Call us at 9463111111 and talk to us about your queries
Your insightful inputs in the investigation of the cyber crime, delivered in an
interactive manner have proved very effective for all the participants.
PS Phanlnikar (I.P.S.) Addl. D.G, MP police academy
Cyber Crime IN TODAYS
The course will help participants to understand the security terminology
Course is suitable for those who are looking to get a foothold in information security and join field of Web Penetration Testing as a profession or aim to explore new career opportunities. It is the most intensive course offered by Cyberops training which will provide a unique prospective into the intricate world of information and Cyber security.
Modules to be covered
This session is introductory to make participants familiar with cyber world.
It will cover essential used in cyber security and cyber crime as well as various threats associated with cyber world.
Terms and terminologies used in information security will be discussed that will help participitants to clear their concepts regarding information security field.
Networks are defined as medium for communication between two or multiple systems, i.e. it constitutes a mechanism of information that travels across multiple devices using various mediums.
The module is designed to understand the basics of networks and how data is transmitted through network, along with various Ports and Protocols. what devices are used for the data transmission i.e. hardware associated with networking like switches, router, hub etc along with types of network, internet protocol v4 & v6, ports & protocols, domain name system and its working.
The module at beginning will define the basic terminologies, introduction of operating systems and technical aspects will follow in the later part of module that includes how multiple operating systems are installed and configured in virtual box.
Course aims to implement understanding of how virtual machines are separated inside the same physical host and how they communicate with lower hardware levels, working of virtualization technology and components involved and the essentials to setup a lab for further modules in this course like web application hacking, malware analysis.
Open source intelligence (OSI) is focused on collecting as much information as possible about a target which can be organization, a person, website or a specific system.
The module is designed to give insight of OSI methods and techniques i.e. various ways to collect information from publically available resources like e-Mail spoofing, Fake mail Tracing by using various methods.
The module will provide elementary knowledge about advance search techniques in various search engines used by security professionals, cyber criminals. Introduction to social engineering technique like phishing for email id hacking, desktop phishing, remote phishing and how it is essential in information gathering
For Information protection data security is essential and thus it needs to be encrypted. The module begins with introduction of cryptography from its origin to traditional methods and modern techniques. Application of cryptography in information security and data protection techniques.
The second half of the module Explore and describe basic concepts of cryptography including secret key and public key systems, encoding and decoding. Difference between encryption and encoding along with techniques and methods of decryption.
The module will begin with an introduction of loopholes in protected wi-fi networks and its testing. Students will be able to learn, how to test security of a protected wifi network.
In the later phase module will include hands on demonstration of internal network attacks like sniffing, MITM, DNS cache poisoning. Introduction of misconfigurations and loopholes in router security.
Module will also incorporate various internal security concepts like firewalls,IDS,IDPS.
The course will cover basic terminologies and concept of Malware - definition, why and how it is affecting the network and the system, key tools and techniques of malware attacks.
Students will be briefed about creating Malware and various types of malware (virus, worms, trojans, keyloggers etc. ).
Module will give insight of methods used to remove virus from system
The module includes the basic fundamentals of web application including some client side and server side scripting and possible web application attacks like SQL Injection, cross site scripting, local file inclusions and remote file inclusions and also medium level attacks like click jacking etc.
Introductory knowledge of database and working with database using SQL queries along with installation and working for local servers. Basic working of HTTP with request and host examples.
Metasploit is a framework which allows a security tester to arrange their exploits and launch them easily and how metasploit cover different types of pre build exploits. The scope of exploitation after compromising a particular system and its effect on network and user.
Almost every case of cyber crime involves a very strong element of system based evidence i.e phone, smart phones and computer etc.
The module will cover basics of forensics and Introduction to basic concept of data recovery from different types of storage devices.
In this module basic C and Python language will be discussed with students. This module will also cover the techniques used by testers to create exploits.
Participants will be able to create their own exploits using Buffer Overflow vulnerabilities.
This session will include various cyber crime cases and criminal modus operands. Also will be discussed various cyber crime cases handled by cyberops along with investigation procedure.
Methods to handle cyber crime cases and Dos and Don’ts of handling cyber crime cases will be discussed. Indian IT act with reference to case studies from cyberops will be discussed.
Who should attend?
Course is designed to address the needs of :
Those who intend to explore cyber security field associated threats and countermeasures and are new to terminologies and concept of cyber security world.
Non – Technical professionals who are looking for prospective career opportunities in cyber security.
Chartered accountants dealing in information security.
Technical background students who aim for advanced learning in cyber security field as this will help them to understand the advanced concepts and terms of cyber world.
The course is designed for all industry spectrums professionals who want to acquaint with the basics of concepts, terminologies of information security, networking, cryptography and all that aspects that frame the underlying concepts of cyber security and countermeasures.
School students, parents, Teachers, Professors and individuals who aim to understand the cyber security aspects.
Corporate and government/ investigators and network security personnel.
Individuals working in a data audit, policy enforcement, or network intrusion investigation role.
Participants should have basic knowledge of computer system and internet surfing.
Course Package includes :
hicube Welcome Kit
Advanced Software Toolkit
Remote access to test beds for two weeks.
Explore Our Events
Training on Handling Cyber Operations in the Field for SP & DIG rank officers
SVPNPA, Hyderabad 28 September 2017
Investigating Cyber Crime Investigation in Social Media & Randomization
Police Training School 18 July 2017
Investigating various Cyber Crime cases with Bitcoin Investigation and the cases studies
CDTS, Jaipur 19 June 2017
Investigation of website hacking & Defacing with case studies.
CDTS Ghaziabad, 31 May 2017
Website Hacking & Modus Operandi used by criminal & Investigation procedure with case study.
ISA, Mount Abu, 26 May 2017
Training on Investigation Phishing, Cyber Pornography, System Hacking & Cyber Stalking Harassing cases
CDTS Ghaziabad, 6-7 February 2017
Panel Discussion on 'Cyber Security: Securing the Connected Workplace', to be aired on Economic Times TV News Channel
- SP Jain School of Global Management Campus, Mumbai / 09 October 2017
An awareness program on Cyber Crime in association with Dept of Science & Technology.
- Rajasthan University, Jaipur / 09 August 2017
Lecture on Cyber Operations for the officers of Rank Add. Director General across India
Sardar Vallabhbhai Patel National Police Academy, Hyderabad 2 June 2017
What Our Clients Says
I am sanguine that the knowledge gained will surely help us in maintaining security of sensitive information. We are indeed grateful that you could spare time out of your busy schedule and we acknowledge your yeomen service to the armed forces.
Maj. Gen. Dushyant Singh (GOC) Indian Army
The officers and staff of Cyber Cell who participated in the training program have benefitted through the inputs and case studies presented by you during the the training. Its all because of your dedication and handwork. We appreciate your role in training programme.
Anil Kumar Gupta (I.P.S) IGP Cyber Cell, M.P
Accept my appreciation for all your efforts in assisting us and giving us guidlines in tracking and cracking our cases with all your expertise Knowledge and hard work. Your assistance was timely and played a imperative role in the investigations.