DMCO COURSE CONTENT
- Intro with New Hacking world
- Role of access controls
- Information gathering
- Access criteria
- Linux access controls
- OSI layers
- IPS overview
- Intro with network and internet
- Email and IP tracking
- Vulnerabilities in Network services
- Anonymity
- Firewall and Ids
- Dos attacks and DDOS attacks
- Hacking life cycle
- Introductions with network scanning
- Anonymous software
- Virus ,worm
- Trojan
- Botnet (root kits)
- Spywares
- Key loggers,crypters
- Secure your system
- OWASP top 10 vulnerabilities
- Sql injections Part 1
- Sql injections Part 2
- Cross site scripting
- Web hacking with tools
- Practises
- WEP cracking
- WPA cracking
- Intro with Backtrack
- Overview of mobile communications
- Sms forging
- Call forging
- Mobile phone hacking
- Type of telephonic
- Protocols of VOIP
- Loopholes in VOIP
- Basics of BT
- Tools and applications information
- Honey pots and Honeynet projects
- White Hat Testing
- Black Hat Testing
- Exploits
- Social Engineering (Hacking Human Mind)
- Computer Forensics
- GSM & 4G Security
- Cyber law / IT act (Amendments)
- HTML,DHTML
- CCC,DREAMVIEWER
- JAVA SCRIPT (CODING)
- E-SERVICE & E-GOVERNANCE
Looking For A First-Class IT Training Institute In Ahmedabad?
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.