Specialized Pentesting Courses | Home | About | Contact | Blog | Glossary         

 QUICK CONTACT

NAME :
EMAIL :
PHONE :
COUNTRY :
STATE :
SUBJECT :
COURSE :
MESSAGE :
  
   







Download in PDF:    This Course   

Security Foundation Course

This course will make you familiar with Basic Ethical Hacking concepts. This will help you prepare for more advance course such as CEH. If you are completely new to the filed of security this is the best course you can take



Training we offer:

Course Name  Security Foundation Course 
Course Duration  15 days 
Course Fee  Rs.5000
Course Mode  Training Academy or On-site Training or E-Learning
Prerequisite  Basic Computer Knowledge 



Security Foundation Course Syllabus

Introduction to Security and its need

Internal Intrusion and External Intrusion techniques

Foot Printing
  • IP address Tracing
  • Honey pot and Bogus DNS detection
  • Tracing of Packet Filtering Devices
  • Tracing of Security Devices
  • DNS Tracing

  • Social Engineering

    Email Tracking
  • With the help of Mail Tracker
  • To find the location of email generated

  • Scanning
  • Port Scanning
  • Vulnerability Scanning

  • System hacking
  • Hacking through OS level bugs
  • Hacking through Application level bugs

  • Exploits
  • Web Server hacking
  • Router Hacking
  • Wireless Hacking

  • Password Cracking
  • System password cracking (hash and encryption methods)
  • Email password hacking

  • Sniffing
  • ARP Poisoning
  • Man in the Middle Attacks
  • Capturing of passwords on the network
  • Breaking into https connections

  • Malwares
  • Viruses, Worms & Trojans
  • Rootkits, Dialers
  • Spywares, keyloggers & Trojans

  •   Metasploits
  • Access to internal networks through firewalls
  • Tunneling Method and Bypass

  • Phishing & Pharming

    Linux Hacking
  • Using Backtrack 5
  • Advanced Security tools

  • Covering Traces & Identity

    Level 1 Security Practices

    Understanding The Security, Functionality and Ease of Use Triangle

    Countermeasures:
  • Security Auditing & Penetration Testing
  • Patch Management
  • Comparison between different Security Suites

  • Comparison between UTMs like Sonicwall, Fortinet, Juniper, Checkpoint, Cisco, Cyberoam & Netasq

    Introduction to Virtualization and Cloud Computing !!!






    Back to top





































































































    ARIZONA Infotech © Copyright 2017 . All Rights Reserved