Case. Net

Course Duration

5 Days

Cost

Audience

  • College Students
  • Faculty & Staff
  • IT & Non-IT Professionals
  • Aspiring cyber security professionals

Course Content

Introduction to Cyber Security

  • Overview Of Cyber Security

  • Hackers and Ethical Hackers

  • Different Types Of Hackers

  • World Top Hackers History

  • Hackers Terminology

  • Hackers Methods of Hacking

  • Skills Required To Be Hacker

Reconnaissance of Artifacts

  • What is Information Gathering

  • Active & Passive Information Gathering

  • Google as a Information Gathering Agent

  • Addons and Tool Based Reconnaissance

  • Site For Reconnaissance

System Hacking(Win 7, 8 & 10) & Protection

  • Password Cracking

  • Password Resetting

  • Login Without Entering Password

  • Password In Plain Text

  • Backdoor Installation

  • Guest to Admin Login

  • Securing System

Steganography & Cryptography

  • Introduction to Steganography

  • Introduction to Cryptography

  • Data Hiding Behind Images, Videos Files

  • Data Hiding Tools

  • Cryptography

  • Use of cryptography in Data Hiding

Hiding Identity( Proxy & vpn)

  • Online Proxy

  • Proxy Tools

  • CGI Proxy

  • Tab, Browser, System, Network Based Proxy

  • VPNs

  • Bypass Restriction Using Proxy and VPNs

Exploitation By Malwares

  • Introduction to viruses, Spywares, Trojans and Viruses

  • Hacking Using Trojans and Others Malwares

  • Binding Trojans

  • Making Fully Undetectable Malwares and Others Viruses

  • Bypassing Anti viruses

  • Rootkits

  • Botnets

Advance Google Database Hacking

  • Google and Its Working

  • Dork For Google Hacking

  • Tools For Google Hacking

  • Web Crawling Tools

  • Google as Vulnerability Scanner

Email Hacking & Countermeasures

  • Session Hijacking

  • Phishing

  • Tabnabbing

  • Clickjacking

  • Fake Emailing

  • Tracing Email

  • Securing Email Accounts

Facebook, Yahoo & Gmail Hacking , Tracing Victim & Safe Guard Techniques

  • Profile Scanning

  • Mobile Tracing by Facebook

  • Fake profile Investigation

  • Session Hijacking

  • Phishing attack

  • Social Engineering attack

  • Tracing Victim

  • Enhance Profile Security

Website Hacking & Countermeasures

  • Bypass Authentication

  • Manual & Automatic SQL Injection

  • Cross Site Scripting

  • Remote Code Execution

  • Dumping Passwords

  • Countermeasures

Career Path in Cyber Security

  • What is Cyber Security

  • Different Fields in Cyber Security

  • Certifications and Importance

  • Short & Long Term courses Available

  • Need of Cyber Security Experts

 

Enroll now

error: Content is protected !!