The rapid and dramatic advances in information technology (IT) in recent years have without question generated tremendous benefits. However, they have created significant and unprecedented risks to operations. Computer security has, in turn, become much more important as all levels of an organization utilize information systems security measures to avoid data tampering, fraud, disruptions in critical operations, and inappropriate disclosure of sensitive information.
Course Highlights & Benefits :
Latest Hacking Techniques & tools, Live investigation & Demonstration of various cases solved by Mr. Dedhia
Basics of Enterprise Risk Management
- Operational Risk Management
- Building a Cyber Risk Management Framework
- Building Cyber Crisis Management Framework
- Cyber Insurance
WHY I.T SECURITY
- Types of cyber crime (Nigerian Scams, credit cards, Net banking frauds)
- Recent Internet Banking frauds & their modus-operandi
- Cyber Crime Cases (Past, present, & what can we expect in future)
Understanding IP & MAC addresses Proxy Servers
- How to use proxy servers
- How to detect proxy servers
- Mobile Hacking & Security( Live Demos of mobile hacking & how to secure your mobiles)
- Call Recording
- Call Spoofing
- Hacking the entire mobile, etc
OWASP Top 10 : Website Hacking & Security
- Vulnerability Scanning in Websites
- SQL Injection
- Cross Site Scripting
- DOS
- Defacing a website
- XSS
- Uploading a shell on the web server
Understanding Data leakage solutions or data security
- Penetration testing tools
- Understanding Kali Linux
- NMAP
- Metasploit framework
- Meterpreter shell
- Router Pentesting
- Pen Testing WPA/WPA2 Encrypted WLAN
Understanding the ISO 27001 standards
CYBER CRIME INVESTIGATIONS & DIGITAL FORENSICS
- Investigating Emails
- Analyzing Email Headers
- Windows File Analysis tools
- MAC FORENSICS
- LINUX FORENSICS
Network Forensics :
- Understanding Wireshark
- Windows server forensics
- Data Acquisition Software Tools
- Creating Images of pen drive/hdd
- Investigating Website & web application
- Mobile Forensics
- Complete laptop / desktop forensics
(incase an employee leaves the company to trace the activity done on his computer)
- How to file cyber complains
Backtrack: Kali Linux, Nmap, NetScan Tools Pro, Nessus, SAINT, GFI LANGuard, TOR, OmniPeek Network Analyzer, Sandcat, Wikto, Acunetix, Havij, TrueCrypt & lot more over 5 GB of materials would be provided in the form of: PowerPoint slides (step by Step Instructions on operating the tools), open source software, Video tutorials.For each & every module & concept which will be taught, we will be giving minimum 2 tools for each module which can be use later on.
Mr. Dedhia is an independent Cyber Crime Investigator & also a Certified Ethical Hacker (EC-Council, USA). Since many years he has been working as a Cyber Crime Investigator and also as a security expert for IT companies, Government department Corporate’s and even individuals. He has also provided training to Navi Mumbai cyber cell department & also assists the Cyber Cell Departments of Mumbai Police with respect to their queries.
Web Developers, Network Engineers, System Administrators, Law Professionals, Banking & finance Sector Professionals, Digital Forensics Investigators, Information Security Managers, Incident Responders, I.T Professionals, Cyber Crime Attorneys, Private investigators, Compliance Officers & Auditors
Participation Fee :
Members |
Rs. 7,000 + 18% GST |
Non-Members |
Rs. 8,000 + 18% GST |
Bank Details for NEFT |
Account No. |
10996680930 |
IFSC CODE |
SBIN0000300 |
Bank Name |
State Bank of India |
Branch Address |
Mumbai Main Branch |
Cheque /Demand Draft should be drawn in favor of “BOMBAY CHAMBER OF COMMERCE AND INDUSTRY”
Contact Details :
Revati Khare || Assistant Director – Information & Communication Technology Committee
Email : revati.khare@bombaychamber.com
Tel. (D) + 91 22 6120 0231; (M) + 91 9892029473