CYBER THREAT IS...One Of The Most Dangerous Threats Surpassing Terrorism To The World. Develop Your Knowledge Base By Getting The Right Training With Respect To Security Fundamentals.

This workshop aims at encouraging young minds to have a wide area of vision in the field of cyber security and computer forensic by motivating and encouraging our highly talented youth to actively participate in the various National and International Level Technical Symposiums, Competitions, Trainings and fulfill various industrial needs in the field of Cyber and Information Security.

Pristine InfoSolutions is one of the leading cyber security services and information security training provider headquartered in Mumbai, having branches all over India. Pristine InfoSolutions Career Development and Training Department is one of the most trusted and by far the largest source for information security training and ethical hacking courses in India. Over the years we have trained many engineers, professionals and corporates in different cities across the country and produced highly skilled pool of IT professionals to counter global industry challenges in the field of Information Security.

Pristine InfoSolutions has been awarded as the India's top cyber security company of the year 2014 by SiliconIndia. Also got featured in Silicon India Magazine.

About the Trainer

Rizwan Shaikh is one of the India's renowned Ethical Hacker, Information Security Researcher and Cyber Crime Consultant actively involved in providing Ethical Hacking and Information Security training & services. He is the Founder, CTO and principal consultant of Pristine InfoSolutions and is responsible for setting company’s strategic direction and overseeing the business operations. With an aim to secure the Cyber World from unethical Hackers, Rizwan has been imparting practical knowledge of Ethical Hacking, Information Security and Cyber Forensics to the budding technical workforce of the country. Rizwan has delivered numerous workshops, seminars, talks and conferences at various colleges, institutions and has been assisting corporates in creating awareness about Information Security and Cyber Crimes. Rizwan Shaikh is regularly invited by Engineering Colleges, Organizations, Corporates and Government agencies to speak and distribute knowledge about Cyber Security. To know more about him, please visit www.rizwanonline.com

He has been featured in various print media and TV news channels to impart expertise on the issues of cyber security, latest being covered by NDTV , Fever FM and Red FM and many more. Few of the show recordings available on our youtube channel.

Key Benefits for students:

  1. Authorized globally CRISIL recognized international certificate of ‘Ethical Hacking and Information Security’ participation to every participant.
  2. Security Tool Kit for each student.
  3. Training Material (e-books) for each student.
  4. Learn & Interact with renowned India’s best Security Experts and Cyber Law Consultants.
  5. Pristine InfoSolutions is the only company to provide workshops with hands-on training and live demos of latest hacking techniques and tools.
  6. Power Point Presentation, Live Demos, Interactive Question & Answer sessions.
  7. Students will have rich experience working on cases & training for cyber crime investigations.
  8. Even after workshop, students can avail Pristine InfoSolutions guidance and support.
  9. Students will have opportunity for inplant training and internships with us.

Duration of workshop:

2 Days(consecutive) - 5 hours per day

Registration charges:

  1. Registration charges are Rs. 700/- per student.
  2. The fee includes workshop training, certificate, training materials and tool kit for each student.

Content for Ethical Hacking & Cyber Security Workshop

Computer Security - Basics

  • Introduction
  • Hacker and Cracker
  • Attacker and Victims
  • Most Common Attacks
  • Committing a Computer Crime
  • ASCII Code - making a folder invisible

Network Security

  • IANA, Allotment of IP Address
  • IPv4 & Ipv6
  • IP Address – Basic, Detecting
  • Ping & Ping Sweep
  • Tools (Ping Sweeping)
  • Foot-Printing Techniques
  • Tracing Target Location
  • Tools to Trace
  • Detecting Victim's OS
  • Detecting Firewall
  • Countermeasures

Email Security

  • Email Threats
  • Hacking Mailing Clients (Outlook)
  • Email Forging (Sending Fake mails)
  • Spamming - live task
  • Bulk Mailing - live task
  • 419 Scam
  • Email Headers
  • Finding details of recipient
  • Countermeasures

Chatting Messenger

  • Introduction
  • Instant Messenger threats
  • Hacking using Gtalk, Google Hangout & Yahoo Messenger
  • Case studies
  • Countermeasures

Port Scanning

  • Type of Ports
  • Virtual Port numbers
  • Detecting Open Ports
  • Tools to carry out Port Scanning
  • Countermeasures

Intellectual Property Theft

  • Introduction
  • Types of Malware
  • Trojan attack & countermeasure
  • Case Study
  • Keylogger working & countermeasure
  • Steganography and Steganalysis

Password Cracking & Prevention

  • Introduction
  • Password Cracking Techniques
  • Dictionary Based Attack
  • Brute force Attack
  • Task – Crack password on site: Live
  • Countermeasures for users
  • Countermeasure for System Administrators

Identity Attacks

  • Introduction
  • Proxy Servers
  • Proxy Bouncing
  • IP Proxy, Tor browser

Mobile Phone & Online Apps Hacking

  • Hacking chatting apps (WeChat & Whatsapp)
  • Hacking online database portals (YellowPages & JustDial)
  • Spying through cell phone
  • Call Spoofing

Website Hacking

  • Hacking & finding Loop holes using Google
  • Finding Control panel of Websites
  • Breaking Cpanel
  • Defacing Website
  • Database Hacking, SQL Injection Attack
  • Web Jacking

Basic Hacking

  • Opening blocked website
  • Phishing Technique
  • Social networking account hacking (Facebook, LinkedIn)
  • Bank Account hacking / illegal Money Transfer
  • Hacking Email accounts
  • Recording activities on computer
  • Making own Virus

Other types of Attack

  • Input Validation
  • Buffer Overflow
  • DOS & DDOS Attacks
  • HoneyPots, 0day
  • Social Engineering Attacks

Cyber Law and Consulting

  • What is Cyber Law
  • Types of Crimes
  • IT Act, 2000
  • Blogs & Blogger's rights & limitation
  • CERT-IND & AO
  • Uniform Domain Dispute Resolution Policy
  • Trademark & Copyright Infringement
  • Central Acts & State Acts

Get yourself registered as soon as possible !!