Signup as a Tutor

As a tutor you can connect with more than a million students and grow your network.

Enquire

Submit your enquiry for Information Security and Ethical Hacking

Please enter valid question or comment

Please select a category

Please enter your name.

Please enter valid Phone Number

Please enter the Pin Code.

By submitting, you agree to our Terms of use and Privacy Policy

Connect With Anoop

You have reached a limit!

We only allow 20 Tutor contacts under a category. Please send us an email at support@urbanpro.com for contacting more Tutors.

You Already have an UrbanPro Account

Please Login to continue

Please Enter valid Email or Phone Number

Please Enter your Password

Please Enter valid Password or OTP

Forgot Password? Resend OTP OTP Sent

Sorry, we were not able to find a user with that username and password.

We have sent you an OTP to your register email address and registered number. Please enter OTP as Password to continue

Further Information Received

Thank you for providing more information about your requirement. You will hear back soon from the trainer

Share

Information Security and Ethical Hacking

Information Security and Ethical Hacking

Gazipur, Delhi

10,000

No Reviews Yet
0 Interested

About the Course


We all know how to use Computer and Internet. We use Facebook and it is a way of living now. But we don't know why our computer gets hacked. Why or how some one else hijacks our Facebook account and misuses it. Do you know there is a way to log into your computer by without even entering the username and password. No matter where you are located you are tracked by the cyber security. BUT HOW....?????
Give me a call. We will have a small discussion and I will tell you.

Topics Covered

* Need For Information Security
* Use of Virtual Machines and VMWare
* Foot Printing and Reconnaissance
* Scanning Networks
* Enumeration
* System Hacking
* Trojans & Backdoors
* Viruses and Worms
* Sniffers
* Social Engineering
* Denial Of Service
* Session Hijacking
* Hacking Web Servers
* Hacking Web Apps
* SQL Injection
* Wireless Hacking
* Evading IDS, Firewalls & Honeypots
* Buffer Overflow
* Cryptography
* Basics Pen Testing

Who should attend

Students
Information Security Professionals
Auditing Professionals
Network Professionals
Office Goers
House Wives
Any one who uses a computer

Pre-requisites

How to operate a computer and use internet

What you need to bring

You need your own laptop

Key Takeaways

Learn about Information Security
Learn about Hackers and Hacking
Hack your Friends' Facebook (with their permission..!)
Learn about Internet and Websites
Learn vulnerabilities in each websites
Learn Penetration Testing
Learn some cool tricks to flaunt..!!!
Content
Reviews
There are no Reviews yet. Be the First to Review
Questions and Comments

Thousands of experts Tutors, Trainers & other Professionals are available to answer your questions

Comment ?

Questions Guidelines

  • Start your question with simple statements like "what", "when", "where", or "how".
  • Ensure your question or answer is not offensive or insensitive - it may be voted down or banned.
  • Please provide as much detail as possible as this will allow our members to better understand and respond to your question.
  • Take some time to categorize your question. This will greatly help other users find the question.


You can add upto 6 Images

Ask


There are no Reviews yet. Be the First to Review

Date and Time

Not decided yet.

cash back100% Money Back Guarentee

About the Trainer

Anoop Narayanan picture

Anoop Narayanan

Trainer with more than 4 years of experience in Information Security


A trainer with experience in training Indian Airforce, Siemens and CMS Infosystems.
Seats Left-

Students Interested 0

Course Id: 10899