know the personalities
hold your mouse,move left and right

About this Conference/technical symposium/symposium


job detailsFree Publishing of valuable information(s) in our website-Procedure to submit detailsjob details

Free Publishing of your College/University function details


Free Publishing of Your College/University function details in our website.Please send details to following email ids


events@technicalsymposium.com
query@technicalsymposium.com
papers@technicalsymposium.com
materials@technicalsymposium.com


Technicalsymposium.com- Free E-Mail Alerts Daily


Get Daily Job/EntranceExam/Scholarships/
Admission/Competitive Exam Details Symposium/Conference Alerts in your email

Please Click the below link and Enter your email id and go to your inbox and confirm.You will be a member in our group.

Please click here to Join Our group

Leading Software Companies are hiring-Apply Now


Freshers Jobs/Symposium/Conference/Certification &Education News Given Below-Get Now

Freshers Jobs and IT /Govt Jobs

Symposium and Conference Details

Free Lecture Notes

Free Placement Papers

Free Project Codings



E-flair '12-Achariya school of business and Technology Villianur Puducherry

Date of Function: March 8 and 9 th2012

When register please mention the column how do you know->Please fill our website name:technicalsymposium.com

A Workshop on Cyber Forensics & Ethical Hacking (16 Hours)

Ethical hacking is an important tool in many national security agencies and even companies. An Ethical Hacker is usually employed with the organization and can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods as a Hacker. The goal of the ethical hacker is to help the organization take pre- emptive measures against malicious attacks by attacking the system himself; all the while staying within legal limits. In order to become an Ethical Hacker or Security Expert, one must think out of the box with the mentality that in order to catch a thief.

This workshop is specifically designed to provide the right knowledge to the aspiring Hacking and Cyber Security enthusiasts. This workshop will explore the various means that an intruder has available to gain access to computer resources. It will investigate weaknesses by discussing the theoretical background behind, and whenever possible, actually performing the attack.

A] Workshop Syllabus:

Modules

Introduction to Ethical Hacking

Hackers & Hacking Methodologies

Types Of Hacker

Under Ground hacker Community

Step Of Conducting Ethical Hacking

Hiding Your Identity While Performing Attack

Information Gathering (Foot Printing & Scanning Methodologies)

Get Know How Hacker Gather Information about Victim on Internet

Information Gathering of Websites & Networks

Scanning Ports, Network, Vulnerability & Structure of Website

Finding Admin Panel of Websites

Google Hacking & Advanced Google Hacking

Using Google as Hacking Tools

Basic & Advanced Syntaxes of Google

Finding Vulnerable of Websites Using Google

Web Cam Hacking

Password Hacking By Google

Sensitive Files Hacking

Google Hacks Tool

Google URL Hacking

Directory Hacking

Security Against Google Hacking

System Hacking & Network Enumeration (LAN Hacking)

Convert Guest To Admin

Cracking Admin Password

View System Account

Reset Syskey Password

Install Backdoor for Future Use

Security Against Windows

What Is Enumeration

Use of Enumeration

Enumerates Username And Password of Victim

Cracking Password Techniques

Escalate admin Level Power

Plant Backdoors & Countermeasures

Hacking By Trojans, Backdoors & Viruses

What Is Trojan?

Trojans Attack cases

Types of Trojans.

Binding Trojan In Different Files

How Attacker Make Undetectable Table Trojans

Different Way a Trojan Can get Into A system

Controlling System Remotely By Trojans

Analysis of Trojans/Virus

Security Issues Against Trojans Attack

Removing Trojans

o Manually

o Automatic

Proxy Server And VPN Technologies (Advance)

What is Proxy?

Chain Proxy By Any Website

Why Hacker use Proxy.

Advantage And Disadvantage of proxy

Online Best Proxy

What Is VPN?

Why We Use VPN

Advantage & Disadvantage of VPN.

Free VPN

Countermeasures

Hacking Email Accounts & Email Security (Advance)

E-mail Sending Process.

Vulnerabilities in Mail Severs.

Email Account Hacking Methods.

Email Spoofing

Phishing , Desktop Phishing

Tabnabbing

Social Networking websites Orkut, Facebook Hacking & Security Policies

Cases of Orkut, Face book etc.

Identity Theft Cases

Virus on Social Sites

Identity Hacking of Facebook & Yahoo Etc

Security Tips against Social Websites

Privacy Option

Countermeasures

Web Browsers Hacking & Security (Advance)

Introduction to Web Browsers

How We Choose Our Browser

Hacking Firefox & Others Web Browsers

How Hacker Use Browser As Hacking Tool

Browser Important Files

Security Issues of Different Browsers

What is unsafe about my browser

Agent Security Against Hacker

Convert Your Browser Anonymizer

Security And Privacy Features

Website & Web Server Hacking And Countermeasure (Advance)

Introduction of Website & Database

Attack On Website & Web Application

SQL Injection attacks

o Manually

o Automatic

Authentication Bypassing

Hacking By SQL Query

Database Hacking Using ODBC Error

Retrieve Data From Website

SQL Injection in MySql Database

Blind SQL Injection

Maintaining Access On Website by Hackers

Uploading Shell ,Viruses & Trojans On Website

XSS (Cross Site Scripting) attacks

o Reflected

o Persistence

LFI & RFI Attack

o Manually

o Automatic

Countermeasures

Cyber Forensics Investigation

Introduction to Cyber Forensic Investigation,

Investigation Tools

Evidence Collection

Evidence Preservation

E-Mail Investigation & Tracking

IP Tracking

Log File Tracing

E-Mail Recovery

Recovering Deleted Evidences

Categories of Incidents

Incident Response Checklist

Procedure for Handling Incident

Incident Management

Incident Reporting

Types of Incidents and Level of Support

Incident Specific Procedures

Android Hacking (Advance)

Hacking an Android Application

Introduction Android

Install Android In any Machine

Rooting an android device

Hacking an application on Android Other topics

Need for mobile best practices

State of mobile malware

Jailbreaking/rooting

Credit Card Frauds & Security (Advance)

Credit card cases

What is Credit card Fraud?

Vulnerability In Credit Card

Tools That Use to generate credit card

Detection of Credit card Fraud

Countermeasures

THIS WORKSHOP IS ONLY FOR EDUCATIONAL PURPOSE NOT FOR HACKING PURPOSE.

B] Prerequisite for Workshop:

Passion to learn new creative things.

Knowledge of how to use Computer.

Having basic knowledge of Web & Internet.



C] Who could attend ?

College students seeking career in Cyber Security Industry.

Person having interest in Hacking & Security.

Education Faculty & Staff.

IT Professionals, Web Developers, Network Engineers.

Students from any branch can attend the workshop.

D] Requirements for Workshop:

Minimum 100 students for conducting the workshop.

A Seminar Hall

Internet Connection for Trainer

Two Projectors.

An Effective collar microphone with a Sound System.



E] Program Benefits & Highlights:

Learn & Interact with renowned Industry Experts

Hands on Demonstrations of Latest Hacking Techniques & Tools.

Hands on Demonstrations of various cases solved by our Trainer.

Advance & New Topic Like:

o Android Hacking

o Web Server Hacking

o Cyber Forensics Ė Rahul Gandhi Email ID Hacked Case

o Advance Email Hacking

Live demo of Website Hacking, Software Cracking without using any software.

PowerPoint Presentation, Live Demos, Interactive Question & Answer sessions and comprehensive reading material.

Toppers of each workshop to be personally interviewed and will receive a chance to work on security projects.

F] Key Benefits of i3indya:

Conducted more than 150 Workshops for Students & Professionals across globe. Conducted workshops at Top most institutes of India including IITís, IIITís, IIST, NITís and Deemed Universities. Trained More than 15,000 students from Indiaís Leading Institutes. FREE Penetration Testing of your College Website (Worth ` 8,000/-)

G] Course Material & CDs:


Comprehensive course material will be provided to participants. Ethical Hacking Toolkit (Containing Tools, Videos, Ebooks, Presentations) i3indya Training Redemption Coupon (10% discount)

H] Workshop Duration:

2 Days (8 hours/day)

I] Charges for Workshop:

? ` 1,200/- per student. (This includes Registration Kit, Toolkit, and Course Material).

J] Certification:

Participation Certificate to all students from i3indya Technologies.

Contact no:

Feel free to contact

P.balaji-9092036944

When register please mention the column how do you know->Please fill our website name:technicalsymposium.com

Register online-Please Click here

E-Flair 12 Reg.Form- Please Click here

Workshop Reg.Form- Information Please Click here


More Symposium and Conference DetailsWant More Symposium and Conference Details Please Click here

Technicalsymposium.com - Stop Searching Here-Get All Our Contents Just in One Click


Job Announcements
job details Chennai Software Companies-HR Email idjob details
job details Bangalore Software Companies Details-Part-I job details
job detailsBangalore Software Companies Details-Part-I job details
View all Government and Software Jobs job detailsjob detailsjob details



Scholarships Details
job detailsIntern Required at Intel job details
job detailsEngineering Internship at Intel job details
job detailsEngineering Internship at Intel job details
View all Scholarships and internships job detailsjob detailsjob details



Premier Institutions Admission Procedures
job details IIT Admission Procedures job details
job detailsNIT Admission Proceduresjob details
job detailsIIM,IIIT,IISC Admission Procedures job details
View all Premier Institutions Admission Procedures job detailsjob detailsjob details
All Departments Lecture Notes
job detailsBE(CSE) Lecture Notes job details
job detailsBE(ECE) Lecture Notesjob details
job detailsBE(Mech) Lecture Notesjob details
View all Departments Lecture Notes job detailsjob detailsjob details



Automobile Engineering-Lecture Notes
job detailsIII Sem Lecture Notes job details
job detailsV Sem Lecture Notesjob details
job detailsVII Sem Lecture Notesjob details
View all Departments Lecture Notes job detailsjob detailsjob details



Bio-Medical-Lecture Notes
job detailsIII Sem Lecture Notes job details
job detailsV Sem Lecture Notesjob details
job detailsVII Sem Lecture Notesjob details
View all Departments Lecture Notes job detailsjob detailsjob details
Biotechnology-Lecture Notes
job detailsIII Sem Lecture Notes job details
job detailsV Sem Lecture Notesjob details
job detailsVII Sem Lecture Notesjob details
View all Departments Lecture Notes job detailsjob detailsjob details



Civil Engineering-Lecture Notes
job detailsIII Sem Lecture Notes job details
job detailsV Sem Lecture Notesjob details
job detailsVII Sem Lecture Notesjob details
View all Departments Lecture Notes job detailsjob detailsjob details



Computer Science Engineering-Lecture Notes
job detailsIII Sem Lecture Notes job details
job detailsV Sem Lecture Notesjob details
job detailsVII Sem Lecture Notesjob details
View all Departments Lecture Notes job detailsjob detailsjob details
ECE-Lecture Notes
job detailsIII Sem Lecture Notes job details
job detailsV Sem Lecture Notesjob details
job detailsVII Sem Lecture Notesjob details
View all Departments Lecture Notes job detailsjob detailsjob details



EEE-Lecture Notes
job detailsIII Sem Lecture Notes job details
job detailsV Sem Lecture Notesjob details
job detailsVII Sem Lecture Notesjob details
View all Departments Lecture Notes job detailsjob detailsjob details



Information technology-Lecture Notes
job detailsIII Sem Lecture Notes job details
job detailsV Sem Lecture Notesjob details
job detailsVII Sem Lecture Notesjob details
View all Departments Lecture Notes job detailsjob detailsjob details
MBA-Lecture Notes
job detailsIII Sem Lecture Notes job details
job detailsV Sem Lecture Notesjob details
job detailsVII Sem Lecture Notesjob details
View all Departments Lecture Notes job detailsjob detailsjob details



MCA-Lecture Notes
job detailsIII Sem Lecture Notes job details
job detailsV Sem Lecture Notesjob details
job detailsVII Sem Lecture Notesjob details
View all Departments Lecture Notes job detailsjob detailsjob details



Mech Engineering-Lecture Notes
job detailsIII Sem Lecture Notes job details
job detailsV Sem Lecture Notesjob details
job detailsVII Sem Lecture Notesjob details
View all Departments Lecture Notes job detailsjob detailsjob details
Indian Economic Service-Question Papers
job details2010 Questions job details
job details2010 Questionsjob details
job details2010 Questionsjob details
View all Economic Service-Question Papers job detailsjob detailsjob details



GATE-Question Papers
job details2011 GATE-Question Papers job details
job details2010 GATE-Question Papersjob details
job details2009 GATE-Question Papersjob details
View all GATE-Question Papers job detailsjob detailsjob details



IES-Question Papers
job details2010 IES-Question Papersjob details
job details2010 IES-Question Papersjob details
job details2010 IES-Question Papersjob details
View all IES-Question Papersjob detailsjob detailsjob details
JAM-Question Papers
job details2011-Question Papers job details
job details2010-Question Papersjob details
job details2009-Question Papersjob details
View all JAM-Question Papers job detailsjob detailsjob details



UPSC-Main Question Papers
job details2010 UPSC-Main Question Papers job details
job details2009 UPSC-Main Question Papersjob details
job details2008 UPSC-Main Question Papersjob details
View all UPSC-Main Question Papers job detailsjob detailsjob details



UPSC-Prelims Question Papers
job details2010 UPSC-Prelims Question Papers job details
job details2009 UPSC-Prelims Question Papers job details
job details2008 UPSC-Prelims Question Papers job details
View all UPSC-Main Question Papers job detailsjob detailsjob details



Free Computer Lab Codings
job detailsC Program For ARRAY REVERSE. job details
job detailsC Program For ASCII VALUE. job details
job detailsC Program For BINARY SEARCH. job details
View all Free Computer Lab Codingsjob detailsjob detailsjob details




Free Semester study Materials
job detailsCOMPUTER ARCHITECTURE- TWO MARKS job details
job detailsComputer Networks Question Bank. job details
job detailsC Plus Plus Important question.job details
View all study Materials & Lecture Notesjob detailsjob detailsjob details
Anna University Syllabus-I-IV Semester
job detailsCommon Syllabus- SEMESTER I job details
job detailsCommon Syllabus- SEMESTER II job details
job details B.E CIVIL ENGINEERING job details
View all Branches Syllabus in Anna Universityjob detailsjob detailsjob details



Anna University Syllabus-V-VIII Semester
job details B.E. CIVIL job details
job detailsB.E. CSE job details
job detailsB.E. ECE job details
View all Branches Syllabus in Anna University job detailsjob detailsjob details
Anna University Syllabus-ME,MCA All Semester
job details M.E. CAD / CAM job details
job details M.C.A. job details
job details M.E. APPLIED ELECTRONICS job details
View all Branches Syllabus in Anna University job detailsjob detailsjob details
Entrance Exam Syllabus
job detailsGate Syllabus-Aerospace Engineeringjob details
job detailsGate Syllabus-Agricultural Engineeringjob details
job detailsGate Syllabus-Architecture and Planning job details
View all Entrance Exam Syllabusjob detailsjob detailsjob details



Competitive Exam Syllabus
job detailsIndian Economic Service Syllabus
job detailsIES-Civil Engineering Syllabus job details
job detailsIES-ECE Syllabusjob details
View all Competitive Exam Syllabusjob detailsjob detailsjob details



IT interview questions
job detailsAptitude Ablity-Part I. job details
job detailsAptitude Ablity-Part II. job details
job detailsAptitude Ablity-Part III job details
View all interview questionsjob detailsjob detailsjob details
Competitive Exam Papers
job detailsUPSC-AGRICULTURE Question Paper job details
job detailsUPSC-Animal Husbandry Question Paper job details
job detailsUPSC-BOTANY Question Paper
View all Competitive Exam Papersjob detailsjob detailsjob details



Entrance Exam Questions
job detailsJAM-Botony Question job details
job detailsJAM-botony 2006 Question job details
job detailsJAM-botony 2007 Question job details
View all Entrance Exam Questionsjob detailsjob detailsjob details



University Question Papers
job detailsAlagappa University Question Papers job details
job detailsAnna University- Questions job details
job detailsAnnamalai University-Questions. job details
View all University Question Papersjob detailsjob detailsjob details
Education loan Details
job detailsAndhra Bank-Loan Procedure
job detailsState Bank of India-Loan Procedurejob details
job detailsBank of Baroda -Loan Procedurejob details
View all Education loan Detailsjob detailsjob detailsjob details



All Certification Details
job detailsMicrosoft-Certificationjob details
job detailsCitrix-Certification job details
job detailsCisco Systems-Certification job details
View all Certification Detailsjob detailsjob detailsjob details



Famous Bio-graphy Details
job detailsAaamir Khan Biography job details
job detailsA.P.J.Abdul Kalam Biography job details
job detailsBill Gates Biography job details
View all Bio-graphy Detailsjob detailsjob detailsjob details

Hosting by Yahoo!

About-Us    Contact-Us    Site-map

©copyright 2009 All rights are reserved to technicalsymposium.com