Home » Trainings


ETHICAL HACKING


Duration 3-4 Weeks
Objective The course presents participants with contemporary ethical hacking techniques needed to safeguard any important system. The acquisition of knowledge related to hacking and vulnerability exploitation has become paramount for ensuring the confidentiality, integrity and availability of critical systems
Outcome

On completion of the course/training, participants should

  • Know about ethical/legal arrangements before ethical hacking
  • Know how to gather information about networked systems
  • Know how to conduct penetration testing to network devices, Windows and Unix servers and web applications
  • Know about automated tools to help identify problematic codes in code review
  • Know application level vulnerabilities, attacks and defenses
  • Know about malware analysis techniques, tools and methodologies
Topics
  • Introduction to Ethical Hacking
  • Foot-printing and Social Engineering
  • Scanning and Enumeration
  • System Hacking
  • Sniffing and Spoofing
  • Hacking Web Servers
  • Wireless Hacking
  • Penetration Testing Methodologies
  • Malware Analysis


DIGITAL FORENSICS


This is the content of Tab2

INFORMATION SECURITY MANAGEMENT


This is the content of Tab2

FUNDAMENTALS OF INFORMATION SECURITY


This is the content of Tab2

CERTIFIED SECURE COMPUTER USER


This is the content of Tab2