info@ccasociety.com
+91-9461101915 | +91-9784268547 | +91-9587597511
A bout

Our Trainer

Milind Agarwal
Milind Agarwal
"Be Aware! Don't Be Greedy."

Head of Cyber Crime Awareness Society (CCAS) and Avenging Security Private Limited Mr. Milind Agarwal is a Professional Cyber Crime Investiator and Certified Forensic Expert. He (born 19-) is an Indian independent computer security consultant and author. He came into limelight when he solved the famous 'GoldSukh' case at the age of 21, and made several hacking claims, including working with intelligence agencies against terrorists. Subsequently, he started offering computer security consulting services, and became a sought-after speaker. and holds the various title like Cyber Crime Investiator, Cyber Security Expert, Ethical Hacker and Certified Forensic Expert.
E thical Hacking

Career Scope

What?
India's 1st NGO based on Cyber Crime Investigation. NGO has been established by Experts and Police officers with the view of giving an impetus to technical and legal support to the Cyber Crime affected people.
Why?
To educate internet user about the Cyber Crime related issues. We are providing a platform to the victim where they heard and justice will be provided
When?
As you pass out school and become a University student, you can start learning Ethical Hacking. If you are an IT student, it is not hard for you to learn Ethical Hacking. The day when you start learning Ethical Hacking, ideas about Cyber Security comes directly to your mind.
How?
Cyber Crime Awareness Society presently assisting Rajasthan / Bengal and Delhi Police to investigate cases related to Cyber Crime.
E thical Hacking

Syllabus

1st Module : Networking Concept
  1. » How does internet work.
  2. » What is network ?
  3. » Countermeasures of network.
  4. » What is IP and? types of IP ?
  5. » What is Mac ?
  6. » What is Cookie and Cache ? .
  7. » Domain Name System
  8. » DNS Poisoning
  9. » Name Server
  10. » Electronic Mail
  11. » Architecture and Services
  12. » Mail Access Protocols
  13. » Introduction of Ports
  14. » Introduction to Web Browser
  15. » Detail Study on Buffer or Packets
  16. » Detail Study on Internet and Intranet
  17. » Detail Study on Firewall
  18. » Concept of Routing and Switching
2nd Module : Operating System Concept
  1. » Introduction to Operating System
  2. » Types of Operating System
  3. » Bootstrapping Technology
  4. » Understanding Windows
  5. » Understanding Tokens
  6. » Impersonation Tokens
  7. » Local and Domain Escalation
  8. » Process Scheduling
  9. » Concept of ACL
3rd Module : Introduction to Ethical Hacking
  1. » What is Ethical Hacking
  2. » Types of Ethical Hackers
  3. » Who is a Ethical Hacker
  4. » Security Challenges
  5. » Scanning
  6. » Skills required for an Ethical Hacker
  7. » Types of Attacks
  8. » What do Ethical Hackers Do
  9. » Vulnerability Research
  10. » Effects of Hacking
  11. » How can Hacking be Ethical
  12. » Types of Data Stolen from the organisation
  13. » What is Penetration Testing
  14. » Penetration Testing Methodlogy
4th Module : Footprinting
  1. » Footprinting Terminologies
  2. » What is Footprinting
  3. » Methods of Footprinting
  4. » Benefits of Footprinting
  5. » People Search
  6. » Who-is-lookup
  7. » DNS Lookup
  8. » Analyzing Email Headers
  9. » Extracting DNs Information
  10. » Traceroute
  11. » Mirroring Websites
  12. » Finding Vulnerable Web-Sites
  13. » Extracting Website Informations
  14. » Tracking Users
  15. » Tracking Emails Communications
  16. » Tracking Emails Communications
  17. » Tracking Mobile Communications
  18. » Mobile Communications Countermeasures
  19. » Additional Footprinting Tools
  20. » Complete Study on CCAS Tracing Tools
5th Module : Google Hacking
  1. » What a hacker Do using Google Hacking
  2. » Footprinting using Google Hacking Technique
  3. » Google Advance Search Operators
  4. » Google Hacking Tools
  5. » Error Message Queries
6th Module : Scanning Network
  1. » Network Scanning
  2. » Types of Scanning
  3. » Three Way Handshake
  4. » TCP Communication Flags
  5. » Hping Commands
  6. » Scanning Techniques
  7. » Seaching Vulnerable Systems
  8. » Complete Study on All CCAS Scanning Tools
  9. » Operating System Fingerprinting
  10. » Scanning Countermeasures
  11. » Securing Network
  12. » Complete Study on Banner Grabbing
  13. » Vulnerability Scanning
  14. » Proxy Servers
  15. » Use of Proxies
  16. » Working of Multi Proxies
  17. » Proxy Tools
  18. » HTTP Tunnelling Technologies
  19. » SSH Tunnelling
  20. » IP Spoofing Detection Technology
  21. » IP Spoofing Countermeasures
  22. » Anonymizers
  23. » Types of Anonymizers
  24. » Anonymizers Tools
7th Module : System Hacking and Passwords Breaking
  1. » Password Complexity
  2. » Password Cracking Techniques
  3. » Types of Password Attacks
  4. » Microsoft Authentication
  5. » How Hash Passwords are Stored in Windows SAM?
  6. » PWdump7 and Fgdump
  7. » LazeSoft
  8. » ?Ophcrack
  9. » Cain & Abel
  10. » Detail Study on Password Cracking Tools
  11. » Privilege Escalation
  12. » Escalation of Privileges
  13. » Keylogger
  14. » Types of Keystroke Loggers
  15. » Detail Study on Keyloggers and Spywares
  16. » AntiKeyloggers
  17. » Spyware
  18. » Types of Spyware
  19. » USB Spyware
  20. » Audio Spyware
  21. » Email or internet Spyware
  22. » Antispyware
  23. » RootKits
  24. » Types Of RootKits
  25. » Details Study on Spyware or RootKits
  26. » AntiRootkits
  27. » Covering Tracks?
8th Module : Steganography & Cryptography
  1. » What is Steganography
  2. » Steganography Techniques
  3. » How Steganography Works
  4. » Types of? Steganography
  5. » Methods of Steganography
  6. » Steganography Detection Tools
  7. » Cryptography
  8. » Types of Cryptography
  9. » Cryptography Techniques
  10. » What is SSH
  11. » Cryptography Tools
  12. » Cryptography Attacks
  13. » Code Breaking Methodologies
9th Module : Trojans and Backdoors
  1. » Introductions to Trojans
  2. » Reasons of Trojans
  3. » How to use Trojans
  4. » How Systems get infected? by Trojans
  5. » Types of Trojans
  6. » Designing Trojans
  7. » Removing? Trojans
  8. » Detail study on Designing and use Trojans
  9. » Detections Trojans
  10. » How to create Backdoors
  11. » Uninstalling Trojans remotely
  12. » Purpose of Backdoors
  13. » Study on Anti-Trojan Sofware
  14. » Backdoor Countermeasures
  15. » Trojans Countermeasures
10th Module : Viruses & Worms
  1. » Introduction to Viruses
  2. » Stages of Viruses Life
  3. » Working Of Viruses
  4. » Why Do People Create Computer Viruses
  5. » Indications of Viruses attack
  6. » How does a Computer get infected by Viruses
  7. » Viruses Analysis
  8. » Types of Viruses
  9. » Desiging Viruses
  10. » Computer Worms
  11. » Worm Maker
  12. » Worm Analysis
  13. » Anti-Virus Tools
  14. » Virus detection methods
  15. » Virus & Worms Countermeasures
11th Module : Sniffers & Phishing
  1. » Sniffing Threats
  2. » How a Sniffer Works
  3. » What is Address Resolution Protocol (ARP)
  4. » Types of Sniffing
  5. » How DHCP works
  6. » Spoofing Attacks
  7. » DNS Poisoning
  8. » Sniffing Tool : WireShark
  9. » Sniffing Prevention Techniques
  10. » How to Detect Sniffing
  11. » What is Phishing
  12. » How Phishing works
  13. » Types Of Phishing
  14. » Designing Phishing
  15. » Detection of Phishing
12th Module : Social Engineering
  1. » What is Social Engineering
  2. » Behaviors Vulnerable to attacks
  3. » Why is Social Engineering Effective
  4. » Warning Signs of an Attacks
  5. » Phases in a Social Engineering attack
  6. » Impact on the Organization
  7. » Command Injection Attacks
  8. » Common Targets of Social Engineering
  9. » Types of Social Engineering
  10. » Social Engineering Through Impersonation On Social networking Sites
  11. » Risks of Social Networking to Corporate Networks
  12. » Social Engineering Countermeasures
13th Module : Denial of Service
  1. » What is Denial of Service Attack
  2. » What is Distributed Denial Of Service Attacks
  3. » Symptoms of DoS atrack
  4. » Internet Relay Chat (IRC)
  5. » DoS Attack Techniques
  6. » Botnet
  7. » DoS/DDoS Countermeasures
  8. » Detail Study on DoS attack Tools
  9. » Detection Techniques
14th Module : Session Hacking
  1. » What is Session Hijacking
  2. » Key Session Hijacking Techniques
  3. » Session Hijacking Process
  4. » Types of Session Hijacking
  5. » Session Hijacking Tools
  6. » Countermeasures
  7. » Methods to Prevent Session Hijacking
  8. » Defending Against Session Hijacking Attacks
15th Module : Hacking Web Applications
  1. » Web Application Security Statistics
  2. » Introduction to Web Applications
  3. » Web Application Components
  4. » How Web Applications Work?
  5. » Web Application Architecture
  6. » Injection Flaws
  7. » What is LDAP Injection?
  8. » How LDAP Injection Works?
  9. » Cross-Site Scripting (XSS) Attacks
  10. » How XSS Attacks Work?
  11. » Cross-Site Scripting Attack Scenario: Attack via Email
  12. » XSS Example
  13. » XSS Cheat Sheet
  14. » Cross-Site Request Forgery (CSRF) Attack
  15. » How CSRF Attacks Work?
  16. » Web Application Denial-of-Service (DoS) Attack
  17. » Buffer Overflow Attacks
  18. » Cookie/Session Poisoning
  19. » How Cookie Poisoning Works?
  20. » Hacking Web Servers
  21. » Username Enumeration
  22. » Password Attacks: Password Functionality Exploits
  23. » Password Attacks: Password Guessing
  24. » Password Attacks: Brute-forcing
  25. » Session Attacks: Session ID Prediction/ Brute-forcing
  26. » Cookie Exploitation: Cookie Poisoning
  27. » Encoding Schemes
  28. » How to Defend Against SQL Injection Attacks?
  29. » How to Defend Against Command Injection Flaws?
  30. » How to Defend Against XSS Attacks?
  31. » How to Defend Against DoS Attack?
  32. » How to Defend Against Web Services Attack?
  33. » Web Application Countermeasures
  34. » Web Application Firewall
16th Module : SQL Injection
  1. » What is SQL Injection?
  2. » SQL Injection Attacks
  3. » How Web Applications Work?
  4. » SQL Injection Detection
  5. » Types of SQL Injection
  6. » What is Blind SQL Injection?
  7. » SQL Injection Methodology
  8. » Information Gathering
  9. » Password Grabbing
  10. » Grabbing SQL Server Hashes
  11. » Extracting SQL Hashes (In a Single Statement)
  12. » SQL Injection Tools
  13. » How to Defend Against SQL Injection Attacks?
  14. » How to Defend Against SQL Injection Attacks: Use Type-Safe SQL Parameters
18th Module : Cyber Crime Investigation
  1. » Introduction to Cyber Crime Investigation.
  2. » Types of Cyber Crimes.
  3. » ?Report Cyber Crimes.
  4. » Investigating Emails (Email Tracing)
  5. » Online email header analysis.
  6. » Investigating Phishing Cases.
  7. » Investigating Data Theft Cases.
  8. » Investigating Orkut Profile Impersonation Cases.
  9. » Cyber Law & IT Act, 2000 / 2008.
19ty Module : Overview of Linux & Backtrack
  1. » Introduction of Linux
  2. » Understanding Linux
  3. » How Linux Works
  4. » Introduction of Backtrack
  5. » Understanding Backtrack
  6. » How Backtrack Operating System Works
  7. » Basic Command of Backtrack
17th Module : Miscellaneous
  1. » Miscellaneous
C ourse

Duration

3 Months
© Cyber Crime Awarness Society 2018