Ethical Hacking

Module One
Introduction to Computer System
Networking Concepts
.Encounter with Network Devices
.Protocols
Cyber Laws ( INDIA) and Hacking Laws
Module Two
Introduction to Hacking
Google Hacking.
Footprinting.
Scanning.
Enumeration.
Module Three
Trojan Horse and Backdoors
Virus and Worms
Denial of service
Proxy and packet filtering
Cryptography, IDS, IPS, Firewall
Module Four
System Hacking
.Windows/Linux Hacking
Sniffers.
Phishing.
Session Hijacking.
Module Five
SQL Injections
PHP Injections
Module Six
Hacking Webserver
Web-based Hacking technique
Hacking Wireless network
Email Hacking
Bluetooth and Mobile hacking