- INTRODUCTION TO COMPUTERS.
- Networking Concepts.
- Encounter with Network Devices.
- Protocols
- Introduction to UNIX/Linux Environment.
- Cyber Laws ( INDIA)
- Introduction to Hacking
- Google Hacking.
- Footprinting.
- Scanning.
- Enumeration.
- Email Analysis and Spam Mails.
- Proxy Servers.
- Spoofing.
- Banner Grabbing.
- System Hacking.
- Web Based Password Hacking.
- Social Engineering.
- DOS & DDOS.
- Sniffers.
- Servers.
- Hacking WEB SERVERS.
- Session Hijacking.
- Defending Virus.
- Defending Trojans.
- Backdoor ,Rootkits and Worms.
- Keyloggers.
- SQL Injection.
- PHP Injections
- Code Injection (2)
- Cross Site Scripting.(XSS)
- Cross Site Request Forgery (CSRF)
- Countermeasures.
Buffer Overflows.
- Physical Security.
- Firewalls.
- HoneyPots
- Cryptography
- Reverse Engineering. (RE)
- Expert Levels Hands on OWASP.
- IP Tracing. (Hunting Hacker’s)
- Mini Project.
- INTRODUCTION TO CYBER FORENSICS.
Courses Offered in Our Training Institute:
Ø
IBM Lotus Notes
Domino Server Administration
Ø
IBM Lotus Notes
Development
Ø
IBM Web Sphere
Application Server Administration
Ø
IBM Web Sphere
Process Server Administration
Ø
IBM Web Sphere MQ
Administration
Ø
Oracle Apps R12
HRMS
Ø
Oracle Apps R12
HRMS - Project
Ø
Oracle Apps R12
Finical
Ø
Oracle Apps R12
Finical Project
Ø
Oracle Apps R12
Technical
Ø
ITIL Foundation
(V2, V3)
No comments:
Post a Comment