Ethical hacking & Countermeasures

Course Contents
  • Introduction to Ethical Hacking
  • Hacking Laws, Footprinting, Google Hacking
  • Scanning, Enumeration, System Hacking
  • Trojans and Backdoors, Viruses and Worms, Sniffers
  • Social Engineering, Phishing
  • Hacking Email Accounts, Denial of Service
  • Session Hijacking, Hacking Web Servers
  • Web Application Vulnerabilities
  • Web-based Password Cracking Techniques
  • Hacking Routers, Cable Modems and Firewalls
  • Hacking Mobile Phones, PDA and Handheld Devices
  • Evading IDS, Firewalls, and Honeypots
  • Web Application Security, SQL Injection
  • Hacking Wireless Networks, Physical Security
  • Linux Hacking, Buffer Overflows, Cryptography,
  • Penetration Testing, MAC OS X Hacking
  • Bluetooth Hacking, VoIP Hacking
Who should attend?

University Students pursing bachelor/Master or equivalent degree. Anyone who is concerned about the security of network infrastructure, Penetration Testers / Vulnerability Assessors, Network Administrators / Engineers, System Administrator, Network Security Professionals, IT Officers / Managers, Telecom Engineers, Manager Network Operations, IT Auditors.

Get The Coaching Training Today!

Are you looking for a training? Contact us for quick response