Certified Cyber Security Expert

TechDefence
In Ahmedabad

Rs 12,000
VAT incl.
You can also call the Study Centre
97233... More
Students that were interested in this course also looked at...
See all

Important information

  • Certificate
  • Ahmedabad
  • 80 hours of class
Description

Hands on Demonstration of Latest Hacking Techniques & tools. Hands on investigation Demonstration of various cases solved by Sunny Vaghela. Personal Interaction with highly experienced faculty. Hands on Practice Sessions. 100% Placement Assistance from TechDefence.
Suitable for: The course will significantly benefit Students, IT Professionals, Web Developers, Network engineers, System Administrators, Law Professionals, Banking & finance Sector Professionals.

Important information
Venues

Where and when

Starts Location
On request
Ahmedabad
A-805 Wallstreet 2,Opp Orient Club,Near Gujarat College, 380007, Gujarat, India
See map

Frequent Asked Questions

· Requirements

no

Course programme

Session 1: Cyber Ethics – Hacking introduction.
Session 2: Basic Networking Terminologies
Session 3: Information Gathering and foot-printing
Session 4: Scanning and Enumeration
Session 5: Trojans and Backdoors
Session 6: Virus and Worms
Session 7: Sniffers and keyloggers
Session 8: Phishing and its preventions
Session 9: System Hacking and Security
Session 10: Social Engineering and Honey pots
Session 11: Bots, Botnets and DoS
Session 12: Cryptography
Session 13: Google Hacking Databases
Session 14: SQL injection 1
Session 15: SQL injection 2
Session 16: Proxy servers and VPN’s
Session 17: Cross site Scripting ( XSS )
Session 18: Local File Inclusion / Remote File Inclusion ( LFI / RFI )
Session 19: Secure Coding practises
Session 20: Information Disclosure vulnerabilities

Session 21: Session Hijacking ( Side jacking )
Session 22: Hacking web servers
Session 23: Vulnerability Assessment and Penetration Testing ( VAPT )
Session 24: Assembly language basics
Session 25: Buffer Overflow attacks 1
Session 26: Buffer Overflow attacks 2
Session 27: Exploit writing
Session 28: Metasploit framework
Session 29: Reverse Engineering
Session 30: Firewalls, IDS and Evading IDS


Students that were interested in this course also looked at...
See all