| Course Others | You are Offering Professional Course | Locality Babra Mohalla |
An ISO: 9001:2008 Certified Company
www.nsrcnano.com, www.nanocdac.com
#604, 601 Siri Estates, Opp. Lane to R.S. Brothers, Ameerpet, Hyderabad-500016. Ph: 040-23754144
E-mail: [email protected], www.nsrcnano.com, www.nanocdac.com
1. Introduction to Ethical Hacking
ETHICAL HACKING
Overview Of Ethical Hacking
Hackers Vs Ethical Hackers
Different Types Of Hackers
World Top Hacker s History
Terminologies used in Hacking
Skills Required To Become a Hacker
2. Foot printing, Information Gathering, Reconnaissance
What is Information Gathering
Active & Passive Information Gathering
Google as a Information Gathering Agent
Addons and Tool Based Footprinting
Site For Footprinting
3. Hiding Identity(Proxy & vpn)
Over view of proxy
Online Proxy
Proxy Tools
VPNs & Bypass Restrictions Using Proxy and VPNs
4. Scanning & Enumeration
Overview of TCP/IP 3 way Handshake
Nmap scanning methods
Nmap Script Engine
Online Scanning
An ISO: 9001:2008 Certified Company
Some useful scanners
Introduction to Enumeration
SNMP Enumeration
Banner grabbing
5. Advance Google Database Hacking
Google and Its Working
Dork For Google Hacking
Tools For Google Hacking
Web Crawling Tools
Digging Email Passwords
6. System Virtualization & Cloning
Virtualization
Vmware
VirtualBox
Backup & Restore
Cloning
7. System and Application Password Hacking
Password Cracking
Password Resetting
Login Without Entering Password
Linux password Resetting
Password In Plain Text
Securing System
Rar,Pdf, MsOffice & Zip password cracking
An ISO: 9001:2008 Certified Company
8. Kali Linux
Introduction to Kali Linux
Installation, Configuration and Maintenance
Top 10 tools & Some other Useful Tools
9. Steganography & Cryptography
Introduction to Stenography & Cryptography
Data Hiding Behind Images, Videos Files Etc
Data Hiding Tools
ADS
Cryptography
10. Viruses, Trojans, Worms and Malwares
Introduction to viruses, worms, and Trojans
Hacking by using some viruses, Trojans and worms
Botnets
Key logging
Overview Of Malware Analysis
Countermeasures
11. Email Hacking & Tracing Victim
Phishing attack
Tracing Victim
Fake profile Investigating
Profile Security
12. Network Attacks & Security
DOS & DDOS Attack
Buffer overflow (Brief Intro)
An ISO: 9001:2008 Certified Company
Sniffing
IDS and Honeypot
13. Website Hacking
Bypass Authentication
SQL Injection
Dumping Passwords
Countermeasures
14. Wireless Password Cracking
WEP Cracking
WPA/WPA2 Password Cracking
WI-FI Router Password Cracking
15. Vulnerability Assessment
Introduction to VA-PT
Nessus
Acunetix
Netsparker
IBM AppScan