Mob:- +91 9947889245

  • Home
  • Θ
  • About Us
  • Θ
  • Services
  • Θ
  • Courses
  • Θ
  • Placements
  • Θ
  • Contacts
  • Θ
  • Technical News
  • Courses

    ETHICAL HACKING TECHNIQUES (EHT)

    Introduction to Ethical Hacking, Hacking Laws

    Foot printing, Google Hacking, Scanning, Enumeration, System Hacking

    Trojans and Backdoors, Viruses and Worms, Sniffers, Social Engineering

    Phishing, Hacking E-mail Accounts, Denial-of-Service, Session Hijacking, Hacking Web Servers

    Web Application Vulnerabilities, Web-based Password Cracking Technique, SQL Injection

    Hacking Wireless Networks, Physical Security, Linux Hacking, Evading IDS, Firewalls and Detecting Honey Pots, Buffer Overflows

    Cryptography, Penetration Testing, Covert Hacking, Writing Virus Codes, Assembly Language Tutorial, Exploit Writing Module

    Smashing the Stack for Fun and Profit, Windows Based Buffer Overflow Exploit Writing, Reverse Engineering

    MAC OS X Hacking, Hacking Routers, cable Modems and Firewalls, Hacking Mobile Phones, PDA and Handheld Devices, Bluetooth Hacking

    VOIP Hacking, RFID Hacking, Spamming, Hacking USB Devices, Hacking Database Servers

    Cyber Warfare-Hacking, Al-Qaida and Terrorism, Internet Content Filtering Techniques, Privacy on the Internet

    Securing Laptop Computers, Corporate EspionageHacking Using Insiders, Creating Security Policies

    Software Piracy and Warez, Hacking and Cheating Online Games

    Hacking RSS and Atom, Hacking Web Browsers (Firefox, IE), Proxy Server Technologies, Data Loss Prevention

    Hacking Global Positioning System (GPS), Computer Forensics and Incident Handling

    Credit Card Frauds, How to Steal Passwords, Firewall Technologies, Threats and Countermeasures, Case Studies. [88 Hrs]

    Copyright © 2013 C-Soft IT Solutions | All Rights Reserved.       Powered by Thooval Info Solutions.