times institute of management & technical studies hacking ethical hacking ethical hacking...

2
ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ETHICAL HACKING l l Desktop & Server Security Windows 8 Introduction and Security Linux Security F Introduction to Information Security Times Institute of Management & Technical Studies 6 Months l l l l Cyber Crime Cyber Forensics Catching Criminals Mobile Forensics F Cyber Forensics l l l Lan Security Firewall Security Internet Security F Web Security l l l Introduction Vulnerability Assessment Penetration Testing F VAPT l l l l l Virtual Private Network Security Wireless LAN Router Security Intrusion Detection and Prevention Access Control F Network Security l l l Malwares Network Intrusions Art of Googling F Protection From Intrusions l l l l l Introduction Data Backup Cryptography Stagenography Physical Security F Data Security l l l l Mobile Security VOIP Email Security Mobile Forensics F Communication Security l l Security Auditing Lead Auditor: It (La-27001) F ISMS l l l l l l l l l l l l Network Basics Introduction IP Address NAT IP Subnets DHCP Server Ports DNS Proxy Servers Virtual Private Networks DNS Server OSI Model F Introduction to Ethical Hacking l l l l Digital Foot Print Information Gathering Who Is Information Web Server Details F Information Gathering

Upload: dinhdieu

Post on 28-Apr-2018

233 views

Category:

Documents


7 download

TRANSCRIPT

Page 1: Times Institute of Management & Technical Studies hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ETHICAL HACKING

l

l

Desktop & Server SecurityWindows 8 Introduction and Security Linux Security

F Introduction to Information Security

Times Institute of Management & Technical Studies

6 Months

l

l

l

l

Cyber CrimeCyber ForensicsCatching CriminalsMobile Forensics

F Cyber Forensics

l

l

l

Lan SecurityFirewall SecurityInternet Security

F Web Security

l

l

l

IntroductionVulnerability AssessmentPenetration Testing

F VAPT

l

l

l

l

l

Virtual Private Network SecurityWireless LANRouter SecurityIntrusion Detection and PreventionAccess Control

F Network Security

l

l

l

MalwaresNetwork IntrusionsArt of Googling

F Protection From Intrusions

l

l

l

l

l

IntroductionData BackupCryptographyStagenographyPhysical Security

F Data Security

l

l

l

l

Mobile SecurityVOIPEmail SecurityMobile Forensics

F Communication Security

l

l

Security AuditingLead Auditor: It (La-27001)

F ISMS

l

l

l

l

l

l

l

l

l

l

l

l

Network Basics IntroductionIP AddressNATIP SubnetsDHCP Server PortsDNSProxy ServersVirtual Private NetworksDNS ServerOSI Model

F Introduction to Ethical Hacking

l

l

l

l

Digital Foot Print Information Gathering Who Is InformationWeb Server Details

F Information Gathering

Page 2: Times Institute of Management & Technical Studies hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking

l

l

l

l

Web Architecture Server ConfigurationHTML BasicsPHP Basics

F Basics of Web Development

l

l

l

l

l

l

l

l

l

ScanningIntroduction to Network Vulnerability Scanning Vulnerability Assessment using NessusScanning PoliciesVulnerability Assessment using Open VASReport Generation Patch Critical LoopholesSystem Hardening Secure System Configuration

F Network Vulnerability

l

l

l

l

l

l

Fake Mail Further practical DNS Spoofing Man In The Middle Attack Cross site scripting attack WIFI Hacking

F Phishing

l

l

l

l

l

l

l

l

l

l

l

l

l

l

Introduction to Network Sniffing Packet Sniffing – WiresharkPacket Analysis Display & Capture FiltersNetwork Attacks - Ettercap DNS Poisoning ARP Poisoning Denial of ServiceReverse EngineeringIntroduction to Reverse Engineering Windows Memory Management System Assembly Language BasicsApplication Debuggers & DissemblersApplication Cracking, Patching & Keygenning

F Network Attacks

l

l

l

l

Introduction to Crypto TechniquesTypes of Encryptions & Hashes Crypto AnalysisInsecure Cryptographic Storage

F Cryptography

l

l

l

l

l

l

Introduction to X86 ArchitectureMemory Analysis Shell Code CompilationVanila ExploitStack Overflow Egg Hunting

F Buffer Overflow Attacks

l

l

l

l

l

l

l

l

l

l

l

l

l

OS DetectionOpen Port & Service DetectionMetasploit Framework ArchitectureVarious Interfaces of Metasploit FrameworkBasic TerminologiesVulnerability AnalysisExploitation on Various Platforms Evade Anti-Virus & FirewallsMetasploit Scripting Create Custom API to test Window Security Configure Nmap with Metasploit FrameworkSETWays to deliver Expolits

F Metasploit Framework

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

Accreditation

Indian Institute of Technology KharagpurHkkjrh; izkS|ksfxdh laLFkku [kM+xiqj

Certification partner

Locate your CenterDelhi (Head Office) | Hauz Khas Near (IIT Delhi) Tilak Nagar | Navi Mumbai

Patna | Lucknow | Aurangabad | Jaipur | Bangalore | Bharatpur | Ajmer | HyderabadChennai | Kolkata | Rajahmundry | Siliguri