Introduction to Cybercrime and Laws
Introduction, Cybercrime: Definition and Origins of the word, Cybercrime andinformation Security, Who are Cybercriminals? Classifications of Cybercrimes.How Criminals Plan Them – Introduction, How Criminals Plan the Attacks, Cybercafeand Cybercrimes, Botnets, Attack Vector, The Indian IT ACT 2000.
Tools and Methods used in Cybercrime
Introduction, Proxy Server and Anonymizers, Password Cracking, Keyloggers and Spyware,Virus and Warms, Trojan and backdoors, Steganography, DOS and DDOS attack, SQLinjection, Buffer Overflow.
Phishing and Identity Theft
Introduction, Phishing – Methods of Phishing, Phishing Techniques, Phishing Toolkits andSpy Phishing. Identity Theft – PII, Types of Identity Theft, Techniques of ID Theft. DigitalForensics Science, Need for Computer Cyberforensics and Digital Evidence, DigitalForensics Life Cycle.
Unix Command Lines, Backtrack Linux, Mac Ports, Cygwin, Windows Power Shell, NetCatCommands, NetCat Uses, SSH, Data Pipe, Fpipe
Network Defense tools
Firewalls and Packet Filters: Firewall Basics, Packet Filter Vs Firewall, How a Firewall Protects a Network, Packet Characteristic to Filter, Stateless VsStateful Firewalls, NetworkAddress Translation (NAT) and Port Forwarding, the basic of Virtual Private Networks,Linux Firewall, Windows Firewall, Snort: Introduction Detection System.