Kalpesh Sharma Advanced Proposal For Technical, Engineering Students
Kalpesh Sharma Advanced Proposal For Technical, Engineering Students
Shubhlabh Technologies & Solutions
2009
Table of Contents
Table of Contents ................................................................................................... Error! Bookmark not defined.
1. Introduction..................................................................................................................................................... 3
1.1 About Us...................................................................................................................................................... 3
1.2 Credentials .................................................................................................................................................. 4
1.3 Representative Clients ................................................................................................................................ 4
1.4 Testimonial.................................................................................................................................................. 5
2. Cyber Crime Training program offered ............................................................................................................. 5
2.1 Program Structure....................................................................................................................................... 5
3. Financials......................................................................................................................................................... 12
4. Client Confidentiality....................................................................................................................................... 12
5. Declaration ..................................................................................................................................................... 12
1. Introduction
1.1 About Us
Shubhlabh Group is a leading Information Security services and training firm with customers in IT/ITES,
Financial Services, Aviation, Telecom/ISP, Government, Infrastructure and Manufacturing. Shubhlabh Security
Group has an R&D center in IIT Delhi and provides end to end information security services to corporations –
Security Audit, Security Implementation and Security Management. Shubhlabh has provided information
security services to leading Indian Corporate houses and government organizations. Shubhlabh is CERT‐In
empanelled by Govt of India to provide Information Security Services. We believe in practical results rather
then just talking about it and thus we are here in front of you to request an opportunity to prove our self.
Other then this, the key person (owner) of our company is world record holder and world’s biggest ethical
hacking expert. He will be personally taking care of students through specialized treatment and extra classes
which will be delivered by the expert himself.
Key Person: Owner of Shubhlabh Technologies, Mr. Kalpesh Sharma is world’s biggest ethical hacker
and information security expert with world records in hacking world’s maximum websites in a single
attempt LIVE on AIR in the presence of technical experts, legal experts, stock exchange experts, Minister
of Information Technology (Mr. Shakeel Ahmed), star media personnel’s, Rajat Sharma (Chairman, India
TV News Channel), Corporate Bodies and millions of public. This telecast was nonstop hacking live
telecast continuously for 3 hours. Apart from this, his is also very fluent in technical intelligence and
cover some extra ordinary information related to special tricks and techniques. We will deliver his
exclusive tricks, techniques and methods as well during the training period. His classes will be a part of
special lectures. Mr. Sharma is also a key person in delivering security consultancy to Army Intelligence
Department in concern to cyber crime and spying on terrorism related activities. Mr. Sharma also
investigated the New Delhi Bomb Blasts in November 2008 by helping the Gujarat Police as well as
private investigation for media agencies. Mr. Sharma holds a reputed brand name, with a global
reputation all over the world and has more then 12 years of experience. Mr. Sharma also worked as
technical assistant to Honorable Chief Minister of Gujarat through a direct appointment by the
Honorable Chief Minister of Gujarat, when he sworn as the CM for the first time. There was no
interference or inclusion of any secretaries or assistants and this was a direct honor given to Mr. Sharma
by the Honorable Chief Minister of Gujarat.
1.2 Credentials
Shubhlabh rated among the top 5 IT Professional Course / Certificates / Diplomas offering in India by
The Week Magazine March 2006.
10 customers in Economic Times India’s Top 100 companies
Shubhlabh’s proprietary auditing tool – Shubhlabh Radar – has been featured in Best IT
Implementations by PC‐Quest May 2008 issue
Shubhlabh operates Security Operations Center for India’s leading international airport.
R&D unit based out of IIT Delhi
Serving security business for over 3 years across the globe
CERT‐In, Ministry of IT Empanelled to conduct Security Audits
Appreciated by the Dr. A.P.J Abdul Kalam during his tenure as President of India at Rashtrapati
Bhawan for providing outstanding Information Security services to Govt of India
1.3 Representative Clients
Manufacturing/Infrastructure
Ballarpur Industries Limited
GMR
Precision Electronics Ltd. – A leading telecom manufacturing company
GMR Hyderabad Airports Ltd
Raxa Security Services – A GMR Group company
IT Sector
Microsoft Corporation – a leading software company
Infosys Technologies – A leading software outsourcing organization
Electronic Tender – Most secured electronic tendering solution
ITES Sector
Aegis – An Essar BPO
Quattro BPO
Annik Technologies
Evalueserve
BFSI
Nucleus Software Ltd. – A leading banking software provider
Iffco Tokio General Insurance Limited
Government Sector
CBI
Delhi Police
DRDO – Defense Research and Development Organization
Ministry of Home Affairs – Govt. of India
Indian Army – Govt. of India
Rashtrapati Bhawan – Govt. of India
National Informatics Centre – Govt. of India
Delhi Metro Railway Corporation
ISP/Telecom
Net4In Ltd.
Tulip Telecom
Department of Telecom
MTNL
BSNL
Education Sector
Manipal Education Group
Educomp Solutions Ltd.
Media
Zee News
Hindustan Times
Cybermedia
Ecommerce
Yatra.com
Bharatmatrimony.com
CIOL.com
AAA Internet Inc
AAAInternet Inc. – www.pgmx.com , www.mmorgph.com
Showbusiness Inc. – www.showbusiness.com
Infoedge Ltd. – Naukri.com, Jeevansathi.com, Brijj.com
1.4 Testimonial
“Shubhlabh & its team of computer security professionals & ethical hackers showed us how bad they
can cripple state of the art network in seconds, thanks to Team Shubhlabh, we called them just in
time to get the systems vetted on security before commissioning of our airport”
‐ Mr. Sivaram Tadepalli, GM Information Technology & Communication, GMR Hyderabad
Airports Ltd.
“Shubhlabh’s training programs opened my mind to the strength of Cyber Spying” – Lt. Col. Navneet
Gumasta, Military Intelligence, Indian Army
2. Cyber Crime Training program offered
The duration of the entire Training program shall be three months comprising of 60 days or 120
hours. The Training program has been divided in to 17 modules in which relevant topics would be
covered. This means every student will be given 3 months advanced level extensive training to
eradicate cyber crime. Daily 100 students will be trained in one class in a room. Similarly 300
peoples will be trained in 3 different classes(i.e. 100 in each class) in 3 different rooms. Daily 8
classes of 2 hours each will be conducted. Which means that 400 students will be trained in one
room daily and similarly 400 in all three rooms. So, a total of 1200 students will be trained within 3
Months. Again in next 3 months the next 1200 will be trained and so on will continue. There would
be 90 minutes class and 30 minutes practical session in the training program. All the students
enrolled in the program shall be required to take up and appear for examinations in final online
examination to get participation certificate.
2.1 Program Structure
Module 1 Introduction to the course
About the course
Objectives of the course
Module 2 Introduction to cyber crime
What is Conventional Crime
What is Cyber & Computer Crime?
Cyber Stalking
Reasons for Cyber Crime
Why learn about CYBER CRIME?
Cyber Terrorism
Forms of Cyber Terrorism
Factors & Reasons
Countermeasures
Challenges
Module 3 Honeypots
Introduction
Types of Honey pots
Production Honey pots
Research Honey pots
Low Interaction Honey pots (Honeyed)
High interaction honey pots (Honey net)
Honey net Architecture
Advantages & Disadvantages
Module 4 Internet and computer technology concepts relevant to cyber crime
Internet and Security Concepts
Internet architecture
Elements of a Secured Network Environment
Threats and Vulnerabilities
Attacks Trend
Virus, Worm ,Trojan ,RATs
Module 5 The criminalization of on‐line conduct
History and evolution of Cyber Crime
Sources of Incidents/Threats
Kinds of Incidents
Phishing
Spamming
Module 6 Key Trends In Cybercrime Globally
Brief Overview
Improving Security
Recommended Security Practices
Module 7 Cyber Laws
Introduction
Need of Cyber Laws
e‐Governance
Impediments in Implementing e‐Governance Projects from Legal Perspective
Analysis of Problems – Repercussions
Relevant Laws
Module 8 Information Technology Act, 2000
The Information Technology Act, 2000 (Some Laws)
Preliminary
Short title, extent, commencement and application
Definitions
Digital Signature
Authentication of electronic records.
Electronic Governance
Legal recognition of electronic records.
Legal recognition of digital signatures.
Use of electronic records and digital signatures in Government and its
agencies.
IT Act 2008:
The Information Technology (Amendment) Bill, 2008
Preliminary
Amendments to The Information Technology Act, 2000
Insertion of new section 3A.
Insertion of new section 6A.
Module 9 Introduction to Computer forensics
Define Computer Forensics
Four key elements: identification, preservation, analysis, and presentation
Computer security risks and remedies.
Personal computer security weaknesses and related computer security risks
which enhance the ability to find computer evidence.
Incident responses, priorities and team building requirements.
computer forensics processing methods and procedures
Module 10 Computer forensics in detail
Crime scene Management
Crime Profiling Crime Scene Management
Live System Data Gathering (Windows)
Data Imaging
Computer hard disk imaging
Removable disks like pen drives, CD/DVD, Removable hard disks
Advanced techniques of data imaging
First Response Kit
Data Recovery
Recovering deleted files from computer
Recovering deleted files from removable devices
Recovering encrypted files (Decryption) e.g MS Office, Rar, etc.)
Basic Forensics Analysis and Software
Internet usage analysis
Special analysis like usage of removable devices
Module 11 Advance Computer forensics
Cyber Forensic
Cyber Crimes
Preparing Before an Incident
Recognizing signs of an incident
Evidence Collection And Prevention
Preliminary Response
Documentation
Crime scene Management
Crime Profiling Crime Scene Management
Live System Data Gathering (Windows)
Data Recovery
Recovering deleted files from computer
Recovering deleted files from removable devices
Recovering encrypted files (Decryption) e.g MS Office, Rar, etc.)
Advance Forensics Analytics and Software
Internet usage analysis
Recovering cookies
Investigating attacks on a computer
Special analysis (like usage of removable devices e.g USB)
Erasing forensics track
Special Forensics
Cyber Cafe Forensics
Log Analyzers
Module 12 To Create & Treat A Forensically Sound Copy Of Digital Evidence.
Computer evidence preservation and the safe seizure of computers.
Identification of computer leads and evidence using computer forensic data
sampling techniques.
Preservation of computer evidence.
The documentation of computer forensics findings for use in trial or for
management review
Module 13 An overview of data recovery‐ tracing and recovering electronic evidence
How to collect, recover, process, and review electronic data regardless of
media type
How to report outlining file structures, media integrity, and the recoverability
of deleted files normal computing methods
Module 14 More about Computer Forensics
Documenting and presenting documented evidence to the Court of Law.
Module 15 Information Security Auditing
What is Information Security
History of ISO 27001
Standards and International Organization for Standardization
BS7799 / ISO 1799
ISO 27001
Domain of BS 7799‐1
Improvement in ISO 27001 over BS 7799
Control Objective and Controls in ISO 27001
Selection and Implementation of Controls
Developing and Adopting Policies
Mandatory Requirments
Information Security Management System
Management Responsibility
Internal ISMS Audit
Management Review of the ISMS
ISMS Improvement
Module 16 Managing Security Awareness
Information Security Management System
ISMS Implementation
Management Security
Managing Security Awareness
Need for Security Management
Impact of a sound Security Management System
Security awareness usually fails, WHY?
ISO 27001 Certification(27‐end)
ISO 27001 Certification
Role of Auditiors
Marketing ISO 27001 to Senior Management
Preparing for Certification
Compliance accreditation and certification
The 6‐step process for Certification
Return On Investment
Where to invest first
Security Policies
Training and Awareness
System Administration
Establish Effective Security Configurations
Maintain Software
Detect Security Breaches
Respond intelligently to incidents
Security Evaluations
Module 17 Cybercrime Status across the Globe
Key Trends & Issues for future
Special Training by Honorable Kalpesh Sharma
Technical Intelligence by Kalpesh Sharma
Tricks, Techniques and Methods by Kalpesh Sharma
3. Financials
Cyber Crime Training Program
Rate per Person Rate per Person Rate per Person
(Training Sessions + (Training Sessions + (Training Sessions +
Course Material + Course Material + Course Material +
S. No. Training Program offered
Certification) (min Certification) (min Certification) (min
Volume of 1200 Volume of 800 Volume of 600
participants ) participants ) participants )
1. Cyber Crime Training
Course Material ‐ consists of Training Books, CBT’s, Tools Other Services Financials for security
services and special services needs to be discussed in person.
4. Client Confidentiality
We respect client confidentiality and follow all practices to maintain client’s data confidential. We
sign an NDA with your organization to legally protect your data. Our datacenters and SOC are based
out of highly secured environments in IIT Delhi. At the same time we follow Chinese wall policy to
make sure that your confidential data is absolutely protected from your competitors. We never
employ same person on a project of your competitor. We always deploy a different team to ensure
that unhealthy competition can not affect.
5. Declaration
I hereby declare that all the information mentioned in this proposal is correct as on 01st June, 2009.
Shubhlabh Group of Companies
Key Person: Kalpesh Sharma
2, shriram park society, on chandola canal,
Near jawahar chowk, Maninagar, Ahmedabad‐380008,
Gujarat, India.
Secret Personal Email: [email protected], [email protected],
[email protected], [email protected],
[email protected]
Mobile: +91‐9227435453
Phone: +91‐79‐25351208
Fax: +91‐79‐25380179