Você está na página 1de 16

appin ®

INFORMATION SECURITY
& ETHICAL HACKING
securing the digital age

Introduction to Information Security & DESKTOP & SERVER SECURITY  LAN Security
Ethical Hacking Setting up a LAN Network
 Windows Security. Threats of LAN
INTRODUCTION  Registries. Hacking MAC Address
 Ports and Services.
 Introduction to Data, Information, Network Scanners
 Vulnerabilities in Windows.
Knowledge, and Intelligence.  Hacking into Windows. Introduction to Wi-Fi LAN
 Security, and its need  Counter Measure & Securing Windows. Security
 Operating System Basics.  How to look for vulnerability?
 DBMS Basics  Deleted file recovery.  Firewall Security
 Data Communication Basics.  Introduction to LINUX.  Introduction to Firewalls
 Basics of “Computer networking”
 OSI model.  Working of a Firewall
MALWARES,LAN SECURITY,FIREWALL
 TCP/IP protocol suit.  Types of Firewall
SECURITY
 Networking devices.  Firewall Application
 Malwares
 Cyber Threats. Network Address
 VIRUS & Worm.
 An approach for ethical hacking. Translation
 Spy ware.
 Types of Hackers. Intrusion Detection
 Trojan
 Hackers Vs Crackers. Logging
 Bots.
 Anatomy of a Hacker  Port Filtering
 Logic Bombs
 Challenges for a hacker
 Counter Measures
 Don't Get Caught
O Ant viruses
 Case Studies of Cyber Crime.
O Anti Spy Ware

www.appinonline.com
INTERNET SECURITY ART OF GOOGLING AND DATA BACKUP

 Finding an IP Address  Art of Googling


 Anonymous Surfing  Terminologies
 Proxies Servers  Basic Search Techniques
 Transparent Proxies  Advanced Search Techniques
 Anonymous Proxies  Data Backup
 Free Proxy servers  Introduction.
 Email Hacking  Various Data Backup Strategies.
 How does Email work?
 Analysis of Email Headers PENETRATION TESTING AND CATCHING CRIMINALS
 Email Tracking  Penetration Testing
 IP Tracking using Email  Definition
 Microsoft Outlook Security  Methodology
 What is Spamming?  Basic Approaches
 Methods of Prevention  Catching Criminals
 Cyber Laws regarding Spamming  Cyber Terrorism
 Email Forging O Forms of Cyber Terrorism
 Detecting Forged Emails O Factors & Reasons
O Countermeasures
SCANNING, FINGERPRINTING,AND O Challenges
INFORMATION GATHERING  Honey Pots
 Daemon-Banner grabbing. O Definition
 Port Scanning. O Basic Approaches
 ICMP Scanning. O Research Honey Pots
 Active Fingerprinting. O Production Honey Pots
 Passive Fingerprinting.
 Attacking the System CRYPTOGRAPHY,STAGNOGRAPHY & CYBER FORENSICS
 Types of attacks
O Non Technical Attack (Social engineering Attack)
 Cryptography
 Definition
TECHNICAL ATTACKS & PASSWARD CRACKING
 Goals
 Technical Attacks
 Types Of Cryptography
 DOS Attacks O SKCS
O Ping of Death  DES
O Land attack O PKCS
O Smurf attack  RSA
O Tear drop attack O Hash Function
O Flood Attack  MD-5
O DOS Vs DDOS Attack  Digital Signature
 Input Validation Attack  Digital Certificate
 SQL injection Attack  Kerberos
 XSS Attack  Steganagraphy
 Buffer Overflow Attack  Cyber Forensics
 Key logger Attack  Introduction to Forensics
 Sniffing Attack  Digital Evidence
 Other types of High Level Attack  Requirements for Forensics
 Password Cracking/ Enumeration  Methodology
 Basic Approaches

www.appinonline.com
SECURITY AUDTING AND CYBER LAWS
 Audit Objectives
 Risk Analysis
 Auditing Steps
 Previous Check
 Planning & Organization
 Network Control - Policies
 Network Ctrl - Hardware / Software
 Network Data Standards and Data Access
 Hardware and Software Backup and Recovery
 Software Communications
 Access to Network Operating Systems Software and
Facilities
 Data Encryption and Filtering
 Internet Applications
 Password Protection
 Security Trends
 Latest Security trends

MOBILE SECURITY
 What is Mobile?
 Architecture of Mobile communication.
 Technology of Mobile Communication.
 Mobile Phone Standrads.
 GSM.
O Advantages & Disadvantages of GSM.
 CDMA.
O Advantages & Disadvantages of CDMA.
 Mobile Generation.
 Protocols used in Mobile.
 SIM.
 What is SIM?
 How SIM works.
 Services of SIM.
O SMS.
O MMS.
O WAP.
O GPRS.
 Problems in Mobile Communication

www.appinonline.com
appin NETWORK
®

SECURITY
securing the digital age

NETWORK SECURITY
VOIP VIRTUAL PRIVATE NETWORK SECURITY
 Voice over IP (VoIP).
 Definition & Trends.  Introduction1
 Services.  Application & Requirements of VPN.
 Types of VoIP.  Tunneling Mechanism
 Components of VoIP.  VPN Tunneling.
 IP Telephony &IP Paging.  Tunneling Protocols.
 VPN Types.
 What IP Telephony brings for IP Paging?
 Virtual Leased Line.
 VoIP Technology available for Paging &
 Virtual Private Routed Networks.
Intercom.  Virtual Private Dial Networks.
O Different types of VoIP.  Virtual Private LAN Segments.
 VoIP Clients.  Open VPN.
 Protocols & Acronyms.  Models of VPN.
 Reasons for VoIP.  IPSec VPN
 Skype.37-40  VPN Step by Step Security Framework
 VoIP Security Scenario.  VPN Security Issues
 VPN Simplified
 How do we secure VoIP?
 VPN Tools and related threats
 Secure The Devices.  Other VPN Threats
 N/W Segregation.  Countermeasures
 Encrypt The Traffic.  VPN related topics: WLAN
 Intrusion Detection.
 Summary of VoIP Security.

www.appinonline.com
WIRELESS LAN  Services Provided by Router
 Introduction of Wireless LAN  Different types of NAT
 Basics of Wireless LAN.  Full Cone NAT, Restricted cone NAT
 Components of Wireless LAN.  Port Restricted cone NAT
 Types of Wireless LAN.  Symmetric NAT
 Setting of Wireless LAN.  NAPT Services
 Detection of Wireless LAN.  ADSL Details
 How to access Wireless LAN?  Trouble Shooting
 Advantages & Disadvantages of Wireless LAN.  Routing Table Problems
 Antennas.  Various types of Attacks
 SSID  Securing the Routers
 Access Point Positioning.
 Rogue Access Point. IDS & IPS
 Tools.  Introduction
 Detection.  What is an Intrusion?
 Wired Equivalent Privacy.  Intrusion Detection
 Tools.  Intrusion Detection System(IDS)
 Related Technology.  Need of an IDS
 Detection of MAC Spoofing.  Components of an Intrusion Detection System
 DOS Attack  Types of Intrusion Detection Systems
 Man in the Middle Attack. (MITM)  Network Based Intrusion Detection Systems
 Scanning Tools.  Host Based Intrusion Detection Systems
 Sniffing Tools.  Host Based Intrusion Detection Systems
 Multiuse Tool.  What is not an IDS?
 WinPcap Tool.  Detection Methodologies
 Auditing Tools.  Signature-based Detection
 Wireless Intrusion Detection System.  Limitations of Signature-based Detection
 Securing Wireless Network.  Anomaly-based Detection
 Limitation of Anomaly-based Detection System
ROUTER SECURITY  Stateful protocol analysis based
 What is Router?  Factors Determining the Effectiveness of an IDS
 Static and Dynamic Routers  Various Tools Available
 Work to Router  Conclusion
 Keeping the Messages Moving  Introduction to IPS
 Directing Traffic  What is an Intrusion Prevention System?
 Transmitting Packets  Need for having an IPS
 Knowing Where to Send Data  Types of IPS
 MAC Addresses  Host Based Intrusion Prevention system
 Understanding the Protocols  Limitation of Host Based Intrusion Prevention system
 Tracing a Message  Network Based IPS
 Denial of Service Attacks  Counter Measures taken by an IPS
 Configuration of Router  Session Sniping
 Essential Configuration of a Router  Packet Filtering & Packet Scrubbing
 Protocols on a Router  IP Blocking & Deception
 RFC1483, Architecture  Risks Involved
 Handshake Protocols  Conclusion

www.appinonline.com
ACCESS CONTROL SYSTEM VULNERABILITY ASSESSMENT AND PENETRATION TESTING
 Introduction: What is Access Control  Vulnerability Assessment
 Access Control in Physical Security  Vulnerabilities
 Access Control in Information Security  Scope of Vulnerability Assessment
 Need of an Access Control System  Tools used for Vulnerability Tests
 Some Concepts Related to Access Control  Types of Vulnerability Assessment
 The Essential Services provided by Access Control Systems  Network Based Vulnerability Assessment
 Access Control Polices  Host Based Vulnerability Assessment
 Discretionary Access Control(DAC)  Application Level Vulnerability Assessment
 Limitations of Discretionary Access Control  Vulnerability Assessment Vs Risk Assessment
 Non-Discretionary Access Control  Penetration Testing
 Mandatory Access Control(MAC)  Scope of Penetration Testing
 Role-based Access Control  Information Gathering
 Temporal Constraints  Footprinting/Fingerprinting
 Workflow  Network Surveying
 Architecture of a Work Flow Management System(WFMS)  Port Scanning and Services Identification
 Architecture of a WFMS  Evading Firewall Rules
 Chinese Wall  Automated Vulnerability Scanning
 Access Contril in Telecommunication  Exploiting Services for Know Vulnerabilities
 Access Policy  Password cracking or Brute Forcing
 Who defines the Access Policy? Denial of Service(DoS) Testing
 Access Policy  Escalation of Privileges
 Classification of Access Policies  Tools Used
 Introduction to Backdoors
E-MAIL SECURITY  Define: Backdoor
 Introduction  How does a Backdoor works?
 History of E-mail  Protocols used by Backdoor
 How E-mail Works?  Files used by Backdoor
 Modern E-mail Networks  Developing a Rootkit
 Various Mail Servers  How Listening and Handshaking take place?
 E-mail Protocols  Counter Measures
 How to steal Data from an E-mail  How to avoid a Trojan Infection?
 Social Engineering  Introduction: Buffer Overflow
 Security Vulnerability  Stack-Based Overflows
 Keyloggers  Example Source Code
 E-mail Exchange Server Security  Introduction: Buffer Overflow
 Relay Restrictions  Exploitation
 Virus Protection
 RPC over HTTP Advanced level registry and code security
 Protecting front-end Servers
 Keep Exchange Server up-to-date

www.appinonline.com
appin
securing the digital age
®

LA ISO 27001
(ISMS)
INTRODUCTION TO INFORMATION
SECURITY AUDITING
MANAGING SECURITY AWARENESS
 ISO 27001
 Information security management system  Return On Investment
 What is Information Security
 ISMS  Return On Investment
 History of ISO 27001
 ISMS implementation  Where to invest first
 Standards and International Organization for
 Management security  Security Policies
Standardization
 Managing Security Awareness  Training and Awareness
 BS7799 / ISO 1799
 Need for Security Management  System Administration
 ISO 27001
 Impact of a sound Security Management  Establish Effective Security Configurations
 Domain of BS 7799-1
System  Maintain Software
 Improvement in ISO 27001 over BS 7799
 Security awareness usually fails, WHY?  Detect Security Breaches
 Control objective and controls in iso 27001
 ISO 27001 certification  Respond intelligently to incidents
 Selection and Implementation of Controls
 ISO 27001 certification  Security Evaluations
 Developing and Adopting Policies
 Role of auditiors
 Mandatory requirments
 Marketing ISO 27001 to Senior Management
 Information security management system
 Preparing for Certification
 Management responsibility
 Compliance accreditation and certification
 Management Review of the ISMS
 ISMS Improvement
 The 6-step process for Certification www.appinonline.com
SECURITY MANAGEMENT PRACTICES AND FRAMEWORK

 Business continuity  Security Management Practices


 Business Continuity Planning  The Big Three : CIA
 Disasters  Security Management Practices
RISK ASSESSMENT, BUSINESS  Types of Disasters  Identification of Assets
CONTINITY AND DISASTER  On the basis of area affected  Determining Valu of Assets
O Local site disasters  Threats on Assets
 Risk assessment O Site disaster - encompass the whole  Risk Management
 What is Risk building  Principles of Risk Management
 What is Risk Assessment O Area disaster - cover the whole  Safeguard Selection
 Kind of Risk area/vicinity  Data Classification
 Stage of Risk Assessment  On the basis of the cause of origin  Classification Criteria
 Approaches To Risk Assessment  Elements of a good Business Continuity Plan  Information Classification Procedure
O Qualitative Risk Assessment  Building a Business Continuity Plan  Assets Protection & Approving Security Changes.
O Quantitative Risk Assessment O Assess Business Requirements  Monitoring Security Of the Networks
 Popular methodologies for Risk Assessment O Identify the IT requirements Security Frameworks
O Building the Backup/recovery solution  What is Security
O Select products to match the design of  What about Adequate Security?
the solution What is required for Adequate Security?
O Implement the solution  Aspects of Security
O Keep the solution up-to-date  Framework 1 : Defense in Depth (DID)
 Secure Environment
ISMS AUDITS AND METHODOLOGY  Framework 2 : OCTAVE
 Audit concepts  Framework 3 : Security Risk Analysis
 Audit fundamentals  Framework 4 : Threat Modeling
 Audit management standard  Stride
 Types of Audits  Dread
 Audit planning
 Audit Execution
 Audit reporting
 Audit follow-up

www.appinonline.com
appin ®

securing the digital age


Cyber Forensic

Cyber Forensic Legal Perspective: Searching for


=Basic of cyber Forensic and Seizing Information
=Introduction =Introduction

=Definition =Information as contraband

=Need Of Cyber Forensic =Information as an Instrumentality

=Principles of cyber forensic =Information as Evidence

=Cyber Crimes =Privileged Confidential Information

=Where and when do you use Cyber =Understanding where the evidence
Forensics might be: Stand-Alone PCs, Networks
and File-server, backup, Electronic
Cyber Laws Bulletin Boards, and Electronic Mail
=What is cyber laws =Searching for Information

=Need of cyber laws =Deciding whether to conduct the


=Internet laws search On-Site or to remove hardware
=Cyber stalking to another location
=Indian laws

=U.S. A. Laws Cyber Investigation Methodology


=Introduction to Cyber Investigation

Preservation documentation =Investigation

=I n t e r p r e t a t i o n or analysis =Issues involved in investigations.

documentation =How to secure your investigations

=Communication =Steps for cyber investigation


=P r o c e d u r e s for Computer =Identification documentation

Evidence Seizure =Collection or extraction documentation

www.appinonline.com
Concept of File Systems and Hard Steganography
Disks =Definition

=Types of Hard Disk Interfaces EFS Key =Ty p e s of Steganography and


=FAT vs. NTFS Steganalysis
=Windows Boot Process (XP/2003) =Steganography vs. Cryptography

=Windows based Forensic =Introduction to Stego-Forensics

=Linux based Forensic =Steganography vs. Watermarking

Basic Forensics Tools =Steganography Tools

Crime scene Management Recovering of Deleted Files and


=C r i m e Profiling Crime Scene deleted partitions
Management =Recovering deleted files from
=Live System Data Gathering (Windows) computer
=Deleting Files

Digital Evidences =Files deleted into windows

=What is Digital Evidences =Storage locations of recycle bin in


=How to identify digital evidence NTFS and FAT system
=How to treat digital evidences =Recycle Bin Working

=How to secure digital evidence =Damaged files in recycled folder

=E vidence acquisition and =R e c o v e r i n g encrypted files


Documentation (Decryption) e.g (MS Office, Rar, etc.)
=Tools to recover deleted files

Data Imaging and Imaging =Recovering deleted files from Deleted


Forensics Partition
=Computer hard disk imaging =Recovering Deleted partitions

=Terminology =Deletion of partitions

=Removable disks like pen drives, =Recovery of deleted partitions

CD/DVD, Removable hard disks =Tools

=Advanced techniques of data imaging


=First Response Kit Introduction to mobile and PDA
=Image File Formats forensics
=Encryption =Recovering deleted call records, sms
=Compression etc from mobile phones
=Encoding =PDA forensics

= Image File Forensics Tools


Web Application Attacks
Password Cracking Investigation
=Brute Force Attack =Types of Web Attacks
=SQL Injection Attack
=Dictionary Attack
=Cross-Site Scripting (XSS)
=RAR Password Crackers =Other Web Application Attack
=Tools for Investigation
=Password Guessing
=CMOS Level Password Cracking
=Pdf Password Crackers
=Password Cracking Tools
=Common Recommendations for
Improving Password Security
=Standard Password Advice

www.appinonline.com
Network Attacks Investigation Trademark and Copyright
=Network Addressing Schemes Infringement Issue
=Sniffer =Characteristics of Trademarks
=Tool: Tcpdump =Copyright
=Network Sniffer =Copyright Infringement:
=HTTP Sniffer =Patent
=EtherDetect Packet Sniffer
=Ethereal
=IDS/IPS Log
Report Generation
= Importance of Reports
=Honey Pot Log
=Report Requirements
Honey Net Log
=Forensic Report
=Things to remember
Digital Storage Devices =Case Studies and references
=Magnetic Tape
=Floppy Disk
=Compact Disk
=CD-ROM
=DVD
=DVD-R, DVD+R, and DVD+R(W)
=DVD-RW, DVD+RW
=HD-DVD (High Definition DVD)
=HD-DVD
=CD Vs DVD Vs Blu-Ray
=HD-DVD vs. Blu-Ray
=iPod
=Flash Memory Cards
=Secure Digital (SD) Memory Card
=Compact Flash (CF) Memory Card
=Memory Stick (MS) Memory Card
=Multi Media Memory Card (MMC)
=xD-Picture Card (xD)
=Smart Media Memory (SM) Card
=USB Flash Drives
=USB Flash in a Pen

www.appinonline.com
appin ®

securing the digital age

SECURED
PROGRAMMING
Overview of Threats and Risks Secure Programming Issues and Techniques
O Physical threats O Implementing authentication
O Electronic threats  Username/password
O The Threat Equation  Biometrics
O Handling risks in software  Digital Certificates
 Commonly used systems such as X.509
Types of Attacks and Attackers Certificate Authentication, Kerberos,
Microsoft Passport, etc.
Secure Programming Concepts and O Authorization
Principles  Using Access Control Lists (ACLs)
O Designing for security O Implementing encryption
O Threat modeling O Using auditing in applications
 How to decompose a system O Denial of service attacks and techniques
 How to develop and use Threat for increasing availability
Trees
O How much effort should be spent on
protecting information? Common Methods of Attack and How to
O Why deploying redundant security Prevent Them
measures is appropriate (practicing O Buffer overflows
"defense in depth")  Protecting against buffer overflows
O Planning for if/when code fails it  Avoiding dangerous calls
does so in a secure manner O Malicious input
O Executing code with the minimum  Input issues and trust boundaries
rights needed to function properly  Treating all input as
(the principle of "least privilege") malicious and always validating it
O Does security though hiding O Race conditions
implementation details work  Avoiding deadlocks
("security through obscurity")?  Avoiding TOCTOU (Time of Change/
O Remaining alert and staying aware
Time of Use) race conditions
 Remedies
Stride Model O Spoofing
O Spoofing Identity
 Spoofing types and defenses
O Tempering With Data
O Repudiation Secure Programming Do's and Don'ts
O Information Disclosure
O Denial of Service
O Escalation of Privileges

www.appinonline.com
appin ®

securing the digital age

Security Testing
Guidelines for “Dot net” secured programming
O Fundamental differences from
O Introduction
functional testing
O General Types of attacks can be possible
O The most common security flaws
O Architectural Principle
O Using code coverage as a metric
O Design Ideas
O Using threat coverage as a metric
O Language Specific Tips
O How to assess the vulnerability of your
system
O How to assess the vulnerability of your
Guidelines for “Database” secured programming
O Introduction
own code
O General Types of attacks can be possible
O How to assess the vulnerability of
commercial products such as databases, O Architectural Principle
communication packages, server O Design Ideas
software, operating systems O Language Specific Tips

Guidelines for “C” secured programming Source Level Security Auditing Tools
O Introduction
O General Types of attacks can be possible
O Architectural Principle
O Design Ideas
O Language Specific Tips

Guidelines for “C++” secured programming


O Introduction
O General Types of attacks can be possible
O Architectural Principle
O Design Ideas
O Language Specific Tips

Guidelines for “Java” secured programming


O Introduction
O General Types of attacks can be possible
O Architectural Principle
O Design Ideas
O Language Specific Tips

www.appinonline.com
appin ®

securing the digital age

Cryptography

Course Details

www.appinonline.com
Cryptography
1. Introduction

Essentials of Crypto

= Crypto is Hard to Use

= Balancing Crypto Use with Your Objectives

Essentials of Networking and the Internet

=Protocol Layers and Network Products

=Internet Technology

=Internet Protocols in Your Host

=The Internet Security Problem

=An Internet Rogue's Gallery

Cryptographic Techniques

=Classical Crypto Techniques

2. Basics Of Encryption =Modern Crypto Techniques

Legal Restrictions
Encryption Building Blocks
=Stream Ciphers
=Block Ciphers 3. Link Encryption
How Crypto Systems Fail Security Objectives
=Cryptanalysis and Modern Codes Product Example: In-line Encryptor
=Brute Force Cracking of Secret Keys Red/Black Separation
=Attacks on Improper Crypto Use Crypto Algorithm and Keying
Choosing Between Strong and Weak Crypto Encryptor Vulnerabilities
=Properties of Good Crypto Algorithms Product Security Requirements
=Crypto Algorithms to Consider Key Recovery and Escrowed Encryption
=Selecting a Block Cipher Mode
=Identifying a Safe Key Length 4 .Management of Secret Keys
=Levels of Risk for Different Applications
Basic Issues in Secret Key Management

Technology: Random Key Generation


5. Security at the IP Layer Random Seeding
Basic Issues with Using IPSEC
Pseudorandom Number Generators
Technology: Cryptographic Checksums
Technical Security Requirements
One-way Hash Functions
Key Distribution Centers (KDCs)
Technical Security Requirements
Maintaining Keys and System Security
IPSEC: IP Security Protocol

IPSEC Authentication

IPSEC Encryption

IPSEC Key Management

Other TCP/IP Network Security Protocols

www.appinonline.com
6. Virtual Private Networks
Security Objectives
10. Secured Electronic Mail
Basic Issues with VPNs
E-Mail Security
Technology: IPSEC Proxy Cryptography
Basics of Internet Electronic Mail
=ESP Tunnel Mode
=Internet E-Mail Software Architecture
=ESP Transport Mode
=E-Mail Security Problems

Technology: Off-line Message Keying


7. IPSEC and Firewalls
=Encryption Tokens
Basic Issues with IPSEC Clients and Firewalls
=Technical Security Requirements
Internet Firewalls
Technology: Digital Signatures
=What Firewalls Control
=Attacks on Digital Signatures
=How Firewalls Control Access
=The Digital Signature Standard
=Firewall Control Mechanisms
=Technical Security Requirements
Product Example: IPSEC Firewall
E-Mail Deployment
=Administering Multiple Sites

=Product Security Requirements


11. Public Key Certificates
Security Objectives
8. Public Key Cryptography and SSL
Distributing Public Keys
Public Key Cryptography
Technology: Public Key Certificates
=Evolution of Public Key Crypto
=Generating Public Key Pairs
=Diffie-Hellman Public Key Technique
=Certificate Revocation
=Brute Force Attacks on RSA
=Certification Authority Workstation
=Other RSA Vulnerabilities
=Technical Security Requirements
=Technical Security Requirements
Certificate Distribution
Technology: Secret Key Exchange with RSA Crypto
=Transparent Distribution
=Attacking Public Key Distribution
=Interactive Distribution
=Public Key versus Secret Key Exchange
Centralized Certification Authority
=Technical Security Requirements
=Netscape Server Authentication
=Secure Sockets Layer (SSL)
=Handling Multiple Certification Authorities
=Other SSL Properties
Hierarchical Certification Authority
=Basic Attacks Against SSL
=PEM Internet Certification Hierarchy
=SSL Security Evolution
=Private Trees

PGP "Web of Trust”


9. World Wide Web Transaction Security
Issues in Internet Transaction Security

Transactions on the World Wide Web

=Transactions with Web Forms

=Web Form Security Services

Security Alternatives for Web Forms

=Password Protection

=Network-level Security (IPSEC)

=Transport-level Security (SSL)

=Application-level Security (SHTTP)

=Client Authentication Alternatives

www.appinonline.com

Você também pode gostar