Cyber Security

Cyber Security

Learn Cyber Security

Content

Ethical Hacking
• Cyber Ethical-Hacking Introduction
• Information Gathering 1
• Information Gathering 2
• Scanning 1
• Scanning 2
• Google Hacking Database
• Virus, Worms – Virus Analysis
• Trojans & Backdoors
• Sniffers & keyloggers
• Proxy Servers & VPNs
• Social Engineering
• Email, DNS, IP spoofing
• HoneyPots
• System Hacking & Security
• Bots,Botnets & DOS
• Cryptography

Website Hacking & Security
• Vulnerability Research
• SQL Injection 1
• SQL Injection 2
• XSS Attacks & Countermeasures
• LFI/ RFI Attacks & Countermeasures
• Information Disclosure Vulnerabilities
• Buffer Overflow Attacks 1
• Buffer Overflow Attacks 2
• Session Hijacking Attacks
• Hacking Web Servers
• Vulnerability Assessment & Penetration Testing
• Exploit Writing
• Secure Coding Practices

Mobile & Wireless Security
• Wireless Hacking & Security
• SMS Forging & Countermeasures
• VoIP Hacking & Countermeasures

Information & Application Security
• Firewalls, IDS, Evading IDS
• Assembly Language Basics
• Metasploit Framework
• Reverse Engineering & Countermeasures

Cyber Crime Investigation
• Introduction to Cyber Crime Investigation
• Handling Real World Cyber Crimes
• Investigating Emails
• (Ahmedabad Blast Mail Case Study)
• Investigating Phishing Cases
• Investgating Cyber Pornography Crimes
• Investigating Credit Card Fraud Cases
• Investigating Data Theft Case

Cyber Forensics & Cyber Law
• Understanding Cyber Forensics
• Cyber Law & IT ACT,2000

Career Technology