Cyber Security

  • Introduction
  • Hacker & Cracker
  • Attacker & Victim
  • Type of Security
  • File Securing Techniques
  • ASCII Code – Making a Folder Invisible
  • introduction
  • Vpn Basics
  • Proxy Servers
  • Mac ID Changer
  • Staying Anonymous
  • Web Proxy
  • IP Proxy
  • Tor Browser
  • Introduction
  • Types of Foot-Printing
  • Methods
  • Using Search Engine
  • IAN, Allotment of IP Address
  • IPV4 & IPV6
  • IP Address – Basic, Detacting
  • Ping & Ping Sweep
  • Tools (ping Sweeping)
  • Nmap, Superscan
  • Trace Router
  • Detecting Victim’s OS
  • Detacting Firewall
  • Countermeasures
  • ICANN, Register, Registry, Registrant
  • Top Level Domains
  • Lifecycle of gTLD
  • Whois Info
  • Domain And Hosting Panels
  • Global DNS Resolution
  • Email Threats
  • Hacking Mailing Clients
  • Email Spoofing
  • Email Spamming
  • E-Bomber Tools
  • Email Headers
  • Spamhaus Projects
  • MX Toolbox
  • Finding Details of Recipient
  • Countermeasures
  • Introduction
  • Password Cracking TEchniques
  • Dictionary Based Attack
  • Brute Force attacks
  • Cracking Any files Password
  • Countermeasures for Users and System Administators
  • Introduction
  • Basic Sniffing
  • Windows Based Sniffing
  • Introduction
  • How to control victim’s computer using Trojans
  • Binding Trojans with another file
  • Undetection process of Trojans from Antivirus
  • Removal of Trojans from your computer
  • Analysis of Trojans/Virus
  • Introduction to viruses
  • How they work?
  • Methods use to hide themselves and replicate themselves
  • Introduction to worms
  • Causes of worms
  • Method used to replicate themselves
  • Role of antivirus product and goat file
  • Introduction
  • Perform Attack
  • crash System
  • Introduction
  • Creating Phishing Pages
  • Anti-Phishing Tools
  • Countermeasures
  • How to detect phishing pages.
  • Detecting Phishing Crimes
  • Password cracking
  • Privilege escalation
  • Tools to aid in system hacking
  • Understanding rootkits
  • Clearing traces
  • Countermeasures
  • Introduction
  • Laws of social engineering
  • Types of social engineering
  • Public-key Cryptography
  • Working of Encryption
  • Digital Signature
  • RSA & Example of RSA Algorithm
  • RC4, RC5, RC6, Blowfish
  • Algorithms and Security
  • Tools that aid in Cryptography
  • Understanding how Google works
  • Google basic operators
  •  Google advanced operators
  • Automated Google tools
  • How to use Google to find the desired website
  • How Google can aid in searching vulnerable website
  • Introdution
  • Software Based SQLi
  • Script Based & Manually
  • Database Hacking
  • Web Application Overview
  • Web Application Attacks
  • SQL injection attacks
  • Attacking Against SQL Servers
  • SQL Server Resolution Service (SSRS)
  • SQL Injection Automated Tools
  • MSSQL Injection
  • Blind SQL Injection
  • Preventing SQL Injection Attacks
  • Introduction to XSS & Types of XSS
  • XSS worm and XSS shell
  • Cookie grabbing
  • Countermeasures
  • Introduction to this framework
  • Getting hands on commands
  • Hacking windows with metasploit
  • Hacking Linux with metasploit
  • Web Hacking through Metasploit
  • Burp Interceptor
  • Burp Target
  • Burp Spider
  • Burp Scanner
  • Burp Intruder
  • Burp Repeater
  • Burp Decoder
  • Burp Sequencer
  • Burp Extender
  • Burp App Store- Introduction
  • Live Hacking Through Burp
  • Owasp Security
  • Owasp 10
  • ZAP 
  • Find Bug on Website
  • Generate Report
  • Submission
  • Wireless Protocols
  • Wireless Routers-Working
  • Attacks on Wireless Routers
  • Cracking Wireless routers password(WEP)
  • Securing routers from Hackers
  • Countermeasures
  • RAT
  • Metasploit
  • Call Spoofing
  • Root & Jail Braking Basics
  • Hacking Apps Data
  • CountermeasuresInt
  • Cyber Forensics
  • Data Recovery
  • Understanding Cyber Forensics
  • Hands on Cyber Forensics on Hard Disks
  • Preparing Cyber Forensics Reports
  • introduction
  • 419 Scam
  • Spamming Email ID
  • Spamvertised Domain
  • Spamvertised Domain
  • Phishing Websites
  • Malware Website
  • Inappropriate Content on Website
  • Who is Inaccuracy
  • Privacy Protected Domains
  •  Cyber Stalking
  • Fake Profiles
  • Child Pornography
  • Credit Card Frauds
  • Types of Cyber Crimes
  • Reporting Cyber Crimes & Incidence response
  • Introduction to IT Act 2000 & its sections
  • Flaws in IT ACT,2000
  • Investigation Methodologies & Case Studies
  • Different Logging Systems.
  • Investigating Emails ( Email Tracing)
  • Ahmedabad Bomb Blasts Terror Mail case study
  • Investigating Phishing Cases
  • Investigating Data Theft Cases
  • Investigating Facebook Profile Impersonation Cases
  • Investigating SMS & Call Spoofing Cases
  • Blogs & Websites
  • Adsense & Adwords
  • SEO & Traffic Generators
  • Alexa & Google PR Improvement
  • Affiliate Marketing
  • Increasing Likes & Followers On Social Media Sites
  • Make good Project
  • Complete 2 Hour Exam
Loading
Privacy Policy