| Courses Basic Computer Training / Hardware Training / Software Training | Locality Nehru Colony |
Best quality training available with major projects. Personality Development class free.
Demo classes available
• PHP
HTML
CSS
J Server
J Query
My SQL
Database Connectivity
Word Press
Joomla
Codeigniter
Cake PHP
Zend Framework
• Java
Basic
OOPS
Threading
Applet
AWT
Swin
g
Database Connectivity
JSP
Servolet
Struts
Hibernate
• ASP.Net
Fundamentals
ASP .Net
.Net Frame work
C Sharp
Data Base Connectivity
ASP Controls
ActiveX Data Object
MVC
Linq
Silver light
Crystal Report
• Android
• Graphic Designing
Adobe Photoshop
Adobe Indesign
Adobe Illustrator
• Web Designing
Fundamentals
HTML
CSS
JavaScript
J query
Photoshop
• Ethical Hacking
• CCNA
• CEH
Introduction to Ethical Hacking
Foot printing and Reconnaissance
Scanning Networks
Enumeration
System Hacking
Trojans and Backdoors
Viruses and Worms
Sniffers
Social Engineering
Denial of Service
Session Hijacking
Hacking Web servers
Hacking Web Applications
SQL Injection
Hacking Wireless Networks
Hacking Mobile Platforms
Evading IDS, Firewalls, and Honey pots
Buffer Overflow
Cryptography
Penetration Testing
• CHFI
Computer Forensics in Today's World
Computer Forensics Investigation Process
Searching and Seizing Computers
Digital Evidence
First Responder Procedures
Computer Forensics Lab
Understanding Hard Disks and File Systems
Windows Forensics
Data Acquisition and Duplication
Recovering Deleted Files and Deleted Partitions
Forensics Investigation using AccessData FTK
Forensics Investigation Using EnCase
Steganography and Image File Forensics
Application Password Crackers
Log Capturing and Event Correlation
Network Forensics, Investigating Logs and Investigating Network Traffic
Investigating Wireless Attacks
Investigating Web Attacks
Tracking Emails and Investigating Email Crimes
Mobile Forensics
Investigative Reports
Becoming an Expert Witness
• ECSA
Need for Security Analysis
TCP IP Packet Analysis
Penetration Testing Methodologies
Customers and Legal Agreements
Rules of Engagement
Penetration Testing Planning and Scheduling
Pre-penetration Testing Steps
Information Gathering
Vulnerability Analysis
External Penetration Testing
Internal Network Penetration Testing
Firewall Penetration Testing
IDS Penetration Testing
Password Cracking Penetration Testing
Social Engineering Penetration Testing
Web Application Penetration Testing
SQL Penetration Testing
Penetration Testing Reports and Post Testing Actions