Ethical Hacking114

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 2

INDUSTRIAL TRAINING ON ETHICAL HACKING

Course Contents :-Module 1: Basics of Information Security Introduction to Information Security & Ethical Hacking Basics of Networking, Operating System and Databases

Module 2: Desktop & server Security Windows Security Hacking into Windows XP, NT Deleted Files Restoration Registries Vulnerability of windows platform Securing Windows, Windows Firewall, Windows Security Center Windows Task Manager System Configuration Utility Windows Password Breaking Counter Measure of password Breaking Port Scanning Virus, worms spywares Spywares Modes of Spreading

Module 3: LAN security and TCP/IP basics Setting up a Local Area Network Connection Threats to LAN Network and File Sharing Firewalls Anti Virus & Anti Spywares Network Scanners Hacking MAC Address Wi-Fi Network Security, Firewalls and security Introduction to Firewalls, Working of a Firewall Types of Firewalls Logging

Module 4: Internet security IP Addresses Finding an IP Address Anonymous Surfing Analysis of Email Headers Anonymous Proxies IP Spoofing, Transparent Proxies IP Tracing using Email Distorting Proxies Email Tracking, Elite Proxies Art of Googling Free Proxy Servers Proxies Servers Cryptography Microsoft Outlook Security & Configuration Stegenography Forensics

Module 5: Project Work Penetration into Windows System Creating Phishing Pages Editing windows, Registry Editing, Art of Googling Maintaining a website and Social Engineering attack SQL Injection Attack on test site only

Contact: CMC Limited (A Tata Enterprise) 8, Vaishali, Main Metro Road, Pitam Pura, New Delhi-110034 Ph.: 011-65905335, 9313877528, 9810324822 E-Mail : [email protected]

You might also like