Truephers Workshop

Truephers’ Ethical Hacking Workshop is a full package of Cyber Security. The Student does not require any pre-knowledge of Cyber Security or Ethical Hacking. The Student will learn to perform different attack methodologies and their countermeasures. We design this course by considering the fact that student should digest each and every topic completely, and in time. Our trainers are Certified Ethical Hackers and professionals. Every trainer is having a decent experience in the Cyber Security world. This workshop is just a kickstart and not for professionals, for all training courses, refer to our training section.


Course Content

Introduction to Ethical Hacking

  • What is Hacking
  • Types of Hackers
  • Other types
  • Hacking Laws

Basics of Networking

  • Introduction to Internet Protocol
  • IP Addresses
  • Classes of IP address
  • Public and Private IP addresses
  • Proxies
  • Web proxies, Manual proxies, VPN

Virtual Machine

  • Installing and Configuring Virtual Box
  • Installing Windows XP for Testing.
  • Configuring Networking in Virtual Box machine
  • Making bootable Pendrive or Flashdrive

Password Hacking and Security

  • Basics of password hashing
  • SAM database
  • Windows password hashes
  • Windows Password Cracking
  • Brute-forcing
  • Dictionary attacks
  • Rainbow tables
  • Trinity, Ophcrack
  • Mitigations

Viruses and Backdoors

  • What are Viruses
  • Virus creation
  • What are Trojans, RAT’s and Backdoors
  • Backdoor and Trojan creation
  • NetBus
  • Poison IVY, Cybergate RAT
  • Mitigations

Data Forensics

  • Introduction to Data Forensics
  • Data recovering
  • Permanent Data deletion
  • Mitigations
  • Eraser

Google Hacking Database

  • Using Google Dorks
  • Finding Open Cameras
  • Finding files types, pages on particular Website
  • Finding backup and log files
  • Finding default configured Routers
  • SHODAN (Search Engine for IOT)

Phishing

  • Phishing
  • Create free Webhosting
  • Configured phishing page manually
  • Mitigations
  • Quiz 

Sniffing and Security

  • Sniffing
  • HTTP, FTP Password Capturing
  • Cain and Able

Steganography

  • Steganography
  • Command-line hiding data behind pictures
  • Hiding data with tools

Spyware and Keyloggers

  • Spyware
  • Installing Spyware
  • Keyloggers
  • Types of Keyloggers
  • Installing and using Keyloggers

Enumeration and Fingerprinting

  • OS Fingerprinting
  • Traceroute
  • WHOIS database
  • Reverse Domain IP check
  • Wayback Machine (Web Archive)

Web Application Vulnerability Assessment

  • Basics of The WEB
  • Understanding Web Protocols
  • Finding Admin panels
  • SQL Injection
  • Finding Insecure & Sensitive files (password, backup files)
  • Insecure File Uploads
  • Mitigations

Fake SMS and Call spoofing

  • Sending anonymous, free SMS
  • Online Fake Call spoofing
  • Mitigations

Features

  • 8 hours a day, for 2 days (16 hours)
  • Instructor-led training
  • Doubt clearance sessions
  • Quizzes in between Sessions
  • Get Trained from Certified Ethical Hackers (OSCP)
  • 80% practicals
  • Online fee payment available
  • Includes Workshop + Certification + Goodies takeaway

Request For a Workshop

Why Truephers’ Workshop

Government Registered Organization
Trainers are Certified Ethical Hackers
Best Ethical Hacking Institute in Chandigarh, Mohali
Core Ethical Hacking, Nothing else
Lowest Fees but Unlimited Learning
Guaranteed Lowest Fees than others

Five Star Rating on Google
ISO Certified Training Center
Full Satisfaction of Students Guaranteed
Any Time Online Doubt Clearance
Tailored made InfoSec Courses provided
Free Personality Development Training Session

Trainers are Certified Ethical Hackers

All our trainers are experts in their niche. Learn from the Certified Ethical Hackers have vast Industry and teaching experience.

Highly Rated on Google

As we focus on quality and not the quantity of work and training that we provide. Our customers and students have been rated as a 5 Star Cyber Security Company on the most trusted platform of Google.


Goodies Takeaway

Certificate

Student who clear the Exam with at least 70% marks get the certification + Goodies. If fails, he gets 3 chances to retake the Exam.

Tool-kit

Students who enroll for this course gets the latest version of free, trial and community editions of tools, used during the training.

E-Books

Students who enroll for this course gets the latest version of Truephers E-book + other free e-books used during the training.

Free Internship

Based on quizzes and questionnaire one student may get a chance for a free internship training at Truephers.


Our Students’ Reviews

Frequently asked Questions

Who should apply for Workshops?

Any student of the school, college, or university can contact us by filling the form above and submit the details. The students who can participate are a secondary school with computers as a subject, B. Tech, B.C.A, B.Sc IT, B.Voc in IT, computer science, and cybersecurity.

What are the requerments for organizing the workshop?

There are some pre-requirements you should take care of before applying for the workshop training, these are. There should be an auditorium, theater, a hall, or a big computer lab with a projector, speaker, and a mic available for the workshop to conduct. There should be a minimum of 50 eligible students who can take part in the workshop.

What we would learn during this workshop training?

The workshop would be of one or two days of 6 to 8 hours a day. Students will learn how to perform a basic penetration test on some systems and applications, some cybersecurity tricks and measures to follow, and some advanced hacking techniques like SQL injections and WiFi hacking.

What we will get after the workshop?

Every student will be provided with a certificate of attending the Truephers Workshop, a tools CD and a booklet depending upon the workshop type (one day/two days). The volunteer and student co-ordinator and student ambassadors will get special recognization certificates with gifts.

What would be the future scope of this workshop training

There is always a big scope of learning something new. This workshop can act as a kickstart for those who want to learn and make a career in cybersecurity. We also conduct advanced cybersecurity workshops and workshops dedicated to the web application and android penetration testing, those who find it crazy enough to get drive through this journey they can leave their contact with us for joining us at the advance workshop.

Send us Query
close slider