Ethical Hacking & Cyber Security
Training
In New Delhi
Description
-
Type
Training
-
Location
New delhi
-
Class hours
60h
This program offered by this institute to extend consciousness of the general hack assaults & newest hack methodology. To set up an experts who can examination the network for the loophole & can offer safety to it. Suitable for: This program is for those students who want to acquire professional bachelor program ,as a Network Enggs, Web-Developer, Software-Developer.
Important information
Documents
- Ethical Hacking & Cyber Security Syllabus
Facilities
Location
Start date
Start date
Reviews
Course programme
This program covers the topic related to Ethical Hacking & Cyber Security. The subjects covered are as follows:
** Training curriculum:
Ethical Hack & Cyber Security
Module
Particular
** Fundamentals of Ethical Hack
** Info. Gather
- Footprint
-Scan
-Networks Enumeration
** Google DB hack
* Physically
* Automatics
** Operates System Hack & Security
-Windows includding X.P., Vista & Win- 7
-Linux covering Ubuntu, Fedora extra
** Hacking By Trojans and Backdoors
** Sniffer & Key loggers , Spywares
** Analysis Virus, Worm & Spyware Etc
** Hacking Email Accounts
-E-mail Spoof
-Fake Mail
-Publishing, Desktop Publishing
-Tab nab
** Data Hiding Methodologies
-Cryptography
-Steganagraphy
** Hide Individuality
- M.A.C.
- I.P.
** Proxy Server & Virtual Private Network
** Tech.
** Hack By USB & Live Devices
** Denial-of-Service Attack
** Honey Pot
-Examine
-Construction
** Social Engg
** Mobile Hack
** Credit Card Frauds & Case
** Website & DB Hack Attacks
-Intro of Website & DB
-Assault On Website & Web App.
-S.Q.L. Injection assault
-Manually
-Automatic
-Authentic Bypass
-Hack By S.Q.L. Query
-DB Hack Use O.D.B.C. mistake
-Rescue Data From Website
-Update, Removal, Insertion of Data into DB of Website
-S.Q.L. Injection in M.Y.S.Q.L. DB
-Attack beside S.Q.L. Server
-Blind S.Q.L. Injection
-Maintain Access On Website by Hack
-Upload Shell, Virus & Trojan On Website
-XSS attack
-Reflect
-Persistence
** Session Hijack
** LFI & RFI Attacks
-Manually
-Automatic
**Counter Measure
** Penetration Test & Vulnerability Examination
-Define Security Examination
-Outline of Penetration Test Methodology
-Penetration Testing Steps
-Synopsis of the Pen Test Legal Framework
-Listed the Automate Penetration Test instruments
-Find Vulnerability
-Manually
-Automatic
-Susceptibility Analysis
-Counter evaluation
** Wi-Fi Hack & Counter Measure
- Intro of Wireless Network
-Wireless Protocol & Standard
-Wireless Router Running
-Attack on Wireless Router
-Intro of W.E.P. & W.P.A.
-Crack W.E.P. & W.P.A. Password
-Secure Router & Wi-Fi Networks from Intruder
-Counter Measures
** Cyber Forensic Examination
* Intro to Cyber Forensic Examination,
* Examination Instruments
* Proof Assortment
* Proof Conservation
* E-Mail examination & Track
* I.P. Track
* Log File Trace
* E-Mail Recover,
* Recover Delete proofs
* Counter Measure
This program focuses on education not on hacking technology.
Ethical Hacking & Cyber Security