Professional Documents
Culture Documents
Concepts of Hacking
o Ethical Hacking and Information Security : Definition
o Who is Hacker (Security Expert)?
o How to become a Hacker?
o Why do we need hackers?
o Case Studies: Hackers Methodology and Innovation
o Difference between hacker and cracker?
Types of Hackers(As per Knowledge)
o Coders
o Admins
o Script Kiddies
Types of Hackers(As per working)
o White Hat Hackers
o Black Hat Hackers
o Grey Hat Hackers
o Hacktivists (Cyber Terrorists)
How to secure yourself from Attackers
How to stop Attackers
Indian Cyber Law
o Real Scenario
o Types of Cyber Crime
o Indian IT Act 2000
Google Hacking
What is an E-mail?
Working of E-mail?
Travelling of an E-mail
Email Server
o Definition
o Usage
E-mail Forgery
o Anonymous Mailing techniques
Using Websites
Using Self Developed PHP Script
o E-Mail Bombers
Security to Anonymous Mailing
o Can User Stop Receiving Fake Mile?
o Tracing an attacker
o Proving a Fake Mail
Attacks on E-mail Password
o Attackers Anatomy and Psychology while hacking the passwords
o Technical Attacks
Using Fake Websites: Phishing
Key loggers
o Non-Technical Attacks
Shoulder Suffering
Dumpster Diving
Social Engineering
Securing the E-mail Passwords
o Password Policies
o Benefits of SSL Certificates for a User
o Anti-Trust Policies
Email Forensics
o E-mail Header Analysis
o WhoisLookUp Query
o Tracing a Sender of an E-Mail
Tracing Sender’s IP Address
Tracing Sender’s Location
Inside Threats: Operating System Hacking and Security