Board logo

subject: Boot Camp - Certified Ethical Hacker (ceh) - Delhi India - Jodo Institute [print this page]


Our Boot Camps are especially designed to cater the needs of students and professionals, who are longing for International Certification within a stipulated time frame.

For IT professional, International Certification has become a baseline. Many companies look for people certified in the technologies they are working on. Because, it s a reassurance to the company that the person has in-depth knowledge, since it s been verified by the technology creator.

Thus, certifications are an excellent way to prove one s credential. Jodo Institute offers boot camps for professionals as well as beginners. Our Regular Track courses have been designed for beginners and Fast Track courses have been designed for professional.

Jodo Institute is an Accredited Partner of EC-Council. It is a Microsoft Gold Certified Partner.

Jodo Institute train IT professionals in securing prestigious Global Certifications in CEH & CISSP. These certifications help candidates in getting high profile jobs in Network Security and E-Commerce organizations.

Certified Ethical Hacker (CEH) is one of the many e-commerce/security relevant certification awarded by EC-Council. CE-Council is world's foremost organization promoting e-commerce and certification standards for professionals.

Jodo Institute is providing Boot camp Training in Delhi India for Certified Ethical Hacker Certification awarded by EC-Council. Jodo Institute is Accredited Training Partner of EC-Council

For Details of course & faculty go to the following link:

http://jodoinstitute.com/boot-camp-CEH-v6.php

Course detail

1.Introduction to Ethical Hacking

2.Hacking Laws

3.Foot printing

4.Scanning

5.Google hacking

6.Email Hacking

7.Enumeration

8.System Hacking

9.Trojans and Backdoors

10.Virus and worms

11.Sniffers

12.Social Engineering

13.Phishing and Identify Theft

14. Denial of Service Attacks

15. Session Hijacking

16. Hacking Web Servers

17. Web Application Vulnerabilities

18. Web-based Password Cracking Techniques

19.SQL Injection

20. Hacking Wireless Networks

21. Physical Security

22.Linux Hacking

23. Evading IDS, Firewalls, and Honeypots

24. Buffer Overflows

25. Cryptography

26. Penetration Testing

by: Mohit Yadav --JODO INSTITUTE ---9891773445




welcome to loan (http://www.yloan.com/) Powered by Discuz! 5.5.0