Ethical Hacking

by Genius Computer Claim Listing

In the computer security context, a security hacker is someone who seeks and exploits weaknesses in a computer system or computer network.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Genius Computer Logo

img Duration

2 Months

Course Details

In the computer security context, a security hacker is someone who seeks and exploits weaknesses in a computer system or computer network.

 

Course Contents:

  • Introduction
  • Networking & Basics
  • Foot Printing
  • Google Hacking
  • Scanning
  • Windows Hacking
  • Linux Hacking
  • Trojans & Backdoors
  • Virus & Worms
  • Proxy & Packet Filtering
  • Denial of Service
  • Sniffer
  • Social Engineering
  • Physical Security
  • Steganography
  • Cryptography
  • Wireless Hacking
  • Firewall & Honey pots
  • IDS & IPS
  • Vulnerability
  • Penetration Testing
  • Session Hijacking
  • Hacking Web Servers
  • SQL Injection
  • Cross Site Scripting
  • Exploit Writing
  • Reverse Engineering
  • Email Hacking
  • Incident Handling & Response
  • Mobile Phone Hacking
  • Ahmedabad Branch

    106/First Floor, Saman Complex, Above Sun Photo, Nr. Karnavati Shoes Market, On the way from Mansi Circle to keshav baug, Satellite, Ahmedabad

Check out more CEH (Certified Ethical Hacker) courses in India

Fita Training Logo

Ethical Hacking Course

FITA Academy’s Ethical Hacking Course in Chennai provides extensive learning on various security processes and techniques, such as network scanning, cryptography, vulnerability detection, penetration testing and system hacking with real-time projects and examples.

by Fita Training [Claim Listing ]
Gencor Logo

Ethical Hacking

Starting from the Ground level Security Essentials, this course will lead you through Cryptography, Computer Networks & Security, Application Security, Data & Endpoint Security, idAM (Identity & Access Management), Cloud Security, Cyber-Attacks and various security practices for businesses.

by Gencor [Claim Listing ]
IIS (Institute of Information Security) Logo

Certified Ethical Hacker Version 12 (CEH V12)

Certified Ethical Hacker training certifies a security professional as an Ethical Hacker and Penetration Tester. CEH training certifies the abilities of an ethical hacker to guard against the weaknesses and vulnerabilities of network infrastructure and illegal hacking.

by IIS (Institute of Information Security) [Claim Listing ]
ATEES Industrial Training (AIT) Logo

Ethical Hacking Course (Advance)

Ethical hacking is the legal attempt to gain unauthorised access to a computer system, app, or data. Copying the strategies and actions of hostile attackers is an ethical hack.

by ATEES Industrial Training (AIT) [Claim Listing ]
Shalom Academy Logo

Ethical Hacking

DOS commands are the primary way through which one can operate the system directly. Hence students will learn about the high level DOS commands to control/secure the system from cyber crimes and some basic virus programming will be taught to resolve it.

by Shalom Academy [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy