Sponsered links

Contact for Price

3393 Views

Summer Training & Project Training on Ethical Hacking in Dehradun- Appin Technology Lab - Dehra Dun

buysellify.com 27/5/2014 01:08 PM   ||   buysellify.com Ballupur, Dehra Dun, Uttaranchal, India
Appin Technology lab offers IT Security & Ethical Hacking for students who want to enhance their knowledge in this field. It is a 6 months based program which equips students with the rigorous training of this program and teaches students with the principles and practices related to it. It covers all the fundamental aspects of the subject and provides an in-depth knowledge of the subject.
Frontrunner Diploma Program
IT Security and Ethical Hacking
MODULE 1: INTRODUCTION TO INFORMATION SECURITY AND ETHICAL HACKING
1.1 INFORMATION SECURITY AND HACKING COMBO
1.2 ESSENTIAL TERMINOLOGIES
1.3 SECURITY AND ITS NEED
1.4 WHY IS IT SECURITY NECESSARY?
1.5 IT SECURITY SERVICES LIFE CYCLE
1.6 OPERATING SYSTEM BASICS
1.7 DATA COMMUNICATION BASICS
1.8 BASICS OF COMPUTER NETWORKING
1.9 OSI AND TCP/IP MODEL
1.10 NETWORKING DEVICES
1.11 CYBER THREATS AND ISSUES
1.12 AN APPROACH TOWARDS HACKING
1.13 PROTECTING YOUR COMPUTER AND NETWORK
1.14 SOFTWARE SECURITY FOR PORTABLE COMPUTERS
1.15 DEFENDING AGAINST SOCIAL ENGINEERS AND PHISHERS
1.16 PROTECTING YOUR PASSWORD AND LOGGING ON SECURELY
1.17 SELECTING TOOLS
1.18 SAFETY RULES
MODULE 2: OS AND SERVER SECYRITY
UNIT 1: DESKTOP & SERVER SECURITY
1.1 INTRODUCTION
1.2 WHAT IS REGISTRY?
1.3 REGISTRY EDITING
1.4 BACKUPS AND RECOVERY
1.5 POLICY
1.6 .INI FILE VIRTUALIZATION
1.7 WINDOWS 9X OPERATING SYSTEMS
1.8 STEPS TO CREATE REGISTRY VALUES
1.9 SOME OF THE EXAMPLES TO CHANGE THE REGISTRY DEFAULT SETTINGS
1.10 NT SECURITY
1.11 SECURITY ARCHITECTURE COMPONENTS
1.12 INTRODUCTION TO SECURING IN NT BOX
1.13 BACKUPS
1.14 WINDOWS VULNERABILITIES AND THREATS
1.15 HOW TO DETERMINE IF YOU ARE AT RISK? USE ANY VULNERABILITY SCANNER
1.16 HOW TO PROTECT AGAINST THE WINDOWS SERVICES VULNERABILITIES
UNIT 2: LINUX SECURITY
2.1 INTRODUCTION: LINUX BASED
2.2 BENEFITS OF LINUX
2.3 HOW SECURE SHOULD MY LINUX BE?
2.4 HOW TO SET UP A FIREWALL UNDER LINUX?
2.5 WINDOWS VS. LINUX DESIGN
2.6 REALISTIC SECURITY AND SEVERITY METRICS
2.7 CERT VULNERABILITY NOTES DATABASE RESULTS
MODULE 3: WEB SECURITY
UNIT 1: LAN SECURITY
1.1 THE INITIAL INTERNETTING CONCEPTS
APPIN TECHNOLOGY LAB 2010
1.2 INTRODUCTION TO LAN
1.3 WHY LAN SECURITY IS IMPORTANT
1.4 LAN/WAN COMPONENTS
1.5 TOPOLOGY
1.6 PROTOCOLS
1.7 THREATS OF LAN
1.8 INAPPROPRIATE ACCESS TO LAN RESOURCES
1.9 DISCLOSURE OF DATA
1.10 UNAUTHORIZED MODIFICATION OF DATA AND SOFTWARE
1.11 DISCLOSURE OF LAN TRAFFIC
1.12 SPOOFING OF LAN TRAFFIC
1.13 DISRUPTION OF LAN FUNCTIONS
1.14 SECURITY SERVICES AND MECHANISMS
1.15 HACKING MAC ADDRESS
1.16 NETWORK SCANNERS
1.17 TYPES OF SCANNING
1.18 SCANNING METHODOLOGY
UNIT 2: FIREWALL SECURITY
2.1 FIREWALLS
2.2 WORKING OF FIREWALL
2.3 TYPES OF FIREWALL
2.4 PROXY SERVER
2.5 WHY PROXYING?
2.6 WORKING OF PROXY SERVER
2.7 ADVANTAGES OF PROXYING
2.8 DISADVANTAGE OF PROXYING
2.9 APPLICATIONS OF FIREWALL
UNIT 3: INTERNET SECURITY
3.1 INTRODUCTIONS
3.2 SECURITY ATTACKS AND SECURITY PROPERTIES
3.3 THREATS FACED ON INTERNET
3.4 INTRODUCTION TO IP ADDRESSES
3.5 FINDING IP ADDRESS OF A REMOTE SYSTEM
3.6 HIDING YOUR IDENTITY: ANONYMOUS SURFING
3.7 PROXIES SERVERS
3.8 WHAT IS A SOCKS PROXY SERVER?
UNIT 4: E-MAIL SECURITY
4.1 INTRODUCTION
4.2 HISTORY OF E-MAIL
4.3 EMAIL ADDRESSES
4.4 HOW E-MAIL WORKS?
4.5 VARIOUS MAIL SERVERS
4.6 E-MAIL PROTOCOLS
4.7 ANALYSIS OF EMAIL HEADERS
4.8 EMAIL TRACKING
4.9 IP TRACKING USING EMAIL
4.10 SPAMMING
4.11 WAYS TO PREVENT SPAM
4.12 HOW TO STEAL DATA FROM AN E-MAIL?
4.13 E-MAIL EXCHANGE SERVER SECURITY
4.14 VIRUS PROTECTION
4.15 RPC OVER HTTP
4.16 PROTECTING FRONT-END SERVERS
4.17 KEEP EXCHANGE SERVER UP-TO-DATE
APPIN TECHNOLOGY LAB 2010
4.18 CYBER LAWS REGARDING SPAMMING
4.19 SECURITY POLICIES
MODULE 4: VAPT
UNIT 1 : INTRODUCTION
1.1 IMPORTANT TECHNICAL TERMS
1.2 INFORMATION GATHERING
1.3 SCANNING AND FINGERPRINTING
UNIT 2 : VULNERABILITY ASSESSMENT
2.1 VULNERABILITIES
2.2 VULNERABILITY ASSESSMENT
2.3 APPROACHES TO DATA SECURITY
2.4 PROTECTIVE MEASURES
2.5 GENERAL APPROACH
2.6 FOOTPRINTING
2.7 VULNERABILITY ASSESSMENT: THE RIGHT TOOLS TO PROTECT YOUR CRITICAL DATA
2.8 TYPES OF VULNERABILITY ASSESSMENT
2.9 THE CHALLENGES OF VULNERABILITY ASSESSMENTS
2.10 APPIN TOOL FOR VULNERABILITY ASSESSMENT
2.11 TOOLS FOR VA
When you call, don't forget to mention that you found this ad on buysellify.com
Useful information
buysellify.com Avoid scams by acting locally or paying with PayPal
Never pay with Western Union, Moneygram or other anonymous payment services
Don't buy or sell outside of your country. Don't accept cashier cheques from outside your country
This site is never involved in any transaction, and does not handle payments, shipping, guarantee transactions, provide escrow services, or offer "buyer protection" or "seller certification"
Add to Favourites
buysellify.com Appin
buysellify.com 08267000800

Like Us On Facebook

buysellify.com Email to Seller :

Sponsored links

Login Now
* Email ID :
* Password :
Forgot your password? New User? Register Now