Learn Ethical Hacking & Forensic Investigation Mumbai

Get paid to find flaws in Websites & Data Security and get paid handsomely.A unique Course which will give you an exciting and rewarding Career in the field of IT. This course aims to develop knowledge of programming and networking at initial level, so the pre-requisite for the course for Ethical Hacking (CEH) and Computer Hacking Forensic Investigator (CHFI) can be covered.
Security issues are bound to happen, but when they happen, it is important to understand their causes and control them. Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Salaries for Forensic Investigator starts with 6 figures, with experience rather than asking, you can demand the salary.
The tools and techniques covered under our course will prepare the student to understand hacking and conduct computer investigations using groundbreaking digital technologies.
  • A. Introduction to C Programming
  • B. Introduction to the Course
  • C. Overview to C Programming
    1. Why use C?
    2. Uses of C
    3. A Brief History of C
    4. C for Personal Computers
  • D. Running C Programs
    1. The Edit-Compile-Link-Execute Process
    2. Using Microsoft C
    3. A Brief History of C
    4. Unix systems
  • E. Structure of C Programs
    1. C's Character Set
    2. The form of a C Program
    3. The layout of C Programs
    4. Pre-processor Directives Unix systems
  • F. Your First Program
    1. Add Comments to a Program
  • G. Data Types
    1. Integer Number Variables
    2. Decimal Number Variables
    3. Character Variables
    4. Assignment Statement
    5. Arithmetic Ordering
    6. Something To Declare
    7. More On Initialising Variables
  • H. Input and Output Functions
    1. On The Run
    2. Input and Output Functions in More Detail
    3. The % Format Specifiers
    4. Formatting Your Output
    5. Custom Libraries
    6. Summing It Up
  • I. Conditional Execution
    1. Program Control
    2. Logical Expressions
    3. True and False in C
    4. Using break and continue Within Loops
  • J. Structure and Nesting
    1. Think of a number
  • K. Functions and Prototypes
    1. Functions - C's Building Blocks
    2. Functions and Local Variables
    3. Making The Connections
    4. Functions and Prototypes
    5. What is ANSI C?
    6. The Standard Library Functions
    7. Throwing The Dice
  • L. Data Types Part II
    1. Global variables
    2. Constant Data Types
  • M. Arrays
    1. Advanced Data Types
    2. In Dis-array
  • N. Pointers
    1. Point to Point
    2. Swap Shop
    3. Pointers And Arrays
  • O. Strings
    1. Stringing Along
    2. As easy as... B or C?
    3. A Sort Of Bubble Program
  • P. Structures
    1. Structures
    2. Defining A New Type
    3. Structures and Functions
    4. Pointers to Structures
    5. Malloc
    6. Structures and Linked Lists
    7. Structures and C++
    8. Header Files
  • Q. File Handling
    1. The Stream File
    2. Text File Functions
    3. Binary File Functions
    4. File System Functions
    5. Command Line Parameters
  • R. C's Standard Libraries
  • Unit 1: Introduction to Networking
    • Overview
    • Objectives
    • Introduction
    • Networking Connectivity
    • Network Extension
    • Network Topologies
    • Protocols
    • Programs and Processes
    • Protocol Layering Concepts
    • Encapsulation and Decapsulation
    • Summary
    • Assessments
  • Unit 2: The OSI Model Layers 1 - 4
    • Overview
    • Objectives
    • Introduction
    • The Physical Layer
    • The Data Link Layer
    • The Network Layer
    • The Transport Layer
    • Summary
    • Assessments
  • Unit 3: The OSI Model Layers 5 - 7
    • Overview
    • Objectives
    • Introduction
    • The Session Layer
    • The Presentation Layer
    • The Application Layer
    • The Transport Layer
    • Summary
    • Assessments
  • Unit 4: LAN Architecture
    • Overview
    • Objectives
    • Introduction
    • History of LANs
    • Transmission Methods and Media
    • LAN Protocols Introduction
    • Ethernet
    • Token Ring
    • Token Bus
    • Fiber Distributed Data Interface (FDDI)
    • Wireless LANs
    • LAN Protocols
    • Summary
    • Assessments
  • Unit 5: Computing Platforms
    • Overview
    • Objectives
    • Introduction
    • Personal Computers
    • Workstations
    • Midrange Computers
    • Mainframe ComputersEthernet
    • Summary
    • Assessments
  • Unit 6: Network Operating Systems
    • Overview
    • Objectives
    • Introduction
    • The Client/Server Model
    • Remote Procedure Call (RPC)
    • PC LAN Architectures and the OSI Model
    • Network Operating System
    • Xerox Network Systems (XNS) and the OSI Model
    • Novell NetWare and the OSI Model
    • AppleTalk and the OSI Model
    • Banyan Vines and the OSI Model
    • IBM PC LANs and the OSI Model
    • Windows NT and the OSI Model
    • UNIX and the OSI Model
    • LANtastic and the OSI Model
    • Summary
    • Assessments
  • Unit 7: System Architectures
    • Overview
    • Objectives
    • Introduction
    • TCP/IP Naming and Addressing
    • TCP/IP Applications and Application Services
    • TCP/IP Protocol Details
    • System Architectures
    • Summary
    • Assessments
  • Unit 8: Internetworking
    • Overview
    • Objectives
    • Introduction
    • Relays and Repeaters
    • Bridges
    • Routers
    • Gateways
    • Hubs
    • Switches
    • Network Management and SNMP
    • Summary
    • Assessments
  • Unit 9: Telecommunications Overview
    • Overview
    • Objectives
    • Introduction
    • Sample Telecommunications Services and Components
    • WAN Link Options
    • Summary
    • Assessments
  • Unit 10: Summary — Network Case Study
    • Overview
    • Objectives
    • Introduction
    • Network Case Study
    • Summary
    • Assessments
  1. Key issues plaguing the information security world, incident management process, and penetration testing.
  2. Various types of footprinting, footprinting tools, and countermeasures.
  3. Network scanning techniques and scanning countermeasures.
  4. Enumeration techniques and enumeration countermeasures.
  5. System hacking methodology, steganography, steganalysis attacks, and covering tracks.
  6. Different types of Trojans, Trojan analysis, and Trojan countermeasures.
  7. Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures.
  8. Packet sniffing techniques and how to defend against sniffing.
  9. Social Engineering techniques, identify theft, and social engineering countermeasures.
  10. DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures.
  11. Session hijacking techniques and countermeasures.
  12. Different types of webserver attacks, attack methodology, and countermeasures.
  13. Different types of web application attacks, web application hacking methodology, and countermeasures
  14. SQL injection attacks and injection detection tools.
  15. Wireless Encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
  16. Mobile platform attack vector, android vulnerabilities, mobile security guidelines, and tools.
  17. Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures.
  18. Various cloud computing concepts, threats, attacks, and security techniques and tools.
  19. Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
  20. Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
  21. Perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
  22. Different threats to IOT platforms and learn how to defend IoT devices securely.
  1. Perform incident response and forensics
  2. Perform electronic evidence collections
  3. Perform digital forensic acquisitions
  4. Perform bit-stream Imaging/acquiring of the digital media seized during the process of investigation.
  5. Examine and analyze text, graphics, multimedia, and digital images
  6. Conduct thorough examinations of computer hard disk drives, and other electronic data storage media
  7. Recover information and electronic data from computer hard drives and other data storage devices
  8. Follow strict data and evidence handling procedures
  9. Maintain audit trail (i.e., chain of custody) and evidence integrity
  10. Work on technical examination, analysis and reporting of computer-based evidence
  11. Prepare and maintain case files
  12. Utilize forensic tools and investigative methods to find electronic data, including Internet use history, word processing documents, images and other files
  13. Gather volatile and non-volatile information from Windows, MAC and Linux
  14. Recover deleted files and partitions in Windows, Mac OS X, and Linux
  15. Perform keyword searches including using target words or phrases
  16. Investigate events for evidence of insider threats or attacks
  17. Support the generation of incident reports and other collateral
  18. Investigate and analyze all response activities related to cyber incidents
  19. Plan, coordinate and direct recovery activities and incident analysis tasks
  20. Examine all available information and supporting evidence or artefacts related to an incident or event
  21. Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents
  22. Conduct reverse engineering for known and suspected malware files
  23. Perform detailed evaluation of the data and any evidence of activity in order to analyze the full circumstances and implications of the event
  24. Identify data, images and/or activity which may be the target of an internal investigation
  25. Establish threat intelligence and key learning points to support pro-active profiling and scenario modelling
  26. Search file slack space where PC type technologies are employed
  27. File MAC times (Modified, Accessed, and Create dates and times) as evidence of access and event sequences
  28. Examine file type and file header information
  29. Review e-mail communications including web mail and Internet Instant Messaging programs
  30. Examine the Internet browsing history
  31. Generate reports which detail the approach, and an audit trail which documents actions taken to support the integrity of the internal investigation process
  32. Recover active, system and hidden files with date/time stamp information
  33. Crack (or attempt to crack) password protected files
  34. Perform anti-forensics detection
  35. Maintain awareness and follow laboratory evidence handling, evidence examination, laboratory safety, and laboratory security policy and procedures
  36. Play a role of first responder by securing and evaluating a cybercrime scene, conducting preliminary interviews, documenting crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence, reporting of the crime scene
  37. Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
  38. Apply advanced forensic tools and techniques for attack reconstruction
  39. Perform fundamental forensic activities and form a base for advanced forensics
  40. Identify and check the possible source/incident origin
  41. Perform event co-relation
  42. Extract and analyze logs from various devices such as proxies, firewalls, IPSes, IDSes, Desktops, laptops, servers, SIM tools, routers, switches, AD servers, DHCP servers, Access Control Systems, etc.
  43. Ensure that reported incident or suspected weaknesses, malfunctions and deviations are handled with confidentiality
  44. Assist in the preparation of search and seizure warrants, court orders, and subpoenas
  45. Provide expert witness testimony in support of forensic examinations conducted by the examiner