Archive for November 2015

Ethical Hacking Training and Workshop in Vellore

About :
This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work and then be lead into scanning and attacking their own networks, no real networks is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system.


Prerequisites: 
Anyone who is concerned about the integrity of the network infrastructure and significantly benefit Security officers, auditors, security Professionals, site administrators.

Our Training Method :
Train in a ready-to-learn comfortable environment
Interact with Cyber Security Specialist & Security expert instructors
Get hands-on labs, industry oriented experience
Results-oriented course content
Highest Pass Rates
Choose from Day, Evening & Weekend Classes to meet your busy schedule.
Real time  Placement assistance on successful completion of the course.

Modules :
-Introduction to Ethical Hacking
-Foot printing and Reconnaissance
-Scanning Networks
-Enumeration
-System Hacking
-Malware Threats
-Evading IDS, Firewalls and Honey pots
-Sniffing
-Social Engineering
-Denial of Service
-Session Hijacking
-Hacking web server's
-Hacking web applications
-SQL Injection
-Hacking Wireless Networks
-Hacking Mobile Platforms
-Cloud Computing
-Cryptography

Session and Training Schedule:  
Weekdays (30 days) – 5 days/week  
2 Hours/day - 1 Hour Theory, 1 Hour Practical  

Weekends (4 weeks) – 2 days/week  
4 Hours/day - 2 Hours Theory, 2 hours Practical 

Our Institute Location:  

Redback IT Solutions Private Limited,  
#AL 24 TNHB PHASE III, 
Sathuvacheri,( Near Vallalar Water Tank)  
Vellore. 632602 

Contact :  
Training Coordinator  
+91 8189985551 


Friday, 27 November 2015
Posted by Siva Priya

CCNA Training in vellore

About :
Cisco Certified Network Associate (CCNA) validates the ability to install, configure, operate, and troubleshoot medium-size routed and switched networks, including implementation and verification of connections to remote sites in a WAN.
Skills and knowledge gained through training for the CCNA certification are immensely valuable in the networking field as the topics covered during the CCNA training program provide the basis for all networking topologies and protocols. 


Cisco certifications have benefited both the employee as well as the employer. It is a known fact that many people have literally changed their lives and have got real benefits and acquired valuable skills in the process of becoming certified. There are innumerable instances where individuals having more than ten years or so in their networking career feel the need of getting CCNA certified.

Modules Covered :
IP data network operation
LAN switching technology
IP addresses
IP routing technology
IP services
Network device security
Troubleshooting
WAN technology

Prerequisites:
Anyone with a graduate degree. 
Knowledge of using computer. 
Basic internet skills.

Course Highlights: 
Up-to-date modules focusing on the current industry needs. 
Boost your skills to induce creativity. 
Structured learning with live projects from day one. 
Additional practical sessions with expert faculty training.
Real time Placement assistance on successful completion of the course.

Session and Training Schedule: 
Weekdays (30 days) – 5 days/week 
2 Hours/day - 1 Hour Theory, 1 Hour Practical 
Weekends (4 weeks) – 2 days/week 
4 Hours/day - 2 Hours Theory, 2 hours Practical 

Our Institute Location: 
Redback IT Solutions Private Limited,
#AL 24 TNHB PHASE III, 
Sathuvacheri,( Near Vallalar Water Tank) 
Vellore. 632602 

Contact : 
Training Coordinator 
+91 8189985551




Sunday, 22 November 2015
Posted by Siva Priya

MCITP Training in Vellore

About :
The MCITP Server Administrator certification will help you develop and demonstrate your knowledge and skills in working with Server 2008 and prepare you for several different roles.The MCITP certification  builds on a combination of MCTS (Microsoft Certified Technology Specialist) prerequisites that will allow you to develop your technical skills and knowledge and prepare you for your role as a Server Administrator.


Prerequisites: 
Anyone with a graduate degree.
Knowledge of using computer.
Basic internet skills.

Course Highlights: 
Up-to-date modules focusing on the current industry needs. 
Boost your skills to induce creativity. 
Structured learning with live projects from day one. 
Additional practical sessions with expert faculty training. 
Real time  Placement assistance on successful completion of the course.

Available MCITP tracks include:
- MCITP: Enterprise Desktop Support Technician 7
- MCITP: Enterprise Desktop Administrator 7
- MCITP: Consumer Support Technician
- MCITP: Enterprise Support Technician
- MCITP: Enterprise Administrator
- MCITP: Server Administrator
- MCITP: Windows Server 2008 R2, Virtualization Administrator
- MCITP: Database Administrator 2008
- MCITP: Database Developer 2008
- MCITP: Business Intelligence Developer 2008
- MCITP: Database Administrator
- MCITP: Database Developer
- MCITP: Business Intelligence Developer
- MCITP: Enterprise Project Management with Microsoft Office Project Server 2007
- MCITP: Enterprise Messaging Administrator 2010
- MCITP: Enterprise Messaging Administrator 

In preparation for your MCITP you will learn how to:
Handle day to day management of the server OS, file structure and directory services.
Handle software distribution and updates.
Monitor servers.
Troubleshoot servers.
Configure the server.
Implement an auditing policy.
Perform scheduled vulnerability assessment scans.

Session and Training Schedule: 
Weekdays (30 days) – 5 days/week 
2 Hours/day - 1 Hour Theory, 1 Hour Practical 
Weekends (4 weeks) – 2 days/week 
4 Hours/day - 2 Hours Theory, 2 hours Practical 

Our Institute Location: 
Redback IT Solutions Private Limited, 
#AL 24 TNHB PHASE III, Sathuvacheri,( Near Vallalar Water Tank) 
Vellore. 632602 

Contact : 
Training Coordinator 
+91 8189985551 
Wednesday, 11 November 2015
Posted by Siva Priya

Hardware and Networking Training in Vellore

About :
Computer hardware professionals take care of the maintenance of computer hardware, while networking involves connecting a group of 2 or more computer systems for sharing data and information. The professionals engaged in R&D of computer hardware and networks are known as hardware and networking engineers. Besides looking after computer maintenance they are also liable for supervising and designing the hardware installation and manufacturing process. 


The increasing use of computer, laptops and Internets has expanded the scope of hardware and networking sector widely.Hardware and networking professionals can find ample job opportunities in different sectors such as education, films, banking, media, animation, hardware and networking product manufacturing and entertainment.
Based on the technical experience one can be appointed at different positions such as system integrator, networking professional, PC assembler, PC technician, technical support executive, peripheral engineer, computer manufacturer,computer chip designer, system administrator, electronic data processing managers and system engineers. Besides this one can even start one’s own hardware assembling firms to develop hardware and network computers depending on the demand and needs of different clients.

Scope of hardware and networking courses in India :
The recent surveys reveal that the hardware and electronics sector is expected to expand above $60billion in India. The wide recognition of software industry in India dominates the hardware sector. But the situation is likely to change in the near future. The number of hardware and networking jobs is expected to grow extensively in India.
Presently, the hardware job market is saturated. There is a huge gap between the demand and supply of hardware pass outs. For this reason students are opting to start their ventures for assembling and hardware maintenance.

Prerequisites:
Anyone with a graduate degree.
Knowledge of using computer.
Basic internet skills.

Course Highlights:
Up-to-date modules focusing on the current industry needs.
Boost your skills to induce creativity.
Structured learning with live projects from day one.
Additional practical sessions with expert faculty training.
Real time 
Placement assistance on successful completion of the course.

Our Course Modules :
Hardware:
Information on PC & how it works
Basic Electronics & Measuring Instruments
Principle of Digital Electronics & Networks
Operating System & Network package
Architecture of the system & networks
Microprocessor & its Application
PC Assembling , Designing Networks
Trouble shooting and Managing Systems

Networking :
Physical Layer [Hub, UTP]/ NIC/ MAC Address/ Broadcast MAC/ Switch
IP Address structure.
Subnetting
LAN communication process.
Routing Logic
NAT
Network Packet Structure
IPv6
DHCP
DNS
Packet Filters

Session and Training Schedule:
Weekdays (30 days) – 5 days/week
2 Hours/day - 1 Hour Theory, 1 Hour Practical

Weekends (4 weeks) – 2 days/week
4 Hours/day - 2 Hours Theory, 2 hours Practical

Our Institute Location:
Redback IT Solutions Private Limited,
#AL 24 TNHB PHASE III,
Sathuvacheri,( Near Vallalar Water Tank)
Vellore. 632602

Contact :
Training Coordinator
+91 8189985551 
Tuesday, 10 November 2015
Posted by Siva Priya

Five of the biggest hacks

1. Operation Shady RAT
Last year security firm McAfee revealed details of Operation Shady RAT (RAT is an acronym for Remote Access Tool), a hacking campaign that took place over several years. The networks of 72 organisations across the world were targeted in the campaign which began in mid-2006, or perhaps earlier, and continued until at least 2010. Targets included the United States government, the UN, 12 US defence contractors and several technology firms.
McAfee said it believed that a “state actor” was behind the attacks and that it was impossible to say how much data was stolen. Though McAfee declined to say which country was behind the attacks, most experts believe China to be the most likely perpetrator.

2. TJX
The precise details of large-scale financial hacks are often kept private but there are several attacks that are contenders for the title of ‘most expensive hack’. One is the 2007 attack on American firm TJX, which was mounted from an insecure WiFi network in one of the company’s TJ Maxx shops. More than 45 million people had their credit card details stolen and some experts said the actual figure was likely to be closer to 94 million.


3. Heartland Payment Systems
This New Jersey payment processing firm lost data on tens of millions of credit cards in an attack in 2009. Around 175,000 businesses were affected by the theft, which was led by hacker Alberto Gonzalez, who was also implicated in the TJX attack.

4. Epsilon
The world’s largest email marketing firm, Epsilon, confirmed in 2011 that it had been the target of hackers. Only names and email addresses were stolen from the firm, which handles more than 40 billion emails every year more than 2,000 brands worldwide including Marks and Spencer. The scale of the theft was unprecedented.

5. Sony PlayStation Network
In 2011, hackers gained access to Sony’s PlayStation Network, putting at risk credit card data for more than 70 million people. The gaming service was closed for weeks and customers were eventually compensated with free games and subscriptions. Though the culprits were never caught, it is now believed that no data was stolen and the attack was intended to simply embarrass Sony.
Sunday, 8 November 2015
Posted by Siva Priya

A zero-day exploit : An advanced Cyber Attack defined

A zero-day vulnerability, at its core, is a flaw. It is an unknown exploit in the wild that exposes a vulnerability in software or hardware which can create complicated problems well before anyone realizes something is wrong. In fact, a zero-day exploit leaves NO opportunity for detection... at first.


Vulnerability Timeline :
A zero-day attack happens once that flaw, or software/hardware vulnerability is exploited, and attackers release malware before a developer has an opportunity to create a patch to fix the vulnerability, hence “zero-day.” 
Let’s break down the steps of the window of vulnerability:

  1. A company’s developers create software, but unbeknownst to them, it includes a vulnerability
  2. The threat actor spots that vulnerability either before the developer does, or acts on it before the developer has a chance to fix it
  3. The attacker writes and implements exploit code while the vulnerability is still open and available
  4. After releasing the exploit, either the public recognizes it in the form of identity or information theft, or the developer catches it and creates a patch to staunch the cyber bleeding.

Once a patch is written and used, the exploit is no longer called a zero-day exploit. These attacks are rarely discovered right away. In fact, it often takes not just days, but months, and sometimes years before a developer learns of the vulnerability that led to an attack.

Read more ..
Wednesday, 4 November 2015
Posted by Siva Priya

Tips for Improving Router Security

With the recent news of router vulnerabilities, we thought it would be an excellent time to provide a few tips for improving your router security. While nothing is hack-proof in the world we live in, you can take many steps to deter attackers from targeting you. I have arranged this from easy to do, to increasingly technical.


  1. This step may be common knowledge to many, but most routers use a default login username such as “admin”, and a password that is usually just “password”. The first step you should take when acquiring a router is to change this to a username you have created, and create a strong password for access. Please note that this is different than your Wi-fi name and password.
  2. Once you have set the router login, you will want to create a password and name for your connection. I generally advise changing it from the default to something that is not personally identifiable. Ideally you do not want your router manufacturer (Netgear. Linksys, etc.) or address as your Wi-fi Name. To add to this, I always advise to go with WPA2 over WPA or WEP. A long passphrase is important here and I would aim for more than 20 characters.
  3. To add to the previous step, you can entirely disable the SSID broadcast so that only users that know your network name can connect and I advise doing this.
  4. If you plan on having guests, create an entirely different Guest network. It is never advisable to give the credentials to your main connection.
  5. Unfortunately convenience generally leads to weaker security in our world. That WPS (Wi-fi Protected Setup) button may be incredibly easy to use, but for security reasons it is generally not advised to use this feature. This can allow an attacker to attempt connection with a PIN and even a longer PIN can be brute-forced fairly quickly with modern technology.
  6. Always make sure the firmware for your router is up to date. I would advise logging into your router regularly to check for updates. This is frequently neglected and should not be.
  7. Disable Remote Administrative Access to your router, and disable administrative access over Wi-Fi. This one is a given and an Admin should only be connecting via a wired Ethernet connection.
  8. The next step I usually advise people to take is to change the default IP ranges for their router. Almost every router has an IP resembling 192.168.1.1 and changing this can help prevent CSRF (Cross-Site Request Forgery) attacks.
  9. Restrict access to the router via MAC addresses. You can specify exactly what devices you want to connect so that others are not permitted. You can usually identify the address of the specific device in the Admin Console of the router.
  10. If the devices you use are compatible, it is generally advisable to change from the standard 2.4-GHz band, to the 5-GHz band. This decreases the range of the signal and could stop a potential attacker that is farther away from your router from discovering it.
  11. Disable Telnet, PING, UPNP, SSH, and HNAP if you can. You can close them entirely, but I generally advise putting them into what is referred to as “Stealth” mode. This stops your router from responding to external communications.
  12. Once you have gone through these steps, make sure that you log out of the router. This does not just apply to routers though. You should log out of any website, utility, or console when you are done using it.
I would certainly advise taking all of the steps above but if you cannot do them all, the more the better. “Better Safe Than Sorry” should be common practice in the cyber security world.
Posted by Siva Priya

WhatsApp Found Collecting Data on Calls and Phone Numbers

WhatsApp, one of the most popular online calling apps, has been exposed by a group of researchers who identified how app’s internal protocol is storing call duration and personal information of the participants.


Though, WhatsApp has never claimed itself to be an anonymous calling service but this new research has unveiled new information on how the app’s communication systems have been powered.

According to the researchers at the University of New Haven, WhatsApp uses FunXMPP protocol (deviated version of XMPP) XMPP has been used by Google for one its communication services, the Gtalk.

The researchers also analyzed the exchanges of messages between the Android phone and WhatsApp server. What they found was that WhatsApp has set up a complete system of gathering the data.

First they authenticated the users involved in the call and then a communication channel was setup using Opus codec at 8 or 16 KHz. After this, they established the call’s relay servers and endpoint IP addresses.

The scraping of data doesn’t end here; researchers were able to identify the app sending Metadata like phones number, timestamp, audio codec for the call and the call duration to its servers.

Read More ..




Tuesday, 3 November 2015
Posted by Siva Priya

Follow by Email

Google+ Followers

Pageviews

Cloud Label

Blogumulus by Roy Tanck and Amanda Fazani

- Copyright © 2013 Redback IT Academy -- Powered by Redback - Designed by @ Redback Studio -