+ 91-79-40047405
+ 61-430120025
+ 230-2900510
India :
Australia :
Mauritius :


About Cyber Professional Hacker

he rapid and dramatic advances in information technology (IT) in recent years have without question generated tremendous benefits. However, they have created significant and unprecedented risks to operations. Computer security has, in turn, become much more important as all levels of an organization to utilize information systems security measures to avoid data tampering, fraud, disruptions in critical operations, and inappropriate disclosure of sensitive information.

The current demand for Information Security jobs continue to grow. With information security increasingly becoming a boardroom level concern, training and certification are becoming increasingly important for candidates and companies.

"NASSCOM predicts requirement of 10 lacs professionals by the year 2010. Currently the number of security professionals in India is around 22,000."

TechDefence Certified Professional Hacker provides a unique opprtunity to learn & get clear perspective of Ethical hacking,Information Security & Cyber Crime Investigation .It would be an ideal platform to aquire the required knowledge to take countermeasures & deal with cyber crime in your organization or your personal life.

Who should attend?

  • Students
  • IT Students & Professionals
  • Web Developers
  • Network Engineers
  • System Administrators
  • Law Professionals
  • Banking & finance Sector Professionals.

Workshop Centers:

  • HacXploit 2010 at DAIICT,Gandhinagar- Dates- 30th & 31st January,2010 (Conducted Sucessfully)
  • Hack IT at National Institute of Technology, Rourkela Date: 6th February,2010 (Conducted Successfully)
  • HackTrack at KIIT University,Bhubaneshwar Dates: 8th-10th February,2010(Conducted Successfully)
  • HackTrack 2010 at Amity University,Noida Dates: 8th & 9th March,2010(Conducted Successfully)
  • HacXplore 2010 at National Institute of Technology,Bhopal Dates: 14th & 15th February,2010 (Conducted Successfully)
  • HackSEC at Pondicherry University,Pondicherry Dates:16th & 17th March,2010 (Conducted Successfully)
  • HackIN at Delhradun Institute of Technology,Dehradun Dates: 20th-21st March,2010 (Conducted Successfully)
  • HackDrive 2010 at Shri Balaji College of Engineering & Technology,Jaipur- Dates: 26th & 27th March,2010 (Conducted Successfully)
  • HackXplore at CVR College of Engineering,Hyderabad Dates: 1st-2nd April,2010 (Conducted Successfully)
  • HacXplode 2010 at Engineering College,Bikaner Dates:7th-8th April,2010 (Conducted Successfully)
  • HacXploit at Hitkarini College of Engineering & Technology,Jabalpur Dates:19th & 20th April,2010 (Conducted Successfully)

Workshop Contents:

Cyber Ethics

  • Hackers & Hacking Methodologies
  • Types of hackers
  • Communities of Hackers
  • Malicious Hacker Strategies
  • Steps to conduct Ethical Hacking
  • Hiding your identity while performing attacks

Information Gathering & Scanning Methodologies

  • Get to know how hacker gather information about victim on internet
  • Information gathering of websites & networks
  • Scanning & Structuring of websites
  • Finding Admin Panel of websites

Trojans & Backdoors

  • How to control victim’s computer using Trojans
  • Binding Trojans with another file
  • Undetection process of Trojans from Antivirus
  • Removal of Trojans from your computer
  • Analysis of Trojans/Virus

Google Hacking

  • Using Google as hacking tool
  • Advanced operators of Google
  • Finding Vulnerable websites using Google
  • Finding Target networks using Google

Wireless Hacking & Security

  • Wireless Protocols
  • Wireless Routers-Working
  • Attacks on Wireless Routers
  • Cracking Wireless routers password(WEP)
  • Securing routers from Hackers
  • Countermeasures

Web Application Attacks

  • Web Application Overview
  • Web Application Attacks
  • OWASP Top 10 Vulnerabilities
  • Putting Trojans on websites
  • SQL injection attacks
  • Executing Operating System Commands
  • Getting Output of SQL Query
  • Getting Data from the Database Using ODBC Error Message
  • How to Mine all Column Names of a Table
  • How to Retrieve any Data
  • How to Update/Insert Data into Database
  • SQL Injection in Oracle
  • SQL Injection in MySql Database
  • Attacking Against SQL Servers
  • SQL Server Resolution Service (SSRS)
  • SQL Injection Automated Tools
  • Blind SQL Injection
  • Preventing SQL Injection Attacks
  • XSS attacks
  • Fining & Fixing XSS in websites
  • Local File inclusion attacks
  • Remote file inclusion attacks
  • Buffer Overflow attacks
  • Session Hijacking attacks
  • 20 Hands on Demonstrations on real websites

Mobile, Voip Hacking & Security

  • SMS & SMSC Introduction
  • SMS forging & countermeasures
  • Sending & Tracking fake SMSes
  • VoIP Introduction
  • Installing VoIP Server
  • Forging Call using VoIP
  • Tracing Fake Calls

Cyber Crime Investigation & Information Security

  • Types of Cyber Crimes
  • How to report Cyber Crimes
  • Details required while reporting cyber crime
  • Different Logging Systems
  • Investigating Emails ( Email Tracing)
  • Ahmedabad Bomb Blasts Terror Mail case study
  • Investigating Phishing Cases
  • Investigating Data Theft Cases
  • Investigating Orkut Profile Impersonation Cases

Workshop Highlights & Benefits

  • Live Demonstration of Latest Hacking Techniques & tools.
  • Live investigation Demonstration of various cases solved by Sunny Vaghela.
  • Personal Interaction with Sunny Vaghela.
  • Hands on Practice Sessions
  • Ethical Hacking Toolkit(Includes Powerpoint Presentations,Tools,Ebooks)

Key Points of TechDefence:

  • We have rich experience working on cases & training for Crime Branch, Ahmedabad,Nashik, Rajkot,Surat & Hyderabad.
  • Conducted more than 160 workshops & seminars for Students & Professionals across globe.
  • We helped Top Investigating Agencies to solve Cyber Terrorism Cases like Ahmedabad & Mumbai Blasts Cases.
  • We do not use third party tools. We have developed our Crypters, Trojans, Scripts etc.
  • Our Director & Trainer is supported by Ministry of Home Affairs, Malaysia.

Workshop Trainer:

  • Sunny Vaghela is serial entrepreneur & has wide experience in the field of Ethical Hacking,Cyber Crime Investigation & Forensics.At the age of 17,Sunny found many loopholes in SMS & VoIP Technology.At 18,Sunny has found loopholes like ‚ÄúSession Hijacking" & "Cross Site Scripting" in popular social networking website orkut.com. At 19 Sunny Vaghela has been awarded by Rajiv Gandhi Young Achiever Award as IT Expert of Gujarat.At 20, He has solved more than 16 cases in association with Crime Branch,Ahmedabad. He traced out origin of Terror Email Trail of Ahmedabad Serial Bomb Blasts.He also helped Mumbai Police to get information on “jamat ud dawah” after Mumbai Terror Attacks.He has addressed more than 160 IT security conferences/Workshops at National & International Level all across Globe.He has trained professionals from many reputed Companies like Google,Yahoo!,ISACA,Temenos,ZOHO, Delloitte,K7 Antivirus,TCS,HCL,Sify & many Co-operative Banks of India.At 21, He is founder & Chief Technical Officer of TechDefence Pvt Ltd which is rapidly growing IT Security Training & Consulting Organization focusing on Cyber Crime Investigation,Cyber Law Consuting,Vulnerability Assessment & Penetration Testing.

To know more about Sunny Vaghela please visit www.sunnyvaghela.com

Workshop Duration:

  • 16 hours (8 Hours/Day)

Certification Policy:

  • Certificate of "Certified Professional Hacker" will be given to participants on completion of workshop.

Request CPH Workshop at your college:

Home | About Us | Services | Solutions | Training | Domain | Team TechDefence | Media | Workshop | Contact

All Copyright © Reserved By TechDefence