Learn Hacking
Jodo Certified IT Security Associate - JCSA - Course Detail
Fee Detail Course Schedule Course Detail
LEVEL 1: Network and System Admin Expert
A key way attackers gain access to a company's resources is through a network connected to the Internet. A company wants to try to prevent as many attacks as possible; but in cases where it cannot prevent an attack, it must detect it in a timely manner. Therefore, an understanding of how networks and the related protocols like TCP/IP work is critical to being able to analyze network traffic and determine hostile traffic. It is just as important to know how to protect against these attacks using devices such as routers and firewalls. These essentials, and more, will be covered to provide a firm foundation for the consecutive days training. Prerequisite of Level 1: Candidates should have sound understanding about Computers and internetwork needs. Recommended for Final year Btech student or pass out, Graduates who want to may career in Information Security.
Course content:
1. Network Fundamentals
2. TCP/IP and IP addressing
3. Router and switch Configuration.
4. Routing Protocols.
5. IPV6 implementation
6. Access list.
7. Wireless Networking.
8. Firewall security concept.
9. Types of Firewall
10. Port Filtering
11. System admin of Windows 2003 and 2008 Server.
12. System admin of Linux O/S
Course duration of Level 1 : 70 Hours
LEVEL 2: Desktop and Server O/S Security
Prerequisite of Level 2: Should have undergone Level 1 training or equivalent knowledge of CCNA training .Recommended for Final year Btech student or pass out, Graduates who want to may career in Information Security.
(1) Windows O/S Security
Windows is the most widely-used and hacked operating system on the planet, and Internet Explorer is every hacker's "favorite" browser. The simple days of Windows 98 desktops and Windows NT 4.0 domains are long gone, replaced by the complexities of Active Directory, Group Policy, PKI, BitLocker, etc. This section will help you to quickly master the world of Windows security while showing you the tools you can use to simplify and automate your work. You will complete the day with a solid grounding in Windows security, including the important new features in Windows 2003, 2008, Vista, Windows 7.
a. The O/S Security Infrastructure.
b. Permissions and User Rights
c. Security Policies and templates.
d. Service packs, patches and Backup
e. Securing Network Services
f. Auditing and automation.
(2)Linux O/S Security:
Based on industry consensus standards, this course provides step-by-step guidance on improving the security of any Linux system. The course combines practical "how to" instructions with background information for Linux beginners and security advice and "best practices" for administrators of all levels of expertise.
a. Linux O/S security.
b. Linux Security Tools
c. Maintain, Monitoring and Auditing Linux.
Course duration of Level 2 : 50 Hours
LEVEL 3: Network Penetration Testing and Ethical hacking
Find Security Flaws before the Bad Guys Do
Security vulnerabilities, such as weak configurations, unpatched systems, and botched architectures, continue to plague organizations. Enterprises need people who can find these flaws in a professional manner to help eradicate them from our infrastructures. Lots of people claim to have penetration testing, ethical hacking, and security assessment skills, but precious few can apply these skills in a methodical regimen of professional testing to help make an organization more secure. This class covers the ingredients for successful network penetration testing to help attendees improve their enterprise's security stance.
We address detailed pre-test planning, including setting up an effective penetration testing infrastructure and establishing ground rules with the target organization to avoid surprises and misunderstanding. Then, we discuss a time-tested methodology for penetration and ethical hacking across the network, evaluating the security of network services and the operating systems behind them.
Attendees will learn how to perform detailed reconnaissance, learning about a target's infrastructure by mining blogs, search engines, and social networking sites. We'll then turn our attention to scanning, experimenting with numerous tools in hands-on exercises. Our exploitation phase will include the use of exploitation frameworks, stand-alone exploits, and other valuable tactics, all with hands-on exercises in our lab environment.
Prerequisite of Level 3: Should have undergone Level 1and Level 3 training or equivalent knowledge of CCNA , MCSE security, Linux security training .Recommended for Final year Btech student or pass out, Graduates who want to may career in Information Security.
Course duration of Level 3 : 80 Hours
1. Introduction to Ethical Hacking
2. Hacking Laws
3. Foot printing
4. Scanning
5. Google hacking
6. Email Hacking
7. Enumeration
8. System Hacking
9. Trojans and Backdoors
10. Virus and worms
11. Sniffers
12. Social Engineering
13. Phishing and Identify Theft
14. Denial of Service Attacks
15. Session Hijacking
16. Hacking Web Servers
17. Web Application Vulnerabilities
18. Web-based Password Cracking Techniques
19. SQL Injection
20. Hacking Wireless Networks
21. Physical Security
22. Linux Hacking
23. Evading IDS, Firewalls, and Honeypots
24. Buffer Overflows
25. Cryptography
26. Penetration Testing
27. Computer Forensics
28. Cyber Crime
29. Case studies and Trainers Secrets
30. Hackers Meet.
JCSA Special topics
1. Hacking Routers and Firewall
2. Hacking Mobile phones and PDA
3. Bluetooth Hacking
4. Hacking USB Devices
5. Securing Laptops
6. Credit Card Fraud
7. Yahoo booters
8. Crawlers
9. Remote File Inclusion
10. Local File Inclusion
11. Backdoor Shells
12. Trojan Writing in C, C++
13. PHP Injection
by: Mohit Yadav --JODO INSTITUTE ---9891773445
Your College Life Will Be Your Backbone Trading The Right Way With Options University University Life Means More Challenges And More Fun Ways to make the college dorm life exciting University Admissions and tuition dilemma for students Learn The Various Aspects Of Smss Let's Learn How To Make A Pinata Helpful Ways To Learn Spanish 10 Funny T Shirt Sayings For College Students Breast Enhancement - Examine A Number Of Possibilities What Leadership Lessons Can Be Learnt From Today's Modern Leaders? Obama Scholarships for Moms: Money to Attend College kenyon college