Sei sulla pagina 1di 6

Complete Cyber Security, Privacy & Anonymity

In this course students will learn practical skill-set in defeating all online threats, beginner to
advanced approach, explore dark nets and mindset of the cyber criminals, global tracking
and hacking infrastructures of FBI, NSA, CIA, GCHQ, MSS and other intelligence agencies,
encryption techniques, hacking techniques & vulnerability scanning, network for maximum
security, wireless security, search engine privacy, browser security, best anonymizing & privacy
methods, bypassing censors, firewalls and proxies, end point protection technologies, hacker
hunting, anti-forensics, OS hardening, email & messenger security, Live OS, USBs, tails, who nix,
parrot systems and many others. No real system/network will be harmed during this course.
The course is divided into 4 sections (25hrs/Section)
Section – 1: Hackers Exposed

Curriculum Topics Covered

Introduction Setting up Lab, Kali Linux, VMWare, Virtual Box, Canary Tokens,
Norse, ANT Product Data, Intelligence Agencies, InSpectre,
Kanguru, CIA, Security, Privacy, Anonymity, Pseudonymity
Know Yourself Assets, Vulnerabilities, Threats, Adversaries, Defense in Depth,
Zero Trust Model
Know Your Enemy Vulnerability Landscape, Exploit Kit, Hackers, Crackers, Cyber
Criminals, Malware, Viruses, Rootkits, RATs, Spyware, Adware,
Scareware, PUPs, Browser Hijacking, Phishing, Vishing, SMShing,
Spamming, Doxing, CPU Hijackers, Darknets, Dark Markets,
Governments, spies, secret stuff, Trust and backdoors,
Censorship, CTI
Encryption Symmetric, Asymmetric, Hashes, Digital Signatures, SSL, TLS, SSL
Strip,Sniffers, ArpWatch, Cain & Abel, HTTPS, Digital
Certificates, CA, E2EE, Steganography, Openpuff,
OS Security and Privacy Security Features & Functionality, Usage Share, Win -10 privacy
& tracking, Disable tracking, Cortana, Wifisense, Mac –
privacy & tracking, Linux like OS, Debian, OpenBSD, Archlinux,
Ubuntu
Security Bugs and Win7/8/8.1/10 - Patching/Autopatching, Autoupdate, Linux-
Vulnerabilities Debian Patching, Mac – patching, Browser & Extension
updates – Firefox/Chrome/IE/Edge, Reducing Threat Privilege -
NoAdmin
Social Engineering and Information disclosure, Identity Strategies, Identify Verification
Social Media Offence & & Registration, Behavioral Security Controls, Technical Security
Defense Controls
Security through Isolation Security Domains, Hardware Isolation, Macdaddyx, Wifispoof,
and Compartmentalization Tmac, dmidecode, cpuz, cupid, i-nex, Virtual Isolation,
Maxthon, portable apps, pen drive apps, authentic8, apikes,
aegis, dual boot, multiboot, application isolation, built-in
sandboxes, f-sandbox, shadowdefender, returnil, deepfreeze,
comodo, bufferzone, sandboxie, apparmour, firejail,
buckleup, super-duper, Virtual Machines, hypervisor,
openvpn, openVZ, virt, Virtual Machine weakness, hardening,
WhonixOS, QubesOS, Librem 13
Section – 2 : Network Security

Curriculum Topics Covered

Routers Home Router, External Vulnerability Scanning, Shodan,


Qualys, Nmap, mxlookup, shieldsup, pentest-tools, putty,
Internal Vulnerability Scanning, MBSA, Nmap, Nessus, Fing,
Superscan, OpenVAS, Metasploitable2, Custom Router
Firmware, OpenWRT, DDWRT, Tomato Firmware, LibreCMC,
R7000 Nighthawk
Firewalls Host based, stateful packet inspection, Virtual, Windows -
WFC, Comodo, Tinywall, Privacyware, Linux- Iptables, UFW,
gufw, nftables, Mac – pflist, icefloor, murus, vallum, little-
snitch, Network based, DD-WRT, Open-WRT, pfsense,
Smoothwall, Vyos, novena, pcengines
Network Attacks Introduction & IOT, Arp spoofing & switches, network isolation,
xarp, DHCP Snooping, netcut, sniffdet, Tuxcut, VLAN setup in
Pfsense
WiFi Security Wifi-Weaknesses – WEP, WPA, WPA2, TKIP, CCMP, WPS, Evil
Twin, Rouge AP, wifipineapple, cowpatty, reaver, aircrack-
ng, oswa live cd, fern wifi cracker, secure configuration and
network isolation, RF Isolation and reduction, wifi inspector,
airodump-ng, wireless network watcher, wifi network monitor,
fing OS
Network Monitoring Syslog, RSYSLOG, Link logger, PRTG, KIWI syslog, syslog
watcher, wireshark, tcpdump, tshark, iptables, wincap, NST,
Netminer, Networx
Tracking IP Address, 3rd party connections, Http referrer, Cookies &
scripts, Super Cookies, browser fingerprinting, panopticlick,
ipleak, internet profiling, browserleaks, GCHQ
Search Engines & Privacy Search engine tracking, censorship & privacy, startpage,
duckduckgo, disconnect search, searx, yacy, metager,
private and anonymous searching
Browser Security & Tracking browser attack surface, isolation & compartmentalization,
Prevention Spikes, maxthon, priv8, Switchy, multifox, Http filters, ad &
track blockers, uBlock, uMatrix, Disconnect, Ghostery,
Request policy, ABP, Privacy badger, WOT, No-script,
Policeman, Purify, History, cookies, super cookies, JonDofox,
Tor, Evercookie, http referrer, ref control, smart referrer,
browser finger printing, jsrecon, firegloves, websocket leaks,
canvas blocker, Certificates and encryption, RCC for
windows, https everywhere, Calomel ssl validation, firefox
hardening, certificate patrol, aboutconfig, ffprofile
Passwords & Authentication Password attacks, hydra, nitrokey HSM, hashcat, pwdump,
OS Passwords, Password managers, lastpass, keypass,
keypassx, keypassxc, yubico, encryptr, Cygnus, zxcvbn, MFA,
softtokens, google authenticator, Authy, 2FA dongles, OTP,
U2F, yubikey-luks, dongleauth.info, RSA tokens, Clef

Section – 3 : Anonymous Browsing

OPSEC Introduction, identity strategies, establishing cover,


fakenamegenerator, disposable email, Identity Cross
contamination, Authorship recognition and evasion methods,
L33t converter, The Knock, OPSEC Failures
Live OS Rufus, Tails, Ironkey, Aegis secure key, Knoopix, Puppy Linux,
JonDo, Freepto, Tiny core, windows to go, Subgraph OS
VPNs VPN weaknesses, OpenVPN, unlocator, smartdnsproxy,
dnsleaks, dnspoof, preventing vpn leaks – firewall and
killswitches, choosing right vpn, setting up openVPN
TOR Tor Network & browser, Directory Authorities & relays, Tor
bridges, pluggable transports and traffic obfuscation, Torrc,
Torsocks, widecap, socat, corridor, proxychains-ng, Tor
Weaknesses, Conclusion and mitigation to reduce risk,
Tor2web, Orfox, OnionCat
VPN & TOR routers Off the self VPN, Tiny Hardware Firewall, Safeplug, Shellfire
box, Keezel, DIY Hardware TOR routers, Onionpi
Proxies http, https, socks & web(CGI), btguard, torguard, foxyproxy,
quick java
SSH Secure Shell OpenSSH, Remote port forwarding, local port forwarding,
Socks5 proxy tunneling, SSH Public Private key authentication,
SSH Hardeining, PGP
I2P Garlic routing, I2P installing, Secure Configuration, I2P
strengths and weaknesses, comparison TOR vs I2P
Privacy and Anonymizing JonDonym, Installing, Configuration, Bullet proof hosting
services services, Botnets, hacked boxes
Censorship Circumvention Outbound firewall bypassing, tunneling, httptunnel,
barbatunnel, corkscrew, port sharing & knocking, sslh,
cloaking and obfuscating, iodine - dns tunnel, dnscat2,
Stunnel, Remote login – VNC & RDP, inbound bypassing –
Reverse Shells, SSH remote tunneling and remote login
Chaining Nesting Nested VPNs (User - Tor - SSH-VPN-JonDonym - Internet),
proxychains, proxyleaks, setting up nested services
Offsite Internet Connections Internet cafes, public wifi spots, wardriving, boosting wifi
range, Yagi Wifi antenna, OSWA, Moocherhunter
Mobile, Cellphones & Cellular Network weaknesses, Network Operator, IMSI
Cellular networks catchers, SnoopSnitch, SS7, mobile and cellphone
weaknesses, Replicant

Section – 4 : End Point Protection

Files and Disk encryption Disk encryption, Attacks – physical, containers, volumes &
partitions, Passware kit enterprise, Windowsscope, Inception,
Firewire attack, cold boot attack, Evil maid attack,
DiskCryptor, Symantec Drive encryption, Ciphershed,
VeraCrypt, Truecrypt, Bitlocker, Filevault2, Dm-crypt and LUKS,
Self-encrypting devices, defense against decrypting attacks,
TRESOR, File encryptions, AES Crypt, peazip, keka, gnupg,
nesting cryptosystem and obfuscation
Anti-virus and end point Threat landscape, FUDs, Protection Methods, Ransomware,
protection Bitdefender, AV & EPP testing problem, Business EPP, Mac –
Xprotect, Kaspersky, FireEye
EDR NG-EPP, Layers protection, EDR
End-point-protection Application and execution control, backdoor factory, ACLs,
technology Accessenum, UAC, Applocker, parental controls, AV,
Appguard, Voodoo Shields, NoVirus Thanks, Exploitation
prevention, EMET, Traps, MBEA, HMPA, Device Guard,
AppArmor, SELinux, GRsecurity, PaX, POSIX & ACLs,
Gatekeeper, System Integrity Protection, Santa, Xfence,
Cylance
Threat Detection and Honeypots, CanaryTokens, OpenCanary, CanaryPi, Artillery –
Monitoring Binary Defense, Honey Drive, Intrusion detection systems –
Snort, Suricata, Bro IDS & Open WIPS-n, Host based intrusion
detection – OSSEC, Network Analysis – Sguil, Xplico & Network
Miner, OWASP Zed Proxy, Burp Proxy, File integrity monitoring,
Samhain, AIDE, ADaudit, Osiris, Afick, Solar Winds, Tripwire & El
Jefe, Network Security Toolkit, Security Onion, SIEM
Malware and Hacker Farber recovery scanner, Automated malware removal tools,
hunting HitmanPro, Malwarebytes, Kaspersky, Adwcleaner,
Roguekiller, Super anti spyware, Live rescue OS, USBs,
Malware seek & destroy, Process Explorer, Process tools,
Sigcheck, Autoruns, Process Monitor, Network Connections,
Networkx, SysDig, Csysdig, debsums, unhide, netstat, lsof,
rkhunter, Chkrootkit, Tiger, Clamav, LMD, Persistence, Task
explorer, KnockKnock, BlockBlock, KextViewer, OSquery,
Firmware Rootkits, BIOS Attacks, darwindumper, EPPRRT,
carboncopy, acronis true image, encrypted backup & cloud
storage, qnap, seafile, syncany, spydio, syncthing
OS and App hardening Hardening Standards, CIS benchmark, STIG Viewer,
OpenSCAP, NIST, baseline auditing, openvas, tenable,
windows hardening, security compliance manager, LGPO,
Attack Surface analyzer, Policy analyzer, Mac – Hardening,
Linux – Hardening, Security focused OS, Subgraph, Whonix,
Tails, Astra Linux, Trisquel, Parrot Security OS, Monitoring for
security drift
Anti-forensics Secure file deletion, eraser, fileshredder, Evidence
elimination, ccleaner, bleachit, Virtual Memory, SWAP, RAM
memory cache & buffer, disable memory dump, disk wiping,
scrubbing EXIF, imageoptim, pdfparanoia, imagemagick,
Sensor Noise Camera Identification
Emails – security, privacy & STARTTLS, Email Weaknesses, PGP, GPG & privacy, GNU
anonymity privacy guard, OpenKeyChain, gpg4usb, iPGMail, Gpg4Win,
Tail, Smartcards Yubikey, Email tracking & exploits, Email
anonymity & pseudonymity, TorBirdy, Remailers, mixmaster,
quicksilvermail, mixminion, email privacy tester, email
alternatives
Messengers - security, Signal, Chatsecure, cryptocat, Ricochet, Linphone, Jitsi,
privacy & anonymity Jabber XMPP, ring, tox

What are the requirements?


 Basic IT Skills, one laptop (quad-core CPU, 8GB RAM, free 60GB HDD/SSD) and 16GB
pen drive (2x)
 Wireless adapter like “Atheros AR9271” or “D-LINK DWA 160-B2”

Who should attend?


 Technically minded people
 If you are concerned about hackers, cyber criminals, malware and viruses
 If you share information anonymously
 If you want to keep communication and personal information private
 Interest in technology and Internet
 Security professionals
 Students studying IT or Security
 Freedom Fighters
 Political or religious dissidents
 Journalists
 Businessmen or women where security and privacy matters
 Law enforcement officers and agents
 High profile individuals
 Concerned about government and corporate spying
 Whistle blowers
 Anonymous bloggers
 Anyone who has an interest in security, privacy and anonymity

What will I learn?*


 To use more than 60+ hacking tools
 An advanced practical skill-set in
o Defeating all online threats – advanced hackers, trackers and all internet
nastiness including mitigating government spying and mass surveillance
o Assuring network security against all threats including advanced hackers,
trackers, exploit-kits, Wifi-attacks and much more
o How to stay anonymous online, how to maintain privacy and how to bypass
firewalls and proxies
o Securing laptops, desktops and mobile devices
 Become a cyber-security specialist
*A participation certificate from RealSense Consulting Pvt. Ltd. will be given to participants
after assessment exam on last day of course
How to register?
You can register online at http://www.realsenseconsulting.com or call 8630481399,
7607807670. Course fee 75000 INR (Indian Citizen) others 5050 USD
Instructor
Mainaksh NP Singh (Co-founder of Realsense Consulting), M.Tech (Software Engineering) -
National University of Singapore, B.Tech (CSE) – National Institute of Technology – Hamirpur, He
is an ethical hacker, pentester and ALM Architect. He has started hacking since 2004
and developed very good expertise in ethical hacking and cyber security. H e h a s
worked with various organizations like Atos, Barclays, RBS, British
Petroleum, Adobe, Equinix, TownGas, HKJC, HP, UOB, BHP Billiton, DBS Bank
e t c . He follows practical ways of teaching with focus towards real time situations.
URL – www.mainaksh.com Email – mainaksh@realsenseconsulting.com

Potrebbero piacerti anche