SlideShare a Scribd company logo
1 of 13
Download to read offline
LUCIDEUS CERTIFIED CYBER 
SECURITY ANALYST (LCCSA) 
www.lucideus.com
1 
Duration Per Day No. of Days Practical Theory 
8 Hours per Day 5 Working Days 40 Hours 7:3 
© Copyright of Lucideus 2014 
Course Title 
LUCIDEUS CERTIFIED CYBER SECURITY ANALYST (LCCSA) 
Course Description 
This is a Penetration Testing & Information Security Training. The training provides you an intensive session 
which will empower you with knowledge in a simplified and easily graspable manner. In the training, we 
teach our students how hackers break into the systems, network, mobiles and websites so as to make them 
aware of the possible loopholes and therefore, making them proficient in reverse-penetration. By doing so, 
they are able to create a virtual wall between their data and the hackers. This training will enable you to carry 
out attacking as well defensive methodologies which will help you and your organization to not only protect 
but also assess the safety and vulnerability ratio. 
Delivery Method 
Methods 
Regular Training 
(MON - FRI) 
2 Hours per Day 20 Working Days 
Ratio 
7:3 
BootCamp Training 
(MON - FRI) 
Course Objectives 
At the end of this course, participants will be able to: 
Course Duration 
40 Hours 
• Understand and perform Information Gathering on Digital Foot Prints 
• Understand Email attacks and will be able to protect their email accounts as well as social networking 
accounts from these attacks 
• Analyze Malwares from a computer system and remove it manually 
• Understand Web Application Attacks and will be able to patch them to produce a secure web application 
• Understand windows memory management & assembly language to perform basic Reverse Engineering 
• Understand Enterprise Network Security Architecture 
• Understand Exploitation 
• Understand Wireless Security 
• Understand Security Architecture of mobile Platforms 
Target audience 
• This course can be attended by college student, security officers, auditors, security professionals, 
website administrators, anyone who is concerned about security of their network infrastructure and 
everyone who want to have a promising career in cyber security 
Prerequisites • Basic knowledge of computers and internet technologies. 
Hands-On 
• The course includes practical hands-on exercises that enable you to test your acquired skills during the 
training and understand its usage in a live environment
2 
Certification 
• Participants clearing final exam with more than 70% marks will be awarded with LCCSA (Lucideus 
Service Tax 
( 12.36%) 
Fees Total 
© Copyright of Lucideus 2014 
Certified Cyber Security Analyst) Certificate. 
• Each Participant would get participation certificate and training completion letter 
Lucideus Cyber Security Toolkit 
• Each participant will get a toolkit containing tools used during the training, with white papers, videos 
and other support software. 
Lucideus -Information Security E-Cook Book 
• Candidates will be provided with Lucideus Information Security E-Cook Book containing tutorials of the 
contents of the training 
Course 
LCCSA Course & Training 15,000 INR 
LCCSA Certification & 
Examination 
5,000 INR 
1,854 INR 16,854 INR 
618 INR 5,618 INR 
Take Away 
Fee Structure of the Training
3 
© Copyright of Lucideus 2014 
Our Facilities
4 
Basic of Network & Web Technology 2 Hours 
Information Gathering & Foot printing 1 Hour 
Email Security 4 Hours 
© Copyright of Lucideus 2014 
Introduction to Information Security 
Introduction 
Need of Information Security 
Ethical Side of Hacking 
Steganography 
Introduction to Indian IT Acts & Cyber Law 
Latest Test Cases 
Conclusion 
1 Hour 
0.5 Hours 
Introduction to Network 
IP Address 
Network Protocols 
NAT 
IP Subnets 
DHCP Server 
Ports 
Services 
DNS 
Proxy Servers 
Virtual Private Networks 
DNS Server 
OSI Model 
Introduction to TCP / IP Model 
1 Hours 
Digital Foot Print 
Information Gathering 
Who Is Information 
Web Server Details 
Reverse IP Mapping 
People Search 
Tools to perform Digital Foot printing 
1 Hours 
Phishing Attacks – Desktop Phishing, Spear Phishing 
IDN Homograph Attack 
Social Engineering 
Fake Emails 
Identify Fake Emails 
Key Loggers 
Email Encryption 
Security Counter Measures
5 
© Copyright of Lucideus 2014 
System Hacking 
Login Bypass 
· Introduction to Authentication Mechanisms 
· Tools to Defeat Authentication 
Malware Illustration – Virus, Worms, Trojans 
Virus 
Trojans 
Evade Antivirus & Firewalls 
Scan System for Malicious Applications 
Secure System Configuration 
4 Hours 
Web Application Vulnerability Assessment & Penetration Testing 
Introduction to Web Architecture 
Introduction to HTML 
Introduction to PHP 
Web Security Misconceptions 
Introduction to DBMS – MySQL, MS SQL, Oracle, DB2 
Introduction to SQL 
Vulnerability Assessment & Penetration Testing 
11 Hours 
OWASP Top 10 Attacks 
· Sensitive Data Exposure 
· Insecure Direct Object References 
· SQL Injections 
· Authentication Bypass Injection 
· B lind Injections 
· Error Based Injection 
· U nion Based Injection 
· Cross Site Scripting (XS 
· Broken Authentication and Session Management 
· CSRF 
· Missing Function Level Access Control 
· Invalidated Redirects and Forwards 
· Security Misconfiguration 
· Using Components with Known Vulnerabilities 
Web Application Firewall 
· Misconfigured WAF 
Brute Forcing Attack 
Arbitrary File Upload 
Secure Development 
· Patch Critical Vulnerabilities 
· Secure Coding 
· Code Review 
Applications to Automate PT 
· SQL Map 
· Burp Suite 
· OWASP Xenotics XSS Framework
6 
© Copyright of Lucideus 2014 
Application to automate Web Application VA 
· W3af 
· IBM App Scan 
· HP Web Inspect 
Google Hacking Database 1 Hour 
Use Google to craft attacks 
Advanced operators of Google 
Find Vulnerabilities using Google 
Security Countermeasures 
Reverse Engineering 
Introduction to Reverse Engineering 
Windows Memory Management System 
Assembly Language Basics 
Application Debuggers & Dissassemblers 
Application Cracking, Patching & Keygens 
4 Hours 
Introduction Linux 
Linux Architecture & Kernel 
Open Source Applications 
Basic Commands 
Network Configuration on Linux 
Install – Uninstall, Configure & Trouble Shoot Applications 
Linux for Hackers 
Introduction to Kali 
Lab Setup 
2 Hours 
Wireless Security 
Introduction to Wireless Technology 
MAC Filtering 
Packet Encryption 
Packet Sniffing 
Types of Authentication 
Attacks on WEP, WPA & WPA2 Encryption 
Security Countermeasures 
3 Hours 
Exploitation:1 Buffer Overflow Attacks 
Introduction to x86 Architecture 
Memory Analysis 
Shell Code Compilation 
Vanila Exploit 
Stack Overflow 
Egg Hunting 
Various ways to deliver an exploit 
1 Hour
7 
© Copyright of Lucideus 2014 
Exploitation:2 Metasploit Framework 
OS Detection 
Open Port & Service Detection 
Metasploit Framework Architecture 
Interfaces of Metasploit Framework 
Basic Terminologies 
Vulnerability Analysis 
Exploitation on Various Platforms 
Web Server Exploitation 
Evade Anti-Virus & Firewalls 
4 Hours 
Mobile Security 
Introduction to Mobile Platforms 
Security Architecture of Mobile Platform 
Introduction to VoIP 
VoIP Calls from any number to any number - Fake Calls 
Android Exploitation Framework 
Android Rooting 
2 Hours 
TOTAL DURATION 40 Hours
Our Milestones in Training 
and Skill Enhancement 
• Lucideus is ISO 27001:2005 and ISO 9001:2008 certified organization for providing IT Security 
training, consulting and VA-PT activities 
• Lucideus has its Advanced Cyber Threat Analysts & Malware Research Lab at computer science 
department of IIT Bombay 
• Lucideus has got experience of more than 30,000 contact Hours of Information Security training 
to individuals 
• Lucideus has trained over 60,000 individuals on various aspects of information security, ranging from 
engineering students to top management executives of fortune 100 companies 
• Lucideus has conducted its courses / boot camps / training sessions in over 200 establishments 
• Lucideus is the only private organization in India to offer courses on cyber security and IT skill 
enhancement, jointly with the government 
Lucideus Key Trainers 
Saket has been awarded the title of "Indian Ambassador of Cyber Security in Education" at the 
National Education Awards 2013. He along with his team have been conducting training and 
consultancy sessions across the globe. He has been invited to most of the elite institutions of India 
including IIT-Bombay, IIT-Delhi, and IIT-Guwahati etc., for conducting seminars or workshops on 
Ethical Hacking & Information Security. At a young age, he has already trained more than 5000 
individuals across 100 plus Colleges, Corporates & Government Departments. Some of the 
organizations include IBM, Wipro, TCS, HCL, Intelligence Agencies, and Special Task Forces etc. 
Saket is also an advisor to reputed organizations, banks and e-commerce companies in designing 
safe cyber architecture for their web servers and networks. 
Vidit is a Microsoft Certified Technology Specialist and a Microsoft Certified Professional with high 
level of expertise in handling server side operations based on windows platform. He has constantly 
been engaged in conducting training sessions and have trained more than 5000 individuals from 100 
plus academic institutions, corporate houses and government organizations such as various IIT's, 
CAIRN India, ISACA, RICOH, Nagarro, Naukri.com, CBI, and RBI etc. He is an ideal to many young 
students in India who take up security as their career objective and a motivation to those who see and 
understand IT Security and its needs. 
Rahul is a post-graduate with majors in Computer Science and has conducted, more than a hundred 
training sessions globally to his account. Being a cyber space researcher himself, Rahul can claim to 
have found critical vulnerabilities on websites of Intel, Sony, HP, Discovery Networks, TED and many 
more. He is also listed in BlackBerry Hall of Fame for his contributions to the organization. A 
published author of two books on information security. He has been covered extensively by the 
global media and is one of the most followed Indian Information Security Expert on various social 
media platforms 
Aman is an avid security researcher with special interest in network exploitation and web application 
security analysis. He has an experience of over 3000 hours of training in the information security 
space and has trained over 5000 individuals personally till date. His student base ranges from 
personnel from the Indian Army, The Indian Navy, Intelligence Agencies, Special Task Forces, 
Criminal Investigation Departments of State Police, Enterprise IT teams and Engineering students 
among others. He has found multiple security flaws on websites like Google, Facebook, EA, MIT, 
National Geography, Blackberry among others. 
8 
© Copyright of Lucideus 2014
9 
Testimonials 
“ The vision of Lucideus stands out from generic security industry entrepreneurs as a powerful intellect, with 
clarity of thought. I hope we can stay in contact, and I am interested to learn more about Lucideus. “ 
Jim Noble 
Senior Advisor, USA Department of Homeland Security 
Former Global CIO, Merrill Lynch 
Former Chief IT Strategy Officer, British Petrolium 
C P Gurnani 
CEO 
Tech Mahindra 
“ The course on cyber security was well attended by the CBI officers and we have received positive feedback 
on the training conducted. The content was useful and the methodology was effective and it has enhanced 
the skills and knowledge of our team. ” 
P V Hari Krishna 
Superintendent of Police 
The CBI 
Government of India 
“ Thank you for your though provoking interactive session on web security. It was extremely informative and 
provided valuable insights for comprehensive web security to our users. We look forward to build further 
relationship with your esteemed organization in areas of Cyber Security ” 
Brigadier J K Sethi 
Deputy Director General 
MISO, Dte General Information Systems 
Indian Army 
Ministry of Defence, Government of India 
“ I sincerely wish you and your team the very best in spreading security consciousness in the persons who 
are lucky to have come across your existence. I also want to acknowledge the excellent resources your 
organization possess to help bridge gaps in cyber ‘combat-readiness’ requirements/services for the 
government and the legal agencies. ” 
Commander S Srivastava 
Secretary 
NESC 
Indian Navy 
Ministry of Defence, Government of India 
© Copyright of Lucideus 2014 
“ You guys are dynamites. You’ll do very well “
10 
© Copyright of Lucideus 2014 
Lucideus Advisors & 
Board Of Studies 
Dr. Dheeraj Sangi – Dean, IIT Kanpur 
Mr. Felix Mohan – ex CISO Bharti Airtel, ex IT Head Indian Navy 
Mr. Mahesh Mahajan – ex EVP, TCS & Global Delivery Head, HCL 
Prof. N. K. Goyal – President, CMAI 
Mr. Nandkumar Saravade – ex Director, Cyber Security, Citi Bank India 
Dr. Rakesh Khandal – Vice Chancellor, UPTU 
Mr. Sachin Shridhar– ex IPS Officer, Chairman Lucideus 
Mr. Subu Goparaju- ex SVP, Global Head, Infosys Labs 
Dr. S. S. Goyal – Director, Cisco, USA 
Dr. S. S. Mantha – Chairman, AICTE 
Mr. Yogesh Kochar – Director, Microsoft India 
Our Corporate Clients 
On WSPT and IT Risk Assessment 
Front 
Lucideus has worked with multiple 
fortune 500 companies in providing 
critical and timely support for their cyber 
security needs. 
On Training and IT Security Skill 
Enhancement Front. 
Lucideus has trained individuals and 
IT teams from leading banks, various 
cyber cells and top university across 
the globe 
Some of the clients of Lucideus include 
3 of the top 5 IT Companies of the World 
2 of the Largest Global Private Banks 
2 of top 5 Oil and Gas Organizations of India 
1 of top 5 Intelligence Agencies of the World 
World's 3rd Largest Railway Network 
4 of the top 5 e-Commerce Websites of India 
Top 2 Financial institutions of India 
4 of top 5 PSU Banks of India 
6 Different Ministries of Government of India
11 
© Copyright of Lucideus 2014 
Lucideus has been featured in
Lucideus Headquarters 
New Delhi 
C-17, 
Safdarjung Development 
Area, Hauz Khas, 
New Delhi - 110016 
www.lucideus.com | info@lucideustech.com | +91 11 26569899. 
All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation 
is strictly prohibited without the prior written consent of Lucideus. No part of this document may be reproduced in any 
form or by any means without the prior written authorization of Lucideus. While every precaution has been taken in the 
preparation of this document, Lucideus assumes no responsibility for errors or omissions. 
© Copyright of Lucideus 2014 
Lucideus Regional Office 
Kolkata 
390 A, Jodhpur Park, 
Kolkata - 700068 
Lucideus Regional Office 
Ahmedabad 
205, 2nd Floor 
Shree Balaji Heights, 
C.G. Road 
Ahmedabad - 380001 
Lucideus Labs 
IIT Bombay 
4th Floor, SINE 
KReSIT Building 
IIT Bombay, Powai 
Mumbai - 400076

More Related Content

What's hot

Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsDinesh O Bareja
 
Cyber swachhta kendra20
Cyber swachhta kendra20Cyber swachhta kendra20
Cyber swachhta kendra20pavanwagh5
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001PECB
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - CybersecurityAbhilashYadav14
 
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and BeyondNUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and BeyondNUS-ISS
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemIJERA Editor
 
Cloud Forensics- An IS Approach
Cloud Forensics- An IS ApproachCloud Forensics- An IS Approach
Cloud Forensics- An IS ApproachIOSR Journals
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)Andris Soroka
 
India is Cyber Vulnerable
India is Cyber VulnerableIndia is Cyber Vulnerable
India is Cyber VulnerableThe eCore Group
 
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Dinesh O Bareja
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationrrepko
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SMCarlos Valderrama
 
Cyber-Security in Education
Cyber-Security in EducationCyber-Security in Education
Cyber-Security in EducationTyrone Grandison
 
101 Basic concepts of information security
101 Basic concepts of information security101 Basic concepts of information security
101 Basic concepts of information securitySsendiSamuel
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Mukesh Chinta
 

What's hot (19)

Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
 
Ethical Hacking Course
Ethical Hacking CourseEthical Hacking Course
Ethical Hacking Course
 
Cyber swachhta kendra20
Cyber swachhta kendra20Cyber swachhta kendra20
Cyber swachhta kendra20
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
 
Ethical Hacking Course
Ethical Hacking CourseEthical Hacking Course
Ethical Hacking Course
 
BCA – cloud technology & information security
BCA – cloud technology & information securityBCA – cloud technology & information security
BCA – cloud technology & information security
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - Cybersecurity
 
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and BeyondNUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 
Cloud Forensics- An IS Approach
Cloud Forensics- An IS ApproachCloud Forensics- An IS Approach
Cloud Forensics- An IS Approach
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
India is Cyber Vulnerable
India is Cyber VulnerableIndia is Cyber Vulnerable
India is Cyber Vulnerable
 
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
 
Cyber-Security in Education
Cyber-Security in EducationCyber-Security in Education
Cyber-Security in Education
 
101 Basic concepts of information security
101 Basic concepts of information security101 Basic concepts of information security
101 Basic concepts of information security
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
 

Viewers also liked

0407 ceh certificate
0407   ceh certificate0407   ceh certificate
0407 ceh certificateWayne Parton
 
NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansMaurice Dawson
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information SecurityAjay Dhamija
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Viewers also liked (7)

0407 ceh certificate
0407   ceh certificate0407   ceh certificate
0407 ceh certificate
 
NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New Orleans
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Lucideus Certified Cyber Security Analyst

Cyber Defence Intelligence (CDI)
Cyber Defence Intelligence  (CDI)Cyber Defence Intelligence  (CDI)
Cyber Defence Intelligence (CDI)FloydCarrasquillo
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
Certied Ethical Hacker
Certied Ethical HackerCertied Ethical Hacker
Certied Ethical HackerKnowledgehut
 
Software Security Training
Software Security TrainingSoftware Security Training
Software Security TrainingBryan Len
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperMohd Anwar Jamal Faiz
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Managed security services
Managed security servicesManaged security services
Managed security servicesmanoharparakh
 
Course overview Cybersecurity and its applications
Course overview Cybersecurity and its applicationsCourse overview Cybersecurity and its applications
Course overview Cybersecurity and its applicationsSanket Shikhar
 
Cloud Software - Cloud-based System Security
Cloud Software - Cloud-based System SecurityCloud Software - Cloud-based System Security
Cloud Software - Cloud-based System SecurityNet at Work
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen? Claranet UK
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxVictoriaChavesta
 
DSS ITSEC 2012 Conference - Presentation CEHv7
DSS ITSEC 2012 Conference - Presentation CEHv7DSS ITSEC 2012 Conference - Presentation CEHv7
DSS ITSEC 2012 Conference - Presentation CEHv7Andris Soroka
 
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦Infosec train
 
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦priyanshamadhwal2
 
Security+ SY0-701 CERTIFICATION TRAINING.pdf
Security+ SY0-701 CERTIFICATION TRAINING.pdfSecurity+ SY0-701 CERTIFICATION TRAINING.pdf
Security+ SY0-701 CERTIFICATION TRAINING.pdfinfosecTrain
 
CompTIA Security+ (Plus) Certification Training Course
CompTIA Security+ (Plus) Certification Training CourseCompTIA Security+ (Plus) Certification Training Course
CompTIA Security+ (Plus) Certification Training CourseInfosecTrain Education
 
CompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdfCompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdfInfosec train
 

Similar to Lucideus Certified Cyber Security Analyst (20)

Cyber Defence Intelligence (CDI)
Cyber Defence Intelligence  (CDI)Cyber Defence Intelligence  (CDI)
Cyber Defence Intelligence (CDI)
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Certied Ethical Hacker
Certied Ethical HackerCertied Ethical Hacker
Certied Ethical Hacker
 
New Horizons SCYBER Presentation
New Horizons SCYBER PresentationNew Horizons SCYBER Presentation
New Horizons SCYBER Presentation
 
Software Security Training
Software Security TrainingSoftware Security Training
Software Security Training
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Managed security services
Managed security servicesManaged security services
Managed security services
 
Course overview Cybersecurity and its applications
Course overview Cybersecurity and its applicationsCourse overview Cybersecurity and its applications
Course overview Cybersecurity and its applications
 
Cloud Software - Cloud-based System Security
Cloud Software - Cloud-based System SecurityCloud Software - Cloud-based System Security
Cloud Software - Cloud-based System Security
 
Arvind profile
Arvind profileArvind profile
Arvind profile
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen?
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
DSS ITSEC 2012 Conference - Presentation CEHv7
DSS ITSEC 2012 Conference - Presentation CEHv7DSS ITSEC 2012 Conference - Presentation CEHv7
DSS ITSEC 2012 Conference - Presentation CEHv7
 
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
 
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
 
Security+ SY0-701 CERTIFICATION TRAINING.pdf
Security+ SY0-701 CERTIFICATION TRAINING.pdfSecurity+ SY0-701 CERTIFICATION TRAINING.pdf
Security+ SY0-701 CERTIFICATION TRAINING.pdf
 
CompTIA Security+ (Plus) Certification Training Course
CompTIA Security+ (Plus) Certification Training CourseCompTIA Security+ (Plus) Certification Training Course
CompTIA Security+ (Plus) Certification Training Course
 
CompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdfCompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdf
 

Recently uploaded

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 

Recently uploaded (20)

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 

Lucideus Certified Cyber Security Analyst

  • 1. LUCIDEUS CERTIFIED CYBER SECURITY ANALYST (LCCSA) www.lucideus.com
  • 2. 1 Duration Per Day No. of Days Practical Theory 8 Hours per Day 5 Working Days 40 Hours 7:3 © Copyright of Lucideus 2014 Course Title LUCIDEUS CERTIFIED CYBER SECURITY ANALYST (LCCSA) Course Description This is a Penetration Testing & Information Security Training. The training provides you an intensive session which will empower you with knowledge in a simplified and easily graspable manner. In the training, we teach our students how hackers break into the systems, network, mobiles and websites so as to make them aware of the possible loopholes and therefore, making them proficient in reverse-penetration. By doing so, they are able to create a virtual wall between their data and the hackers. This training will enable you to carry out attacking as well defensive methodologies which will help you and your organization to not only protect but also assess the safety and vulnerability ratio. Delivery Method Methods Regular Training (MON - FRI) 2 Hours per Day 20 Working Days Ratio 7:3 BootCamp Training (MON - FRI) Course Objectives At the end of this course, participants will be able to: Course Duration 40 Hours • Understand and perform Information Gathering on Digital Foot Prints • Understand Email attacks and will be able to protect their email accounts as well as social networking accounts from these attacks • Analyze Malwares from a computer system and remove it manually • Understand Web Application Attacks and will be able to patch them to produce a secure web application • Understand windows memory management & assembly language to perform basic Reverse Engineering • Understand Enterprise Network Security Architecture • Understand Exploitation • Understand Wireless Security • Understand Security Architecture of mobile Platforms Target audience • This course can be attended by college student, security officers, auditors, security professionals, website administrators, anyone who is concerned about security of their network infrastructure and everyone who want to have a promising career in cyber security Prerequisites • Basic knowledge of computers and internet technologies. Hands-On • The course includes practical hands-on exercises that enable you to test your acquired skills during the training and understand its usage in a live environment
  • 3. 2 Certification • Participants clearing final exam with more than 70% marks will be awarded with LCCSA (Lucideus Service Tax ( 12.36%) Fees Total © Copyright of Lucideus 2014 Certified Cyber Security Analyst) Certificate. • Each Participant would get participation certificate and training completion letter Lucideus Cyber Security Toolkit • Each participant will get a toolkit containing tools used during the training, with white papers, videos and other support software. Lucideus -Information Security E-Cook Book • Candidates will be provided with Lucideus Information Security E-Cook Book containing tutorials of the contents of the training Course LCCSA Course & Training 15,000 INR LCCSA Certification & Examination 5,000 INR 1,854 INR 16,854 INR 618 INR 5,618 INR Take Away Fee Structure of the Training
  • 4. 3 © Copyright of Lucideus 2014 Our Facilities
  • 5. 4 Basic of Network & Web Technology 2 Hours Information Gathering & Foot printing 1 Hour Email Security 4 Hours © Copyright of Lucideus 2014 Introduction to Information Security Introduction Need of Information Security Ethical Side of Hacking Steganography Introduction to Indian IT Acts & Cyber Law Latest Test Cases Conclusion 1 Hour 0.5 Hours Introduction to Network IP Address Network Protocols NAT IP Subnets DHCP Server Ports Services DNS Proxy Servers Virtual Private Networks DNS Server OSI Model Introduction to TCP / IP Model 1 Hours Digital Foot Print Information Gathering Who Is Information Web Server Details Reverse IP Mapping People Search Tools to perform Digital Foot printing 1 Hours Phishing Attacks – Desktop Phishing, Spear Phishing IDN Homograph Attack Social Engineering Fake Emails Identify Fake Emails Key Loggers Email Encryption Security Counter Measures
  • 6. 5 © Copyright of Lucideus 2014 System Hacking Login Bypass · Introduction to Authentication Mechanisms · Tools to Defeat Authentication Malware Illustration – Virus, Worms, Trojans Virus Trojans Evade Antivirus & Firewalls Scan System for Malicious Applications Secure System Configuration 4 Hours Web Application Vulnerability Assessment & Penetration Testing Introduction to Web Architecture Introduction to HTML Introduction to PHP Web Security Misconceptions Introduction to DBMS – MySQL, MS SQL, Oracle, DB2 Introduction to SQL Vulnerability Assessment & Penetration Testing 11 Hours OWASP Top 10 Attacks · Sensitive Data Exposure · Insecure Direct Object References · SQL Injections · Authentication Bypass Injection · B lind Injections · Error Based Injection · U nion Based Injection · Cross Site Scripting (XS · Broken Authentication and Session Management · CSRF · Missing Function Level Access Control · Invalidated Redirects and Forwards · Security Misconfiguration · Using Components with Known Vulnerabilities Web Application Firewall · Misconfigured WAF Brute Forcing Attack Arbitrary File Upload Secure Development · Patch Critical Vulnerabilities · Secure Coding · Code Review Applications to Automate PT · SQL Map · Burp Suite · OWASP Xenotics XSS Framework
  • 7. 6 © Copyright of Lucideus 2014 Application to automate Web Application VA · W3af · IBM App Scan · HP Web Inspect Google Hacking Database 1 Hour Use Google to craft attacks Advanced operators of Google Find Vulnerabilities using Google Security Countermeasures Reverse Engineering Introduction to Reverse Engineering Windows Memory Management System Assembly Language Basics Application Debuggers & Dissassemblers Application Cracking, Patching & Keygens 4 Hours Introduction Linux Linux Architecture & Kernel Open Source Applications Basic Commands Network Configuration on Linux Install – Uninstall, Configure & Trouble Shoot Applications Linux for Hackers Introduction to Kali Lab Setup 2 Hours Wireless Security Introduction to Wireless Technology MAC Filtering Packet Encryption Packet Sniffing Types of Authentication Attacks on WEP, WPA & WPA2 Encryption Security Countermeasures 3 Hours Exploitation:1 Buffer Overflow Attacks Introduction to x86 Architecture Memory Analysis Shell Code Compilation Vanila Exploit Stack Overflow Egg Hunting Various ways to deliver an exploit 1 Hour
  • 8. 7 © Copyright of Lucideus 2014 Exploitation:2 Metasploit Framework OS Detection Open Port & Service Detection Metasploit Framework Architecture Interfaces of Metasploit Framework Basic Terminologies Vulnerability Analysis Exploitation on Various Platforms Web Server Exploitation Evade Anti-Virus & Firewalls 4 Hours Mobile Security Introduction to Mobile Platforms Security Architecture of Mobile Platform Introduction to VoIP VoIP Calls from any number to any number - Fake Calls Android Exploitation Framework Android Rooting 2 Hours TOTAL DURATION 40 Hours
  • 9. Our Milestones in Training and Skill Enhancement • Lucideus is ISO 27001:2005 and ISO 9001:2008 certified organization for providing IT Security training, consulting and VA-PT activities • Lucideus has its Advanced Cyber Threat Analysts & Malware Research Lab at computer science department of IIT Bombay • Lucideus has got experience of more than 30,000 contact Hours of Information Security training to individuals • Lucideus has trained over 60,000 individuals on various aspects of information security, ranging from engineering students to top management executives of fortune 100 companies • Lucideus has conducted its courses / boot camps / training sessions in over 200 establishments • Lucideus is the only private organization in India to offer courses on cyber security and IT skill enhancement, jointly with the government Lucideus Key Trainers Saket has been awarded the title of "Indian Ambassador of Cyber Security in Education" at the National Education Awards 2013. He along with his team have been conducting training and consultancy sessions across the globe. He has been invited to most of the elite institutions of India including IIT-Bombay, IIT-Delhi, and IIT-Guwahati etc., for conducting seminars or workshops on Ethical Hacking & Information Security. At a young age, he has already trained more than 5000 individuals across 100 plus Colleges, Corporates & Government Departments. Some of the organizations include IBM, Wipro, TCS, HCL, Intelligence Agencies, and Special Task Forces etc. Saket is also an advisor to reputed organizations, banks and e-commerce companies in designing safe cyber architecture for their web servers and networks. Vidit is a Microsoft Certified Technology Specialist and a Microsoft Certified Professional with high level of expertise in handling server side operations based on windows platform. He has constantly been engaged in conducting training sessions and have trained more than 5000 individuals from 100 plus academic institutions, corporate houses and government organizations such as various IIT's, CAIRN India, ISACA, RICOH, Nagarro, Naukri.com, CBI, and RBI etc. He is an ideal to many young students in India who take up security as their career objective and a motivation to those who see and understand IT Security and its needs. Rahul is a post-graduate with majors in Computer Science and has conducted, more than a hundred training sessions globally to his account. Being a cyber space researcher himself, Rahul can claim to have found critical vulnerabilities on websites of Intel, Sony, HP, Discovery Networks, TED and many more. He is also listed in BlackBerry Hall of Fame for his contributions to the organization. A published author of two books on information security. He has been covered extensively by the global media and is one of the most followed Indian Information Security Expert on various social media platforms Aman is an avid security researcher with special interest in network exploitation and web application security analysis. He has an experience of over 3000 hours of training in the information security space and has trained over 5000 individuals personally till date. His student base ranges from personnel from the Indian Army, The Indian Navy, Intelligence Agencies, Special Task Forces, Criminal Investigation Departments of State Police, Enterprise IT teams and Engineering students among others. He has found multiple security flaws on websites like Google, Facebook, EA, MIT, National Geography, Blackberry among others. 8 © Copyright of Lucideus 2014
  • 10. 9 Testimonials “ The vision of Lucideus stands out from generic security industry entrepreneurs as a powerful intellect, with clarity of thought. I hope we can stay in contact, and I am interested to learn more about Lucideus. “ Jim Noble Senior Advisor, USA Department of Homeland Security Former Global CIO, Merrill Lynch Former Chief IT Strategy Officer, British Petrolium C P Gurnani CEO Tech Mahindra “ The course on cyber security was well attended by the CBI officers and we have received positive feedback on the training conducted. The content was useful and the methodology was effective and it has enhanced the skills and knowledge of our team. ” P V Hari Krishna Superintendent of Police The CBI Government of India “ Thank you for your though provoking interactive session on web security. It was extremely informative and provided valuable insights for comprehensive web security to our users. We look forward to build further relationship with your esteemed organization in areas of Cyber Security ” Brigadier J K Sethi Deputy Director General MISO, Dte General Information Systems Indian Army Ministry of Defence, Government of India “ I sincerely wish you and your team the very best in spreading security consciousness in the persons who are lucky to have come across your existence. I also want to acknowledge the excellent resources your organization possess to help bridge gaps in cyber ‘combat-readiness’ requirements/services for the government and the legal agencies. ” Commander S Srivastava Secretary NESC Indian Navy Ministry of Defence, Government of India © Copyright of Lucideus 2014 “ You guys are dynamites. You’ll do very well “
  • 11. 10 © Copyright of Lucideus 2014 Lucideus Advisors & Board Of Studies Dr. Dheeraj Sangi – Dean, IIT Kanpur Mr. Felix Mohan – ex CISO Bharti Airtel, ex IT Head Indian Navy Mr. Mahesh Mahajan – ex EVP, TCS & Global Delivery Head, HCL Prof. N. K. Goyal – President, CMAI Mr. Nandkumar Saravade – ex Director, Cyber Security, Citi Bank India Dr. Rakesh Khandal – Vice Chancellor, UPTU Mr. Sachin Shridhar– ex IPS Officer, Chairman Lucideus Mr. Subu Goparaju- ex SVP, Global Head, Infosys Labs Dr. S. S. Goyal – Director, Cisco, USA Dr. S. S. Mantha – Chairman, AICTE Mr. Yogesh Kochar – Director, Microsoft India Our Corporate Clients On WSPT and IT Risk Assessment Front Lucideus has worked with multiple fortune 500 companies in providing critical and timely support for their cyber security needs. On Training and IT Security Skill Enhancement Front. Lucideus has trained individuals and IT teams from leading banks, various cyber cells and top university across the globe Some of the clients of Lucideus include 3 of the top 5 IT Companies of the World 2 of the Largest Global Private Banks 2 of top 5 Oil and Gas Organizations of India 1 of top 5 Intelligence Agencies of the World World's 3rd Largest Railway Network 4 of the top 5 e-Commerce Websites of India Top 2 Financial institutions of India 4 of top 5 PSU Banks of India 6 Different Ministries of Government of India
  • 12. 11 © Copyright of Lucideus 2014 Lucideus has been featured in
  • 13. Lucideus Headquarters New Delhi C-17, Safdarjung Development Area, Hauz Khas, New Delhi - 110016 www.lucideus.com | info@lucideustech.com | +91 11 26569899. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation is strictly prohibited without the prior written consent of Lucideus. No part of this document may be reproduced in any form or by any means without the prior written authorization of Lucideus. While every precaution has been taken in the preparation of this document, Lucideus assumes no responsibility for errors or omissions. © Copyright of Lucideus 2014 Lucideus Regional Office Kolkata 390 A, Jodhpur Park, Kolkata - 700068 Lucideus Regional Office Ahmedabad 205, 2nd Floor Shree Balaji Heights, C.G. Road Ahmedabad - 380001 Lucideus Labs IIT Bombay 4th Floor, SINE KReSIT Building IIT Bombay, Powai Mumbai - 400076