<div style="margin:20px 0 0 200px"> To view the site, enable JavaScript by changing your browser options, then <a href="">Try Again</a>.</div>
Contact Now for Enrollment

Address

Indian School of Ethical Hacking,
Plot Number 23, 2nd Floor, Lane Number 2,
District Center, Chandrasekharpur,
Bhubaneswar, Odisha 751016
(Near ICICI Bank)

Certified Ethical Hacker (CEH 10.0)

Duration

Duration

40 hours - 2 classes per week

Eligibility

Eligibility

  1. Basic Knowledge of Software, Database and Networking
  2. If you do not have the above knowledge, please complete our "INDUSTRY READY" Course (only Module - II & III) to be eligible - https://www.isoeh.com/industry-ready.html
Course Fees

Course Fees

Rs.37,000/-
Inclusive of all taxes

Course Details

Module 01: Introduction to Ethical Hacking
  • Information Security Overview
  • Information Security Threats and Attack Vectors
  • Hacking Concepts
  • Ethical Hacking Concepts
  • Information Security Controls
  • Penetration Testing Concepts
  • Information Security Laws and Standards
Module 02: Footprinting and Reconnaissance
  • Footprinting Concepts
  • Footprinting through Search Engines
  • Footprinting through Web Services
  • Footprinting through Social Networking Sites
  • Website Footprinting
  • Email Footprinting
  • Competitive Intelligence
  • Whois Footprinting
  • DNS Footprinting
  • Network Footprinting
  • Footprinting Through Social Engineering
  • Footprinting Tools
  • Footprinting Countermeasures
  • Footprinting Penetration Testing
Module 03: Scanning Networks
  • Network Scanning Concepts
  • Scanning Tools
  • Scanning Techniques
  • Scanning Beyond IDS and Firewall
  • Banner Grabbing
  • Draw Network Diagrams
  • Scanning Pen Testing
Module 04: Enumeration
  • Enumeration Concepts
  • NetBIOS Enumeration
  • SANP Enumeration
  • LDP Enumeration
  • SMTP and DNS Enumeration
  • Other Enumeration Techniques
  • Enumeration Countermeasures
  • Enumeration Pen Testing
Module 05:Vulnerability Analysis
  • Vulnerability Assessment Concepts
  • Vulnerability Assessment Solutions
  • Vulnerability Scoring Systems
  • Vulnerability Assessment Tools
  • Vulnerability Assessment Reports
Module 06: System Hacking
  • System Hacking Concepts
  • Cracking Passwords
  • Escalating Privileges
  • Executing Applications
  • Hiding Files
  • Covering Tracks
  • Penetration Testing
Module 07: Malware Threats
  • Malware Concepts
  • Trojan Concepts
  • Virus and Worm Concepts
  • Malware Analysis
  • Countermeasures
  • Anti-Malware Software
  • Malware Penetration testing
Module 08: Sniffing
  • Sniffing Concepts
  • Sniffing Technique: MAC Attacks
  • Sniffing Technique: DHCP Attacks
  • Sniffing Technique: ARP Poisoning
  • Sniffing Technique: Spoofing Attacks
  • Sniffing Technique: DNS Poisoning
  • Sniffing Tools
  • Countermeasures
  • Sniffing Detection Techniques
  • Sniffing Pen Testing
Module 09: Social Engineering
  • Social Engineering Concepts
  • Social Engineering Techniques
  • Insider Threats
  • Impersonation on Social Networking Sites
  • Identity Theft
  • Countermeasures
  • Social Engineering Pen Testing
Module 10: Denial-of-Service
  • DoS/DDos Concepts
  • DoS/DDos Attack Techniques
  • Botnets
  • DDoS Case Study
  • DoS/DDos Attack Tools
  • Countermeasures
  • DoS/DDos Protection Tools
  • DoS/DDos Penetration Testing
Module 11: Session Hijacking
  • Session Hijacking Concepts
  • Application Level Session Hijacking
  • Network Level Session Hijacking
  • Session Hijacking Tools
  • Countermeasures
  • Penetration Testing
Module 12: Evading IDS,Firewalls, and Honeypots
  • IDS, Firewall and Honeypot Concepts
  • IDS, Firewall and Honeypot Solutions
  • Evading IDS
  • Evading Firewalls
  • IDS/Firewall Evading Tools
  • Detecting Honeypots
  • IDS/Firewall Evasion Countermeasures
  • Penetration Testing
Module 13: Hacking Web Servers
  • Web Server Concepts
  • Web Server Attacks
  • Web Server Attacks Methodology
  • Web Server Attack Tools
  • Countermeasures
  • Patch Management
  • Web Server Security Tools
  • Web Server Pen Testing
Module 14: Hacking Web Applications
  • Web App Concepts
  • Web App Threats
  • Hacking Methodology
  • Web App Hacking Tools
  • Countermeasures
  • Web App Security Testing Tools
  • Web App Pen Testing
Module 15: SQL Injection
  • SQL Injection Concepts
  • Types of SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • Evasion Techniques
  • Countermeasures
Module 16: Hacking Wireless Networks
  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Countermeasures
  • Wireless Security Tools
  • Wireless Pen Testing
Module 17: Hacking Mobile Platforms
  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Mobile Spyware
  • Mobile Device Management
  • Mobile Security Guidelines and Tools
  • Mobile Pen Testing
Module 18: IoT Hacking
  • IoT Concepts
  • IoT Attacks
  • IoT Hacking Methodology
  • IoT Hacking Tools
  • Countermeasures
  • IoT Pen Testing
Module 19: Cloud Computing
  • Cloud Computing Concepts
  • Cloud Computing Threats
  • Cloud Computing Attacks
  • Cloud Security
  • Cloud Security Tools
  • Cloud Penetration Testing
Module 20: Cryptography
  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure (PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptanalysis
  • Countermeasures

Digital Forensic (CHFI 9.0)

Duration

Duration

40 hours - 2 classes per week

Eligibility

Eligibility

Basic knowledge of Hardware, Software & Network

Course Fees

Course Fees

Rs.34,000/-
Inclusive of all taxes

Course Outline (Global Certification from EC-Council on qualifying online examination):

Module 01: Computer Forensics in Today's World
  • Forensics Science
  • Computer Forensics
    • Security Incident Report
    • Aspects of Organizational Security
    • Evolution of Computer Forensics
    • Objective of Computer Forensics
    • Need for Compute Forensics
  • Forensics Readiness
    • Benefits of Forensics Readiness
    • Goals of Forensics Readiness
    • Forensics Readiness Planning
  • Cyber Crime
    • Computer Facilitated Crimes
    • Modes of Attacks
    • Examples of Cyber Crime
    • Types of Computer Crimes
    • Cyber Criminals
    • Organized Cyber Crime: Organizational Chart
    • How Serious are Different Types of Incidents?
    • Disruptive Incidents to the Business
    • Cost Expenditure Responding to the Security Incident
  • Cyber Crime Investigation
    • Key Steps in Forensics Investigation
    • Rules of Forensics Investigation
    • Need for Forensics Investigator
    • Role of Forensics Investigator
    • Accessing Computer Forensics Resources
    • Role of Digital Evidence
  • Corporate Investigations
    • Understanding Corporate Investigations
    • Approach to Forensics Investigation: A Case Study
    • Instructions for the Forensic Investigator to Approach the Crime Scene
    • Why and When Do You Use Computer Forensics?
    • Enterprise Theory of Investigation (ETI)
    • Legal Issues
    • Reporting the Results
  • Reporting a Cyber Crime
    • Why you Should Report Cybercrime?
    • Reporting Computer-Related Crimes
    • Person Assigned to Report the Crime
    • When and How to Report an Incident?
    • Who to Contact at the Law Enforcement?
    • Federal Local Agents Contact
    • More Contacts
    • CIO Cyberthreat Report Form
Module 02: Computer Forensics Investigation Process
  • Investigating Computer Crime
    • Before the Investigation
    • Build a Forensics Workstation
    • Building the Investigation Team
    • People Involved in Computer Forensics
    • Review Policies and Laws
    • Forensics Laws
    • Notify Decision Makers and Acquire Authorization
    • Risk Assessment
    • Build a Computer Investigation Toolkit
  • Steps to Prepare for a Computer Forensics Investigation
  • Computer Forensics Investigation Methodology
    • Obtain Search Warrant
      • Example of Search Warrant
      • Searches Without a Warrant
    • Evaluate and Secure the Scene
      • Forensics Photography
      • Gather the Preliminary Information at the Scene
      • First Responder
    • Collect the Evidence
      • Collect Physical Evidence
        • Evidence Collection Form
      • Collect Electronic Evidence
      • Guidelines for Acquiring Evidence
    • Secure the Evidence
      • Evidence Management
      • Chain of Custody
        • Chain of Custody Form
    • Acquire the Data
      • Duplicate the Data (Imaging)
      • Verify Image Integrity
        • MD5 Hash Calculators: HashCalc, MD5 Calculator and HashMyFiles
      • Recover Lost or Deleted Data
        • Data Recovery Software
    • Analyze the Data
      • Data Analysis
      • Data Analysis Tools
    • Assess Evidence and Case
      • Evidence Assessment
      • Case Assessment
      • Processing Location Assessment
      • Best Practices to Assess the Evidence
    • Prepare the Final Report
      • Documentation in Each Phase
      • Gather and Organize Information
      • Writing the Investigation Report
      • Sample Report
    • Testifying as an Expert Witness
      • Expert Witness
      • Testifying in the Court Room
      • Closing the Case
      • Maintaining Professional Conduct
      • Investigating a Company Policy Violation
      • Computer Forensics Service Providers
Module 03: Searching and Seizing Computers
  • Searching and Seizing Computers without a Warrant
    • A: Fourth Amendment's "Reasonable Expectation of Privacy" in Cases Involving Computers: General Principles
      • A.1: Reasonable Expectation of Privacy in Computers as Storage Devices
      • A.3: Reasonable Expectation of Privacy and Third-Party Possession
      • A.4: Private Searches
      • A.5 Use of Technology to Obtain Information
    • B: Exceptions to the Warrant Requirement in Cases Involving Computers
      • B.1: Consent
        • B.1.a: Scope of Consent
        • B.1.b: Third-Party Consent
        • B.1.c: Implied Consent
      • B.2: Exigent Circumstances
      • B.3: Plain View
      • B.4: Search Incident to a Lawful Arrest
      • B.5: Inventory Searches
      • B.6: Border Searches
      • B.7: International Issues
    • C: Special Case: Workplace Searches
      • C.1: Private Sector Workplace Searches
      • C.2: Public-Sector Workplace Searches
  • Searching and Seizing Computers with a Warrant
    • A: Successful Search with a Warrant
      • A.1: Basic Strategies for Executing Computer Searches
        • A.1.a: When Hardware is itself Contraband, Evidence, or an Instrumentality or Fruit of Crime
        • A.1.b: When Hardware is Merely a Storage Device for Evidence of Crime
      • A.2: The Privacy Protection Act
        • A.2.a: The Terms of the Privacy Protection Act
        • A.2.b: Application of the PPA to Computer Searches and Seizures
      • A.3: Civil Liability Under the Electronic Communications Privacy Act (ECPA)
      • A.4: Considering the Need for Multiple Warrants in Network Searches
      • A.5: No-Knock Warrants
      • A.6: Sneak-and-Peek Warrants
      • A.7: Privileged Documents
    • B: Drafting the Warrant and Affidavit
      • B.1: Accurately and Particularly Describe the Property to be Seized in the Warrant and/or Attachments to the Warrant
        • B.1.a: Defending Computer Search Warrants Against Challenges Based on the Description of the "Things to Be Seized"
      • B.2: Establish Probable Cause in the Affidavit
      • B.3: In the Affidavit Supporting the Warrant, include an Explanation of the Search Strategy as Well as the Practical & Legal Considerations that Will Govern the Execution of the Search
    • C: Post-Seizure Issues
      • C.1: Searching Computers Already in Law Enforcement Custody
      • C.2: The Permissible Time Period for Examining Seized Computers
      • C.3: Rule 41(e) Motions for Return of Property
  • The Electronic Communications Privacy Act
    • A. Providers of Electronic Communication Service vs. Remote Computing Service
    • B. Classifying Types of Information Held by Service Providers
    • C. Compelled Disclosure Under ECPA
    • D. Voluntary Disclosure
    • E. Working with Network Providers
  • Electronic Surveillance in Communications Networks
    • A. Content vs. Addressing Information
    • B. The Pen/Trap Statute, 18 U.S.C. §§ 3121-3127
    • C. The Wiretap Statute ("Title III"), 18 U.S.C. §§ 2510-2522
      • C.1: Exceptions to Title III
    • D. Remedies For Violations of Title III and the Pen/Trap Statute
  • Evidence
    • A. Authentication
    • B. Hearsay
    • C. Other Issues
Module 04: Digital Evidence
  • Digital Data
    • Definition of Digital Evidence
    • Increasing Awareness of Digital Evidence
    • Challenging Aspects of Digital Evidence
    • The Role of Digital Evidence
    • Characteristics of Digital Evidence
    • Fragility of Digital Evidence
    • Anti-Digital Forensics (ADF)
  • Types of Digital Data
    • Types of Digital Data
  • Rules of Evidence
    • Rules of Evidence
    • Best Evidence Rule
    • Federal Rules of Evidence
    • International Organization on Computer Evidence (IOCE)
    • IOCE International Principles for Digital Evidence
    • Scientific Working Group on Digital Evidence (SWGDE)
    • SWGDE Standards for the Exchange of Digital Evidence
  • Electronic Devices: Types and Collecting Potential Evidence
    • Electronic Devices: Types and Collecting Potential Evidence
  • Digital Evidence Examination Process
    • Evidence Assessment
      • Prepare for Evidence Acquisition
    • Evidence Acquisition
      • Preparation for Searches
      • Seizing the Evidence
      • Imaging
      • Bit-Stream Copies
      • Write Protection
      • Evidence Acquisition
      • Evidence Acquisition from Crime Location
      • Acquiring Evidence from Storage Devices
      • Collecting Evidence
      • Collecting Evidence from RAM
      • Collecting Evidence from a Standalone Network Computer
      • Chain of Custody
      • Chain of Evidence Form
    • Evidence Preservation
      • Preserving Digital Evidence: Checklist
      • Preserving??Removable Media
      • Handling Digital Evidence
      • Store and Archive
      • Digital Evidence Findings
    • Evidence Examination and Analysis
      • Evidence Examination
      • Physical Extraction
      • Logical Extraction
      • Analyze Host Data
      • Analyze Storage Media
      • Analyze Network Data
      • Analysis of Extracted Data
      • Timeframe Analysis
      • Data Hiding Analysis
      • Application and File Analysis
      • Ownership and Possession
    • Evidence Documentation and Reporting
      • Documenting the Evidence
      • Evidence Examiner Report
      • Final Report of Findings
      • Computer Evidence Worksheet
      • Hard Drive Evidence Worksheet
      • Removable Media Worksheet
  • Electronic Crime and Digital Evidence Consideration by Crime Category
    • Electronic Crime and Digital Evidence Consideration by Crime Category
Module 05: First Responder Procedures
  • Electronic Evidence
  • First Responder
  • Roles of First Responder
  • Electronic Devices: Types and Collecting Potential Evidence
  • First Responder Toolkit
    • First Responder Toolkit
    • Creating a First Responder Toolkit
    • Evidence Collecting Tools and Equipment
  • First Response Basics
    • First Response Rule
    • Incident Response: Different Situations
    • First Response for System Administrators
    • First Response by Non-Laboratory Staff
    • First Response by Laboratory Forensics Staff
  • Securing and Evaluating Electronic Crime Scene
    • Securing and Evaluating Electronic Crime Scene: A Checklist
    • Securing the Crime Scene
    • Warrant for Search and Seizure
    • Planning the Search and Seizure
    • Initial Search of the Scene
    • Health and Safety Issues
  • Conducting Preliminary Interviews
    • Questions to Ask When Client Calls the Forensic Investigator
    • Consent
    • Sample of Consent Search Form
    • Witness Signatures
    • Conducting Preliminary Interviews
    • Conducting Initial Interviews
    • Witness Statement Checklist
  • Documenting Electronic Crime Scene
    • Documenting Electronic Crime Scene
    • Photographing the Scene
    • Sketching the Scene
    • Video Shooting the Crime Scene
  • Collecting and Preserving Electronic Evidence
    • Collecting and Preserving Electronic Evidence
    • Order of Volatility
    • Dealing with Powered On Computers
    • Dealing with Powered Off Computers
    • Dealing with Networked Computer
    • Dealing with Open Files and Startup Files
    • Operating System Shutdown Procedure
    • Computers and Servers
    • Preserving Electronic Evidence
    • Seizing Portable Computers
    • Switched On Portables
    • Collecting and Preserving Electronic Evidence
  • Packaging and Transporting Electronic Evidence
    • Evidence Bag Contents List
    • Packaging Electronic Evidence
    • Exhibit Numbering
    • Transporting Electronic Evidence
    • Handling and Transportation to the Forensics Laboratory
    • Storing Electronic Evidence
    • Chain of Custody
    • Simple Format of the Chain of Custody Document
    • Chain of Custody Forms
    • Chain of Custody on Property Evidence Envelope/Bag and Sign-out Sheet
  • Reporting the Crime Scene
    • Reporting the Crime Scene
  • Note Taking Checklist
  • First Responder Common Mistakes
Module 06: Computer Forensics Lab
  • Setting a Computer Forensics Lab
    • Computer Forensics Lab
    • Planning for a Forensics Lab
    • Budget Allocation for a Forensics Lab
    • Physical Location Needs of a Forensics Lab
    • Structural Design Considerations
    • Environmental Conditions
    • Electrical Needs
    • Communication Needs
    • Work Area of a Computer Forensics Lab
    • Ambience of a Forensics Lab
    • Ambience of a Forensics Lab: Ergonomics
    • Physical Security Recommendations
    • Fire-Suppression Systems
    • Evidence Locker Recommendations
    • Computer Forensic Investigator
    • Law Enforcement Officer
    • Lab Director
    • Forensics Lab Licensing Requisite
    • Features of the Laboratory Imaging System
    • Technical Specification of the Laboratory-??ased Imaging System
    • Forensics Lab
    • Auditing a Computer Forensics Lab
    • Recommendations to Avoid Eyestrain
  • Investigative Services in Computer Forensics
    • Computer Forensics Investigative Services
    • Computer Forensic Investigative Service Sample
    • Computer Forensics Services: PenrodEllis Forensic Data Discovery
    • Data Destruction Industry Standards
    • Computer Forensics Services
  • Computer Forensics Hardware
    • Equipment Required in a Forensics Lab
    • Forensic Workstations
    • Basic Workstation Requirements in a Forensics Lab
    • Stocking the Hardware Peripherals
    • Paraben Forensics Hardware
      • Handheld First Responder Kit
      • Wireless StrongHold Bag
      • Wireless StrongHold Box
      • Passport StrongHold Bag
      • Device Seizure Toolbox
      • Project-a-Phone
      • Lockdown
      • iRecovery Stick
      • Data Recovery Stick
      • Chat Stick
      • USB Serial DB9 Adapter
      • Mobile Field Kit
    • Portable Forensic Systems and Towers: Forensic Air-Lite VI MK III laptop
    • Portable Forensic Systems and Towers: Original Forensic Tower II and F
    • Portable Forensic Workhorse V: Tableau 335 Forensic Drive Bay Controller
    • Portable Forensic Systems and Towers: Forensic Air-Lite IV MK II
    • Portable Forensic Systems and Towers: Forensic Air-Lite V MK III
    • Portable Forensic Systems and Towers: Forensic Tower IV Dual Xeon
    • Portable Forensic Systems and Towers: Ultimate Forensic Machine
    • Forensic Write Protection Devices and Kits: Ultimate Forensic Write Protection Kit II-ES
    • Tableau T3u Forensic SATA Bridge Write Protection Kit
    • Tableau T8 Forensic USB Bridge Kit/Addonics Mini DigiDrive READ ONLY 12-in-1 Flash Media Reader
    • Tableau TACC 1441 Hardware Accelerator
      • Multiple TACC1441 Units
    • Tableau TD1 Forensic Duplicator
    • Power Supplies and Switches
    • Digital Intelligence Forensic Hardware
      • FRED SR (Dual Xeon)
      • FRED-L
      • FRED SC
      • Forensic Recovery of Evidence Data Center (FREDC)
      • Rack-A-TACC
      • FREDDIE
      • UltraKit
      • UltraBay II
      • UltraBlock SCSI
      • Micro Forensic Recovery of Evidence Device (µFRED)
      • HardCopy 3P
    • Wiebetech
      • Forensics DriveDock v4
      • Forensics UltraDock v4
      • Drive eRazer
      • v4 Combo Adapters
      • ProSATA SS8
      • HotPlug
    • CelleBrite
      • UFED System
      • UFED Physical Pro
      • UFED Ruggedized
    • DeepSpar
      • Disk Imager Forensic Edition
      • 3D Data Recovery
      • Phase 1 Tool: PC-3000 Drive Restoration System
      • Phase 2 Tool: DeepSpar Disk Imager
      • Phase 3 Tool: PC-3000 Data Extractor
    • InfinaDyne Forensic Products
      • Robotic Loader Extension for CD/DVD Inspector
      • Robotic System Status Light
    • Image MASSter
      • Solo-4 (Super Kit)
      • RoadMASSter- 3
      • WipeMASSter
      • WipePRO
      • Rapid Image 7020CS IT
    • Logicube
      • Forensic MD5
      • Forensic Talon®
      • Portable Forensic Lab™
      • CellDEK®
      • Forensic Quest-2®
      • NETConnect™
      • RAID I/O Adapter™
      • GPStamp™
      • OmniPort
      • Desktop WritePROtects
      • USB Adapter
      • CloneCard Pro
      • EchoPlus
      • OmniClone IDE Laptop Adapters
      • Cables
    • VoomTech
      • HardCopy 3P
      • SHADOW 2
  • Computer Forensics Software
    • Basic Software Requirements in a Forensic Lab
    • Maintain Operating System and Application Inventories
    • Imaging Software
      • R-drive Image
      • P2 eXplorer Pro
      • AccuBurn-R for CD/DVD Inspector
      • Flash Retriever Forensic Edition
    • File Conversion Software
      • FileMerlin
      • SnowBatch®
      • Zamzar
    • File Viewer Software
      • File Viewer
      • Quick View Plus 11 Standard Edition
    • Analysis Software
      • P2 Commander
      • DriveSpy
      • SIM Card Seizure
      • CD/DVD Inspector
      • Video Indexer (Vindex™)
    • Monitoring Software
      • Device Seizure
      • Deployable P2 Commander (DP2C)
      • ThumbsDisplay
      • Email Detective
    • Computer Forensics Software
      • DataLifter
      • X-Ways Forensics
      • LiveWire Investigator
Module 07: Understanding Hard Disks and File Systems
  • Hard Disk Drive Overview
    • Disk Drive Overview
    • Hard Disk Drive
    • Solid-State Drive (SSD)
    • Physical Structure of a Hard Disk
    • Logical Structure of Hard Disk
    • Types of Hard Disk Interfaces
    • Hard Disk Interfaces
      • ATA
      • SCSI
      • IDE/EIDE
      • USB
      • Fibre Channel
    • Disk Platter
    • Tracks
      • Track Numbering
    • Sector
      • Advanced Format: Sectors
      • Sector Addressing
    • Cluster
      • Cluster Size
      • Changing the Cluster Size
      • Slack Space
      • Lost Clusters
    • Bad Sector
    • Hard Disk Data Addressing
    • Disk Capacity Calculation
    • Measuring the Performance of the Hard Disk
  • Disk Partitions and Boot Process
    • Disk Partitions
    • Master Boot Record
      • Structure of a Master Boot Record
    • What is the Booting Process?
    • Essential Windows System Files
    • Windows Boot Process
    • Macintosh Boot Process
    • http://www.bootdisk.com
  • Understanding File Systems
    • Understanding File Systems
    • Types of File Systems
    • List of Disk File Systems
    • List of Network File Systems
    • List of Special Purpose File Systems
    • List of Shared Disk File Systems
    • Popular Windows File Systems
      • File Allocation Table (FAT)
        • FAT File System Layout
        • FAT Partition Boot Sector
        • FAT Structure
        • FAT Folder Structure
        • Directory Entries and Cluster Chains
        • Filenames on FAT Volumes
        • Examining FAT
        • FAT32
      • New Technology File System (NTFS)
        • NTFS Architecture
        • NTFS System Files
        • NTFS Partition Boot Sector
        • Cluster Sizes of NTFS Volume
        • NTFS Master File Table (MFT)
          • Metadata Files Stored in the MFT
        • NTFS Files and Data Storage
        • NTFS Attributes
        • NTFS Data Stream
        • NTFS Compressed Files
          • Setting the Compression State of a Volume
        • Encrypting File Systems (EFS)
          • Components of EFS
          • Operation of Encrypting File System
          • EFS Attribute
          • Encrypting a File
          • EFS Recovery Key Agent
          • Tool: Advanced EFS Data Recovery
          • Tool: EFS Key
        • Sparse Files
        • Deleting NTFS Files
      • Registry Data
      • Examining Registry Data
      • FAT vs. NTFS
    • Popular Linux File Systems
      • Linux File System Architecture
      • Ext2
      • Ext3
    • Mac OS X File System
      1. HFS vs. HFS Plus
      2. HFS
      3. HFS Plus
        1. HFS Plus Volumes
        2. HFS Plus Journal
    • Sun Solaris 10 File System: ZFS
    • CD-ROM / DVD File System
    • CDFS
  • RAID Storage System
    • RAID Levels
    • Different RAID Levels
    • Comparing RAID Levels
    • Recover Data from Unallocated Space Using File Carving Process
  • File System Analysis Using The Sleuth Kit (TSK)
    • The Sleuth Kit (TSK)
      • The Sleuth Kit (TSK): fsstat
      • The Sleuth Kit (TSK): istat
      • The Sleuth Kit (TSK): fls and img_stat
Module 08: Windows Forensics
  • Collecting Volatile Information
    • Volatile Information
      • System Time
        • Logged-on Users
        • Psloggedon
        • Net Sessions Command
        • Logonsessions Tool
      • Open Files
        • Net File Command
        • PsFile Command
        • OpenFiles Command
      • Network Information
      • Network Connections
      • Process Information
      • Process-to-Port Mapping
      • Process Memory
      • Network Status
      • Other Important Information
  • Collecting Non-volatile Information
    • Non-volatile Information
      • Examine File Systems
      • Registry Settings
      • Microsoft Security ID
      • Event Logs
      • Index.dat File
      • Devices and Other Information
      • Slack Space
      • Virtual Memory
      • Swap File
      • Windows Search Index
      • Collecting Hidden Partition Information
      • Hidden ADS Streams
        • Investigating ADS Streams: StreamArmor
      • Other Non-Volatile Information
  • Windows Memory Analysis
    • Memory Dump
    • EProcess Structure
    • Process Creation Mechanism
    • Parsing Memory Contents
    • Parsing Process Memory
    • Extracting the Process Image
    • Collecting Process Memory
  • Windows Registry Analysis
    • Inside the Registry
    • Registry Structure within a Hive File
    • The Registry as a Log File
    • Registry Analysis
    • System Information
    • TimeZone Information
    • Shares
    • Audit Policy
    • Wireless SSIDs
    • Autostart Locations
    • System Boot
    • User Login
    • User Activity
    • Enumerating Autostart Registry Locations
    • USB Removable Storage Devices
    • Mounted Devices
    • Finding Users
    • Tracking User Activity
    • The UserAssist Keys
    • MRU Lists
    • Search Assistant
    • Connecting to Other Systems
    • Analyzing Restore Point Registry Settings
    • Determining the Startup Locations
  • Cache, Cookie, and History Analysis
    • Cache, Cookie, and History Analysis in IE
    • Cache, Cookie, and History Analysis in Firefox
    • Cache, Cookie, and History Analysis in Chrome
    • Analysis Tools
      • IE Cookies View
      • IE Cache View
      • IE History Viewer
      • MozillaCookiesView
      • MozillaCacheView
      • MozillaHistoryView
      • ChromeCookiesView
      • ChromeCacheView
      • ChromeHistoryView
  • MD5 Calculation
    • Message Digest Function: MD5
    • Why MD5 Calculation?
    • MD5 Hash Calculators: HashCalc, MD5 Calculator and HashMyFiles
    • MD5 Checksum Verifier
    • ChaosMD5
  • Windows File Analysis
    • Recycle Bin
    • System Restore Points (Rp.log Files)
    • System Restore Points (Change.log.x Files)
    • Prefetch Files
    • Shortcut Files
    • Word Documents
    • PDF Documents
    • Image Files
    • File Signature Analysis
    • NTFS Alternate Data Streams
    • Executable File Analysis
    • Documentation Before Analysis
    • Static Analysis Process
    • Search Strings
    • PE Header Analysis
    • Import Table Analysis
    • Export Table Analysis
    • Dynamic Analysis Process
    • Creating Test Environment
    • Collecting Information Using Tools
    • Process of Testing the Malware
  • Metadata Investigation
    • Metadata
    • Types of Metadata
    • Metadata in Different File Systems
    • Metadata in PDF Files
    • Metadata in Word Documents
    • Tool: Metadata Analyzer
  • Text Based Logs
    • Understanding Events
    • Event Logon Types
    • Event Record Structure
    • Vista Event Logs
    • IIS Logs
      • Parsing IIS Logs
    • Parsing FTP Logs
      • FTP sc-status Codes
    • Parsing DHCP Server Logs
    • Parsing Windows Firewall Logs
    • Using the Microsoft Log Parser
  • Other Audit Events
    • Evaluating Account Management Events
    • Examining Audit Policy Change Events
    • Examining System Log Entries
    • Examining Application Log Entries
  • Forensic Analysis of Event Logs
    • Searching with Event Viewer
    • Using EnCase to Examine Windows Event Log Files
    • Windows Event Log Files Internals
  • Windows Password Issues
    • Understanding Windows Password Storage
    • Cracking Windows Passwords Stored on Running Systems
    • Exploring Windows Authentication Mechanisms
      • LanMan Authentication Process
      • NTLM Authentication Process
      • Kerberos Authentication Process
    • Sniffing and Cracking Windows Authentication Exchanges
    • Cracking Offline Passwords
  • Forensic Tools
    • Windows Forensics Tool: OS Forensics
    • Windows Forensics Tool: Helix3 Pro
    • Integrated Windows Forensics Software: X-Ways Forensics
    • X-Ways Trace
    • Windows Forensic Toolchest (WFT)
    • Built-in Tool: Sigverif
    • Computer Online Forensic Evidence Extractor (COFEE)
    • System Explorer
    • Tool: System Scanner
    • SecretExplorer
    • Registry Viewer Tool: Registry Viewer
    • Registry Viewer Tool: RegScanner
    • Registry Viewer Tool: Alien Registry Viewer
    • MultiMon
    • CurrProcess
    • Process Explorer
    • Security Task Manager
    • PrcView
    • ProcHeapViewer
    • Memory Viewer
    • Tool: PMDump
    • Word Extractor
    • Belkasoft Evidence Center
    • Belkasoft Browser Analyzer
    • Metadata Assistant
    • HstEx
    • XpoLog Center Suite
    • LogViewer Pro
    • Event Log Explorer
    • LogMeister
    • ProDiscover Forensics
    • PyFlag
    • LiveWire Investigator
    • ThumbsDisplay
    • DriveLook
Module 09: Data Acquisition and Duplication
  • Data Acquisition and Duplication Concepts
    • Data Acquisition
    • Forensic and Procedural Principles
    • Types of Data Acquisition Systems
    • Data Acquisition Formats
    • Bit Stream vs. Backups
    • Why to Create a Duplicate Image?
    • Issues with Data Duplication
    • Data Acquisition Methods
    • Determining the Best Acquisition Method
    • Contingency Planning for Image Acquisitions
    • Data Acquisition Mistakes
  • Data Acquisition Types
    • Rules of Thumb
    • Static Data Acquisition
      • Collecting Static Data
      • Static Data Collection Process
    • Live Data Acquisition
      • Why Volatile Data is Important?
      • Volatile Data
      • Order of Volatility
      • Common Mistakes in Volatile Data Collection
      • Volatile Data Collection Methodology
      • Basic Steps in Collecting Volatile Data
      • Types of Volatile Information
  • Disk Acquisition Tool Requirements
    • Disk Imaging Tool Requirements
    • Disk Imaging Tool Requirements: Mandatory
    • Disk Imaging Tool Requirements: Optional
  • Validation Methods
    • Validating Data Acquisitions
    • Linux Validation Methods
    • Windows Validation Methods
  • RAID Data Acquisition
    • Understanding RAID Disks
    • Acquiring RAID Disks
    • Remote Data Acquisition
  • Acquisition Best Practices
    • Acquisition Best Practices
  • Data Acquisition Software Tools
    • Acquiring Data on Windows
    • Acquiring Data on Linux
    • dd Command
    • dcfldd Command
    • Extracting the MBR
    • Netcat Command
    • EnCase Forensic
    • Analysis Software: DriveSpy
    • ProDiscover Forensics
    • AccessData FTK Imager
    • Mount Image Pro
    • Data Acquisition Toolbox
    • SafeBack
    • ILookPI
    • RAID Recovery for Windows
    • R-Tools R-Studio
    • F-Response
    • PyFlag
    • LiveWire Investigator
    • ThumbsDisplay
    • DataLifter
    • X-Ways Forensics
    • R-drive Image
    • DriveLook
    • DiskExplorer
    • P2 eXplorer Pro
    • Flash Retriever Forensic Edition
  • Data Acquisition Hardware Tools
    • US-LATT
    • Image MASSter: Solo-4 (Super Kit)
    • Image MASSter: RoadMASSter- 3
    • Tableau TD1 Forensic Duplicator
    • Logicube: Forensic MD5
    • Logicube: Portable Forensic Lab™
    • Logicube: Forensic Talon®
    • Logicube: RAID I/O Adapter™
    • DeepSpar: Disk Imager Forensic Edition
    • Logicube: USB Adapter
    • Disk Jockey PRO
    • Logicube: Forensic Quest-2®
    • Logicube: CloneCard Pro
    • Logicube: EchoPlus
    • Paraben Forensics Hardware: Chat Stick
    • Image MASSter: Rapid Image 7020CS IT
    • Digital Intelligence Forensic Hardware: UltraKit
    • Digital Intelligence Forensic Hardware: UltraBay II
    • Digital Intelligence Forensic Hardware: UltraBlock SCSI
    • Digital Intelligence Forensic Hardware: HardCopy 3P
    • Wiebetech: Forensics DriveDock v4
    • Wiebetech: Forensics UltraDock v4
    • Image MASSter: WipeMASSter
    • Image MASSter: WipePRO
    • Portable Forensic Systems and Towers: Forensic Air-Lite V MK III
    • Forensic Tower IV Dual Xeon
    • Digital Intelligence Forensic Hardware: FREDDIE
    • DeepSpar: 3D Data Recovery
      • Phase 1 Tool: PC-3000 Drive Restoration System
      • Phase 2 Tool: DeepSpar Disk Imager
      • Phase 3 Tool: PC-3000 Data Extractor
    • Logicube
      • Cables
      • Adapters
      • GPStamp™
      • OmniPort
      • CellDEK®
    • Paraben Forensics Hardware
      • Project-a-Phone
      • Mobile Field Kit
      • iRecovery Stick
    • CelleBrite
      • UFED System
      • UFED Physical Pro
Module 10: Recovering Deleted Files and Deleted Partitions
  • Recovering the Deleted Files
    • Deleting Files
    • What Happens When a File is Deleted in Windows?
    • Recycle Bin in Windows
      • Storage Locations of Recycle Bin in FAT and NTFS System
      • How the Recycle Bin Works
      • Damaged or Deleted INFO File
      • Damaged Files in Recycled Folder
      • Damaged Recycle Folder
    • File Recovery in MAC OS X
    • File Recovery in Linux
  • File Recovery Tools for Windows
    • Recover My Files
    • EASEUS Data Recovery Wizard
    • PC INSPECTOR File Recovery
    • Recuva
    • DiskDigger
    • Handy Recovery
    • Quick Recovery
    • Stellar Phoenix Windows Data Recovery
    • Tools to Recover Deleted Files
      • Total Recall
      • Advanced Disk Recovery
      • Windows Data Recovery Software
      • R-Studio
      • PC Tools File Recover
      • Data Rescue PC
      • Smart Undelete
      • FileRestore Professional
      • Deleted File Recovery Software
      • DDR Professional Recovery Software
      • Data Recovery Pro
      • GetDataBack
      • UndeletePlus
      • Search and Recover
      • File Scavenger
      • Filesaver
      • Virtual Lab
      • [email protected] UNDELETE
      • Win Undelete
      • R-Undelete
      • Recover4all Professional
      • eData Unerase
      • [email protected] File Recovery
      • FinalRecovery
  • File Recovery Tools for MAC
    • MAC File Recovery
    • MAC Data Recovery
    • Boomerang Data Recovery Software
    • VirtualLab
    • File Recovery Tools for MAC OS X
      • DiskWarrior
      • AppleXsoft File Recovery for MAC
      • Disk Doctors MAC Data Recovery
      • R-Studio for MAC
      • Data Rescue
      • Stellar Phoenix MAC Data Recovery
      • FileSalvage
      • TechTool Pro
  • File Recovery Tools for Linux
    • R-Studio for Linux
    • Quick Recovery for Linux
    • Kernal for Linux Data Recovery
    • TestDisk for Linux
  • Recovering the Deleted Partitions
    • Disk Partition
    • Deletion of Partition
    • Recovery of the Deleted Partition
  • Partition Recovery Tools
    • [email protected] Partition Recovery for Windows
    • Acronis Recovery Expert
    • DiskInternals Partition Recovery
    • NTFS Partition Data Recovery
    • GetDataBack
    • EASEUS Partition Recovery
    • Advanced Disk Recovery
    • Power Data Recovery
    • Remo Recover (MAC) - Pro
    • MAC Data Recovery Software
    • Quick Recovery for Linux
    • Stellar Phoenix Linux Data Recovery Software
    • Tools to Recover Deleted Partitions
      • Handy Recovery
      • TestDisk for Windows
      • Stellar Phoenix Windows Data Recovery
      • ARAX Disk Doctor
      • Power Data Recovery
      • Quick Recovery for MAC
      • Partition Find & Mount
      • Advance Data Recovery Software Tools
      • TestDisk for MAC
      • Kernel for FAT and NTFS – Windows Disk Recovery
      • Disk Drill
      • Stellar Phoenix MAC Data Recovery
      • ZAR Windows Data Recovery
      • AppleXsoft File Recovery for MAC
      • Quick Recovery for FAT & NTFS
      • TestDisk for Linux
Module 11: Forensics Investigation using AccessData FTK
  • Overview and Installation of FTK
    • Overview of Forensic Toolkit (FTK)
    • Features of FTK
    • Software Requirement
    • Configuration Option
    • Database Installation
    • FTK Application Installation
  • FTK Case Manager User Interface
    • Case Manager Window
      • Case Manager Database Menu
        • Setting Up Additional Users and Assigning Roles
      • Case Manager Case Menu
        • Assigning Users Shared Label Visibility
      • Case Manager Tools Menu
        • Recovering Processing Jobs
        • Restoring an Image to a Disk
      • Case Manager Manage Menu
        • Managing Carvers
        • Managing Custom Identifiers
  • FTK Examiner User Interface
    • FTK Examiner User Interface
      • Menu Bar: File Menu
        • Exporting Files
        • Exporting Case Data to a Custom Content Image
        • Exporting the Word List
      • Menu Bar: Edit Menu
      • Menu Bar: View Menu
      • Menu Bar: Evidence Menu
      • Menu Bar: Tools Menu
        • Verifying Drive Image Integrity
        • Mounting an Image to a Drive
      • File List View
        • Using Labels
        • Creating and Applying a Label
  • Starting with FTK
    • Creating a case
    • Selecting Detailed Options: Evidence Processing
    • Selecting Detailed Options: Fuzzy Hashing
    • Selecting Detailed Options: Data Carving
    • Selecting Detailed Options: Custom File Identification
    • Selecting Detailed Options: Evidence Refinement (Advanced)
    • Selecting Detailed Options: Index Refinement (Advanced)
  • FTK Interface Tabs
    • FTK Interface Tabs
      • Explore Tab
      • Overview Tab
      • Email Tab
      • Graphics Tab
      • Bookmarks Tab
      • Live Search Tabs
      • Volatile Tab
  • Adding and Processing Static, Live, and Remote Evidence
    • Adding Evidence to a Case
    • Evidence Groups
    • Acquiring Local Live Evidence
    • FTK Role Requirements For Remote Acquisition
    • Types of Remote Information
    • Acquiring Data Remotely Using Remote Device Management System (RDMS)
    • Imaging Drives
    • Mounting and Unmounting a Device
  • Using and Managing Filters
    • Accessing Filter Tools
    • Using Filters
    • Customizing Filters
    • Using Predefined Filters
  • Using Index Search and Live Search
    • Conducting an Index Search
      • Selecting Index Search Options
      • Viewing Index Search Results
      • Documenting Search Results
    • Conducting a Live Search: Live Text Search
    • Conducting a Live Search: Live Hex Search
    • Conducting a Live Search: Live Pattern Search
  • Decrypting EFS and other Encrypted Files
    • Decrypting EFS Files and Folders
    • Decrypting MS Office Files
    • Viewing Decrypted Files
    • Decrypting Domain Account EFS Files from Live Evidence
    • Decrypting Credant Files
    • Decrypting Safeboot Files
  • Working with Reports
    • Creating a Report
    • Entering Case Information
    • Managing Bookmarks in a Report
    • Managing Graphics in a Report
    • Selecting a File Path List
    • Adding a File Properties List
    • Making Registry Selections
    • Selecting the Report Output Options
    • Customizing the Formatting of Reports
    • Viewing and Distributing a Report
Module 12: Forensics Investigation Using EnCase
  • Overview of EnCase Forensic
    • Overview of EnCase Forensic
    • EnCase Forensic Features
    • EnCase Forensic Platform
    • EnCase Forensic Modules
  • Installing EnCase Forensic
    • Minimum Requirements
    • Installing the Examiner
    • Installed Files
    • Installing the EnCase Modules
    • Configuring EnCase
      • Configuring EnCase: Case Options Tab
      • Configuring EnCase: Global Tab
      • Configuring EnCase: Debug Tab
      • Configuring EnCase: Colors Tab and Fonts Tab
      • Configuring EnCase: EnScript Tab and Storage Paths Tab
    • Sharing Configuration (INI) Files
  • EnCase Interface
    • Main EnCase Window
      • System Menu Bar
      • Toolbar
      • Panes Overview
        • Tree Pane
        • Table Pane
        • Table Pane: Table Tab
        • Table Pane: Report Tab
        • Table Pane: Gallery Tab
        • Table Pane: Timeline Tab
        • Table Pane: Disk Tab and Code Tab
      • View Pane
      • Filter Pane
        • Filter Pane Tabs
        • Creating a Filter
        • Creating Conditions
      • Status Bar
  • Case Management
    • Overview of Case Structure
    • Case Management
    • Indexing a Case
    • Case Backup
    • Options Dialog Box
    • Logon Wizard
    • New Case Wizard
    • Setting Time Zones for Case Files
    • Setting Time Zone Options for Evidence Files
  • Working with Evidence
    • Types of Entries
    • Adding a Device
      • Adding a Device using Tableau Write Blocker
    • Performing a Typical Acquisition
    • Acquiring a Device
    • Canceling an Acquisition
    • Acquiring a Handsprings PDA
    • Delayed Loading of Internet Artifacts
    • Hashing the Subject Drive
    • Logical Evidence File (LEF)
    • Creating a Logical Evidence File
    • Recovering Folders on FAT Volumes
    • Restoring a Physical Drive
  • Source Processor
    • Source Processor
    • Starting to Work with Source Processor
    • Setting Case Options
    • Collection Jobs
      • Creating a Collection Job
      • Copying a Collection Job
      • Running a Collection Job
    • Analysis Jobs
      • Creating an Analysis Job
      • Running an Analysis Job
    • Creating a Report
  • Analyzing and Searching Files
    • Viewing the File Signature Directory
    • Performing a Signature Analysis
    • Hash Analysis
    • Hashing a New Case
    • Creating a Hash Set
    • Keyword Searches
    • Creating Global Keywords
    • Adding Keywords
    • Importing and Exporting Keywords
    • Searching Entries for Email and Internet Artifacts
    • Viewing Search Hits
    • Generating an Index
    • Tag Records
  • Viewing File Content
    • Viewing Files
    • Copying and Unerasing Files
    • Adding a File Viewer
    • Viewing File Content Using View Pane
    • Viewing Compound Files
    • Viewing Base64 and UUE Encoded Files
  • Bookmarking Items
    • Bookmarks Overview
    • Creating a Highlighted Data Bookmark
    • Creating a Note Bookmark
    • Creating a Folder Information/ Structure Bookmark
    • Creating a Notable File Bookmark
    • Creating a File Group Bookmark
    • Creating a Log Record Bookmark
    • Creating a Snapshot Bookmark
    • Organizing Bookmarks
    • Copying/Moving a Table Entry into a Folder
    • Viewing a Bookmark on the Table Report Tab
    • Excluding Bookmarks
    • Copying Selected Items from One Folder to Another
  • Reporting
    • Reporting
    • Report User Interface
    • Creating a Report Using the Report Tab
    • Report Single/Multiple Files
    • Viewing a Bookmark Report
    • Viewing an Email Report
    • Viewing a Webmail Report
    • Viewing a Search Hits Report
    • Creating a Quick Entry Report
    • Creating an Additional Fields Report
    • Exporting a Report
Module 13: Steganography and Image File Forensics
  • Steganography
    • What is Steganography?
    • How Steganography Works
    • Legal Use of Steganography
    • Unethical Use of Steganography
  • Steganography Techniques
    • Steganography Techniques
    • Application of Steganography
    • Classification of Steganography
    • Technical Steganography
    • Linguistic Steganography
    • Types of Steganography
      • Image Steganography
        • Least Significant Bit Insertion
        • Masking and Filtering
        • Algorithms and Transformation
        • Image Steganography: Hermetic Stego
        • Steganography Tool: S- Tools
        • Image Steganography Tools
          • ImageHide
          • QuickStego
          • Gifshuffle
          • OutGuess
          • Contraband
          • Camera/Shy
          • JPHIDE and JPSEEK
          • StegaNote
      • Audio Steganography
        • Audio Steganography Methods
        • Audio Steganography: Mp3stegz
        • Audio Steganography Tools
          • MAXA Security Tools
          • Stealth Files
          • Audiostegano
          • BitCrypt
          • MP3Stego
          • Steghide
          • Hide4PGP
          • CHAOS Universal
      • Video Steganography
        • Video Steganography: MSU StegoVideo
        • Video Steganography Tools
          • Masker
          • Max File Encryption
          • Xiao Steganography
          • RT Steganography
          • Our Secret
          • BDV DataHider
          • CHAOS Universal
          • OmniHide PRO
      • Document Steganography: wbStego
        • Byte Shelter I
        • Document Steganography Tools
          • Merge Streams
          • Office XML
          • CryptArkan
          • Data Stash
          • FoxHole
          • Xidie Security Suite
          • StegParty
          • Hydan
      • Whitespace Steganography Tool: SNOW
      • Folder Steganography: Invisible Secrets 4
        • Folder Steganography Tools
          • StegoStick
          • QuickCrypto
          • Max Folder Secure
          • WinMend Folder Hidden
          • PSM Encryptor
          • XPTools
          • Universal Shield
          • Hide My Files
      • Spam/Email Steganography: Spam Mimic
    • Steganographic File System
    • Issues in Information Hiding
  • Steganalysis
    • Steganalysis
    • How to Detect Steganography
    • Detecting Text, Image, Audio, and Video Steganography
    • Steganalysis Methods/Attacks on Steganography
    • Disabling or Active Attacks
    • Steganography Detection Tool: Stegdetect
    • Steganography Detection Tools
      • Xstegsecret
      • Stego Watch
      • StegAlyzerAS
      • StegAlyzerRTS
      • StegSpy
      • Gargoyle Investigator™ Forensic Pro
      • StegAlyzerSS
      • StegMark
  • Image Files
    • Image Files
    • Common Terminologies
    • Understanding Vector Images
    • Understanding Raster Images
    • Metafile Graphics
    • Understanding Image File Formats
    • GIF (Graphics Interchange Format)
    • JPEG (Joint Photographic Experts Group)
      • JPEG File Structure
      • JPEG 2000
    • BMP (Bitmap) File
      • BMP File Structure
    • PNG (Portable Network Graphics)
      • PNG File Structure
    • TIFF (Tagged Image File Format)
      • TIFF File Structure
  • Data Compression
    • Understanding Data Compression
    • How Does File Compression Work?
    • Lossless Compression
    • Huffman Coding Algorithm
    • Lempel-Ziv Coding Algorithm
    • Lossy Compression
    • Vector Quantization
  • Locating and Recovering Image Files
    • Best Practices for Forensic Image Analysis
    • Forensic Image Processing Using MATLAB
    • Locating and Recovering Image Files
    • Analyzing Image File Headers
    • Repairing Damaged Headers
    • Reconstructing File Fragments
    • Identifying Unknown File Formats
    • Identifying Image File Fragments
    • Identifying Copyright Issues on Graphics
    • Picture Viewer: IrfanView
    • Picture Viewer: ACDSee Photo Manager 12
    • Picture Viewer: Thumbsplus
    • Picture Viewer: AD Picture Viewer Lite
    • Picture Viewer Max
    • Picture Viewer: FastStone Image Viewer
    • Picture Viewer: XnView
    • Faces – Sketch Software
    • Digital Camera Data Discovery Software: File Hound
  • Image File Forensics Tools
    • Hex Workshop
    • GFE Stealth™ - Forensics Graphics File Extractor
    • Ilook
    • Adroit Photo Forensics 2011
    • Digital Photo Recovery
    • Stellar Phoenix Photo Recovery Software
    • Zero Assumption Recovery (ZAR)
    • Photo Recovery Software
    • Forensic Image Viewer
    • File Finder
    • DiskGetor Data Recovery
    • DERescue Data Recovery Master
    • Recover My Files
    • Universal Viewer
Module 14: Application Password Crackers
  • Password Cracking Concepts
    • Password - Terminology
    • Password Types
    • Password Cracker
    • How Does a Password Cracker Work?
    • How Hash Passwords are Stored in Windows SAM
  • Types of Password Attacks
    • Password Cracking Techniques
    • Types of Password Attacks
    • Passive Online Attacks: Wire Sniffing
    • Password Sniffing
    • Passive Online Attack: Man-in-the-Middle and Replay Attack
    • Active Online Attack: Password Guessing
    • Active Online Attack: Trojan/Spyware/keylogger
    • Active Online Attack: Hash Injection Attack
    • Rainbow Attacks: Pre-Computed Hash
    • Distributed Network Attack
      • Elcomsoft Distributed Password Recovery
    • Non-Electronic Attacks
    • Manual Password Cracking (Guessing)
    • Automatic Password Cracking Algorithm
    • Time Needed to Crack Passwords
  • Classification of Cracking Software
  • Systems Software vs. Applications Software
  • System Software Password Cracking
    • Bypassing BIOS Passwords
      • Using Manufacturer's Backdoor Password to Access the BIOS
      • Using Password Cracking Software
        • CmosPwd
      • Resetting the CMOS using the Jumpers or Solder Beads
      • Removing CMOS Battery
      • Overloading the Keyboard Buffer and Using a Professional Service
    • Tool to Reset Admin Password: [email protected] Password Changer
    • Tool to Reset Admin Password: Windows Key
  • Application Software Password Cracking
    • Passware Kit Forensic
    • Accent Keyword Extractor
    • Distributed Network Attack
    • Password Recovery Bundle
    • Advanced Office Password Recovery
    • Office Password Recovery
    • Office Password Recovery Toolbox
    • Office Multi-document Password Cracker
    • Word Password Recovery Master
    • Accent WORD Password Recovery
    • Word Password
    • PowerPoint Password Recovery
    • PowerPoint Password
    • Powerpoint Key
    • Stellar Phoenix Powerpoint Password Recovery
    • Excel Password Recovery Master
    • Accent EXCEL Password Recovery
    • Excel Password
    • Advanced PDF Password Recovery
    • PDF Password Cracker
    • PDF Password Cracker Pro
    • Atomic PDF Password Recovery
    • PDF Password
    • Recover PDF Password
    • Appnimi PDF Password Recovery
    • Advanced Archive Password Recovery
    • KRyLack Archive Password Recovery
    • Zip Password
    • Atomic ZIP Password Recovery
    • RAR Password Unlocker
    • Default Passwords
    • http://www.defaultpassword.com
    • http://www.cirt.net/passwords
    • http://default-password.info
    • http://www.defaultpassword.us
    • http://www.passwordsdatabase.com
    • http://www.virus.org
  • Password Cracking Tools
    • L0phtCrack
    • OphCrack
    • Cain & Abel
    • RainbowCrack
    • Windows Password Unlocker
    • Windows Password Breaker
    • SAMInside
    • PWdump7 and Fgdump
    • PCLoginNow
    • KerbCrack
    • Recover Keys
    • Windows Password Cracker
    • Proactive System Password Recovery
    • Password Unlocker Bundle
    • Windows Password Reset Professional
    • Windows Password Reset Standard
    • Krbpwguess
    • Password Kit
    • WinPassword
    • Passware Kit Enterprise
    • Rockxp
    • PasswordsPro
    • LSASecretsView
    • LCP
    • MessenPass
    • Mail PassView
    • Messenger Key
    • Dialupass
    • Protected Storage PassView
    • Network Password Recovery
    • Asterisk Key
    • IE PassView
Module 15: Log Capturing and Event Correlation
  • Computer Security Logs
    • Computer Security Logs
    • Operating System Logs
    • Application Logs
    • Security Software Logs
    • Router Log Files
    • Honeypot Logs
    • Linux Process Accounting
    • Logon Event in Window
    • Windows Log File
      • Configuring Windows Logging
      • Analyzing Windows Logs
      • Windows Log File: System Logs
      • Windows Log File: Application Logs
      • Logon Events that appear in the Security Event Log
    • IIS Logs
      • IIS Log File Format
      • Maintaining Credible IIS Log Files
    • Log File Accuracy
    • Log Everything
    • Keeping Time
    • UTC Time
    • View the DHCP Logs
      • Sample DHCP Audit Log File
    • ODBC Logging
  • Logs and Legal Issues
    • Legality of Using Logs
    • Records of Regularly Conducted Activity as Evidence
    • Laws and Regulations
  • Log Management
    • Log Management
      • Functions of Log Management
      • Challenges in Log Management
      • Meeting the Challenges in Log Management
  • Centralized Logging and Syslogs
    • Centralized Logging
      • Centralized Logging Architecture
      • Steps to Implement Central Logging
    • Syslog
      • Syslog in Unix-Like Systems
      • Steps to Set Up a Syslog Server for Unix Systems
      • Advantages of Centralized Syslog Server
    • IIS Centralized Binary Logging
  • Time Synchronization
    • Why Synchronize Computer Times?
    • What is NTP?
      • NTP Stratum Levels
    • NIST Time Servers
    • Configuring Time Server in Windows Server
  • Event Correlation
    • Event Correlation
      • Types of Event Correlation
      • Prerequisites for Event Correlation
      • Event Correlation Approaches
  • Log Capturing and Analysis Tools
    • GFI EventsManager
    • Activeworx Security Center
    • EventLog Analyzer
    • Syslog-ng OSE
    • Kiwi Syslog Server
    • WinSyslog
    • Firewall Analyzer: Log Analysis Tool
    • Activeworx Log Center
    • EventReporter
    • Kiwi Log Viewer
    • Event Log Explorer
    • WebLog Expert
    • XpoLog Center Suite
    • ELM Event Log Monitor
    • EventSentry
    • LogMeister
    • LogViewer Pro
    • WinAgents EventLog Translation Service
    • EventTracker Enterprise
    • Corner Bowl Log Manager
    • Ascella Log Monitor Plus
    • FLAG - Forensic and Log Analysis GUI
    • Simple Event Correlator (SEC)
Module 16: Network Forensics, Investigating Logs and Investigating Network Traffic
  • Network Forensics
    • Network Forensics
    • Network Forensics Analysis Mechanism
    • Network Addressing Schemes
    • Overview of Network Protocols
    • Overview of Physical and Data-Link Layer of the OSI Model
    • Overview of Network and Transport Layer of the OSI Model
    • OSI Reference Model
    • TCP/ IP Protocol
    • Intrusion Detection Systems (IDS) and ??heir Placement
      • How IDS Works
      • Types of Intrusion Detection Systems
      • General Indications of Intrusions
    • Firewall
    • Honeypot
  • Network Attacks
    • Network Vulnerabilities
    • Types of Network Attacks
      • IP Address Spoofing
      • Man-in-the-Middle Attack
      • Packet Sniffing
        • How a Sniffer Works
      • Enumeration
      • Denial of Service Attack
      • Session Sniffing
      • Buffer Overflow
      • Trojan Horse
  • Log Injection Attacks
    • New Line Injection Attack
      • New Line Injection Attack Countermeasure
    • Separator Injection Attack
      • Defending Separator Injection Attacks
    • Timestamp Injection Attack
      • Defending Timestamp Injection Attacks
    • Word Wrap Abuse Attack
      • Defending Word Wrap Abuse Attacks
    • HTML Injection Attack
      • Defending HTML Injection Attacks
    • Terminal Injection Attack
      • Defending Terminal Injection Attacks
  • Investigating and Analyzing Logs
    • Postmortem and Real-Time Analysis
    • Where to Look for Evidence
    • Log Capturing Tool: ManageEngine EventLog Analyzer
    • Log Capturing Tool: ManageEngine Firewall Analyzer
    • Log Capturing Tool: GFI EventsManager
    • Log Capturing Tool: Kiwi Syslog Server
    • Handling Logs as Evidence
    • Log File Authenticity
    • Use Signatures, Encryption, and Checksums
    • Work with Copies
    • Ensure System's Integrity
    • Access Control
    • Chain of Custody
    • Condensing Log File
  • Investigating Network Traffic
    • Why Investigate Network Traffic?
    • Evidence Gathering via Sniffing
    • Capturing Live Data Packets Using Wireshark
      • Display Filters in Wireshark
      • Additional Wireshark Filters
    • Acquiring Traffic Using DNS Poisoning Techniques
      • Intranet DNS Spoofing (Local Network)
      • Intranet DNS Spoofing (Remote Network)
      • Proxy Server DNS Poisoning
      • DNS Cache Poisoning
    • Evidence Gathering from ARP Table
    • Evidence Gathering at the Data-Link Layer: DHCP Database
    • Gathering Evidence by IDS
  • Traffic Capturing and Analysis Tools
    • NetworkMiner
    • Tcpdump/Windump
    • Intrusion Detection Tool: Snort
      • How Snort Works
    • IDS Policy Manager
    • MaaTec Network Analyzer
    • Iris Network Traffic Analyzer
    • NetWitness Investigator
    • Colasoft Capsa Network Analyzer
    • Sniff - O - Matic
    • NetResident
    • Network Probe
    • NetFlow Analyzer
    • OmniPeek Network Analyzer
    • Firewall Evasion Tool: Traffic IQ Professional
    • NetworkView
    • CommView
    • Observer
    • SoftPerfect Network Protocol Analyzer
    • EffeTech HTTP Sniffer
    • Big-Mother
    • EtherDetect Packet Sniffer
    • Ntop
    • EtherApe
    • AnalogX Packetmon
    • IEInspector HTTP Analyzer
    • SmartSniff
    • Distinct Network Monitor
    • Give Me Too
    • EtherSnoop
    • Show Traffic
    • Argus
  • Documenting the Evidence Gathered on a Network
Module 17: Investigating Wireless Attacks
  • Wireless Technologies
    • Wireless Networks
    • Wireless Terminologies
    • Wireless Components
    • Types of Wireless Networks
    • Wireless Standards
    • MAC Filtering
    • Service Set Identifier (SSID)
    • Types of Wireless Encryption: WEP
    • Types of Wireless Encryption: WPA
    • Types of Wireless Encryption: WPA2
    • WEP vs. WPA vs. WPA2
  • Wireless Attacks
    • Wi-Fi Chalking
      1. Wi-Fi Chalking Symbols
    • Access Control Attacks
    • Integrity Attacks
    • Confidentiality Attacks
    • Availability Attacks
    • Authentication Attacks
  • Investigating Wireless Attacks
    • Key Points to Remember
    • Steps for Investigation
      • Obtain a Search Warrant
      • Identify Wireless Devices at Crime Scene
        • Search for Additional Devices
        • Detect Rogue Access Point
      • Document the Scene and Maintain a Chain of Custody
      • Detect the Wireless Connections
        • Methodologies to Detect Wireless Connections
        • Wi-Fi Discovery Tool: inSSIDer
        • GPS Mapping
          • GPS Mapping Tool: WIGLE
          • GPS Mapping Tool: Skyhook
        • How to Discover Wi-Fi Networks Using Wardriving
        • Check for MAC Filtering
        • Changing the MAC Address
        • Detect WAPs using the Nessus Vulnerability Scanner
        • Capturing Wireless Traffic
          • Sniffing Tool: Wireshark
          • Follow TCP Stream in Wireshark
          • Display Filters in Wireshark
          • Additional Wireshark Filters
      • Determine Wireless Field Strength
        • Determine Wireless Field Strength: FSM
        • Determine Wireless Field Strength: ZAP Checker Products
        • What is Spectrum Analysis?
      • Map Wireless Zones & Hotspots
      • Connect to Wireless Network
        • Connect to the Wireless Access Point
        • Access Point Data Acquisition and Analysis: Attached Devices
        • Access Point Data Acquisition and Analysis: LAN TCP/IP Setup
        • Access Point Data Acquisition and Analysis
          • Firewall Analyzer
          • Firewall Log Analyzer
      • Wireless Devices Data Acquisition and Analysis
      • Report Generation
  • Features of a Good Wireless Forensics Tool
  • Wireless Forensics Tools
    • Wi-Fi Discovery Tools
      • NetStumbler
      • NetSurveyor
      • Vistumbler
      • WirelessMon
      • Kismet
      • AirPort Signal
      • WiFi Hopper
      • Wavestumbler
      • iStumbler
      • WiFinder
      • Meraki WiFi Stumbler
      • Wellenreiter
      • AirCheck Wi-Fi Tester
      • AirRadar 2
    • Wi-Fi Packet Sniffers
      • OmniPeek
      • CommView for Wi-Fi
      • Wi-Fi USB Dongle: AirPcap
      • tcpdump
      • KisMAC
    • Acquiring Traffic Using DNS Poisoning Techniques
      • Intranet DNS Spoofing (Local Network)
      • Intranet DNS Spoofing (Remote Network)
      • Proxy Server DNS Poisoning
      • DNS Cache Poisoning
    • Evidence Gathering from ARP Table
    • Evidence Gathering at the Data-ink Layer: DHCP Database
    • Gathering Evidence by IDS
  • Traffic Capturing and Analysis Tools
    • NetworkMiner
    • Tcpdump/Windump
    • Intrusion Detection Tool: Snort
      • How Snort Works
    • IDS Policy Manager
    • MaaTec Network Analyzer
    • Iris Network Traffic Analyzer
    • NetWitness Investigator
    • Colasoft Capsa Network Analyzer
    • Sniff - O - Matic
    • NetResident
    • Network Probe
    • NetFlow Analyzer
    • OmniPeek Network Analyzer
    • Firewall Evasion Tool: Traffic IQ Professional
    • NetworkView
    • CommView
    • Observer
    • SoftPerfect Network Protocol Analyzer
    • EffeTech HTTP Sniffer o Big-Mother o EtherDetect Packet Sniffer
      • Cascade Pilot Personal Edition
      • OptiView® XG Network Analysis Tablet
      • Network Packet Analyzer
      • Network Observer
      • Ufasoft Snif
      • CommView for WiFi
      • Network Assistant
    • Wi-Fi Raw Packet Capturing Tools
      • WirelessNetView
      • Pirni Sniffer
      • Tcpdump
      • Airview
    • Wi-Fi Spectrum Analyzing Tools
      • Cisco Spectrum Expert
      • AirMedic
      • BumbleBee
      • Wi-Spy
Module 18: Investigating Web Attacks
  • Introduction to Web Applications and Webservers
    • Introduction to Web Applications
    • Web Application Components
    • How Web Applications Work
    • Web Application Architecture
    • Open Source Webserver Architecture
    • Indications of a Web Attack
    • Web Attack Vectors
    • Why Web Servers are Compromised
    • Impact of Webserver Attacks
    • Website Defacement
    • Case Study
  • Web Logs
    • Overview of Web Logs
    • Application Logs
    • Internet Information Services (IIS) Logs
      • IIS Webserver Architecture
      • IIS Log File Format
    • Apache Webserver Logs
    • DHCP Server Logs
  • Web Attacks
    • Web Attacks - 1
    • Web Attacks - 2
      • Unvalidated Input
      • Parameter/Form Tampering
      • Directory Traversal
      • Security Misconfiguration
      • Injection Flaws
      • SQL Injection Attacks
      • Command Injection Attacks
        • Command Injection Example
      • File Injection Attack
      • What is LDAP Injection?
        • How LDAP Injection Works
      • Hidden Field Manipulation Attack
      • Cross-Site Scripting (XSS) Attacks
        • How XSS Attacks Work
      • Cross-Site Request Forgery (CSRF) Attack
        • How CSRF Attacks Work
      • Web Application Denial-of-Service (DoS) Attack
        • Denial of Service (DoS) Examples
      • Buffer Overflow Attacks
      • Cookie/Session Poisoning
        • How Cookie Poisoning Works
      • Session Fixation Attack
      • Insufficient Transport Layer Protection
      • Improper Error Handling
      • Insecure Cryptographic Storage
      • Broken Authentication and Session Management
      • Unvalidated Redirects and Forwards
      • DMZ Protocol Attack/ Zero Day Attack
      • Log Tampering
      • URL Interpretation and Impersonation Attack
      • Web Services Attack
      • Web Services Footprinting Attack
      • Web Services XML Poisoning
      • Webserver Misconfiguration
      • HTTP Response Splitting Attack
      • Web Cache Poisoning Attack
      • HTTP Response Hijacking
      • SSH Bruteforce Attack
      • Man-in-the-Middle Attack
      • Defacement Using DNS Compromise
  • Web Attack Investigation
    • Investigating Web Attacks
    • Investigating Web Attacks in Windows-Based Servers
    • Investigating IIS Logs
    • Investigating Apache Logs
    • Example of FTP Compromise
    • Investigating FTP Servers
    • Investigating Static and Dynamic IP Addresses
    • Sample DHCP Audit Log File
    • Investigating Cross-Site Scripting (XSS)
    • Investigating SQL Injection Attacks
    • Pen-Testing CSRF Validation Fields
    • Investigating Code Injection Attack
    • Investigating Cookie Poisoning Attack
    • Detecting Buffer Overflow
    • Investigating Authentication Hijacking
    • Web Page Defacement
    • Investigating DNS Poisoning
    • Intrusion Detection
    • Security Strategies to Web Applications
    • Checklist for Web Security
  • Web Attack Detection Tools
    • Web Application Security Tools
      • Acunetix Web Vulnerability Scanner
      • Falcove Web Vulnerability Scanner
      • Netsparker
      • N-Stalker Web Application Security Scanner
      • Sandcat
      • Wikto
      • WebWatchBot
      • OWASP ZAP
      • SecuBat Vulnerability Scanner
      • Websecurify
      • HackAlert
      • WebCruiser
    • Web Application Firewalls
      • dotDefender
      • IBM AppScan
      • ServerDefender VP
    • Web Log Viewers
      • Deep Log Analyzer
      • WebLog Expert
      • AlterWind Log Analyzer
      • Webalizer
      • eWebLog Analyzer
      • Apache Logs Viewer (ALV)
    • Web Attack Investigation Tools
      • AWStats
      • Paros Proxy
      • Scrawlr
  • Tools for Locating IP Address
    • Whois Lookup
    • SmartWhois
    • ActiveWhois
    • LanWhois
    • CountryWhois
    • CallerIP
    • Hide Real IP
    • IP - Address Manager
    • Pandora FMS
Module 19: Tracking Emails and Investigating Email Crimes
  • Email System Basics
    • Email Terminology
    • Email System
    • Email Clients
    • Email Server
    • SMTP Server
    • POP3 and IMAP Servers
    • Email Message
    • Importance of Electronic Records Management
  • Email Crimes
    • Email Crime
    • Email Spamming
    • Mail Bombing/Mail Storm
    • Phishing
    • Email Spoofing
    • Crime via Chat Room
    • Identity Fraud/Chain Letter
  • Email Headers
    • Examples of Email Headers
    • List of Common Headers
  • Steps to Investigate
    • Why to Investigate Emails
    • Investigating Email Crime and Violation
      • Obtain a Search Warrant and Seize the Computer and Email Account
      • Obtain a Bit-by-Bit Image of Email Information
      • Examine Email Headers
        • Viewing Email Headers in Microsoft Outlook
        • Viewing Email Headers in AOL
        • Viewing Email Headers in Hotmail
        • Viewing Email Headers in Gmail
        • Viewing Headers in Yahoo Mail
        • Forging Headers
      • Analyzing Email Headers
        • Email Header Fields
        • Received: Headers
        • Microsoft Outlook Mail
        • Examining Additional Files (.pst or .ost files)
        • Checking the Email Validity
        • Examine the Originating IP Address
      • Trace Email Origin
        • Tracing Back
        • Tracing Back Web-based Email
      • Acquire Email Archives
        • Email Archives
        • Content of Email Archives
        • Local Archive
        • Server Storage Archive
        • Forensic Acquisition of Email Archive
      • Recover Deleted Emails
        • Deleted Email Recovery
  • Email Forensics Tools
    • Stellar Phoenix Deleted Email Recovery
    • Recover My Email
    • Outlook Express Recovery
    • Zmeil
    • Quick Recovery for MS Outlook
    • Email Detective
    • Email Trace - Email Tracking
    • R-Mail
    • FINALeMAIL
    • eMailTrackerPro
    • Forensic Tool Kit (FTK)
    • Paraben's email Examiner
    • Network Email Examiner by Paraben
    • DiskInternal's Outlook Express Repair
    • Abuse.Net
    • MailDetective Tool
  • Laws and Acts against Email Crimes
    • U.S. Laws Against Email Crime: CAN-SPAM Act
    • 18 U.S.C. § 2252A
    • 18 U.S.C. § 2252B
    • Email Crime Law in Washington: RCW 19.190.020
Module 20: Mobile Forensics
  • Mobile Phone
    • Mobile Phone
    • Different Mobile Devices
    • Hardware Characteristics of Mobile Devices
    • Software Characteristics of Mobile Devices
    • Components of Cellular Network
    • Cellular Network
    • Different Cellular Networks
  • Mobile Operating Systems
    • Mobile Operating Systems
    • Types of Mobile Operating Systems
    • WebOS
      • WebOS System Architecture
    • Symbian OS
      • Symbian OS Architecture
    • Android OS
      • Android OS Architecture
    • RIM BlackBerry OS
    • Windows Phone 7
      • Windows Phone 7 Architecture
    • Apple iOS
  • Mobile Forensics
    • What a Criminal can do with Mobiles Phones?
    • Mobile Forensics
    • Mobile Forensics Challenges
    • Forensics Information in Mobile Phones
    • Memory Considerations in Mobiles
    • Subscriber Identity Module (SIM)
    • SIM File System
    • Integrated Circuit Card Identification (ICCID)
    • International Mobile Equipment Identifier (IMEI)
    • Electronic Serial Number (ESN)
    • Precautions to be Taken Before Investigation
  • Mobile Forensic Process
    • Mobile Forensic Process
      • Collect the Evidence
        • Collecting the Evidence
        • Points to Remember while Collecting the Evidence
        • Collecting iPod/iPhone Connected with Computer
      • Document the Scene and Preserve the Evidence
      • Imaging and Profiling
      • Acquire the Information
        • Device Identification
        • Acquire Data from SIM Cards
        • Acquire Data from Unobstructed Mobile Devices
        • Acquire the Data from Obstructed Mobile Devices
        • Acquire Data from Memory Cards
        • Acquire Data from Synched Devices
        • Gather Data from Network Operator
        • Check Call Data Records (CDRs)
        • Gather Data from SQLite Record
        • Analyze the Information
      • Generate Report
  • Mobile Forensics Software Tools
    • Oxygen Forensic Suite 2011
    • MOBILedit! Forensic
    • BitPim
    • SIM Analyzer
    • SIMCon
    • SIM Card Data Recovery
    • Memory Card Data Recovery
    • Device Seizure
    • SIM Card Seizure
    • ART (Automatic Reporting Tool)
    • iPod Data Recovery Software
    • Recover My iPod
    • PhoneView
    • Elcomsoft Blackberry Backup Explorer
    • Oxygen Phone Manager II
    • Sanmaxi SIM Recoverer
    • USIMdetective
    • CardRecovery
    • Stellar Phoenix iPod Recovery Software
    • iCare Data Recovery Software
    • Cell Phone Analyzer
    • iXAM
    • BlackBerry Database Viewer Plus
    • BlackBerry Signing Authority Tool
  • Mobile Forensics Hardware Tools
    • Secure View Kit
    • Deployable Device Seizure (DDS)
    • Paraben's Mobile Field Kit
    • PhoneBase
    • XACT System
    • Logicube CellDEK
    • Logicube CellDEK TEK
    • TadioTactics ACESO
    • UME-36Pro - Universal Memory Exchanger
    • Cellebrite UFED System - Universal Forensic Extraction Device
    • ZRT 2
    • ICD 5200
    • ICD 1300
Module 21: Investigative Reports
  • Computer Forensics Report
    • Computer Forensics Report
    • Salient Features of a Good Report
    • Aspects of a Good Report
  • Computer Forensics Report Template
    • Computer Forensics Report Template
    • Simple Format of the Chain of Custody Document
    • Chain of Custody Forms
    • Evidence Collection Form
    • Computer Evidence Worksheet
    • Hard Drive Evidence Worksheet
    • Removable Media Worksheet
  • Investigative Report Writing
    • Report Classification
    • Layout of an Investigative Report
      • Layout of an Investigative Report: Numbering
    • Report Specifications
    • Guidelines for Writing a Report
    • Use of Supporting Material
    • Importance of Consistency
    • Investigative Report Format
    • Attachments and Appendices
    • Include Metadata
    • Signature Analysis
    • Investigation Procedures
    • Collecting Physical and Demonstrative Evidence
    • Collecting Testimonial Evidence
    • Do's and Don'ts of Forensics Computer Investigations
    • Case Report Writing and Documentation
    • Create a Report to Attach to the Media Analysis Worksheet
    • Best Practices for Investigators
  • Sample Forensics Report
    • Sample Forensics Report
  • Report Writing Using Tools
    • Writing Report Using FTK
    • Writing Report Using ProDiscover
Module 22: Becoming an Expert Witness
  • Expert Witness
    • What is an Expert Witness?
    • Role of an Expert Witness
    • What Makes a Good Expert Witness?
  • Types of Expert Witnesses
    • Types of Expert Witnesses
    • Computer Forensics Experts
      • Role of Computer Forensics Expert
    • Medical & Psychological Experts
    • Civil Litigation Experts
    • Construction & Architecture Experts
    • Criminal Litigation Experts
  • Scope of Expert Witness Testimony
    • Scope of Expert Witness Testimony
    • Technical Witness vs. Expert Witness
    • Preparing for Testimony
  • Evidence Processing
    • Evidence Preparation and Documentation
    • Evidence Processing Steps
    • Checklists for Processing Evidence
    • Examining Computer Evidence
    • Prepare the Report
    • Evidence Presentation
  • Rules for Expert Witness
    • Rules Pertaining to an Expert Witness's Qualification
    • Daubert Standard
    • Frye Standard
    • Importance of Resume
    • Testifying in the Court
    • The Order of Trial Proceedings
  • General Ethics While Testifying
    • General Ethics While Testifying
    • Importance of Graphics in a Testimony
    • Helping your Attorney
    • Avoiding Testimony Issues
    • Testifying during Direct Examination
    • Testifying during Cross-Examination
    • Deposition
    • Recognizing Deposition Problems
    • Guidelines to Testify at a Deposition
    • Dealing with Media
    • Finding a Computer Forensic Expert

Machine Learning Using Python

Duration

Duration

40 hours

Eligibility

Eligibility

  1. Good knowledge of Mathematics(Undergraduate)
  2. Good understanding of Python programming
Course Fees

Course Fees

Class Room Training: Rs.16,000/-
Inclusive of all taxes

Online: Rs.26,000/-
Inclusive of all taxes

Course Details

Introduction
  • What is Machine Learning
  • Why Machine Learning
  • Application of Machine Learning
  • Data and Data Preprocessing
Regression
  • Simple Linear Regression
  • Multiple Linear Regression
  • Polynomial Regression
  • Support Vector Regression (SVR)
  • Decision Tree Regression
  • Random Forest Regression
  • Regression Models Performance
Classification
  • Logistic Regression
  • K-Nearest Neighbors (K-NN)
  • Support Vector Machine (SVM)
  • Kernel SVM
  • Classification Models Performance
Clustering
  • K-Means Clustering
  • Hierarchical Clustering
Natural Language processing
Dimensionality Reduction
  • Principal Component Analysis (PCA)
  • Linear Discriminant Analysis (LDA)
  • Kernel PCA
Model Selection and boosting
  • Model Selection
  • XGBoost
Project/Assignment

 

 

Advanced Level

Duration

Duration

40 hours

Eligibility

Eligibility

  1. Basic Knowledge of Machine Learning
  2. Good knowledge of Mathematics(Undergraduate)
  3. Good understanding of Python programming
Course Fees

Course Fees

Class Room Training: Rs.16,000/-
Inclusive of all taxes

Online: Rs.26,000/-
Inclusive of all taxes

Course Details

Introduction
  • Introduction to Advanced Machine Learning
  • Supervised Learning
  • Unsupervised Learning
  • Data and Data Preprocessing
Classification
  • Naive Bayes
  • Decision Tree Classification
  • Random Forest Classification
  • Classification Models Performance
Association Rule
  • Aprion
  • Eclat
Reinforcement Learning
  • Upper Confidence Bound (UCB)
  • Thompson Sampling
Deep Learning
  • Artificial Neural Networks
  • Convolutional Neural Networks
Probability
  • Random Variable
  • Mean and variance
  • Probability
  • Conditional Probability
  • Bays Theorem
  • Estimation
  • Sampling
Machine Learning in Information Security
  • Data Exploration
  • Spam Filtering
Project/Assignment

Python Programming

Duration

Duration

40 hours - 2 classes per week

Eligibility

Eligibility

Knowledge of C programming is preferred

Course Fees

Course Fees

Rs.9,750/-
Inclusive of all taxes

Course Details

Getting Started with Python
  • Introducing Python (Day 1)
  • Installing Python on Windows (Day 1)
  • Installing Python on Linux and other Operating Systems (Day 2)
Types, Variables and Input/Output
  • Using quotes and escape character (Day 3)
  • String Concatenation and Repeater Operators (Day 3)
  • Using Mathematical Operators with Numbers (Day 4)
Lists in Python
  • Creating and Using Lists (Day 5)
  • len() with Lists (Day 5)
  • in Operator with Lists (Day 5)
  • Deleting List Element (Day 6)
  • Common list and operations (Day 6)
Dictionaries
  • Using Dictionaries (Day 7)
  • Accessing Dictionary values (Day 7)
  • Adding, Replacing and Deleting key-value pairs (Day 8)
  • Functions: get(), keys(), values() and items() (Day 8)
For Loops and Tuples
  • Using for Loops (Day 9)
  • Using Sequence Operators and Functions with Strings (Day 10)
  • Using the in Operator (Day 10)
  • Indexing and Slicing Strings (Day 10)
Functions in Python
  • Defining Functions (Day 11)
  • Using Parameters and Return Values (Day 11)
  • Using Arguments and Defaults Parameters (Day 11)
  • Using Global Variables and Constants (Day 11)
Object-Oriented Python
  • Introduction to Object-Oriented Python (Day 12)
  • Creating Classes, Methods and Objects (Day 12)
  • Using Constructor and Attributes (Day 12)
  • Using Class Attributes and Static Methods (Day 13)
  • Understanding Object Encapsulation (Day 13)
  • Private Attributes and Methods (Day 13)
  • Controlling Attribute Access (Day 14)
  • Inheritance (Day 14)
  • Polymorphism (Day 14)
File Input and Output and Exceptions
  • The open Function (Day 15)
  • Input from Text Files (Day 15)
  • Output to Text Files (Day 15)
  • Handling Exceptions (Day 15)
Modules
  • Using Modules in Programs (Day 16)
  • Writing Modules (Day 16)
  • Importing Modules (Day 17)
Building hacking tools using python
  • Network Communications (Day 18)
  • Creating a socket (Day 18)
  • Creating port scanner using python (Day 19)
  • Creating a HTTP banner grabber (Day 20)
  • Creating packet sniffer under Linux (Day 20)

CCNA

Duration

Duration

40 hours - 2 classes per week

Eligibility

Eligibility

Basic Hardware Knowledge

Course Fees

Course Fees

Rs.9,800/-
Inclusive of all taxes

Course Details

OSI Model and TCP/IP
  • Layers of OSI model
  • Layers of TCP/IP model
  • Relationship between OSI model and TCP/IP model
Classifications of Networks
  • Logical and Physical Network
  • LAN and WAN
  • Private and Public Network
  • Collision Domain and Broadcast Domain
Networking Devices and Media
  • Networking Devices
    • Router
    • Switch
    • Hub
    • Modem
  • Networking Media
    • Cable (Copper and Fiber Optics)
    • Wireless Waves
Networking Protocols
IP Address
  • Static IP address and DHCP IP address
  • Types of IP address
    • IPv4 and IPv6
    • Private and Public IP address
    • Unicast, Multicast, Broadcast and Anycast
    • Class A, B, C, D, E
    • Classfull and Classless IP address
  • Subnet Mask and Subnetting
  • Supernetting
MAC Address, DLCI, VPI/VCI
TCP and UDP Ports
Connecting different devices by UTP and Serial Cable
Routing
  • Router Hardware Components and IOS
  • Routing Table and Router Configuration Files
  • Basic Router Management
  • Securing Router with Password
  • IOS backup and Recovery
  • Static Routing and Dynamic Routing
  • Routing Protocols and their types
    • Distance Vector, Link State, Hybrid and Path Vector Routing Protocols
    • Classfull and Classless Routing Protocols
    • Interior Gateway Protocol and Exterior Gateway Protocol
Important Routing Protocols
  • Routing Information Protocol (RIP)
    • 1Working Logic and Route Cost
    • RIP v1 and RIPv2
    • Basic configuration
    • Route Summarization and Default Route
  • Open Shortest Path First (OSPF)
    • Working Logic and Route Cost
    • OSPF Area
    • Designated Router and Backup Designated Router
    • Basic configuration
    • Route Summarization and Default Route
  • Enhanced Interior Gateway Routing Protocol (EIGRP)
    • Working Logic and Route Cost
    • Successor and Feasible Successor Route
    • Unequal Cost Load Balancing
    • Interface Bandwidth Limiting
    • Basic Configuration
    • Route Summarization and Default Route
  • Border Gateway Protocol (BGP)
    • Working Logic
    • IBGP and EBGP
    • Basic Configuration
Access List (ACL) and Packet Filtering
  • Working Logic
  • Standard ACL and Extended ACL
  • Placement of ACL
  • Configuration
Network Address Translation (NAT)
  • Public and Private IP
  • Static Nat
  • Dynamic Nat
  • Port Address Translation (PAT)
  • Inside and Outside NAT
  • Port Forwarding
  • Configuration
Virtual Private Network (VPN)
  • Concepts and Advantages of VPN
  • Site To Site VPN and Remote Access VPN
  • Intranet and Extranet VPN
  • Simple Tunnel Network Configuration
How a Router connects to the WAN?
  • Serial Cable using HDLC or PPP
  • Serial Cable using Frame-relay
  • Digital Subscriber Line (DSL) with Asynchronous Transfer Mode (ATM)
  • Metro Ethernet
  • Multi Protocol Label Switching (MPLS)
Switching
  • Types of Switching
  • Switch Hardware Components
  • Basic Switch Configuration
  • 1Securing a Switch by Password
  • Accessing a switch via Telnet
  • Content Addressable Memory (CAM) Table
  • CAM Table management
  • Securing Switch Ports by Port Security
Segmenting a Layer 2 Network by VLAN
  • VLAN concepts, VLAN.DAT
  • Inter VLAN Routing
  • VLAN Trunking and VLAN Trunking Protocol (VTP)
  • VTP Domain and VTP Server, VTP Client, VTP Transparent
Preventing Layer 2 Loops by Spanning Tree Protocol (STP)
  • How a Layer 2 Loop happens
  • Role of STP to eliminate Layer 2 Loops
  • STP Topology
    • Root Bridge
    • Designated Bridge
    • Root Port
    • Designated Port
  • Bridge Protocol Data Units (BPDU) and STP Port states
  • How to speed up STP
    • Portfast, Uplinkfast, Backbonefast
    • Rapid STP (RSTP)
Wireless LAN
  • WLAN Concepts
  • Basic Configuration
  • WLAN Security Concepts
IPv6
  • Benefits of IPv6
  • IPv6 address format
  • Types of IPv6 address
    • Unicast, Multicast and Anycast
    • Global and Link Local
  • Configuring Interfaces with IPv6 address

CCNA 3.0

Duration

Duration

80 hours - 2 classes per week

Eligibility

Eligibility

Must completed 10+2

Course Fees

Course Fees

Rs.16,000/-
Inclusive of all taxes

Course Details

Network Fundamentals
  • Compare and contrast OSI and TCP/IP models
  • Compare and contrast TCP and UDP protocols
  • Describe the impact of infrastructure components in an enterprise network
    • Firewalls
    • Access points
    • Wireless controllers
  • Describe the effects of cloud resources on enterprise network architecture
    • Traffic path to internal and external cloud services
    • Virtual services
    • Basic virtual network infrastructure
  • Compare and contrast collapsed core and three-tier architectures
  • Compare and contrast network topologies
    • Star
    • Mesh
    • Hybrid
  • Select the appropriate cabling type based on implementation requirements
  • Apply troubleshooting methodologies to resolve problems
    • Perform and document fault isolation
    • Resolve or escalate
    • Verify and monitor resolution
  • Configure, verify, and troubleshoot IPv4 addressing and subnetting
  • Compare and contrast IPv4 address types
    • Unicast
    • Broadcast
    • Multicast
  • Describe the need for private IPv4 addressing
  • Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in a LAN/WAN environment
  • Configure, verify, and troubleshoot IPv6 addressing
  • Configure and verify IPv6 Stateless Address Auto Configuration
  • Compare and contrast IPv6 address types
    • Global unicast
    • Unique local
    • Link local
    • Multicast
    • Modified EUI 64
    • Autoconfiguration
    • Anycast
LAN Switching Technologies
  • Describe and verify switching concepts
    • MAC learning and aging
    • Frame switching
    • Frame flooding
    • MAC address table
  • Interpret Ethernet frame format
  • Troubleshoot interface and cable issues (collisions, errors, duplex, speed)
  • Configure, verify, and troubleshoot VLANs (normal/extended range) spanning multiple switches
    • Access ports (data and voice)
    • Default VLAN
  • Configure, verify, and troubleshoot interswitch connectivity
    • Trunk ports
    • Add and remove VLANs on a trunk
    • DTP, VTP (v1&v2), and 802.1Q
    • Native VLAN
  • Configure, verify, and troubleshoot STP protocols
    • STP mode (PVST+ and RPVST+)
    • STP root bridge selection
  • Configure, verify and troubleshoot STP related optional features
    • PortFast
    • BPDU guard
  • Configure and verify Layer 2 protocols
    • Cisco Discovery Protocol
    • LLDP
  • Configure, verify, and troubleshoot (Layer 2/Layer 3) EtherChannel
    • Static
    • PAGP
    • LACP
  • Describe the benefits of switch stacking and chassis aggregation
Routing Technologies
  • Describe the routing concepts
    • Packet handling along the path through a network
    • Forwarding decision based on route lookup
    • Frame rewrite
  • Interpret the components of a routing table
    • Prefix
    • Network mask
    • Next hop
    • Routing protocol code
    • Administrative distance
    • Metric
    • Gateway of last resort
  • Describe how a routing table is populated by different routing information sources
    • Admin distance
  • Configure, verify, and troubleshoot inter-VLAN routing
    • Router on a stick
    • SVI
  • Compare and contrast static routing and dynamic routing
  • Compare and contrast distance vector and link state routing protocols
  • Compare and contrast interior and exterior routing protocols
  • Configure, verify, and troubleshoot IPv4 and IPv6 static routing
    • Default route
    • Network route
    • Host route
    • Floating static
  • Configure, verify, and troubleshoot single area and multi-area OSPFv2 for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub, virtuallink, and LSAs)
  • Configure, verify, and troubleshoot single area and multi-area OSPFv3 for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub, virtuallink, and LSAs)
  • Configure, verify, and troubleshoot EIGRP for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub)
  • Configure, verify, and troubleshoot EIGRP for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub)
  • Configure, verify, and troubleshoot RIPv2 for IPv4 (excluding authentication, filtering, manual summarization, redistribution)
  • Troubleshoot basic Layer 3 end-to-end connectivity issues
WAN Technologies
  • Configure and verify PPP and MLPPP on WAN interfaces using local authentication
  • Configure, verify, and troubleshoot PPPoE client-side interfaces using local authentication
  • Configure, verify, and troubleshoot GRE tunnel connectivity
  • Describe WAN topology options
    • Point-to-point
    • Hub and spoke
    • Full mesh
    • Single vs dual-homed
  • Describe WAN access connectivity options
    • MPLS
    • Metro Ethernet
    • Broadband PPPoE
    • Internet VPN (DMVPN, site-to-site VPN, client VPN)
  • Configure and verify single-homed branch connectivity using eBGP IPv4 (limited to peering and route advertisement using Network command only)
  • Describe basic QoS concepts
    • Marking
    • Device trust
    • Prioritization
      • Voice
      • Video
      • Data
    • Shaping
    • Policing
    • Congestion management
Infrastructure Services
  • Describe DNS lookup operation
  • Troubleshoot client connectivity issues involving DNS
  • Configure and verify DHCP on a router (excluding static reservations)
    • Server
    • Relay
    • Client
    • TFTP, DNS, and gateway options
  • Troubleshoot client- and router-based DHCP connectivity issues
  • Configure, verify, and troubleshoot basic HSRP
    • Priority
    • Preemption
    • Version
  • Configure, verify, and troubleshoot inside source NAT
    • Static
    • Pool
    • PAT
  • Configure and verify NTP operating in a client/server mode
Infrastructure Security
  • Configure, verify, and troubleshoot port security
    • Static
    • Dynamic
    • Sticky
    • Max MAC addresses
    • Violation actions
    • Err-disable recovery
  • Describe common access layer threat mitigation techniques
    • 802.1x
    • DHCP snooping
    • Nondefault native VLAN
  • Configure, verify, and troubleshoot IPv4 and IPv6 access list for traffic filtering
    • Standard
    • Extended
    • Named
  • Verify ACLs using the APIC-EM Path Trace ACL Analysis tool
  • Configure, verify, and troubleshoot basic device hardening
    • Local authentication
    • Secure password
    • Access to device
      • Source address
      • Telnet/SSH
    • Login banner
  • Describe device security using AAA with TACACS+ and RADIUS
Infrastructure Management
  • Configure and verify device-monitoring protocols
    • SNMPv2
    • SNMPv3
    • Syslog
  • Troubleshoot network connectivity issues using ICMP echo-based IP SLA
  • Configure and verify device management
    • Backup and restore device configuration
    • Using Cisco Discovery Protocol or LLDP for device discovery
    • Licensing
    • Logging
    • Timezone
    • Loopback
  • Configure and verify initial device configuration
  • Perform device maintenance
    • Cisco IOS upgrades and recovery (SCP, FTP, TFTP, and MD5 verify)
    • Password recovery and configuration register 7.5.c File system management
  • Use Cisco IOS tools to troubleshoot and resolve problems
    • Ping and traceroute with extended option
    • Terminal monitor
    • Log events
    • Local SPAN
  • Describe network programmability in enterprise network architecture
    • Function of a controller
    • Separation of control plane and data plane
    • Northbound and southbound APIs

Network Penetration Testing - Basic

Corporate networks around the world are systematically being victimized by rampant hacking.It is being executed so flawlessly that the attackers compromise a system, steal everything of value and completely erase their tracks within few minutes.

Penetration Testing is the Simulation of a real world hacking by a hacker who has no knowledge (E.g. Operating System running, application running, device type andnetwork topology etc.) of the remote network environment.

The job of penetration tester is not limited to finding vulnerabilities only, but to exploit them to gain access to remote server.

Duration

Duration

40 hours - 2 classes per week

Eligibility

Eligibility

  1. Good Knowledge of Networking on Windows and Linux
  2. MCSE/CCNA/RHCE are preferred
Course Fees

Course Fees

Rs.14,750/-
Inclusive of all taxes

Course Details

  • Types of Penetration Testing
  • Vulnerability vs Penetration Testing
  • Metasploit Basics
  • Intelligence gathering( Passive and Active)
  • Port scanning in depth
  • Scanning Server Message Block
  • FTP Scanning
  • Scanning a network
  • Basics of Exploitation
  • Exploiting Windows and Linux OS
  • Brute Forcing Ports
  • Privilege Escalation
  • Creating Stand alone binaries with MSF payload
  • Evading Antivirus
  • Exploitation using Client side attack
  • Browser based attack
  • File format exploit
  • Social Engineering Toolkit
  • Web attack vectors
  • Client side web exploits
  • Simulated Penetration Testing
  • Exploiting webservers

Network Penetration Testing - Advance

Penetration Testing of Cloud-based Networks and Infrastructures (IaaS) → NPT-Level 2 or NPT Expert

This will specifically cater to the assessment of IaaS and vSphere-based systems, exploitation, and post-exploitation. With the increasing number of cyber attacks and revolution of technical innovations, the risk factor is increasing tremendously. Now business organizations are more concerned about their data and ready to invest billions to safeguard it from hackers. This course is designed to help our students to become efficient pen testers who can conduct vulnerability scan and penetration testing and develop detailed VAPT Reports to ensure that the cyber controls are working fine.

As the companies are concerned about IT security best practices and compliances, regular assessment of internal and external network should be in check.

After the course, the assessment will include CTF (Capture the Flag) where the students need to find the flags hidden inside the machine by finding the vulnerabilities within a given timeframe with documentation. This actually helps students to learn in a methodical way and prepares them for a real-time situation.

Duration

Duration

40 hours

Eligibility

Eligibility

Completion of Level-I of Network penetration testing

Course Fees

Course Fees

Rs.14,750/-
Inclusive of all taxes

Course Details

  • AdvancedMetasploit (using Scanners, Auxiliary modules, Post-exploitation)
  • AdvancedMeterpreter and back-dooring
  • Advanced Malware and PHP Malware
  • VPN penetration testing
  • Running non-MSF exploits
  • Hacking Mail Servers
  • Reverse TCP Connections
  • Binding Trojans/Shells to ports
  • Rooting exploits
  • SMB exploits
  • Extracting credentials from system memory
  • Userland to Root exploits

Web Application Penetration Testing - Basic

Web Application penetration Testing(WAPT) is the Security testing techniques for vulnerabilities or security holes in corporate websites and web applications. These vulnerabilities leave websites open to exploitation.

Companies now a days are moving their most applications and critical business process on web. Web applications are a major point of vulnerability in organizations today. Web app holes have resulted in the theft of millions of credit cards, major financial and reputational damage for hundreds of enterprises, and even the compromise of thousands of browsing machines that visited Web sites altered by attackers.

It is sad but true that many of the advantages that make online applications so convenient, also make them incredibly insecure. As a result, hackers are able to use web applications to penetrate enterprises' network and access private customer databases. The resulting identity and data theft has become a major concern for corporations and consumers alike.

Globally with the rising number of incidents of web defacement, the scope of Web Application penetration Tester is definitely rising. Today Web Application Penetration Testers are in very high demand in software companies, IT security firms, Government and Private Sectors etc.

Scope of web application penetration testing in india:
Web Pen tester, Web security analyst/consultant, Web Application security analyst.

Duration

Duration

40 hours - 2 classes per week

Eligibility

Eligibility

  1. Strong knowledge of JAVA OR .NET OR PHP
  2. Knowledge of Database Programming
  3. Knowledge of HTML & Javascript

OR Successful completion of module II & - III or IV, of "Industry Ready" course - www.isoeh.com/industry-ready.html

Course Fees

Course Fees

Rs.14,750/-
Inclusive of all taxes

Course Details

  • Web Application introduction
  • Core Defence Mechanism
  • Web Application Technologies and Protocols
  • Mapping the Application
  • Enumerating Content
  • Analyzing the Application
  • Bypassing Client-Side Controls
  • Mapping the Attack Surface
  • Hidden form fields & threats
  • Attacking Authentication
  • Attacking Session Management
  • Web2.0 securities
  • Hacking Webservices
  • Threat Modeling- Application security Control
  • Injecting code
  • SQL Injection
  • Cross Site Scripting (XSS)
  • CSRF With Hijacks
  • Hijacking the Browser
  • Controlling Zombies
  • Attacking Webserver
  • Web Server Exploits
  • Hardening Webserver
  • Source code vulnerabilities : JAVA, ASP.net, Perl, Javascript
  • Web Application hackers Toolkit

Web Application Penetration Testing - Advance

Penetration Testing of Cloud-based Web Applications (SaaS and PaaS)

This will be the WAPT-Level 2, which requires knowledge of WAPT at the very least, along with knowledge of Web-Application Technologies, DBMS and Networking. This course will very specifically cater to the vulnerability assessment of SaaS and PaaS systems, and how to perform VA and PT on them. Also the tool that I intend to use for this course will be Burp (simply because it is the only tool which allows you to scan cloud-based systems pseudo-manually, which is extremely important. Other scanners like Acunetix aren't good at scanning and testing of Cloud-based systems). As a result, this course will be very intensive and centered around the usage of Burp suite along with its different modules, along with fine-tuning and advanced usage.

Duration

Duration

40 hours

Eligibility

Eligibility

WAPT Beginner, or knowledge of Web Application Penetration Testing

Course Fees

Course Fees

Rs.14,750/-
Inclusive of all taxes

Course Details

  • Introduction to Cloud Computing
  • What is SaaS and PaaS
  • Concepts of Web 2.0 and Technologies in use
  • Inherent vulnerabilities in Cloud systems
  • Application logic flaws and their identification (manual)
  • Server-side logic flaws and their identification (manual)
  • Introduction to Burp Suite
  • Advanced usage of Burp and its modules (includes stuff like fine-tuning scans, using Intruder, Sequencer and other modules etc)
  • Testing Cloud systems using Burp
  • Testing Application logic using Burp
  • Exploitation and Confirmation of vulnerabilities using Burp

Data Structure

Your college degree will make you a fresher. Before you graduate from college, learn the latest technologies adopted by the industry & earn some valuable experience with on-job training on Live projects. Our 5 level course (each 1 month) will equip you with all the latest technologies starting from basic level C to advance level, Oracle. Students who pass with high grades will be put on LIVE projects under the guidance of highly experienced coders at our Sector-V Software Division, where they see all phases of SDLC. At the campus interview or while you search for better jobs, you will be miles ahead of your fellow classmates.

Working professionals who wish to switch to new technology will also find the course helpful.

Duration

Duration

40 hours - 2 classes per week

Eligibility

Eligibility

Knowledge of C Programing

Course Fees

Course Fees

Rs.7,750/-
Inclusive of all taxes

Course Details

  • Overview of data structure
  • Arrays and pointers
  • Recursion
  • Dynamic Memory Allocation
  • Link list
  • Insertion and deletion from the list
  • Stack using array and link list
  • Queue using array and link list
  • Circular queue
  • Priority queue
  • Arrays: different types searching and sorting
  • Tree
  • Binary Tree
  • Complete binary tree
  • Array representation of binary tree
  • Different traversal of a binary tree
  • Threaded binary tree
  • Binary search tree
  • Searching, Insertion and deletion
  • AVL trees
  • B+ tree
  • Hashing
  • Graph theory

Diploma in Cyber Security

Why the knowledge of IT Security has become a must for individuals in this 'Digital Era'?

Data held on IT systems is valuable and critical to the business. Client information, payment information, personal files, bank account details - all of this information can be hard to replace and potentially dangerous if it falls into the wrong hands. Data lost due to disasters such as a flood or fire is crushing, but losing it to hackers or a malware infection can have much greater consequences.

Duration

Duration

12 months - 4 days in a week

Eligibility

Eligibility

10+2

Course Fees

Course Fees

Rs.72,000/- (Paid one time)
Rs.80,000/- (Paid in installments)
Inclusive of all taxes

Globally, with a tremendous rise in cyber crime, there is a rapidly growing demand for highly skilled professional called Ethical Hackers / IT Security Professionals who can safeguard the Internet & corporate networks and data. We need software developers who can write secure codes. Professionals in any industry get 50% higher salary if equipped with knowledge of Information Security.

  • Banking Sector / Non- IT Corporate: Their data & network is constantly under attack. More & more organizations are hiring security experts to protect themselves from Industrial espionage. Company HR is giving more priority to the Software & Network Engineers who are familiar with the IT security basics.
  • Software Developers / DBA / Network Engineers: With websites defaced, database hacked, network penetrated, the future computer Engineers need to have in depth IT Security Knowledge to get a job.
  • Govt. / Military / Police / Investigation Bureau: Organized crime shifting modulus operandi to cyber base, Police & other investigation bureau are recruiting Engineers with IT Security knowledge. Computer Engineers with knowledge of Digital Forensics will be the top recruited in coming days.
  • Common Man / kids: With increased use of Online Bill Payment, staying connected via Social Network sites & mobile usage, one needs to know how to stay protected. With the kids introduced to the Internet quite early in age, IT Security education is a must among the elders so that they can guide their children to stay protected.

According to the Bureau of Labor Statistics, the rate of growth for jobs in information security is projected at 37% from 2012–2022—that's much faster than the average for all other occupations.

Why should you join this course?

  • Covers A to Z courses of cyber security
  • Practical training with LIVE projects
  • Training is provided by industry experts
  • Examination and certification at the end of the course
  • Job assistance by experienced industry professionals

Course Details

Semester 1:
Paper code Title Lecture Marks Internal Theory Lab
Paper code: DCS-01 Title: C Programing Lecture: 40 Marks: 100 Internal: 20 Theory: 40 Lab: 40
Paper code: DCS-02 Title: Core Java Lecture: 40 Marks: 100 Internal: 20 Theory: 40 Lab: 40
Paper code: DCS-03 Title: RDBMS Lecture: 40 Marks: 100 Internal: 20 Theory: 40 Lab: 40
Paper code: DCS-04 Title: CCNA Lecture: 40 Marks: 100 Internal: 20 Theory: 40 Lab: 40
Paper code: DCS-05 Title: Python Programing Lecture: 40 Marks: 100 Internal: 20 Theory: 40 Lab: 40
Semester 2:
Paper code Title Lecture Marks Internal Theory Lab
Paper code: DCS-06 Title: Network Security Lecture: 40 Marks: 100 Internal: 20 Theory: 20 Lab: 60
Paper code: DCS-07 Title: Web Application Security Lecture: 40 Marks: 100 Internal: 20 Theory: 20 Lab: 60
Paper code: DCS-08 Title: Network Penetration Testing Lecture: 40 Marks: 100 Internal: 20 Theory: 20 Lab: 60
Paper code: DCS-09 Title: Web Application Testing Lecture: 40 Marks: 100 Internal: 20 Theory: 20 Lab: 60
Paper code: DCS-10 Title: Project Lecture: 8 Weeks Marks: 100      

Diploma in Cyber Security - Advance

Duration

Duration

18 months - 6 days in a week

Eligibility

Eligibility

10+2

Course Fees

Course Fees

Rs.1,50,000/- (Paid one time)
Rs.1,60,000/- (Paid in installments)
Inclusive of all taxes

Course Details

Semester 1:
Paper code Title Lecture Marks Internal Theory Lab
Paper code: DCSA-01 Title: C Programing Lecture: 40 Marks: 100 Internal: 20 Theory: 40 Lab: 40
Paper code: DCSA-02 Title: Core Java Lecture: 40 Marks: 100 Internal: 20 Theory: 40 Lab: 40
Paper code: DCSA-03 Title: Advanced Java Lecture: 40 Marks: 100 Internal: 20 Theory: 40 Lab: 40
Paper code: DCSA-04 Title: RDBMS Lecture: 40 Marks: 100 Internal: 20 Theory: 40 Lab: 40
Paper code: DCSA-05 Title: CCNA Lecture: 40 Marks: 100 Internal: 20 Theory: 40 Lab: 40
Paper code: DCSA-06 Title: Python Programing Lecture: 40 Marks: 100 Internal: 20 Theory: 40 Lab: 40
Semester 2:
Paper code Title Lecture Marks Internal Theory Lab
Paper code: DCSA-07 Title: Network Security Lecture: 40 Marks: 100 Internal: 20 Theory: 20 Lab: 60
Paper code: DCSA-08 Title: Web Application Security Lecture: 40 Marks: 100 Internal: 20 Theory: 20 Lab: 60
Paper code: DCSA-09 Title: Network Penetration Testing Lecture: 40 Marks: 100 Internal: 20 Theory: 20 Lab: 60
Paper code: DCSA-10 Title: Web Application Testing Lecture: 40 Marks: 100 Internal: 20 Theory: 20 Lab: 60
Paper code: DCSA-11 Title: Minor Project Lecture: 8 Weeks Marks: 100      
Semester 3:
Paper code Title Lecture Marks Internal Theory Lab
Paper code: DCSA-12 Title: Network+ Lecture: 40 Marks: 100 Internal: 20 Theory: 20 Lab: 60
Paper code: DCSA-13 Title: Network Penetration Testing Advance Lecture: 40 Marks: 100 Internal: 20 Theory: 20 Lab: 60
Paper code: DCSA-14 Title: Web Application Penetration Testing Advance Lecture: 40 Marks: 100 Internal: 20 Theory: 20 Lab: 60
Paper code: DCSA-15 Title: Computer Forensic Lecture: 40 Marks: 100 Internal: 20 Theory: 20 Lab: 60
Paper code: DCSA-16 Title: Major Project Lecture: 8 Weeks Marks: 100      

Linux 7.0

The latest version of Linux comes with dramatic improvements in reliability, performance and scalability. A wealth of new features provides the architect, system administrator, and developer with the resources necessary to innovate and manage more efficiently.

India is the outsourcing hub and corporate headquarters of big MNCs are present here. If you want to enhance your knowledge and skill in areas of Linux system automation and administration, then go for this training. Most big companies look for the Linux administrators and search for the employees having the right blend of technical and communication skills. In today's open source market, Linux professionals who are ready to serve them with the right skills to handle their server requirements receive a high call and offered lucrative salary structure.

Linux is the operating system for hackers and security professionals. Linux has many advantages -

  1. It is free.
  2. It is extremely stable (i.e., it rarely crashes).
  3. It is highly secure and resistant to computer viruses, spyware and other malware.
  4. Source code available.

Career wise, it is extemely worthwile to have Linux skills rather than just knowing how to use Microsoft Windows. For computer science students and professionals, having Linux skills is mandatory.

Duration

Duration

40 hours - 2 classes per week

Eligibility

Eligibility

Basic knowledge of Computer

Course Fees

Course Fees

Rs.17,000/-
Inclusive of all taxes

Course Details

Red Hat System Administration I (RH124)
  • Accessing the Command Line
  • Managing Files From the Command Line
  • Getting Help in Red Hat Enterprise Linux
  • Creating, Viewing, and Editing Text Files
  • Managing Local Linux Users and Groups
  • Controlling Access to Files with Linux File System Permissions
  • Monitoring and Managing Linux Process
  • Controlling Services and Daemons
  • Configuring and Security openSSH Service
  • Analyzing and storing Logs
  • Managing Hed Hat Enterprise Linux Networking
  • Archiving and Copying Files Between Systems
  • Installing and Updating Software Packages
  • Accessing Linux File System
  • Using Virtulized Systems
  • Comprehensive review
Red Hat System Administration II (RH134)
  • Automating Installation with Kickstart
  • Using Regular Expressions with grep
  • Creating and Editing Text Fileswith Vim
  • Scheduling Future Linux Tasks
  • Managing Priority of Linux Process
  • Controlling Access to files with Acess Control Lists (ACLs)
  • Managing Selinux Security
  • Connecting to network-defined User and Groups
  • Adding Disks, Partitions and File systems to a Linux System
  • Managing Logical Volume management (LVM) Storage
  • Acessing Network Storage with Network File System (NFS)
  • Acessing Network Storage with SMB
  • Controlling and Troubleshooting the Red Hat Enterprise Linux Boot Process
  • Limiting Network Communication with Firewalid
  • Comprehensive Review of System Administration II
Red Hat System Administration III (RH254)
  • Controlling Service and Daemons
  • Managing IPv6 Networking
  • Configuring Link Aggregation and Bridging
  • Network Port Security
  • Managing DNS for Servers
  • Configuring Email Transmission
  • Providing Remote Block Storage
  • Providing File –based Storage
  • Configuring MarisDB Database
  • Providing Apache HTTPD Web service
  • WritingBsh Scripts
  • Bash Conditionals and Control structures
  • Configuring the Shell Enviroment
  • Linux Containers and Dockes

Windows Server 2016 MCSA

The launch of Windows Server 2016 has widened the path for a variety of new skills, technologies and advancements. In this competitive world, it is important to upgrade your skills and knowledge to stay ahead from the rest.

Through this training program, students can boost up their technical skills for understanding and using the software's, servers, operating systems and other products designed by Microsoft.

Who should do the course?

  • Students who want to learn and pursue a career in Microsoft Server infrastructure administration.
  • IT professionals who want to upgrade their technical skills.
  • Data center administrators/architectures.
Duration

Duration

100 hours - 3 classes per week

Eligibility

Eligibility

Must clear 10th board exam

Course Fees

Course Fees

Rs.17,000/-
Inclusive of all taxes

Module 1: Installing, upgrading, and migrating servers and workloads

This module describes the new features of Windows Server 2016, and explains how to prepare for and install Nano Server and Server Core. This module also describes how to plan a server upgrade and migration strategy, and explains how to perform a migration of server roles and workloads within and across domains. Finally, this module explains how to choose an activation model based on your environment characteristics.

Lessons:

  • Introducing Windows Server 2016
  • Preparing and installing Nano Server and Server Core
  • Preparing for upgrades and migrations
  • Migrating server roles and workloads
  • Windows Server activation models

Lab: Installing and configuring Nano Server

  • Installing Nano Server
  • Completing post-installation tasks on Nano Server
  • Performing remote management

After completing this module, students will be able to:

  • Describe the new features of Windows Server 2016
  • Prepare for and install Nano Server and Server Core
  • Plan a server upgrade and migration strategy
  • Perform a migration of server roles and workloads within a domain and across domains
  • Choose an activation model
Module 2: Configuring local storage

This module explains how to manage disks and volumes in Windows Server 2016.

Lessons:

  • Managing disks in Windows Server
  • Managing volumes in Windows Server

Lab: Configuring local storage

  • Creating and managing volumes
  • Resizing volumes
  • Managing virtual hard disks

After completing this module, students will be able to:

  • Manage disks in Windows Server
  • Manage volumes in Windows Server
Module 3: Implementing enterprise storage solutions

This module discusses direct-attached storage (DAS), network-attached storage (NAS), and storage area networks (SANs). It also explains the purpose of Microsoft Internet Storage Name Service (iSNS) Server, data center bridging (DCB), and Multipath I/O (MPIO). Additionally, this module compares Fibre Channel, Internet Small Computer System Interface (iSCSI), and Fibre Channel over Ethernet (FCoE), and describes how to configure sharing in Windows Server 2016.

Lessons:

  • Overview of DAS, NAS, and SANs
  • Comparing Fibre Channel, iSCSI, and Fibre Channel over Ethernet
  • Understanding iSNS, DCB, and MPIO
  • Configuring sharing in Windows Server 2016

Lab: Planning and configuring storage technologies and components

  • Planning storage requirements
  • Configuring iSCSI storage
  • Configuring and managing the share infrastructure

After completing this module, students will be able to:

  • Describe DAS, NAS, and SANs
  • Compare Fibre Channel iSCSI, and FCoE
  • Explain the use of iSNS, DCB, and MPIO
  • Configure sharing in Windows Server
Module 4: Implementing Storage Spaces and Data Deduplication

This module explains how to implement and manage Storage Spaces. This module also explains how to implement Data Deduplication.

Lessons:

  • Implementing Storage Spaces
  • Managing Storage Spaces
  • Implementing Data Deduplication

Lab: Implementing Storage Spaces

  • Creating a Storage Space

Lab: Implementing Data Deduplication

  • Installing Data Deduplication
  • Configuring Data Deduplication

After completing this module, students will be able to:

  • Describe and implement the Storage Spaces feature in the context of enterprise storage needs
  • Manage and maintain Storage Spaces
  • Describe and implement Data Deduplication
Module 5: Installing and configuring Hyper-V and virtual machines

This module provides an overview of Hyper-V and virtualization. It explains how to install Hyper-V, and how to configure storage and networking on Hyper-V host servers. Additionally, it explains how to configure and manage Hyper-V virtual machines.

Lessons:

  • Overview of Hyper-V
  • Installing Hyper-V
  • Configuring storage on Hyper-V host servers
  • Configuring networking on Hyper-V host servers
  • Configuring Hyper-V virtual machines
  • Managing virtual machines

Lab: Installing and configuring Hyper-V

  • Verify installattion of the Hyper-V server role
  • Configuring Hyper-V networks
  • Creating and configuring a virtual machines
  • Enable nested virtualization for a virtual machine

After completing this module, students will be able to:

  • Describe Hyper-V and virtualization
  • Install Hyper-V
  • Configure storage on Hyper-V host servers
  • Configure networking on Hyper-V host servers
  • Configure Hyper-V virtual machines
  • Manage Hyper-V virtual machines
Module 6: Deploying and managing Windows and Hyper-V containers

This module provides and overview of containers in Windows Server 2016. Additionally, this module explains how to deploy Windows Server and Hyper-V containers. It also explains how to install, configure, and manage containers by using Docker.

Lessons:

  • Overview of containers in Windows Server 2016
  • Deploying Windows Server and Hyper-V containers
  • Installing, configuring, and managing containers by using Docker

Lab: Installing and configuring containers

  • Installing and configuring Windows Server containers by using Windows PowerShell
  • Installing and configuring Windows Server containers by using Docker Installing

After completing this module, students will be able to:

  • Describe containers in Windows Server 2016
  • Explain how to deploy containers
  • Explain how to install, configure, and manage containers using Docker
Module 7: Overview of high availability and disaster recovery

This module provides an overview of high availability and high availability with failover clustering in Windows Server 2016. It further explains how to plan high availability and disaster recovery solutions with Hyper-V virtual machines. Additionally, this module explains how to back up and restore the Windows Server 2016 operating system and data by using Windows Server Backup.

Lessons:

  • Defining levels of availability
  • Planning high availability and disaster recovery solutions with Hyper-V virtual machines
  • Backing up and restoring by using Windows Server Backup
  • High availability with failover clustering in Windows Server 2016

Lab: Planning and implementing a high availability and disaster recovery solution

  • Determining the appropriate high availability and disaster recovery solution
  • Implementing storage migration
  • Configuring Hyper-V replicas

After completing this module, students will be able to:

  • Describe levels of availability
  • Plan for high availability and disaster recovery solutions with Hyper-V virtual machines
  • Back up and restore data by using Windows Server Backup
  • Describe high availability with failover clustering in Window Server 2016
Module 8: Implementing failover clustering

This module explains how to plan for failover clustering. It also explains how to create, manage, and troubleshoot a failover cluster.

Lessons:

  • Planning a failover cluster
  • Creating and configuring a new failover cluster
  • Maintaining a failover cluster
  • Troubleshooting a failover cluster
  • Implementing site high availability with stretch clustering

Lab: Implementing a failover clustering

  • Creating a failover cluster
  • Verifying quorum settings and adding a node

Lab: Managing a failover cluster

  • Evicting a node and verifying quorum settings
  • Changing the quorum from Disk Witness to File Share Witness, and defining node voting
  • Verifying high availability

After completing this module, students will be able to:

  • Plan for a failover-clustering implementation
  • Create and configure a failover cluster
  • Maintain a failover cluster
  • Troubleshoot a failover cluster
  • Implement high availability and stretch clustering for a site
Module 9: Implementing failover clustering with Windows Server 2016 Hyper-V

This module describes how Hyper-V integrates with failover clustering. It also explains how to implement Hyper-V virtual machines (VMs) in failover clusters.

Lessons:

  • Overview of the integration of Hyper-V Server 2016 with failover clustering
  • Implementing Hyper-V VMs on failover clusters
  • Key features for VMs in a clustered environment

Lab: Implementing failover clustering with Windows Server 2016 Hyper-V

  • Configure iSCSI storage
  • Configuring a failover cluster for Hyper-V
  • Configuring a highly available VM

After completing this module, students will be able to:

  • Describe how Hyper-V integrates with failover clustering
  • Implement Hyper-V VMs on failover clusters
  • Describe the key features for VMs in a clustered environment
Module 10: Implementing Network Load Balancing

This module provides an overview of NLB clusters. It also explains how to plan and configure an NLB cluster implementation.

Lessons:

  • Overview of NLB
  • Configuring an NLB cluster
  • Planning an NLB implementation

Lab: Implementing NLB

  • Implementing a Network Load Balancing (NLB) cluster
  • Configuring and managing the NLB cluster
  • Validating high availability for the NLB cluster

After completing this module, students will be able to:

  • Describe NLB
  • Configure an NLB cluster
  • Explain how to plan an NLB implementation
Module 11: Creating and managing deployment images

This module provides an overview of the Windows Server 2016 image deployment process. It also explains how to create and manage deployment images by using the Microsoft Deployment Toolkit (MDT). Additionally, it describes different workloads in the virtual machine environment.

Lessons:

  • Introduction to deployment images
  • Creating and managing deployment images by using MDT
  • Virtual machine environments for different workloads

Lab: Using MDT to deploy Windows Server 2016

  • Configuring MDT
  • Creating and deploying an image

After completing this module, students will be able to:

  • Describe the Windows Server 2016 image deployment process
  • Create and manage deployment images by using MDT
  • Describe the different workloads in the virtual machine environment
Module 12: Managing, monitoring, and maintaining virtual machine installations

This module provides an overview on Windows Server Update Services (WSUS) and the requirements to implement WSUS. It explains how to manage the update process with WSUS. Additionally, this module provides an overview of Windows PowerShell Desired State Configuration (DSC) and Windows Server 2016 monitoring tools. Finally, this module describes how to use Performance Monitor, and how to manage event logs.

Lessons:

  • WSUS overview and deployment options
  • Update management process with WSUS
  • Overview of Windows PowerShell DSC
  • Overview of Windows Server 2016 monitoring tools
  • Using Performance Monitor
  • Monitoring event logs

Lab: Implementing WSUS and deploying updates

  • Implementing WSUS
  • Configuring update settings
  • Approving and deploying an update by using WSUS

Lab: Monitoring and troubleshooting Windows Server 2016

  • Establishing a performance baseline
  • Identifying the source of a performance problem
  • Viewing and configuring centralized event logs

After completing this module, students will be able to:

  • Describe the purpose of WSUS and the requirements to implement WSUS
  • Manage the update process with WSUS
  • Describe the purpose and benefits of Windows PowerShell DSC
  • Describe the monitoring tools available in Windows Server 2016
  • Use Performance Monitor

Oracle

Your college degree will make you a fresher. Before you graduate from college, learn the latest technologies adopted by the industry & earn some valuable experience with on-job training on Live projects. Our 5 level course (each 1 month) will equip you with all the latest technologies starting from basic level C to advance level Oracle. Students who pass with high grades will be put on LIVE projects under the guidance of highly experienced coders at our Sector-V Software Division, where they see all phases of SDLC. At the campus interview or while you search for better jobs, you will be miles ahead of your fellow classmates.

Working professionals who wish to switch to new technology will also find the course helpful.

Duration

Duration

40 hours - 2 classes per week

Eligibility

Eligibility

Meant for Freshers

Course Fees

Course Fees

Rs.10,750/-
Inclusive of all taxes

Course Details

  • RDBMS Concepts and design
  • SQL statements
  • Oracle functions
  • Single row and Group functions
  • Set Operators
  • Displaying data from multiple tables
  • Different types of joining
  • Sub queries
  • Case expression
  • Substitution variables
  • Control-break reports
  • Verifying and clearing variables using define and undefined commands
  • Data definition Language (DDL)
  • Creating tables with constraints
  • Alter, drop & truncate tables
  • Data manipulation language
  • Transaction control language
  • COMMIT and ROLLBACK
  • Creating views
  • Creating join views
  • DML through views
  • Oracle Security
  • Privileges
  • Roles
  • Granting privilege to objects
  • Data Dictionary for privileges
  • Revoking object privilege
  • Indexes
  • Sequence
  • Synonyms
  • Introduction to pl/sql
  • Pl/sql block structure
  • Pl/sql architercture
  • Fundamental of pl/sql
  • Conditional and iterative control
  • Sql in pl/sql
  • Composite datatype
  • Cursor management in pl/sql
  • Explicit cursor manipulation
  • Implicit cursor
  • Bulk collect
  • Exception handling in pl/sql
  • Predefined exception
  • User defined exception
  • Non predefined exception
  • Propagation of exception
  • Using raise_application_error
  • Sub programme
  • Procedure
  • Function
  • Pacakage
  • Methods for passing parameters
  • Cursor expression
  • Using stored function in sql statement
  • Autonomous transaction
  • Database triggers
  • Part of a trigger
  • Statement trigger and row trigger
  • Instead of trigger
  • Dropping triggers

Industry Ready - C Programming

Your college degree will make you a fresher. Before you graduate from college, learn the latest technologies adopted by the industry & earn some valuable experience with on-job training on Live projects. Our 5 level course (each 1 month) will equip you with all the latest technologies starting from basic level C to advance level Oracle. Students who pass with high grades will be put on LIVE projects under the guidance of highly experienced coders at our Sector-V Software Division, where they see all phases of SDLC. At the campus interview or while you search for better jobs, you will be miles ahead of your fellow classmates.

Working professionals who wish to switch to new technology will also find the course helpful.

Duration

Duration

40 hours - 2 classes per week

Eligibility

Eligibility

Meant for Freshers

Course Fees

Course Fees

Rs.6,750/-
Inclusive of all taxes

Course Details

  • Introduction to programming
  • Decision making
  • Switch case
  • Different types of loop
  • User defined functions
  • Arrays: Single and multi dimentions
  • String
  • Structure
  • Pointer
  • File handling
  • Storage class

Android App Development - Basic

Duration

Duration

40 hours - 2 classes per week

Eligibility

Eligibility

Knowledge of Core Java is mandatory

Course Fees

Course Fees

Rs.8,750/-
Inclusive of all taxes

Course Details

Introduction to Android4 Hours
  • Android Overview (Day 1)
  • Developer of Android (Day 1)
  • Open Handset Alliance(OHA) (Day 1)
  • Comparison of Android with other platforms(Android vs IOS vs Windows vs others) (Day 1)
  • Why is Android Significant? (Day 2)
  • Features of Android (Hardware and Software) (Day 2)
  • Why Android is an Open source? (Day 2)
  • Versions of Android (Day 2)
Android Architecture2 Hours
  • Applications and Application Framework (Day 3)
  • Libraries(Core and Native) (Day 3)
  • Linux Kernels (Day 3)
Understanding Building Environment for Android2 Hours
  • Front End and Back End (Day 4)
  • Interface (Day 4)
  • Layouts and widgets (Day 4)
  • Layout Types(Relative,Linear(Horizontal and Vertical, Table, Frame etc.) (Day 4)
  • Android API Level (Day 4)
Application Development Requirements2 Hours
  • IDE (Day 5)
  • What is Android SDK? (Day 5)
  • Installation of IDE and Android SDK (Day 5)
  • Setting up the Android Virtual Device(AVD) (Day 5)
  • How to use Emulator? (Day 5)
Life of Android: Core Building Blocks of Android2 Hours
  • Components of Android(Activity, View, Intent, Broadcast Receiver, Content provider, Service) (Day 6)
  • Life Cycle Activity of Android (Day 6)
  • Application's manifest file (Day 6)
  • APKs (Day 6)
Application Development2 Hours
  • Developing 1st application(using Buttons, TextView, EditText and background view) to display Informations (Day 7)
  • Android Application to develop Basic and Advance Calculator (Day 7)
  • Generate Signed apk (Day 7)
Introduction to Intent6 Hours
  • Intent Types(Explicit and Implicit) (Day 8)
  • Android Application on Explicit Intent:
    • Application to display images using multiple activity (Day 8)
  • Android Application on Implicit Intent
    • Application to access web page (Day 9)
    • Dialer Application Development (Day 10)
Understanding Various Notifications6 Hours
  • Android Toast
    • How to use Toast in Android Application (Day 11)
    • Working on Intent and Toast (Day 11)
    • Application Development (Day 11)
  • Dialog and Alert-Dialog
    • Application to show Alert dialog in Android screen (Day 12)
  • Android Notifications
    • Application to generate Notification to user (Day 13)
Working with Files6 Hours
  • Internal Storage (Day 14)
  • External Storage (Day 15)
  • Shared Preferences (Day 16)
  • Application Development on Files
Using Database6 Hours
  • Introduction to SQLite Database (Day 17)
  • DDL and DML Commands (Day 17)
  • Architecture (Day 17)
  • Application to perform signup and signin operation using SQLite Database (Day 18)
  • Android Realtime Applications Using Database (Booking System, Shopping Cart, Banking Application etc.) (Day 19)
Android Application Security2 Hours
  • How to Secure the Android Application? (Day 20)
  • APK attack surface (Day 20)
  • Application Obfuscation (Day 20)
  • Mobile Application security scanner (Day 20)

Android App Development - Advance

Duration

Duration

40 hours - 2 classes per week

Eligibility

Eligibility

Java, OOPs Concept, Android Basics

Course Fees

Course Fees

Rs.10,750/-
Inclusive of all taxes

Course Details

Multithreading6 Hours
  • Thread
  • Using Java Multithreading classes
  • How to use Handler Class
  • UI Thread
  • Android Applications on Multithreading(My Splashscreen,Stopwatch,ThreadHandler)
Sensors in Android4 Hours
  • Sensor Listener
  • Sensor Manager
  • Sensor Events
  • Android Application on Sensors(Accelerometer and Proximity)
Android Location Based Services6 Hours
  • Geo-Coding and Reverse Geo-Coding
  • Intent Service
  • How to get Location address in an Android app
  • Application to track the user's Location(Latitude, Longitude and Address)
Android Google Maps4 Hours
  • Discussion on Google API Console
  • How to create Google Maps API key,Google Places API key
  • Android Google Map Application Development to place the marker in user's current location,search any places and navigate
Android Web Services6 Hours
  • Uses and Characteristics of Json in Real Time
  • Json Parser
  • UI Thread and what is Async Task
  • Async Task Operations(onPreExecute(), doInBackground(), onPostExecute())
  • API formation
  • Android Applications to parse Json Data from API
Android WebView4 Hours
  • How to design and Develop Android Web Application for any Website
Android WiFi4 Hours
  • Wifi Manager API
  • Broadcast Receiver
  • Android Wifi Application
Android Bluetooth4 Hours
  • Bluetooth Adapter
  • Bluetooth Permissions
  • Android Bluetooth Application Development
Android Application Security2 Hours
  • How to Secure the Android Application?
  • APK attack surface
  • Application Obfuscation
  • Mobile Application security scanner

Industry Ready Java - Core

Your college degree will make you a fresher. Before you graduate from college, learn the latest technologies adopted by the industry & earn some valuable experience with on-job training on Live projects. Our 5 level course (each 1 month) will equip you with all the latest technologies starting from basic level C to advance level Oracle. Students who pass with high grades will be put on LIVE projects under the guidance of highly experienced coders at our Sector-V Software Division, where they see all phases of SDLC. At the campus interview or while you search for better jobs, you will be miles ahead of your fellow classmates.

Working professionals who wish to switch to new technology will also find the course helpful.

Duration

Duration

40 hours - 2 classes per week

Eligibility

Eligibility

Knowledge of C & Database.

Course Fees

Course Fees

Rs.8,750/-
Inclusive of all taxes

Course Details

Introduction to Java(Properties, Oops, JDK & JVM & JRE) 4 Hours
  • Why Java is called Platform Independent? (Explanation with practical Architecture)
  • Methods and Variable types (Theory and 2 Examples)
  • Data types with sizes (Theory and Example)
  • Class, objects (Theory and 2 Examples)
  • Method overloading (Theory and 3 Examples)
Concept of Constructor 2 Hours
  • What is Constructor (Theory and 2 Examples)
  • Specification and Constructor Types (Theory and 1 Example each of Constructor types)
  • Constructor Techniques(Constructor Overloading Copy Constructor) (Theory and 2 Examples)
Encapsulation 2 Hours
  • Advantages of Using Encapsulation in Java (Theory and 2 Examples)
Inheritance Concepts and Java Keywords 4 Hours
  • Advantages, features of Inheritance (Theory and 3 Examples)
  • Method Overriding (Theory and 2 Examples)
  • Discussion about Keywords (this, super, final, static ) (Theory and 2 examples each)
Access Modifiers and Packages 3 Hours
  • Use of Access modifiers in Java Programming (Theory and 2 Examples of Default, Private, Public and Protected access modifiers)
  • Types of Packages and its implementation (Theory and 2 Examples)
Concept of Polymorphism 2 Hours
  • Types and implementation in programming (Theory and 3 Examples)
Abstraction and Scanner Class 3 Hours
  • How to achieve abstraction in Java? (Theory and 2 Examples)
  • Abstract keyword,Abstract Class, Interface (Theory and 3 Examples each)
  • Importance of Scanner Class in Programming (Theory and 4 Examples)
Exception Handling in Java 3 Hours
  • What is Exception and it's types (Theory and 3 Examples)
  • Use of Java Exception Handling Keywords (try, catch, finally, throw, throws) (Theory and 2 Examples each)
Thread Programming 3 Hours
  • Advantages, Concept of Multithreading, Lifecycle (Theory and 2 Examples)
  • Creating Thread, Thread Scheduler, Sleeping, joining a thread (Theory and 2 Examples each)
  • Thread priority and synchronization (Theory and 2 Examples each)
GUI Concepts and Application Development 4 Hours
  • Java AWT, Event-Handling (Theory and 3 Examples each)
  • Java Applet (Theory and 4 Examples each)
  • Java Swing (Theory and 4 Applications each)
Connectivity in Java 3 Hours
  • Concepts of JDBC (Java Data Base Connection) (Theory)
  • API (Theory)
  • Interfaces (Theory)
  • JDBC programming (3 Examples)
Java I/O 2 Hours
  • Reading and Writing file and data/Object (Theory and 4 Examples)
  • Serialization and De-Serialization (Theory and 2 Examples)
Wrapper Class & Java Strings 2 Hours
  • Concepts of auto-boxing and un-boxing (Theory and 2 Examples)
  • What is String ?How to create String? (Theory and 3 Examples)
  • Java String Buffer and String Builder (Theory and 5 Examples each)
Projects on Java Swing and JDBC 3 Hours
  • Implement Jdbc -Swing GUI Application to Store, Update, Delete and View the Employee Details (Emp_Id, Emp_Name, Emp_Address, Emp_DOB, Emp_Salary) (Front End- UI Designing in JFrame form and Back End: Java Coding and Database connection between Java and Oracle Database)
  • Implement Registration Form GUI Application Using Java Swing(Front End- UI Designing in JFrame form and Back End: Java Coding) etc.

Industry Ready Java - Advanced

Your college degree will make you a fresher. Before you graduate from college, learn the latest technologies adopted by the industry & earn some valuable experience with on-job training on Live projects. Our 5 level course (each 1 month) will equip you with all the latest technologies starting from basic level C to advance level Oracle. Students who pass with high grades will be put on LIVE projects under the guidance of highly experienced coders at our Sector-V Software Division, where they see all phases of SDLC. At the campus interview or while you search for better jobs, you will be miles ahead of your fellow classmates.

Working professionals who wish to switch to new technology will also find the course helpful.

Duration

Duration

40 hours - 2 classes per week

Eligibility

Eligibility

Knowledge of C & Database.

Course Fees

Course Fees

Rs.9,750/-
Inclusive of all taxes

Course Details

Java Database Connectivity(JDBC) 2 Hours
  • DDL & DML Commands
  • How to create Connection in IDE?
  • Interfaces in JDBC (Statement, ResultSet and Prepared Statement)
Java Database Connectivity(JDBC) 2 Hours
  • Transaction Management in JDBC
  • Application Development on Transaction Management
Java Database Connectivity(JDBC) 2 Hours
  • Batch Processing in JDBC
  • Application Development on Batch Processing
Java Server Page(JSP) 2 Hours
  • Advance of JSP over Servlet
  • Lifecycle of JSP Page
  • How to create a JSP Page
Java Server Page(JSP) 2 Hours
  • Methods of JSP Page Interface
  • JSP tags and Examples
  • JSP Implicit objects and Examples
Java Server Page(JSP) 2 Hours
  • JSP Directives and Examples
  • Exception Handling in JSP
Java Server Page(JSP) 2 Hours
  • Action Tags
  • Java Bean(Bean Development in JSP)
Java Server Page(JSP) 2 Hours
  • Projects (Java Web Application Development to Upload Records to Database and fetch/read the records from Database)
Client-Server model and MVC architecture 2 Hours
  • RequestDispatcher in Servlet and examples
Client-Server model and MVC architecture 2 Hours
  • Discussion on MVC Architecture
  • MVC Example in JSP
Java Servlets 2 Hours
  • What is a Sevlet and Advantages?
  • What is web application?
  • Advantages of servlet over CGI
  • Web Terminology
  • Website:Static vs Dynamic
Java Servlets 2 Hours
  • HTTP and HTTP Requests
  • Get vs Post with practical examples
  • Servlet API
  • Servlet Interface
Java Servlets 2 Hours
  • Generic and Http Servlet Class
  • Difference between Generic Servlet and Http servlet
Java Servlets 2 Hours
  • Servlet LifeCycle
  • Steps to create a Servlet Project
Java Servlets 2 Hours
  • Projects(Registration Form,Fetching result for a given record etc)
Session Tracking in Servlets 2 Hours
  • What is session?
  • How session Works?
Session Tracking in Servlets 2 Hours
  • Session Tracking Techniques:
    • Cookies
    • Hidden Form Field
Session Tracking in Servlets 2 Hours
  • Session Tracking Techniques:
    • URL Rewriting
    • HttpSession
  • Examples on Session tracking Techniques
Servlet Miscelleneous 2 Hours
  • Event and Listener in Servlet
  • Servlet Filter and Usage
Servlet Miscelleneous 2 Hours
  • Filter API
  • Examples

For any enquiry please fill up the form below

Fields marked with * are mandatory.