Rohtak
    Posted: 21 days ago by
    Shortlist

    Ethical hacking training in nano scientific research centre

    Course
    Others
    You are
    Offering Professional Course
    Locality
    Babra Mohalla
     
    Reply
     

    Description for "Ethical hacking training in nano scientific research centre"

    An ISO: 9001:2008 Certified Company

    www.nsrcnano.com, www.nanocdac.com
    #604, 601 Siri Estates, Opp. Lane to R.S. Brothers, Ameerpet, Hyderabad-500016. Ph: 040-23754144
    E-mail: [email protected], www.nsrcnano.com, www.nanocdac.com

    1. Introduction to Ethical Hacking

    ETHICAL HACKING

    Overview Of Ethical Hacking
    Hackers Vs Ethical Hackers
    Different Types Of Hackers
    World Top Hacker s History
    Terminologies used in Hacking
    Skills Required To Become a Hacker

    2. Foot printing, Information Gathering, Reconnaissance

    What is Information Gathering
    Active & Passive Information Gathering
    Google as a Information Gathering Agent
    Addons and Tool Based Footprinting
    Site For Footprinting

    3. Hiding Identity(Proxy & vpn)

    Over view of proxy
    Online Proxy
    Proxy Tools
    VPNs & Bypass Restrictions Using Proxy and VPNs

    4. Scanning & Enumeration

    Overview of TCP/IP 3 way Handshake
    Nmap scanning methods
    Nmap Script Engine
    Online Scanning
    An ISO: 9001:2008 Certified Company

    Some useful scanners
    Introduction to Enumeration
    SNMP Enumeration
    Banner grabbing

    5. Advance Google Database Hacking

    Google and Its Working
    Dork For Google Hacking
    Tools For Google Hacking
    Web Crawling Tools
    Digging Email Passwords

    6. System Virtualization & Cloning

    Virtualization
    Vmware
    VirtualBox
    Backup & Restore
    Cloning

    7. System and Application Password Hacking


    Password Cracking
    Password Resetting
    Login Without Entering Password
    Linux password Resetting
    Password In Plain Text
    Securing System
    Rar,Pdf, MsOffice & Zip password cracking


    An ISO: 9001:2008 Certified Company

    8. Kali Linux

    Introduction to Kali Linux
    Installation, Configuration and Maintenance
    Top 10 tools & Some other Useful Tools

    9. Steganography & Cryptography

    Introduction to Stenography & Cryptography
    Data Hiding Behind Images, Videos Files Etc
    Data Hiding Tools
    ADS
    Cryptography

    10. Viruses, Trojans, Worms and Malwares

    Introduction to viruses, worms, and Trojans
    Hacking by using some viruses, Trojans and worms
    Botnets
    Key logging
    Overview Of Malware Analysis
    Countermeasures

    11. Email Hacking & Tracing Victim
    Phishing attack
    Tracing Victim
    Fake profile Investigating
    Profile Security

    12. Network Attacks & Security

    DOS & DDOS Attack
    Buffer overflow (Brief Intro)
    An ISO: 9001:2008 Certified Company

    Sniffing
    IDS and Honeypot

    13. Website Hacking

    Bypass Authentication
    SQL Injection
    Dumping Passwords
    Countermeasures

    14. Wireless Password Cracking

    WEP Cracking
    WPA/WPA2 Password Cracking
    WI-FI Router Password Cracking

    15. Vulnerability Assessment


    Introduction to VA-PT
    Nessus
    Acunetix
    Netsparker
    IBM AppScan

     

    safety nebosh iosh center bihar jamshedpur jharkand

    payloader grader traning india madhubani ara jharkand

    poclain traning instituite india madhubani ara jharkand

    jcb center india muzaffer pur ara jamui

    operater traning school in bihar katihar

    Craen Operating Course Training Center In Haryana Best India

    Osha Nebosh Iosh Diploam Course In Telangana Top 66 Osha Neb