Course Introduction

FSP 201 : Ethical Hacking & IT Security

  • Course Outline
  • Curriculum
  • FAQ
  • Case Studies
  • Reviews

Ethical Hacking, as the name suggests, is an ethical way of working with technology to find out weaknesses of a system, taking it to the next level for further development. Hacking is never illegal; it is an act of using skills and advanced techniques on a target to gain information about a system and its surroundings, though it depends on the nature of the person who is performing the action. The main focus of the Ethical Hacking and IT Security course is to train the student into an interactive environment where the student will learn the skills of performing vulnerability assessment, pen-testing of systems and networks, patching the weaknesses, making reports of scanned vulnerabilities.


The students will learn all aspects of ethical hacking and information security, which will enhance their skills making them confident in handling situations like zero-day incidence response, data-theft management, incidental data lost, or an Intrusion by the unauthorized. As almost every organization now days has its own website, database servers, which handle and store confidential data related to the future and on-going projects, staff details, customer’s details, member’s login credentials, credit card details, and other sophisticated data. An Information Security Expert is a first Priority personal required for the security of this data.

 

Our detailed course and real-time cutting edge techniques are taught to students by Industry Level Certified Professionals. A virtual environment created for students helps the participant to practice and perform real-time attacks on a virtual simulation network, advanced level penetration testing techniques, privilege escalation techniques that intruders use to penetrate the network.


Expert advice is always required in case of a detected attack, an unauthorized access log, or in a case where expert advice takes the case towards a decision. Advanced skills and real-time practice helps a student to attain a level of confidence to handle these situations easily. Reporting these attacks to a concerned is also a major role of an Information Security Expert nowadays. Our unmatched course layout covers major reporting methods that help students to practice the situation easily.


Modern tools and techniques, Command-line interface tutorials, Linux Operating system tutorials, and required coding skills help participants to become a successful Ethical Hacker. Wireless Communication standards, Wireless Hacking, Exploit Writing skills, Android and iPhone security, Network Security, and other major concepts which are also included in our course to make participants a complete Ethical Hacker.

  • Level I : Ethical Hacking & IT Security

    MODULE 1 – ETHICAL HACKING

    The meaning of the ethical hacking and ethical hacker is used to define the hacking performed by an organization or a person to help in the identification of the threats in a network or electronics. Ethical hackers can undertake an effort to penetrate networks and evade way previous computer securities and examine any points that could be exploited through malicious hackers.

    Introduction to ethical hacking introduces the general principle of hacking, history of hacking, famous hackers, phases of hacking, ethical hacking industry practices, difference between ethical hackers and malicious hackers, and types of hackers.

    MODULE 2 – SCANNING NETWORK

    Network scanning is a procedure for finding information and identifying the attacker, IP address, and so on. The module structure covers the introduction of scanning, introduction of ports and protocols, types of scanning - port scanning, network scanning, and vulnerability scanning. Objective of scanning - detect live systems on network, discover open ports on system, OS detection, service detection, and version detection, obtaining IP from host, obtaining host from IP, discover IP addresses in network, and overview of TCP. The introductory part of scanning tools like – Nmap, Host, NBT scan, Fping, Alive6, Netcat, Vega, and Nessus.

    MODULE 3 – SYSTEM HACKING

    Password hacking is divided into four categories – active online attacks, offline attacks, passive online attacks, and non-technical attacks. System hacking module completely comprises the information at hand before system hacking stage, system hacking - cracking password, window hacking by Ophcrack, window hacking by hiren boot, window hacking by CMD, and Linux hacking.

    MODULE 4 – VIRUSES AND WORMS

    Virus, Trojans, Worms, etc. are part of the malware or malicious software. All these are specially designed to steal, harm, and interrupt the networks. Virus is very harmful to computer and it attached itself and spread from one to another system and infect the systems. Worms are classified as a sub class of virus. In the additional nature, worms spread from system to system without any human actions. Both are malicious programs that self-replicate on systems or through computer networks without any awareness of the user being. Subclasses of malware programs contains - Email-Worm, Net-Worm, IM-Worm, IRC-Worm, P2P-Worm, etc.

    The module will introduce you to the nature of viruses and worms, difference between viruses and worms, key loggers, virus detection methods, virus, and worms countermeasures.

    MODULE 5 – CRYPTOGRAPHY

    Cryptography is a crucial tool for protecting info in systems. This course explains cryptography concepts, types of cryptography, and the algorithms such as symmetric, asymmetric, and hash.

    MODULE 6 – MOBILE HACKING

    This module will introduce you to the mobile hacking methods, call spoofing, message spoofing, hacking codes, and hacking android OS.

    MODULE 7 – STEGANOGRAPHY

    The students will understand the basics of stenography, hiding text behind image, hiding image behind image, hiding video behind image, hiding text behind text, and drive hiding. It also covers the necessary tools of the stenography.

  • Level II : Ethical Hacking & IT Security

    MODULE 1 – ETHICAL HACKING

    The meaning of the ethical hacking and ethical hacker is used to define the hacking performed by an organization or a person to help in the identification of the threats in a network or electronics. Ethical hackers can undertake an effort to penetrate networks and evade way previous computer securities and examine any points that could be exploited through malicious hackers.

    Introduction to ethical hacking introduces the general principle of hacking, history of hacking, famous hackers, phases of hacking, ethical hacking industry practices, difference between ethical hacker and malicious hacker, and types of hackers.

    MODULE 2 – FOOTPRINTING AND RECONNAISSANCE

    Footprinting and reconnaissance is the initial phase and very essential evil that penetration tester used to assess for the IT infrastructure security and indicates the maximum figures about the devices and networks.

    The basics techniques used for footprinting are ping sweep and TCP Scans.

    Module summarizes the footprinting concepts, objectives of footprinting, footprint methodology like- footprint through search engines, finding company’s external and internal URLs, collect location information, people search online services, people search on social networking services, footprinting through job sites, website footprinting, website mirroring tools, extract website information, email footprinting, tracking email communications, collecting information from email header, email tracking tools.

    Apart from this, it also comprises the footprinting using Google, Google hacking techniques, Google advance search operators, Google hacking tools, Google hacking database (GHDB), DNS footprinting, footprinting through social engineering, and footprinting tools such as maltego, DNSEnum, Dmitr, etc.

    MODULE 3 – SCANNING NETWORK

    Network scanning is a procedure for finding information and identifying the attacker, IP address, and so on. The module structure covers the introduction of scanning, introduction of ports and protocols, types of scanning - port scanning, network scanning, and vulnerability scanning. Objective of scanning - detect live systems on network, discover open ports on system, OS detection, service detection, and version detection, obtaining IP from host, obtaining host from IP, discover IP addresses in network, and overview of TCP. The introductory part of scanning tools like – Nmap, Host, NBT scan, Fping, Alive6, Netcat, Vega, and Nessus.

    MODULE 4 – SYSTEM HACKING

    Password hacking is divided into four categories – active online attacks, offline attacks, passive online attacks, and non-technical attacks. System hacking module completely comprises the information at hand before system hacking stage, system hacking - cracking password, window hacking by Ophcrack, window hacking by hiren boot, window hacking by CMD, and Linux hacking.

    MODULE 5 – TROJANS AND BACKDOORS

    Trojans is a program that pretenses as a benevolent application. The main Trojan horses are Data Sending Trojans, Proxy Trojans, Destructive Trojans, Remote Access Trojans, FTP Trojans, security software disabler Trojans, and denial-of-service attack (DoS) Trojans. Backdoor is a way of accessing a program or in the meaning of the entire computer system. It is also known as trapdoor.

    The structure of the module will define you to concepts of Trojans, Trojan creators, indications of a Trojan attack, Trojan infection, Trojan Tools, and the detection methods of Trojan.

    MODULE 6 – VIRUSES AND WORMS

    Virus, Trojans, Worms, etc. are part of the malware or malicious software. All these are specially designed to steal, harm, and interrupt the networks. Virus is very harmful to computer and it attached itself and spread from one to another system and infect the systems. Worms are classified as a sub class of virus. In the additional nature, worms spread from system to system without any human actions. Both are malicious programs that self-replicate on systems or through computer networks without any awareness of the user being. Subclasses of malware programs contain - Email-Worm, Net-Worm, IM-Worm, IRC-Worm, P2P-Worm, etc.

    The module will introduce you to the nature of viruses and worms, difference between viruses and worms, key loggers, virus detection methods, virus, and worms countermeasures.

    MODULE 7 – SESSION HIJACKING

    In the field of application security, session hijacking is a very ancient and repetitive topic. The module will focus on introduction to session hijacking, difference between spoofing and hijacking, steps of session hijacking, types of session hijacking, a brief introduction of TCP, three-way handshake, client-server model - two-tier and three-tier.

    MODULE 8 – SOCIAL ENGINEERING

    It is the resources of the information. The module will comprise the concepts of social engineering, behaviors vulnerable to attacks, factors that make companies vulnerable to attacks, social engineering techniques, types of social engineering such as human-based, system-based and mobile-based.

    MODULE 9 – CRYPTOGRAPHY

    Cryptography is a crucial tool for protecting info in systems. This course explains cryptography concepts, types of cryptography, and the algorithms such as symmetric, asymmetric, and hash.

    MODULE 10 – MOBILE HACKING

    This module will introduce you to the mobile hacking methods, call spoofing, message spoofing, hacking codes, and hacking android OS.

    MODULE 11 – STEGANOGRAPHY

    The students will understand the basics of stenography, hiding text behind image, hiding image behind image, hiding video behind image, hiding text behind text, and drive hiding. It also covers the necessary tools of the stenography.

  • Level III : Ethical Hacking & IT Security

    MODULE 1 – ETHICAL HACKING

    The meaning of the ethical hacking and ethical hacker is used to define the hacking performed by an organization or a person to help in the identification of the threats in a network or electronics. Ethical hackers can undertake an effort to penetrate networks and evade way previous computer securities and examine any points that could be exploited through malicious hackers.

    Introduction to ethical hacking introduces the general principle of hacking, history of hacking, famous hackers, phases of hacking, ethical hacking industry practices, difference between ethical hacker and malicious hacker, and types of hackers.

    MODULE 2 – FOOTPRINTING AND RECONNAISSANCE

    Footprinting and reconnaissance is the initial phase and very essential evil that penetration tester used to assess for the IT infrastructure security and indicates the maximum figures about the devices and networks.

    The basics techniques used for footprinting is ping sweep and TCP Scans.

    Module summarizes the footprinting concepts, objectives of footprinting, footprint methodology like- footprint through search engines, finding company’s external and internal URLs, collect location information, people search online services, people search on social networking services, footprinting through job sites, website footprinting, website mirroring tools, extract website information, email footprinting, tracking email communications, collecting information from email header, email tracking tools.

    Apart from this, it also comprises the footprinting using Google, Google hacking techniques, Google advance search operators, Google hacking tools, Google hacking database (GHDB), DNS footprinting, footprinting through social engineering, and footprinting tools such as maltego, DNSEnum, Dmitr etc.

    MODULE 3 – SCANNING NETWORK

    Network scanning is a procedure for finding information and identifying the attacker, IP address, and so on. The module structure covers the introduction of scanning, the introduction of ports and protocols, types of scanning - port scanning, network scanning, and vulnerability scanning. Objective of scanning - detect live systems on network, discover open ports on system, OS detection, service detection, and version detection, obtaining IP from host, obtaining host from IP, discover IP addresses in network, and overview of TCP. The introductory part of scanning tools likes – Nmap, Host, NBT scan, Fping, Alive6, Netcat, Vega, and Nessus.

    MODULE 4 – ENUMERATION

    First attack on target network is an enumeration. It is a procedure to take all information of the user, user name, machine information, resources of networks, services, etc. In this module, you will be introduced to the enumeration. The fundamentals of the enumeration concepts and techniques are included in this module. You will be introduced to the enumeration, services, and ports to enumerate.

    MODULE 5 – SYSTEM HACKING

    Password hacking is divided into four categories – active online attacks, offline attacks, passive online attacks, and non-technical attacks. System hacking module completely comprises the information at hand before system hacking stage, system hacking - cracking password, window hacking by Ophcrack, window hacking by hiren boot, window hacking by CMD, and Linux hacking.

    MODULE 6 – TROJANS AND BACKDOORS

    Trojans is a programme that pretenses as a benevolent application. The main Trojan horses are Data Sending Trojans, Proxy Trojans, Destructive Trojans, Remote Access Trojans, FTP Trojans, security software disabler Trojans, and denial-of-service attack (DoS) Trojans. Backdoor is a way of accessing a programme or in the meaning of the entire computer system. It is also known as trapdoor.

    The structure of the module will define you to concepts of Trojans, Trojan creators, indications of a Trojan attack, Trojan infection, Trojan Tools, and the detection methods of Trojan.

    MODULE 7 – VIRUSES AND WORMS

    Virus, Trojans, Worms, etc. are part of the malware or malicious software. All these are specially designed to steal, harm, and interrupt the networks. Virus is very harmful to computer and it attached itself and spread from one to another system and infect the systems. Worms are classified as a sub class of viruses. In the additional nature, worms spread from system to system without any human actions. Both are malicious programs that self-replicate on systems or through computer networks without any awareness of the user being. Subclasses of malware programs contain - Email-Worm, Net-Worm, IM-Worm, IRC-Worm, P2P-Worm, etc.

    The module will introduce you to the nature of viruses and worms, difference between viruses and worms, key loggers, virus detection methods, virus, and worms countermeasures.

    MODULE 8 – SNIFFING

    It covers all the aspects of the sniffing such as overview of sniffing, types of sniffing, active and passive, introduction to ARP poisoning, MITM, sniffing tools- ettercap, cain and able and wireshark.

    MODULE 9 – SESSION HIJACKING

    In the field of application security, session hijacking is very ancient and repetitive topic. The module will focus on the introduction to session hijacking, difference between spoofing and hijacking, steps of session hijacking, types of session hijacking, brief introduction of TCP, three-way handshake, client-server model - two-tier and three-tier.

    MODULE 10 – SOCIAL ENGINEERING

    It is the resources of the information. The module will comprise the concepts of social engineering, behaviors vulnerable to attacks, factors that make companies vulnerable to attacks, social engineering techniques, types of social engineering such as human-based, system-based, and mobile-based.

    MODULE 11 – DENIAL OF SERVICE (DOS)

    An attack is an event in which a user or association is deprived of the services of a store they would usually expect to have, is known as Denial of Service (DoS). Module will describe you to the concepts of DoS, Denial of Service attack, symptoms of a DoS attack, Cyber Criminals, and Case Studies.

    MODULE 12 – HACKING WEBSERVER

    Hacking webserver, introduction to web server, introduction to database, and the hacking webserver with Metasploit would be comprised in this module.

    MODULE 13 – STRUCTURED QUERY LANGUAGE INJECTION

    It is a code injection method used to attack the data-driven application in which malware SQL statements are inserted into an entry field for implementation. The module will introduce you to the basics of SQL injection, vulnerability testing for SQL injection, SQL injection cheat sheet, SQL injection tools like SQL MAP and Havij.

    MODULE 14 – HACKING WIRELESS NETWORKS

    Hacking wireless network will describe you to the concepts of the wireless, wireless standards, service set identifier (SSID), Wi-Fi authentication modes, Wi-Fi authentication process using a centralized authentication server, wireless encryption, types of wireless encryption, and its works.

    MODULE 15 – EVADING IDS, FIREWALLS AND HONEYPOT

    The Intrusion detection system (IDS) classifies any doubtful pattern that may show an attack that could co-operation the computer. Module will define you to the concepts of IDS, firewall and honeypot concepts, IDS and their placement, IDS Works, firewall, and the introduction of honeypot.

    MODULE 16 – BUFFER OVERFLOW

    When any programme efforts to store extra data in a buffer than it was intended to hold after that occurs the buffer overflow. It will familiarize you to the basic concepts of buffer overflow, buffer overflow counter-measures, defense against buffer overflows, and prevention of BOF attacks.

    MODULE 17 – CRYPTOGRAPHY

    Cryptography is a crucial tool for protecting info in systems. This course explains cryptography concepts, types of cryptography, and algorithms such as symmetric, asymmetric, and hash.

    MODULE 18 – PENETRATION TESTING

    Penetration testing is a tool to test and evaluate the security and of a system, networks to catch vulnerabilities that an attacker could exploit. The module will comprise the concepts of pen testing, security assessments, security audit, vulnerability assessment, limitations of vulnerability assessment, and types of pen testing like- black-box penetration testing, grey-box penetration testing, and white-box penetration testing.

    MODULE 19 – MOBILE HACKING

    This module will introduce you to the mobile hacking methods, call spoofing, message spoofing, hacking codes, and hacking android OS.

    MODULE 20 – STEGANOGRAPHY

    The students will understand the basics of stenography, hiding text behind an image, hiding image behind image, hiding video behind image, hiding text behind text, and drive hiding. It also covers the necessary tools of the stenography.

  • What is Ethical Hacking & IT Security?

    In the course Ethical Hacking & IT Security, the learners will be guided as to how to deal with the increasing cyber threat and the methods and techniques to cope with them.

  • How can I become a Ethical hacker?

    The learners enrolled in the course are subjected to in-depth content scrutinized by the professionals to give insights into ethical hacking. To be an ethical hacker, the learner should be well aware of the core knowledge of the subject. 

  • What are the responsibilities of an Ethical hacker?

    The ethical hacker works as per the legal reforms and serve for securing the network by figuring out the bugs and fix the same to ensure no foreign invasion of any kind into the system.

  • What are the scope and the opportunistic aspects of the course?

    Other than working in the Crime Laboratory, you can also be appointed as a Crime Scene Investigator in Police Stations or  as an Investigator for the Mobile Forensic Laboratory. You can also be appointed as an Information Security Officer in any of the fields by your technical skills and expertise.

  • Where can I contact in case of any queries?

    You can write to us at education@sifs.in or call us at +91-1147074263 or WhatsApp us +91-7303913002 or +91-7303913003.

Kevin Poulsen

In 1988, at the age of 23, Kevin Poulsen, known online as Dark Dante, hacked into a federal computer network and started poking around in files for the investigation of Filipino President Ferdinand Marcos. It wasn't his first hack, but it was the first time the feds had noticed him. When he found out they were on to him, he went on the run. But like so many hackers, that didn't mean he went offline.

During the 17 months, he was underground, Poulsen hacked FBI files, revealing wiretap details for mobsters, foreign politicians, and the American Civil Liberties Union. He and some hacker friends also took over the phone lines for an L.A. radio station, ensuring they were the winning caller in contests, netting themselves two Porsche sports cars, a couple of Hawaiian vacations, and $20,000 in cash. When the TV show Unsolved Mysteries picked up on Poulsen's story and broadcast a segment about him, mysteriously, as soon as the screen displayed the toll-free number viewers could use to report tips on the case, all the show's phone lines went dead. Still, the episode proved to be his downfall, as Poulsen was apprehended shortly after when the employees of a supermarket recognized him from the show.

During their prosecution, the FBI called Poulsen "The Hannibal Lecter of Computer Crime," scaring the courts enough to warrant holding him without bail for five years in federal prison while the government put their case together.

However, when all was said and done, they could only charge him with lesser crimes like money laundering and wire fraud, dropping some of the more serious hacking charges altogether. He was sentenced to "time served" and released, but was barred from touching a computer for three years.

Since then, Poulsen has become a respected journalist, writing about computer security for Wired Magazine, as well as a few books on the subject, like Kingpin, which comes out in February. He has also used his hacking skills for the forces of good, famously finding 744 registered sex offenders who were using MySpace to troll for underage victims.

Taniya Jaiswal

4

Thankyou SIFS INDIA.. I learned a lot from online course that you provided us... It's a great platform for us to learn.. Thank you so much..I am fortunate that I have enrolled.

Tanisha Saraf

5

The course was very interesting and knowledgeable, helped a lot in knowing new things. The material is very effective and simplified.
Glad to be a part of this course.

Christa Grace Daniel

4

Amazing experience , interesting topics and nice content all over. 

Aditya Arora

4

Thank you SIFS for the opportunity and i am had a very good experience as well. Thank you for this course. I get know experience and knowledge about the different things, uses of the tools, software application and how to prepare a well documented and official reports. It's an amazing and effective time with you.

Kondwani McDavid Malimba

4

Appreciable efforts and course from SIFS. 

 

Instructors

Afreen Tarannum

Afreen Tarannum

Senior Scientific Officer
Dr. Ranjeet Singh

Dr. Ranjeet Singh

Managing Director
Niharika Pagare

Niharika Pagare

Forensic Instructor

Preview this course

Select Course Level
Call for Assistance
7303913002

Ask Your Query

Be a Part of Revolutionized Learning

Our courses acknowledge comprehensive learning through synergistic sessions and also while staying rooted.