Welcome to YLOAN.COM
yloan.com » College-University » Learn Hacking,ethical Hacking Course,ceh Delhi,hacking
College-University Vocational-Trade-Schools Root Category Home-Schooling scholarships books certification students

Learn Hacking,ethical Hacking Course,ceh Delhi,hacking

LEVEL 1: Network and System Admin Expert

LEVEL 1: Network and System Admin Expert

A key way attacker"s gain access to a company's resources is through a network connected to the Internet. A company wants to try to prevent as many attacks as possible; but in cases where it cannot prevent an attack, it must detect it in a timely manner. Therefore, an understanding of how networks and the related protocols like TCP/IP work is critical to being able to analyze network traffic and determine hostile traffic. It is just as important to know how to protect against these attacks using devices such as routers and firewalls. These essentials, and more, will be covered to provide a firm foundation for the consecutive days training. Prerequisite of Level 1: Candidates should have sound understanding about Computers and internetwork needs. Recommended for Final year Btech student or pass out, Graduates who want to may career in Information Security.

Course content:

1. Network Fundamentals

2. TCP/IP and IP addressing

3. Router and switch Configuration.

4. Routing Protocols.

5. IPV6 implementation

6. Access list.

7. Wireless Networking.

8. Firewall security concept.

9. Types of Firewall

10. Port Filtering

11. System admin of Windows 2003 and 2008 Server.

12. System admin of Linux O/S

Course duration of Level 1 : 70 Hours

LEVEL 2: Desktop and Server O/S Security

Prerequisite of Level 2: Should have undergone Level 1 training or equivalent knowledge of CCNA training .Recommended for Final year Btech student or pass out, Graduates who want to may career in Information Security.

(1) Windows O/S Security

Windows is the most widely-used and hacked operating system on the planet, and Internet Explorer is every hacker's "favorite" browser. The simple days of Windows 98 desktops and Windows NT 4.0 domains are long gone, replaced by the complexities of Active Directory, Group Policy, PKI, BitLocker, etc. This section will help you to quickly master the world of Windows security while showing you the tools you can use to simplify and automate your work. You will complete the day with a solid grounding in Windows security, including the important new features in Windows 2003, 2008, Vista, Windows 7.

a. The O/S Security Infrastructure.

b. Permissions and User Rights

c. Security Policies and templates.

d. Service packs, patches and Backup

e. Securing Network Services

f. Auditing and automation.

(2)Linux O/S Security:

Based on industry consensus standards, this course provides step-by-step guidance on improving the security of any Linux system. The course combines practical "how to" instructions with background information for Linux beginners and security advice and "best practices" for administrators of all levels of expertise.

a. Linux O/S security.

b. Linux Security Tools

c. Maintain, Monitoring and Auditing Linux.

Course duration of Level 2 : 50 Hours

LEVEL 3: Network Penetration Testing and Ethical hacking

Find Security Flaws before the Bad Guys Do

Security vulnerabilities, such as weak configurations, unpatched systems, and botched architectures, continue to plague organizations. Enterprises need people who can find these flaws in a professional manner to help eradicate them from our infrastructures. Lots of people claim to have penetration testing, ethical hacking, and security assessment skills, but precious few can apply these skills in a methodical regimen of professional testing to help make an organization more secure. This class covers the ingredients for successful network penetration testing to help attendees improve their enterprise's security stance.

We address detailed pre-test planning, including setting up an effective penetration testing infrastructure and establishing ground rules with the target organization to avoid surprises and misunderstanding. Then, we discuss a time-tested methodology for penetration and ethical hacking across the network, evaluating the security of network services and the operating systems behind them.

Attendees will learn how to perform detailed reconnaissance, learning about a target's infrastructure by mining blogs, search engines, and social networking sites. We'll then turn our attention to scanning, experimenting with numerous tools in hands-on exercises. Our exploitation phase will include the use of exploitation frameworks, stand-alone exploits, and other valuable tactics, all with hands-on exercises in our lab environment.

Prerequisite of Level 3: Should have undergone Level 1and Level 3 training or equivalent knowledge of CCNA , MCSE security, Linux security training .Recommended for Final year Btech student or pass out, Graduates who want to may career in Information Security.

Course duration of Level 3 : 80 Hours

1. Introduction to Ethical Hacking

2. Hacking Laws

3. Foot printing

4. Scanning

5. Google hacking

6. Email Hacking

7. Enumeration

8. System Hacking

9. Trojans and Backdoors

10. Virus and worms

11. Sniffers

12. Social Engineering

13. Phishing and Identify Theft

14. Denial of Service Attacks

15. Session Hijacking

16. Hacking Web Servers

17. Web Application Vulnerabilities

18. Web-based Password Cracking Techniques

19. SQL Injection

20. Hacking Wireless Networks

21. Physical Security

22. Linux Hacking

23. Evading IDS, Firewalls, and Honeypots

24. Buffer Overflows

25. Cryptography

26. Penetration Testing

27. Computer Forensics

28. Cyber Crime

29. Case studies and Trainers Secrets

30. Hackers Meet.

JCSA Special topics

1. Hacking Routers and Firewall

2. Hacking Mobile phones and PDA

3. Bluetooth Hacking

4. Hacking USB Devices

5. Securing Laptops

6. Credit Card Fraud

7. Yahoo booters

8. Crawlers

9. Remote File Inclusion

10. Local File Inclusion


11. Backdoor Shells

12. Trojan Writing in C, C++

13. PHP Injection

by: Mohit Yadav --JODO INSTITUTE ---9891773445
Ceh,learn Ethical Hacking,hacking Workshop,learn Hacking. Hacking Workshop,learn Hacking, Ceh,learn Ethical Hacking No More Blemish Face - Learn How You Can Get rid of Your Scary Face Mcse 70-291 Exam Nowaday Easy Scholarships For College - An Easy Way to Get Scholarship Money For Free In the Bible versus the Quran: He Learned to Hunt; He Ate People Distance Learning: Is It Really Appropriate For You? How To Learn Simple php Learning The Consequences Of The Various Eating Disorders Money To Help You Go To College: Obama Grants Effective Leadership Skills - Leaders Learn Best on the Job If You Want More GACE Test Points, Just Bust GACE Study Guide Myths! TExES Exam Takers React to Shocking TExES Exam Study Guide Report
print
www.yloan.com guest:  register | login | search IP(216.73.216.16) California / Anaheim Processed in 0.019417 second(s), 7 queries , Gzip enabled , discuz 5.5 through PHP 8.3.9 , debug code: 167 , 6577, 249,
Learn Hacking,ethical Hacking Course,ceh Delhi,hacking Anaheim