Case. Net
Course Duration
5 Days
Cost
Audience
- College Students
- Faculty & Staff
- IT & Non-IT Professionals
- Aspiring cyber security professionals
Course Content
Introduction to Cyber Security
Overview Of Cyber Security
Hackers and Ethical Hackers
Different Types Of Hackers
World Top Hackers History
Hackers Terminology
Hackers Methods of Hacking
Skills Required To Be Hacker
Reconnaissance of Artifacts
What is Information Gathering
Active & Passive Information Gathering
Google as a Information Gathering Agent
Addons and Tool Based Reconnaissance
Site For Reconnaissance
System Hacking(Win 7, 8 & 10) & Protection
Password Cracking
Password Resetting
Login Without Entering Password
Password In Plain Text
Backdoor Installation
Guest to Admin Login
Securing System
Steganography & Cryptography
Introduction to Steganography
Introduction to Cryptography
Data Hiding Behind Images, Videos Files
Data Hiding Tools
Cryptography
Use of cryptography in Data Hiding
Hiding Identity( Proxy & vpn)
Online Proxy
Proxy Tools
CGI Proxy
Tab, Browser, System, Network Based Proxy
VPNs
Bypass Restriction Using Proxy and VPNs
Exploitation By Malwares
Introduction to viruses, Spywares, Trojans and Viruses
Hacking Using Trojans and Others Malwares
Binding Trojans
Making Fully Undetectable Malwares and Others Viruses
Bypassing Anti viruses
Rootkits
Botnets
Advance Google Database Hacking
Google and Its Working
Dork For Google Hacking
Tools For Google Hacking
Web Crawling Tools
Google as Vulnerability Scanner
Email Hacking & Countermeasures
Session Hijacking
Phishing
Tabnabbing
Clickjacking
Fake Emailing
Tracing Email
Securing Email Accounts
Facebook, Yahoo & Gmail Hacking , Tracing Victim & Safe Guard Techniques
Profile Scanning
Mobile Tracing by Facebook
Fake profile Investigation
Session Hijacking
Phishing attack
Social Engineering attack
Tracing Victim
Enhance Profile Security
Website Hacking & Countermeasures
Bypass Authentication
Manual & Automatic SQL Injection
Cross Site Scripting
Remote Code Execution
Dumping Passwords
Countermeasures
Career Path in Cyber Security
What is Cyber Security
Different Fields in Cyber Security
Certifications and Importance
Short & Long Term courses Available
Need of Cyber Security Experts