Winter Training on !
Information Security and !
Cyber Forensics
MISSION
Our objective is to provide web security to every user of the internet. We want to ensure that confidential information stored in websites remains confidential; that
people who prey on unsecured web pages are captured in our “web security cages”; and that
every patron of the internet can use the web freely, without the nagging thought that his data
could easily fall into the wrong hands and be abused.
VISION
We envisage a world wide web devoid of the flaws of porous internet security. This, we will accomplish by strengthening our clients’ websites, and also by disseminating
instructions to students through our workshops. We want to provide services that make the
internet a virtual utopia – a place where knowledge is nestled in a package that is beautiful
yet strong, and where that knowledge is completely safe from prying eyes and devious
hackers.
WHY LUCIDEUS TRAINING ?
Our objective at Lucideus is to arm students and corporations with the skill set necessary to
enjoy on a continuous basis a secure web experience. Our trainers are well experienced in
conducting workshops designed to achieve this very objective. We have travelled across
hundreds of institutions, teaching our trade to thousands of students. We have exposed to
them the frailties of websites they visit regularly. We have shown them how vulnerable their
confidential information is without safety measures. In the process, we may have scared
them a little, but have made everyone aware of the lurking threats and armed everyone with
the necessary knowledge to effectively neutralize those threats. Without intricate and
confounding pedagogy, in a user friendly and engaging style, you will learn how you can
plug the loopholes and browse the web fearlessly and confidently.
Our experienced web-security trainers actively participate in our field support, web security
consulting and solution implementation. This brings real-life experience to the classroom
environment.
Our Associations /Affiliations
Lucideus is a registered Private Limited company [CIN #
U72200WB2012PTC181708] with associations with
numerous global organizations, including the likes of TEDx,
TiE, IEEE, ACM and ChaT, among many others. Our team
comprises trainers with the experience of more than 15000
training hours under their belts. These hours have been spent
teaching the nuances of information security to about 20,000
students in more than 200 colleges globally.
The set of skills possessed by the Lucideus Team has also
come to the aid of many law enforcement agencies. Agents
belonging to CID, STF, CBI and KP have been trained
extensively by our crew. Thus, we have imparted to them
some of the know how required to solve both cyber and noncyber crimes.
Our Trainers :
Vidit Baxi!
Saket Modi
Rahul Tyagi
Aman Sachdev
Contents Of The Course
Session
Module
Duration
(in hours)
Cyber Ethics
1
 
 
 
 
Importance of the Information Security
Introduction to the Hackers and Hacking Terminologies
Communities and Types of the Hackers
Conclusion
2.0
Basics Of Web Technology
 
 
2
 
 
Introduction
Network Terminologies
 
IP Addressing
 
Ports
 
Proxy Servers
 
Virtual Private Networks
 
NAT Web Application Terminologies
 
HTML Basics
 
PHP Basics
Conclusion 2.0
Contents Of The Course
Session
Module
Duration
(in hours)
Information Gathering
3
 
 
 
 
 
 
 
WHOIS information Info Gathering using Tools and Search Engines
Info Gathering using Meta tags & Words
People Search
Website Scanner
E-Spiders
Web Archive
1.0
E-Mail Attacks and Security
4
 
 
 
 
 
Creating Fake Pages
Social Engineering Techniques
IDN homograph attack
Sending Fake Mails
Identifying and Tracing the Fake Emails
2.0
Contents Of The Course
Session
Module
Duration
(in hours)
Trojans and Backdoors
5
 
 
 
 
 
 
 
Introduction to the Virus, Worms & Trojans
Trojan Creation
Evading Anti-Viruses
Reverse Connection of Trojan Servers
Identify Trojans in the system
Removing Trojans
Analysis of Trojans/Virus
4.0
Reverse Engineering & Buffer Overflow
6
 
 
 
 
Understanding the architecture of an executable file
Learning how to debug a file
Cracking a live application to make a 14 day trial period
to a lifetime validity product Basic understanding of the assembly language
6.0
Contents Of The Course
Session
Module
Duration
(in hours)
Web Application Attacks
7
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Introduction to the Web Architecture
Security Misconceptions
Web Application Vulnerabilities SQL Basics
Types of SQL Injection
Authentication Bypass Vulnerability
Union Based Injection
Error Based Injection
Blind Injection – Union Based
Blind Injection – Error Based
Code Execution Vulnerability
Cross Site Scripting Vulnerability
Cross Frame Scripting Vulnerability
Cross Site Reference Forgery Session Hijacking attacks
Testing the Web Application Firewalls
WAF Evasion
Types of Control Panels Uploading Control Panel Analyzing the logs
Log filtration
11.0
Contents Of The Course
Session
Module
Duration
(in hours)
Google Dorks
8
 
 
 
 
Using Google as hacking tool
Advanced operators of Google and Google Dorks
Finding Vulnerable websites using Google
Finding Target networks using Google
2.0
Mobile, VoIP Hacking and Security
9
 
 
 
 
 
 
SMS & SMSC Introduction
SMS forging & Countermeasures
Sending & Tracking Fake SMS
VoIP Introduction
Installing VoIP Server
Live CALL FORGING using VoIP
1.0
Contents Of The Course
Session
Module
Linux Basics and Introduction
to BackTrack Operating System
10
Duration
(in hours)
2.0
Information Gathering Using
Linux
11
 
 
 
 
 
DNS Enumeration.
Email Searches.
Who is info.
Route Mapping.
Trace Routing.
1.0
Contents Of The Course
Session
Module
Duration
(in hours)
Metasploit Frameworks System
12
 
 
 
 
 
 
 
 
Introduction to the Metasploit Framework
Architecture of Metasploit Framework
Basic Terminologies
Exploitation Techniques
Identifying Vulnerability and Exploits
Exploitation on different platforms
Evading the Firewall & Antivirus
Scripting
4.0
Wireless Hacking
13
 
 
 
 
Introduction to the Wireless Technologies
Types of Authentication
Different Types of Attacks
Cracking WEP and WPA Encryption
2.0
Contents Of The Course
Session
Module
Duration
(in hours)
Cyber Crime Investigation
14
  Understanding the what the Cyber Criminals work
  Case studies of some real life cyber crime cases solved
by Lucideus
  Steps to carry our Facebook and Gmail Forensics with
the Cyber Crime angle
1.0
Securing Yourself and Exam
15
 
 
Top counter measures to take against the hackers
A practical Examination for your certification
Total Duration of The Course
1.0
42.0
Certification Process
At the end of every training batch, Lucideus will conduct a test. The test will eschew the
traditional components of examinations, abandoning pen and paper for a more practical
assessment of what the students were just taught in the entire month.
You get a Lucideus Certified Cyber Security Analyst (LCCSA) Certificate only if you score
more than 80% in the final examination, otherwise you get a participation certificate.
Plus, we refund the entire training fee to the student who scores 100% in our final exam.
In Addition…
E-Certification
  In keeping up with our notion that all global transactions, business or educational, are
shifting into virtual space, Lucideus becomes the first company in India to provide eCertificates. Every participant of the training session will be awarded a certificate, declaring
that he/she has participated/has successfully completed the course requirements for
Lucideus Certified Cyber Security Analyst ( LCCSA ).
Lucideus Cyber Ninja Toolkit (LCNT)
  Although everything we teach our students is contained in the virtual world, we also
provide participants with tangible things that they can take away with them. At the close
of the training session, we gift each student a Take Away Kit containing more than 400
extra hours of course content on Ethical Hacking along with presentations, video tutorials,
tools, scripts, note files, cheat sheets, white papers, etc.
Batches..
Duration
Starts On
Ends On
One Month (42 Hours)
18th November
17th December
One Month (42 Hours)
2nd December 31st December
One Month (42 Hours)
30th December
28th January
To Register
Now
Lucideus has Successfully Conducted it’s training Sessions at …
 
Indian Institute of Technology, Delhi ( IIT-D )
 
Indian Institute of Technology, Bombay ( IIT-B )
 
Indian Institute of Technology, Guwahati ( IIT-G )
 
Indian Institute of Technology, BHU ( IIT-BHU )
 
Indian Institute of Technology, Gandhinagar ( IIT-GN )
 
Indian Institute of Technology, Mandi ( IIT-MD )
 
National Institute of Technology, Allahbad ( NIT – Allahbad )
 
National Institute of Technology, Agartala ( NIT – Agartala )
 
National Institute of Technology, Silchar ( NIT – Silchar )
 
National Institute of Technology, Jaipur ( MNIT – Jaipur )
 
HBTI, Kanpur
 
VSSUT, Burla
Lucideus has Successfully Conducted it’s training Sessions at …
 
Jadavpur University
 
CUSAT, Cochin, Kerela
 
MET, Nashik
 
OP Jindal Institute of Technology, Raigarh
 
Aditya Engineering College, Kakinada
 
K L University, Vijaywada
 
West Bengal Institute of Technology, Kolkata
 
 
 
Yagvalikya Institute of Technology, Jaipur
 
Asansole Engineering College, Asansole
 
Godavri Institute of Engineering and Technology, Jyothi Engineering College, Trissur
Poornima College, Jaipur
Lucideus has Successfully Conducted it’s training Sessions at …
Khalsa College of Engineering and Technology, Amritsar!
  Apex College, Bhubaneswar
 
 
Vivekananda Institute of Technology, Jaipur
St. Joseph College of Engineering and Technology, Palai!
  Jalpaiguri Government Engineering College
  Sagar Institute of Technology and Management, Lucknow
 
 
Gandhi Institute of Technology and Management, Bhubaneswar
 
Indira Gandhi Institute of Technology, Delhi
 
Techno India College, Kolkata
 
Gulzar Group of Institutes, Khanna
 
KN Modi Institute of Engineering, Ghaziabad
 
IMS Engineering College, Ghaziabad
Lucideus has Successfully Conducted it’s training Sessions at …
Mewar University, Rajasthan!
  Mepco Sechlenk Engineering College, Tamil Nadu
 
 
Fr Angel’s College of Engineering, Mumbai
Kruti Institute of Engineering, Raipur!
  Charotar University, Gujarat
  Beant College of Engineering and Technology, Punjab
 
 
KSRM, Andhra Pradesh
 
Jhulelal Institute of Technology, Nagpur
 
G H Raisoni College of Engineering, Nagpur
 
Aishwaria College, Jodhpur
 
Amal Jyoti College of Engineering
 
ITM Gwalior
© Lucideus Tech Pvt Ltd. C-17 Safdarjung Development Area, Hauz Khas, New Delhi, India 110016 www.lucideus.com . info@lucideustech.com . +91 11 26569899 . All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation is strictly prohibited without the prior written consent of Lucideus. No part of this document may be reproduced in any form or by any means without the prior written authorization of Lucideus. While every precaution has been taken in the preparation of this document, Lucideus assumes no responsibility for errors or omissions.