Professional Documents
Culture Documents
ETHICAL HACKINTG & CYBER SECURITY
TRAINING.
TOPICS COVERED IN ETHICAL HACKING & CYBER SECURITY TRAINING.
Course Curriculum
Module I
Module II
Fake Mail
Further practical
DNS Spoofing
Man In The Middle Attack
Cross site scripting attack
WIFI Hacking
These hackers typically scan for weaknesses, prioritize targets, test entry points, as
well as create a strategy which can best put their resources in a great advantage. After
the security measures are assessed, the ethical hacking company can then prescribe
re-mediation advice for the business’s unique security objectives, capabilities, and IT
environment.
The business entity can do fine-tuning of their security tools, make adjustments on
their security policy and efforts, as well as identify any required training.
This training will significantly benefit security officers, network administrators,
firewall administrators, auditors, security professionals, site administrators,students
and anybody who is concerned about the integrity of their network infrastructure.
MODULES 1
MODULES 2
Cross site scripting(XSS) manual, automated and Security
DDOS attacks, buffer and stack overflow
Mobile E-hacking and security
Spamming attacks
Concept of ATM security and hacking
Live demonstration on dedicated server - (How Hackers Hack)
USB hacking technique / switch blades
Credit card and debit card hack attacks
Protocols vulnerabilities and exploiting through sniffers
Email hacking and security
Virus, trojan, worms and security
Reverse engineering and security
Wi-Fi security
Physical security threats
Understanding ISO 27001 standards
Cyber laws in India