable for group registration 3+ = 25%

BISE Fees after Discount : Rs 18000/- Only single registration

BISE Fees after Discount : Rs 15000/- Per head for group registration

FAQ

Are there ID requirements or an age limit to enter the event?

2 Passport size photos and one Goverment approved ID card xerox to Initiate registration process.

What resources will I need for this class?

You will need a computer with a suitably wifi enabled with the capacity of loading linux. To do the three labs, you will need to run a Linux distribution in a (freely available) virtual machine (VM). You will have to download VM images that we provide and install them.

What is the coolest thing I'll learn if I take this class?

There are too many to count! You will learn about state-of-the-art attacks and how they work. You will also learn about state of the art automation, like fuzz testing, that can find vulnerabilities automatically.

What background is expected for learners in this class?

BISE course is targeted at those on the front lines of security, who are now, or will, develop software that could be subject to attack (which, in the end, is most software!). Therefore, we assume a technical background, with programming proficiency in C, and some knowledge of things like the web, networking, and Linux.

Where can I contact the organizer with any questions?

If you have any questions you can call the Mr.Thomas - 09962208446 or write email to contact@briskinfosec.com

Photo of Chennai Information Security & Hackers Hat Meetup group
Chennai Information Security & Hackers Hat Meetup
See more events
BriskInfoSec
No.54, First Floor, Vadagaram, Nelson Manikam Road, Choolaimedu, Landmark : Baroda Bank · Chennai