Mob:- +91 9947889245
Courses
Introduction to Ethical Hacking, Hacking Laws
Foot printing, Google Hacking, Scanning, Enumeration, System Hacking
Trojans and Backdoors, Viruses and Worms, Sniffers, Social Engineering
Phishing, Hacking E-mail Accounts, Denial-of-Service, Session Hijacking, Hacking Web Servers
Web Application Vulnerabilities, Web-based Password Cracking Technique, SQL Injection
Hacking Wireless Networks, Physical Security, Linux Hacking, Evading IDS, Firewalls and Detecting Honey Pots, Buffer Overflows
Cryptography, Penetration Testing, Covert Hacking, Writing Virus Codes, Assembly Language Tutorial, Exploit Writing Module
Smashing the Stack for Fun and Profit, Windows Based Buffer Overflow Exploit Writing, Reverse Engineering
MAC OS X Hacking, Hacking Routers, cable Modems and Firewalls, Hacking Mobile Phones, PDA and Handheld Devices, Bluetooth Hacking
VOIP Hacking, RFID Hacking, Spamming, Hacking USB Devices, Hacking Database Servers
Cyber Warfare-Hacking, Al-Qaida and Terrorism, Internet Content Filtering Techniques, Privacy on the Internet
Securing Laptop Computers, Corporate EspionageHacking Using Insiders, Creating Security Policies
Software Piracy and Warez, Hacking and Cheating Online Games
Hacking RSS and Atom, Hacking Web Browsers (Firefox, IE), Proxy Server Technologies, Data Loss Prevention
Hacking Global Positioning System (GPS), Computer Forensics and Incident Handling
Credit Card Frauds, How to Steal Passwords, Firewall Technologies, Threats and Countermeasures, Case Studies. [88 Hrs]
Copyright © 2013 C-Soft IT Solutions | All Rights Reserved. Powered by Thooval Info Solutions.