Requirement & T&C:

1: Gender:Male
2: Advance Skills:

• Network scanning techniques and scanning countermeasures.
• Enumeration techniques and enumeration countermeasures.
• System hacking methodology, steganography, steganalysis attacks, and covering tracks.
• Windows OS Secuity. Hacking Into System By Changing Passwords & Getting Access To System By Elevating Privileges and to bypass The Windows Security.
• Operating System Attacks, Misconfiguration Attacks, Application-Level Attacks, Examples of
Application-Level Attacks, Shrink Wrap Code Attacks.
• Different types of Trojans, Trojan analysis, and Trojan countermeasures.
• Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures.
• Virus creation in computer using Batch file programing, HTML & VB Script.
• Packet sniffing techniques and how to defend against sniffing.
• Social Engineering techniques, identify theft, and social engineering countermeasures.
• DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures.
• Find security issues, verify vulnerability mitigations & manage security assessments
with Metasploit.
• The cross-site scripting (XSS) vulnerability to exploit client side web application vulnerability.
• Web server Attacks – Directory Traversal Attacks, HTTP Response Splitting Attack, Web Cache
Poisoning Attack ,HTTP Response Hijacking, SSH Brute force Attack, Web server Password
Cracking, Web Application Attacks.
• Session hijacking techniques and countermeasures.
• Different types of web server attacks, attack methodology, and countermeasures.
• Different types of web application attacks, web application hacking methodology, and countermeasures.
• SQL injection attacks and injection detection tools.
• Performing MAC, DHCP & Spoofing attacks. Poisoning using ARP and DNS.
• Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi-fi security
tools.
• Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vul
nerabilities, mobile security guidelines, and tools.
• Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures.
• Various cloud computing concepts, threats, attacks, and security techniques and tools.
• Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
• Hacking Web Applications – Web Attack Vectors, Command Injection Attacks, File Injection
Attack, Hidden Field Manipulation Attack, Stealing Users’ Cookies, Cookie/Session Poisoning,
Broken Authentication and Session Management.
• Monitoring Keyloggers -Spytech SpyAgent, All In One Keylogger, Keyloggers for Windows,
Amac Keylogger for Mac, Hardware Keyloggers.
• Spyware usage – Desktop Spyware, Activity Monitor, Email and Internet Spyware, Power Spy,
Internet and Email Spyware, Child Monitoring Spyware, Net Nanny Home Suite, Screen Cap
-turing Spyware, USB Spyware, Audio Spyware, Video Spyware, Print Spyware.
• Various types of penetration testing, security audit, vulnerability assessment, and penetration
testing roadmap.

• B

* Understanding Of  Some Technical Terminologies
3: Intelligence level Mind And Critical Thinking
4: Dedication And Regularity
5: Be Confidential, And IQ level :65+
6: No Babu Shona Activity
7: You Have To Agree With All T&C Of Indian Cyber Troops
8: You Have To Serve To Country First And Then Indian Cyber Troops
9: If You Are In Other Squad Or Team You Have To Leave Other Squad Before Entrance
10 You Have To Follow ICT’s Protocol And Be Friendly With Other Members And Security Protocol Will Decided By Your Head Of Department
11:You Have To Be Patriotic
12:If You Support Any Anti-National Activity Then We Will Take Strict Action Against You With “LEA”
13:Don’t Misuse Skills Otherwise Strict Action Will Be Taken On You

We Can Change t&c Anytime For Any User, We Don't Allow External Involvement Into ICT's T&C  ~ Order By K. Sharma

How To Apply?

1: Fill Out Registration Forum: Check Form Button Downside
2: Each Wrong Detail Will Leads To Rejection
3: Accept All T&C Of ICT Given In Requirements Field
4: Drop Contact Details Properly So We Can Contact You Easily
5: All Fields Are Mandatory
6: Within 7 Days You Will Response

 

 

By Clicking On Button You Are Accepting T&C Of ICT

 

 

We Can Change T&C Anytime According To Time And Situation And person