Winter Training on ! Information Security and ! Cyber Forensics MISSION Our objective is to provide web security to every user of the internet. We want to ensure that confidential information stored in websites remains confidential; that people who prey on unsecured web pages are captured in our “web security cages”; and that every patron of the internet can use the web freely, without the nagging thought that his data could easily fall into the wrong hands and be abused. VISION We envisage a world wide web devoid of the flaws of porous internet security. This, we will accomplish by strengthening our clients’ websites, and also by disseminating instructions to students through our workshops. We want to provide services that make the internet a virtual utopia – a place where knowledge is nestled in a package that is beautiful yet strong, and where that knowledge is completely safe from prying eyes and devious hackers. WHY LUCIDEUS TRAINING ? Our objective at Lucideus is to arm students and corporations with the skill set necessary to enjoy on a continuous basis a secure web experience. Our trainers are well experienced in conducting workshops designed to achieve this very objective. We have travelled across hundreds of institutions, teaching our trade to thousands of students. We have exposed to them the frailties of websites they visit regularly. We have shown them how vulnerable their confidential information is without safety measures. In the process, we may have scared them a little, but have made everyone aware of the lurking threats and armed everyone with the necessary knowledge to effectively neutralize those threats. Without intricate and confounding pedagogy, in a user friendly and engaging style, you will learn how you can plug the loopholes and browse the web fearlessly and confidently. Our experienced web-security trainers actively participate in our field support, web security consulting and solution implementation. This brings real-life experience to the classroom environment. Our Associations /Affiliations Lucideus is a registered Private Limited company [CIN # U72200WB2012PTC181708] with associations with numerous global organizations, including the likes of TEDx, TiE, IEEE, ACM and ChaT, among many others. Our team comprises trainers with the experience of more than 15000 training hours under their belts. These hours have been spent teaching the nuances of information security to about 20,000 students in more than 200 colleges globally. The set of skills possessed by the Lucideus Team has also come to the aid of many law enforcement agencies. Agents belonging to CID, STF, CBI and KP have been trained extensively by our crew. Thus, we have imparted to them some of the know how required to solve both cyber and noncyber crimes. Our Trainers : Vidit Baxi! Saket Modi Rahul Tyagi Aman Sachdev Contents Of The Course Session Module Duration (in hours) Cyber Ethics 1 Importance of the Information Security Introduction to the Hackers and Hacking Terminologies Communities and Types of the Hackers Conclusion 2.0 Basics Of Web Technology 2 Introduction Network Terminologies IP Addressing Ports Proxy Servers Virtual Private Networks NAT Web Application Terminologies HTML Basics PHP Basics Conclusion 2.0 Contents Of The Course Session Module Duration (in hours) Information Gathering 3 WHOIS information Info Gathering using Tools and Search Engines Info Gathering using Meta tags & Words People Search Website Scanner E-Spiders Web Archive 1.0 E-Mail Attacks and Security 4 Creating Fake Pages Social Engineering Techniques IDN homograph attack Sending Fake Mails Identifying and Tracing the Fake Emails 2.0 Contents Of The Course Session Module Duration (in hours) Trojans and Backdoors 5 Introduction to the Virus, Worms & Trojans Trojan Creation Evading Anti-Viruses Reverse Connection of Trojan Servers Identify Trojans in the system Removing Trojans Analysis of Trojans/Virus 4.0 Reverse Engineering & Buffer Overflow 6 Understanding the architecture of an executable file Learning how to debug a file Cracking a live application to make a 14 day trial period to a lifetime validity product Basic understanding of the assembly language 6.0 Contents Of The Course Session Module Duration (in hours) Web Application Attacks 7 Introduction to the Web Architecture Security Misconceptions Web Application Vulnerabilities SQL Basics Types of SQL Injection Authentication Bypass Vulnerability Union Based Injection Error Based Injection Blind Injection – Union Based Blind Injection – Error Based Code Execution Vulnerability Cross Site Scripting Vulnerability Cross Frame Scripting Vulnerability Cross Site Reference Forgery Session Hijacking attacks Testing the Web Application Firewalls WAF Evasion Types of Control Panels Uploading Control Panel Analyzing the logs Log filtration 11.0 Contents Of The Course Session Module Duration (in hours) Google Dorks 8 Using Google as hacking tool Advanced operators of Google and Google Dorks Finding Vulnerable websites using Google Finding Target networks using Google 2.0 Mobile, VoIP Hacking and Security 9 SMS & SMSC Introduction SMS forging & Countermeasures Sending & Tracking Fake SMS VoIP Introduction Installing VoIP Server Live CALL FORGING using VoIP 1.0 Contents Of The Course Session Module Linux Basics and Introduction to BackTrack Operating System 10 Duration (in hours) 2.0 Information Gathering Using Linux 11 DNS Enumeration. Email Searches. Who is info. Route Mapping. Trace Routing. 1.0 Contents Of The Course Session Module Duration (in hours) Metasploit Frameworks System 12 Introduction to the Metasploit Framework Architecture of Metasploit Framework Basic Terminologies Exploitation Techniques Identifying Vulnerability and Exploits Exploitation on different platforms Evading the Firewall & Antivirus Scripting 4.0 Wireless Hacking 13 Introduction to the Wireless Technologies Types of Authentication Different Types of Attacks Cracking WEP and WPA Encryption 2.0 Contents Of The Course Session Module Duration (in hours) Cyber Crime Investigation 14 Understanding the what the Cyber Criminals work Case studies of some real life cyber crime cases solved by Lucideus Steps to carry our Facebook and Gmail Forensics with the Cyber Crime angle 1.0 Securing Yourself and Exam 15 Top counter measures to take against the hackers A practical Examination for your certification Total Duration of The Course 1.0 42.0 Certification Process At the end of every training batch, Lucideus will conduct a test. The test will eschew the traditional components of examinations, abandoning pen and paper for a more practical assessment of what the students were just taught in the entire month. You get a Lucideus Certified Cyber Security Analyst (LCCSA) Certificate only if you score more than 80% in the final examination, otherwise you get a participation certificate. Plus, we refund the entire training fee to the student who scores 100% in our final exam. In Addition… E-Certification In keeping up with our notion that all global transactions, business or educational, are shifting into virtual space, Lucideus becomes the first company in India to provide eCertificates. Every participant of the training session will be awarded a certificate, declaring that he/she has participated/has successfully completed the course requirements for Lucideus Certified Cyber Security Analyst ( LCCSA ). Lucideus Cyber Ninja Toolkit (LCNT) Although everything we teach our students is contained in the virtual world, we also provide participants with tangible things that they can take away with them. At the close of the training session, we gift each student a Take Away Kit containing more than 400 extra hours of course content on Ethical Hacking along with presentations, video tutorials, tools, scripts, note files, cheat sheets, white papers, etc. Batches.. Duration Starts On Ends On One Month (42 Hours) 18th November 17th December One Month (42 Hours) 2nd December 31st December One Month (42 Hours) 30th December 28th January To Register Now Lucideus has Successfully Conducted it’s training Sessions at … Indian Institute of Technology, Delhi ( IIT-D ) Indian Institute of Technology, Bombay ( IIT-B ) Indian Institute of Technology, Guwahati ( IIT-G ) Indian Institute of Technology, BHU ( IIT-BHU ) Indian Institute of Technology, Gandhinagar ( IIT-GN ) Indian Institute of Technology, Mandi ( IIT-MD ) National Institute of Technology, Allahbad ( NIT – Allahbad ) National Institute of Technology, Agartala ( NIT – Agartala ) National Institute of Technology, Silchar ( NIT – Silchar ) National Institute of Technology, Jaipur ( MNIT – Jaipur ) HBTI, Kanpur VSSUT, Burla Lucideus has Successfully Conducted it’s training Sessions at … Jadavpur University CUSAT, Cochin, Kerela MET, Nashik OP Jindal Institute of Technology, Raigarh Aditya Engineering College, Kakinada K L University, Vijaywada West Bengal Institute of Technology, Kolkata Yagvalikya Institute of Technology, Jaipur Asansole Engineering College, Asansole Godavri Institute of Engineering and Technology, Jyothi Engineering College, Trissur Poornima College, Jaipur Lucideus has Successfully Conducted it’s training Sessions at … Khalsa College of Engineering and Technology, Amritsar! Apex College, Bhubaneswar Vivekananda Institute of Technology, Jaipur St. Joseph College of Engineering and Technology, Palai! Jalpaiguri Government Engineering College Sagar Institute of Technology and Management, Lucknow Gandhi Institute of Technology and Management, Bhubaneswar Indira Gandhi Institute of Technology, Delhi Techno India College, Kolkata Gulzar Group of Institutes, Khanna KN Modi Institute of Engineering, Ghaziabad IMS Engineering College, Ghaziabad Lucideus has Successfully Conducted it’s training Sessions at … Mewar University, Rajasthan! Mepco Sechlenk Engineering College, Tamil Nadu Fr Angel’s College of Engineering, Mumbai Kruti Institute of Engineering, Raipur! Charotar University, Gujarat Beant College of Engineering and Technology, Punjab KSRM, Andhra Pradesh Jhulelal Institute of Technology, Nagpur G H Raisoni College of Engineering, Nagpur Aishwaria College, Jodhpur Amal Jyoti College of Engineering ITM Gwalior © Lucideus Tech Pvt Ltd. C-17 Safdarjung Development Area, Hauz Khas, New Delhi, India 110016 www.lucideus.com . info@lucideustech.com . +91 11 26569899 . All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation is strictly prohibited without the prior written consent of Lucideus. No part of this document may be reproduced in any form or by any means without the prior written authorization of Lucideus. While every precaution has been taken in the preparation of this document, Lucideus assumes no responsibility for errors or omissions.