Transcript
Page 1: Times Institute of Management & Technical Studies hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ETHICAL HACKING

l

l

Desktop & Server SecurityWindows 8 Introduction and Security Linux Security

F Introduction to Information Security

Times Institute of Management & Technical Studies

6 Months

l

l

l

l

Cyber CrimeCyber ForensicsCatching CriminalsMobile Forensics

F Cyber Forensics

l

l

l

Lan SecurityFirewall SecurityInternet Security

F Web Security

l

l

l

IntroductionVulnerability AssessmentPenetration Testing

F VAPT

l

l

l

l

l

Virtual Private Network SecurityWireless LANRouter SecurityIntrusion Detection and PreventionAccess Control

F Network Security

l

l

l

MalwaresNetwork IntrusionsArt of Googling

F Protection From Intrusions

l

l

l

l

l

IntroductionData BackupCryptographyStagenographyPhysical Security

F Data Security

l

l

l

l

Mobile SecurityVOIPEmail SecurityMobile Forensics

F Communication Security

l

l

Security AuditingLead Auditor: It (La-27001)

F ISMS

l

l

l

l

l

l

l

l

l

l

l

l

Network Basics IntroductionIP AddressNATIP SubnetsDHCP Server PortsDNSProxy ServersVirtual Private NetworksDNS ServerOSI Model

F Introduction to Ethical Hacking

l

l

l

l

Digital Foot Print Information Gathering Who Is InformationWeb Server Details

F Information Gathering

Page 2: Times Institute of Management & Technical Studies hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking ethical hacking

l

l

l

l

Web Architecture Server ConfigurationHTML BasicsPHP Basics

F Basics of Web Development

l

l

l

l

l

l

l

l

l

ScanningIntroduction to Network Vulnerability Scanning Vulnerability Assessment using NessusScanning PoliciesVulnerability Assessment using Open VASReport Generation Patch Critical LoopholesSystem Hardening Secure System Configuration

F Network Vulnerability

l

l

l

l

l

l

Fake Mail Further practical DNS Spoofing Man In The Middle Attack Cross site scripting attack WIFI Hacking

F Phishing

l

l

l

l

l

l

l

l

l

l

l

l

l

l

Introduction to Network Sniffing Packet Sniffing – WiresharkPacket Analysis Display & Capture FiltersNetwork Attacks - Ettercap DNS Poisoning ARP Poisoning Denial of ServiceReverse EngineeringIntroduction to Reverse Engineering Windows Memory Management System Assembly Language BasicsApplication Debuggers & DissemblersApplication Cracking, Patching & Keygenning

F Network Attacks

l

l

l

l

Introduction to Crypto TechniquesTypes of Encryptions & Hashes Crypto AnalysisInsecure Cryptographic Storage

F Cryptography

l

l

l

l

l

l

Introduction to X86 ArchitectureMemory Analysis Shell Code CompilationVanila ExploitStack Overflow Egg Hunting

F Buffer Overflow Attacks

l

l

l

l

l

l

l

l

l

l

l

l

l

OS DetectionOpen Port & Service DetectionMetasploit Framework ArchitectureVarious Interfaces of Metasploit FrameworkBasic TerminologiesVulnerability AnalysisExploitation on Various Platforms Evade Anti-Virus & FirewallsMetasploit Scripting Create Custom API to test Window Security Configure Nmap with Metasploit FrameworkSETWays to deliver Expolits

F Metasploit Framework

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

ethicalhacking

Accreditation

Indian Institute of Technology KharagpurHkkjrh; izkS|ksfxdh laLFkku [kM+xiqj

Certification partner

Locate your CenterDelhi (Head Office) | Hauz Khas Near (IIT Delhi) Tilak Nagar | Navi Mumbai

Patna | Lucknow | Aurangabad | Jaipur | Bangalore | Bharatpur | Ajmer | HyderabadChennai | Kolkata | Rajahmundry | Siliguri