Thursday, 20 December 2012

Ethical hacking Syllabus








  1. INTRODUCTION TO COMPUTERS. 
  2. Networking Concepts.
  3. Encounter with Network Devices.
  4. Protocols
  5. Introduction to UNIX/Linux Environment.
  6. Cyber Laws ( INDIA)
  7. Introduction to Hacking
  8. Google Hacking.
  9. Footprinting.
  10. Scanning.
  11. Enumeration.
  12. Email Analysis and Spam Mails.
  13. Proxy Servers.
  14. Spoofing.
  15. Banner Grabbing.
  16. System Hacking.
  17. Web Based Password Hacking.
  18. Social Engineering.
  19. DOS & DDOS.
  20. Sniffers.
  21. Servers.
  22. Hacking WEB SERVERS.
  23. Session Hijacking.
  24. Defending Virus.
  25. Defending Trojans.
  26. Backdoor ,Rootkits and Worms. 
  27. Keyloggers.
  28. SQL Injection.
  29. PHP Injections
  30. Code Injection (2)
    1. Cross Site Scripting.(XSS)
    2. Cross Site Request Forgery (CSRF)
    3. Countermeasures.


 Buffer Overflows.
  1. Physical Security.
  2. Firewalls.
  3. HoneyPots
  4. Cryptography
  5. Reverse Engineering. (RE)
  6. Expert Levels Hands on OWASP.
  7. IP Tracing. (Hunting Hacker’s)
  8. Mini Project.
  9. INTRODUCTION TO CYBER FORENSICS.
Courses Offered in Our Training Institute:

Ø IBM Lotus Notes Domino Server Administration

Ø IBM Lotus Notes Development

Ø IBM Web Sphere Application Server Administration

Ø IBM Web Sphere Process Server Administration

Ø IBM Web Sphere MQ Administration

Ø Oracle Apps R12 HRMS

Ø Oracle Apps R12 HRMS  - Project

Ø Oracle Apps R12 Finical

Ø Oracle Apps R12 Finical Project

Ø Oracle Apps R12 Technical

Ø ITIL Foundation (V2, V3)

No comments:

Post a Comment