[go: up one dir, main page]

0% found this document useful (0 votes)
67 views12 pages

Industrial Training

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 12

(SESSION JULY –DEC 2022)

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

INDUSTRIAL TRAINING REPORT

SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENT


FOR THE DEGREE OF BACHELOR OF ENGINEERING
IN
COMPUTER SCIENCE & ENGINEERING

Submitted To:
Mrs. Ayonija Pathre
by

Rabindranath Tagore University


Bhopal

Submitted To:- Head Of Dept:- Submitted by:-

Mrs. AYONIJA PATHRE Mr. MUKESH KUMAR SWYAM PRAKASH SIN


Assistant Professor Assistant Professor Roll No. -M16ET1CS0007

1
CONTENTS

 Acknowledgement

 Company profile

 Certificate of Training

 Declaration

 Technology

 Introduction

 History and Features

 Application/ Usage

 Modules of Training

 Daily Dairy

 Summary

2
ACKNOWLEDGEMENT

I would like to express our sincere gratitude to our guide ----name of your
trainner------------------ for her/his encouragement and constant guidance, without her/his
continued support and insights throughout this work, this training could not have been
completed.

I are thankful to Mr. MUKESH KUMAR, HOD of Computer Science & Engineering
for his encouragement.

I convey my sincere thanks to all teaching and non-teaching staff of computer science
and engineering department for their kind cooperation.
I also extend thanks to my colleagues and friends who have been cooperative during
the entire project work.

(Student Name)

Swyam Prakash Singh

M16ET1CS0007

3
COMPANY PROFILE

Pristine InfoSolutions Pvt. Ltd.


 Is one of the leading IT services and Ethical Hacking training provider headquartered in
Mumbai, India. Over the years we have trained many professionals and corporates in
different cities across the country and produced highly skilled pool of IT professionals to
counter global industry challenges in the field of Ethical Hacking and Information Security.

We provide the most intensive, immersion Information Security training and services
designed to help you master the practical steps necessary for defending IT Infrastructure
against the most dangerous threats – the ones being actively exploited.

Mr. Rizwan Shaikh Information Security Researcher and Cyber Crime Consultant with
more than 8 years of experience in the meadow of Ethical Hacking, Information Security and
Cyber Law are Co-founder of Pristine Infosolutions. He have been conducting Ethical
Hacking training and providing Information Security services across the globe.

I have been invited by many corporates and leading institutions of India for conducting
workshops, seminars, boot-camps and trainings on Ethical Hacking and Information Security.
I have trained more than 30000 individuals in Colleges, Corporates and Government
Departments.
His area of expertise includes Vulnerability Assessment, Information Security Audits,
Penetration Testing, Source Code Reviews, Computer Forensics, Ethical Hacking and Cyber
Law

4
CERTIFICATE OF TRAINING

5
DECLARATION

I hereby declare that work which is being presented in the Industrial Training entitled
“ETHICAL HACKING” is in partial fulfillment for the awarded of degree of Bachelor of
Engineering in Computer Science & Engineering. The work has been carried out at
Rabindranath Tagore University, Bhopal and is an authentic record of my own work.

GUIDE NAME SWYAM PRAKASH SINGH


Mrs. AYONIJA PATHRE (M16ET1CS0007)
Assistant professor

Date-

6
TECHNOLOGY

INTRODUCTION

HISTORY AND FEATURE

History:
Feature:

APPLICATION

7
MODULES OF TRAINING

8
DAILY DAIRY

Week - 1
 Introduction
 Computer Security Basics
 Most Common Attacks
 ASCII Code
 Networking Basics and Security
 IANA, Allotment of IP Address
Week - 2
 Ping and Ping Sweep
 Foot-Printing Techniques
 Detecting Victim’s OS
 Detecting Firewall
 Domain Name and DNS
 ICANN
Week - 3
 Top Level Domains
 DNS Delegation
 Email Security
 Hacking Mailing Client
 Instant Messenger Hacking (gtalk, yahoo,etc)
 Port Scanning
Week - 4
 Detecting Open Ports
 Intellectual Property Theft
 Trojan Attack and Countermeasures
 Hacking by Key Loggers
 Identity Attacks
Week -5
 Proxy Server Attacks
 Password Cracking
 Sniffer and Wireless Hacking
 Call Spoofing
 Google Hacking
 Buffer Overflow
Week - 6
 DOS and DDOS Attacks
 Honey Pots
 0-day Attacks
 Window and System Hacking
 SQL Injection

9
 Social Engineering Attacks
Week - 7
 Defacing Website and Security Standard
 Web Jacking
 Finding Loopholes
 Phishing Techniques
 Cyber law and Consulting
 Cyber Forensics and Investigation
 IT Act 200
 CERT-IND and AO
Week - 8
 Case Studies
 Earning Money Online
 Adsense and Adwords
 Test

10
SUMMARY

Pristine InfoSolutions Private Limited is a very intriguing place for students place for do their
training program as I was working and feel of a real job experience. By this training program,
I have gained a wide knowledge of Ethical Hacking and its Applications.
Pristine InfoSolutions Private Limited contributes a lot of the knowledge of its trainees and
try their level best to contribute to increase our ability so that we can stand out from others
and whatever they contribute to the corporates world automatically becomes productive.
The Company provides me with the real-time working scenario. I have gained a lot of
experience of a real time job in a company.

11
12

You might also like