Cyber Security Expert ++
Advance Ethical Hacking(Cyber security expert)
Duration : 1 Year Fee : 1,00,000/-
Payment Mode : 50% Advance payment
1: -Level One
Introduction To Networking
Basics of Networking
Concepts of LAN and WAN
Introduction to Information Security and Hacking
Intro to Ethical Hacking
History of Hacking
Various steps of Hacking
Database and Information Gathering
Passive and Active Foot Printing
Domain Information
People Information Gathering
Working on various Tools
Scanning Ports
Operating System Guessing
Open Ports
Service Guessing
TCP/UDP Scanning
Using Google for Hacking
Advance Searching Option
Using Various Google Operators
Searching Confidential Information
Searching Database Information
Finding Email ID\\\'s and Password
Methods of Attacks
Ping of Death
Smurf
Tear Drop Attack
DOS/DDos Attack
RFI/LFI Attack
Other Attacks
Malwares
Virus Creation
Worm Creation
Trojan Creation
Spyware Creation
Introduction to bots and root kit
Window Hacking Techniques
User account Cracking
Windows Tricks
Registry Hacking
Linux Hacking Techniques
Intro to Linux
Basics of Linux Operating System
Cracking the Root Account
Introduction to Sniffing
Hacking in LAN
Packet Sniffing
Passive and Active Sniffing
Session Hijacking
Hijacking in LAN
Hijacking in WAN
Side Jacking
Cookie Editor
2 :- Level Two
Email Hacking
Email Tracing
Fake Email ID Creation
Phishing (Normal and Advance)
Into to SQL Injection
What is SQL?
Normal SQL Injection
Advance SQL Injection
Working with SQL Tools
Cross site Scripting
Intro to XSS
Types of XSS
Working on popular websites
VAPT
Finding the Vulnerabilities
Exploiting the Loopholes
Website Penetration Testing
Network Penetration Testing
Stenography
Normal Stenography
Encrypted Stenography
Cryptography
SKCS
PKCS
Algorithms of Cryptography
Wireless Cracking
Introduction of WIFI
Cracking WEP
Intro WAP Cracking
Firewall, IDS and IPS
Implementing Firewalls
Working with IDS and IPS
Bypassing Methods
Intro to Honeypots
Intro to Honey Pots
Software Honey Pot
Catching Criminals
Buffer overflow Attack
Intro to Buffer overflow
Use Buffer Attack in Buffer overflow
Heap and Stack
Reverse Engg.
Intro to Reverse Engineering
Cracking Softwares
Manual Cracking
Cyber Laws
HTML
About Html and version
heading and paragraphs
Formatting
Links and images
Tables and Lists
Marques Iframes
Form tag and Form tag elements
Color codes
sample webpage
Javascript
Javascript Introduction
Variable in Javascript
Javascript operator
if else / switch Statement
Loop in Javascript
Function
Array
Error Handling
Event Handling
Javascript Objects
Window Object
Document Object
Date Object
String Object
Math Object
Array Object
Custom Object
Photoshop
Creating Logo
Layer Effects
3D Effects with Photoshop
Pattern
Web Pattern
Web Ad
Resulation Setting
Convert Image to Html
Cuting Picture
Template
Creating Full Web Page
Gif Animation
Dreamweaver
External CSS
Internal CSS
Div Tag (Tabless Design)
Table based Designing
Internal Div
Div Layout
External Div
Form Genrating
Vallidation
Behaviour
Jquery
Syntax and Selectors
Events
Effects
Callback
HTML
CSS
CSS
External CSS
Internal CSS
Div with Css
Class & ID with CSS
Links/Table with CSS
Form with CSS
PHP & Mysql
About Server and php version
Download and installing php
Variable in php
if else / switch Statement
Form Tag
Loop
Array
Function
About Mysql Database
Mysql Insert Query
Mysql Select Query
Mysql Delete Query
Mysql Update Query
Session
Cookies
Upload/Download
File/Directory
Send mail
Opps Basic Concepts
Class & Object
Constructor & Destructor
Inheritance
Database with OOPS
PHP String Function
PHP Array Function
PHP Mysql function
PHP Date function
PHP Variable function
PHP File/Directory function
PHP Math function
PHP Misc function
Javascript
About Javascript and version
Variable in Javascript
Javascript operator
If else statement
Switch statement
While Loop
Do while Loop
For Loop
Function
Array
Error Handling
Event Handling
Javascript Objects
Window Object
Document Object
Date Object
String Object
Math Object
Array Object
Custom Object
Ajax
What is Ajax
Advantage and disadvantage of Ajax
About XML HttpRequestObject
Webpage status theory
Ajax and PHP
Work with SetRequestMethod
Some Ajax examples
Enquiry Form
Image gallery
Check user existence
Search Engine Basic
Internet.
Website
Portals
Search Engines
Directories
Search Engines V/S directory
Major search engines and directories
Page Rank
Google Sandbox effect
Website Architecture
Domain
Hosting
How the Search Engine works
Website designing. (Basics)
Keywords Research and Analysis
SWOT Analysis of Website
Target segmentation
Keyword research
Competitor analysis
Finding Appropriate Keywords.
Off Page Optimization
Submission to search engines
Local marketing
Directory Submission
Blog Submission
Blog Comments
Article Submission
Free Classifieds
Forums
Press Releases
Video optimization
Link Building
How to promote home page
Promoting Subsequent pages of the website
Blog Comments
On Page Optimization
Meta Tags
Description
Keywords
Creating Robots file
Header and footer
Creating sitemaps
Optimizing Seo content
Image tag optimization
Canonical / 404 Implementation
Keyword Density Analysis
Anchor Text
URL renaming/re-writing
Google webmaster tools
SEO Tools
Google Keyword Tool
Word Tracker
Keyword Spamming
Keywords Position Checker
Keyword Density Checker
Google Analytics
Note: 100% Job Guarantee
For Details Contact
9911097721
NEXT TRAINING BATCH
PHP & Mysql
Jan 21 2013
SEO & SMO
Jan 21 2013
Webdesigning
Jan 21 2013
.Net
Jan 21 2013
Asp.net with C#
Jan 21 2013
Live project(PHP)
Jan 21 2013
Ethical Hacking
Jan 21 2013