Professional Documents
Culture Documents
TRAINING WING
In Association With
LONDON, UK
PRESENTS
WE WORK IN THE DARK WE DO WHAT WE CAN WE GIVE WHAT WE HAVE OUR DOUBT IS OUR PASSION, AND OUR PASSION IS OUR TASK THE REST IS THE MADNESS OF ART. -- INDIAN CYBER ARMY --
NO GREAT GENIUS HAS EVER EXISTED WITHOUT SOME TOUCH OF MADNESS -- KISLAY CHAUDHARY --
DONT LEARN TO HACK, PLEASE HACK TO LEARN TO CATCH A THIEF, THINK LIKE A THIEF HACK!!! TO BEAT HACKERS MIND, CREATE CYBER SAFE INDIA -- INDIAN CYBER ARMY --
MESSAGE BY DIRECTOR
Computer crimes have become a dangerous problem over the past few years that governments and private Organizations worldwide have begun to crack down on one of the most common types of computer crime known as hacking. Establishment of Indian Cyber Army, way back in 2011, with the goal Digitally Secured India, along with Some Printed Papers and short but dedicated team, we marked a vision that would change the life of Cyber World. We will make it most secured and crime free. In todays scenario India is having the fastest growing cyber society in the world. At the same time Indian Cyber Army with its immense effect in uplifting the standards of Cyber Security, Research and Investigations over cyber crime for the Individuals, Corporate and Law and Enforcement Agencies who wants cyber crime free society on internet life. I welcome you all to the family of juvenile and energetic professionals in Indian Cyber Army [ICA]. Indian Cyber Army nurture and shape young minds to help them continuously meet the challenges of the ever evolving Cyber Crimes. We take pride in our ability to help numerous professionals across the country chart their road to success and soar to new horizons. Today, we can say with pride that Team Indian Cyber Army is second to none. With all this and a special emphasis on quality of Services combined with communityoriented focus, The Indian Cyber Army has grown into a responsible Organization of Cyber Security, Research, Cyber Crime Investigation and Hi-Tech Training with social concerns. We are, thus, committed to empower our Students and Clients with knowledge, skills and vision to meet the challenges and opportunities of a rapidly changing world. I personally welcome all those hard working young men and women who keenly desire to pursue quality Hi-Tech Training and Research to join this Organization and assure them that our Services will meet all their legitimate needs to fulfill their needs. I would like to welcome you all again to join ICA family of independent learners, Professionals and ensure your future with knowledge and success.
OBJECTIVES OF ORGANIZATION
Indian Cyber Army focuses on advancing the Information Security and Ethical Hacking. The objectives of the company, inter-alias include; Research, Analyze, Train and Develop Technology Discovering vulnerabilities/loopholes in websites, networks, developing exploits and providing the advisories to overcome the exploit or loopholes. Protecting the National Information Heritage, Financial freedom, privacy of the individuals and the intellectual property from the global menace of unseen cyber criminals is a social necessity. Organize conferences, workshops (HackinTech), Training and brainstorming (Boot Camps) sessions involving all concerned professionals, students and industry associations for the advancement of the Information Security and Ethical Hacking. Provide a forum for discussion on new changes, threats, loopholes and to provide suitable inputs to create Cyber Safe India. Promote and conduct live Hacking Sessions to show the real threats on India. Stimulate research and development. Bring out quality publications (Hackcrypt: Magazine for Hackers) and Books on Information Security for all levels of readership. Honors outstanding professionals. Conducting Computer Training for Financially Weak Children.
Indian Cyber Army is supported by Government, Alumnis from IITs, Veterans of Cyber Security World and Ex-Army men and Corporate. Partner Organization with Microsoft, Intel, Symantec (Norton Antivirus), IBM India, GFI, MacAfee Antivirus and Many More Organizations Working in the field of Cyber Security. Receive an unparalleled education on the art of computer security with personal one-on-one attention from the Indian Cyber Army Cyber Security Team. Toppers of each batch to be personally interviewed by Indian Cyber Army and will receive a chance to work with them on security projects at Cyber Crime Investigation Bureau, New Delhi- A Private Cyber Crime Investigation Agency or Indian Information Security Research Organization (IISRO) - A Private Info Sec Research Center under Indian Cyber Army Student Partners Program (ICASP). Indian Cyber Army Ethical Hacking & Information Security Software Tool Kit with Manual for each student. Study materials prepared by the legends of hacking world. Authorized Certificate, recognized in the security industry globally after the completion of Any Program. Free Membership to Indian Cyber Army Indias first White Hat Hackers Team. One Year Free Subscription to Hackcrypt Magazine (E-Copy)
The Major benefits of Training Programs by Indian Cyber Army is the fact that you'll be put on live Projects. Once you've completed your training sessions, and have cleared the certification examination you will be put as an understudy on the live projects being executed at Indian Cyber Army (www.indiancyberarmy.org), Indian Information Security Research Organization (www.iisro.com), and Cyber Crime Investigation Bureau (www.ccibindia.com). These include penetration testing projects, compliance projects, security audits, cyber crime investigations and researches etc.
consultant in the domain of information security. While most certification programs are geared towards purely technical know-how, the CYBOARMOURER also arms you with the necessary consulting skills in Order to help you make your mark in this exciting field. The best part about the CYBOARMOURER is the fact that you get hands-on practical training on live projects. It covers a wide variety of topics, starting right from the basics, and then leading up to compliance standards, and even forensics and cyber crime investigations. The course content is developed with the support of Security Experts, Black Hat Hackers, Ministry of Communications and IT, Government of India and Various Universities of India that can assure you that it is designed specifically to make you an expert consultant in the domain of information security. COURSE MODULES:
Introduction to Information Security and Ethical Hacking Ports and Protocols Steps to Hacking Detecting Live System Trojans, Worms & Viruses Hacking into Email Windows Systems Hacking Website Hacking Linux Fundamentals Linux Hacking Crypto Graphy Buffer Overflow Attacks Vulnerability Assessments Penetration Testing Pen Testing Wireless Networks Cyber Laws and IT Acts Cyber Crime & Forensics Investigation
ELIGIBILITY: Basic Knowledge of Computers/ Internet etc. Network & System Administrators Information Security Officers Students of B.E/B.Tech/ME/B.Sc/M.Sc. IT professionals and Security Consultants, Security and Hacking enthusiasts
CREDITS
This Program will immerse the participant into an interactive environment where they will be shown how to scan, test, hack and secure systems. The lab intensive environment gives each participant in-depth knowledge and practical experience with the current essential security systems. Participants will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Participants then learn how intruders escalate privileges and what steps can be taken to secure a system. When a participant leaves this intensive 5 day class they will have hands on understanding and experience in internet security.
COURSE MODULES:
Introduction to Penetration Testing Ports and Protocols Steps to Hacking Detecting Live System Trojans, Worms & Viruses, Malware Analysis Windows Systems Hacking Linux Fundamentals Linux Hacking Networks, Sniffing, IDS Attacking Web Technologies Injecting the Database Advanced Exploitation Techniques Vulnerability Assessments Pen Testing Wireless Networks
ELIGIBILITY: Basic Knowledge of Computers/ Internet etc. Network & System Administrators Information Security Officers Students of B.E/B.Tech/ME/B.Sc/M.Sc. IT professionals and Security Consultants, Security and Hacking enthusiasts
CREDITS.
todays investigative, intelligence, and response professionals. Forensics and Cyber Crime Investigation is designed to fulfill this role. This is an intensive introduction to forensic computing geared toward technical professionals who need to hit the ground running without being tied to a particular tool or methodology. Individuals preparing for the CHFI or other forensic exam will be well prepared by attending this class. This course covers what forensic computing is, how to conduct electronic discovery, how to analyze data collected, and how to prepare reports. The course content is developed with the support of Security Experts, Black Hat Hackers, Ministry of Communications and IT, Government of India and Various Universities of India that can assure you that it is designed specifically to make you an expert consultant in the domain of information security.
COURSE MODULES:
Introduction to Information Security and Ethical Hacking Cyber Laws and IT Acts Cyber Investigation Essentials Digital Evidence in Computer Devices Cyber Forensics Essentials Investigating Emails Penetration Testing Investigating Server Logs Investigating Financial Crimes Windows Forensics Linux Forensics Social Networking Forensics Malware Forensics Apps Forensics Mobile Forensics Computer Security Incident Response Handling Real World Investigations
ELIGIBILITY: Basic Knowledge of Computers/ Internet etc. Network & System Administrators Students of B.E/B.Tech/ME/B.Sc/M.Sc. Information Security Officers & IT professionals and Security Consultants, Security and Hacking enthusiasts
CREDITS.
ELIGIBILITY: Bachelors Degree in any stream. Good Knowledge in Computers/ Internet etc. Duration: 12 Months [SEM-1 + SEM-2]
ELIGIBILITY: Bachelors Degree in any stream. Good Knowledge in Computers/ Internet etc. Duration: 18 Months [Sem-1 + Sem-2 + Sem-3]
COURSES CERTIFIED ETHICAL HACKER CERTIFIED FORENSICS EXPERT CERTIFIED PENETRATION TESTER ADVANCE DIPLOMA IN CYBER SECURITY PG DIPLOMA IN CYBER SECURITY
PAYMENT OPTION - NET BANKING (NEFT/RTGS)/ CASH DEPOSIT: Transfer Full Amount by Net Banking /Cash Deposit to Account no.010783800002248 in name of INDIAN CYBER ARMY (Add Rs.250 for Bank Charges, in case of Cash Deposit) in any Yes Bank across the country (Our Branch Laxmi Nagar, New Delhi, India. IFSC Code: - YESB0000107) E Mail the Educational Documents and Govt. ID Proof (zipped format) to documents@indiancyberarmy.org with Subject as your Unique Registration Number. After we receive your payment confirmation, we would give you a call to confirm your batch date, timings and other details.