Truephers Workshop
Truephers’ Ethical Hacking Workshop is a full package of Cyber Security. The Student does not require any pre-knowledge of Cyber Security or Ethical Hacking. The Student will learn to perform different attack methodologies and their countermeasures. We design this course by considering the fact that student should digest each and every topic completely, and in time. Our trainers are Certified Ethical Hackers and professionals. Every trainer is having a decent experience in the Cyber Security world. This workshop is just a kickstart and not for professionals, for all training courses, refer to our training section.
Course Content
Introduction to Ethical Hacking
- What is Hacking
- Types of Hackers
- Other types
- Hacking Laws
Basics of Networking
- Introduction to Internet Protocol
- IP Addresses
- Classes of IP address
- Public and Private IP addresses
- Proxies
- Web proxies, Manual proxies, VPN
Virtual Machine
- Installing and Configuring Virtual Box
- Installing Windows XP for Testing.
- Configuring Networking in Virtual Box machine
- Making bootable Pendrive or Flashdrive
Password Hacking and Security
- Basics of password hashing
- SAM database
- Windows password hashes
- Windows Password Cracking
- Brute-forcing
- Dictionary attacks
- Rainbow tables
- Trinity, Ophcrack
- Mitigations
Viruses and Backdoors
- What are Viruses
- Virus creation
- What are Trojans, RAT’s and Backdoors
- Backdoor and Trojan creation
- NetBus
- Poison IVY, Cybergate RAT
- Mitigations
Data Forensics
- Introduction to Data Forensics
- Data recovering
- Permanent Data deletion
- Mitigations
- Eraser
Google Hacking Database
- Using Google Dorks
- Finding Open Cameras
- Finding files types, pages on particular Website
- Finding backup and log files
- Finding default configured Routers
- SHODAN (Search Engine for IOT)
Phishing
- Phishing
- Create free Webhosting
- Configured phishing page manually
- Mitigations
- Quiz
Sniffing and Security
- Sniffing
- HTTP, FTP Password Capturing
- Cain and Able
Steganography
- Steganography
- Command-line hiding data behind pictures
- Hiding data with tools
Spyware and Keyloggers
- Spyware
- Installing Spyware
- Keyloggers
- Types of Keyloggers
- Installing and using Keyloggers
Enumeration and Fingerprinting
- OS Fingerprinting
- Traceroute
- WHOIS database
- Reverse Domain IP check
- Wayback Machine (Web Archive)
Web Application Vulnerability Assessment
- Basics of The WEB
- Understanding Web Protocols
- Finding Admin panels
- SQL Injection
- Finding Insecure & Sensitive files (password, backup files)
- Insecure File Uploads
- Mitigations
Fake SMS and Call spoofing
- Sending anonymous, free SMS
- Online Fake Call spoofing
- Mitigations
Features
- 8 hours a day, for 2 days (16 hours)
- Instructor-led training
- Doubt clearance sessions
- Quizzes in between Sessions
- Get Trained from Certified Ethical Hackers (OSCP)
- 80% practicals
- Online fee payment available
- Includes Workshop + Certification + Goodies takeaway
Request For a Workshop
Why Truephers’ Workshop
Goodies Takeaway
Our Students’ Reviews
Frequently asked Questions
Any student of the school, college, or university can contact us by filling the form above and submit the details. The students who can participate are a secondary school with computers as a subject, B. Tech, B.C.A, B.Sc IT, B.Voc in IT, computer science, and cybersecurity.
There are some pre-requirements you should take care of before applying for the workshop training, these are. There should be an auditorium, theater, a hall, or a big computer lab with a projector, speaker, and a mic available for the workshop to conduct. There should be a minimum of 50 eligible students who can take part in the workshop.
The workshop would be of one or two days of 6 to 8 hours a day. Students will learn how to perform a basic penetration test on some systems and applications, some cybersecurity tricks and measures to follow, and some advanced hacking techniques like SQL injections and WiFi hacking.
Every student will be provided with a certificate of attending the Truephers Workshop, a tools CD and a booklet depending upon the workshop type (one day/two days). The volunteer and student co-ordinator and student ambassadors will get special recognization certificates with gifts.
There is always a big scope of learning something new. This workshop can act as a kickstart for those who want to learn and make a career in cybersecurity. We also conduct advanced cybersecurity workshops and workshops dedicated to the web application and android penetration testing, those who find it crazy enough to get drive through this journey they can leave their contact with us for joining us at the advance workshop.