loading......

coming soon

Coming Soon

We are in process of building the inventory of good professionals in this category

Got it!

Where do you need ?

location

Please select a Location.

Enquire

Submit your enquiry for Profesional Ethical Hacking and Cyber Security

Please enter valid question or comment

Please enter your name.

Please enter valid email

Please enter valid Phone Number

Please enter the Pin Code.

By submitting, you agree to our Terms of use and Privacy Policy

Connect With Maulik

You have reached a limit!

We only allow 20 Tutor contacts under a category. Please send us an email at support@urbanpro.com for contacting more Tutors.

You Already have an UrbanPro Account

Please Login to continue

Please Enter valid Email or Phone Number

Please Enter your Password

Please Enter valid Password or OTP

Forgot Password? Resend OTP OTP Sent

Sorry, we were not able to find a user with that username and password.

We have sent you an OTP to your register email address and registered number. Please enter OTP as Password to continue

Further Information Received

Thank you for providing more information about your requirement. You will hear back soon from the trainer

Share

Profesional Ethical Hacking and Cyber Security

Profesional Ethical Hacking and Cyber Security

Online Instructor led Course

Platform: Skype

10,000

No Reviews Yet
0 Interested

About the Course


Learn Cyber Security,Ethical Hacking,Linux and Networking

Topics Covered

Ethical Hacking

Cyber Ethics-Hacking Introduction
Information Gathering 1
Information Gathering 2
Scanning 1
Scanning 2
Google Hacking Database
Virus, Worms – Virus Analysis
Trojans & Backdoors
Sniffers & keyloggers
Proxy Servers & VPNs
Social Engineering
Email, DNS, IP spoofing
HoneyPots
System Hacking & Security
Bots,Botnets & DOS
Cryptography

Website Hacking & Security

Vulnerability Research
SQL Injection 1
SQL Injection 2
XSS Attacks & Countermeasures
LFI/ RFI Attacks & Countermeasures
Information Disclosure Vulnerabilities
Buffer Overflow Attacks 1
Buffer Overflow Attacks 2
Session Hijacking Attcks
Hacking Web Servers
Vulnerability Assessment & Penetration Testing
Exploit Writing
Secure Coding Practices

Mobile & Wireless Security

Wireless Hacking & Security
SMS Forging & Countermeasures
VoIP Hacking & Countermeasures

Information & Application Security

Firewalls, IDS, Evading IDS
Assembly Language Basics
Metasploit Framework
Reverse Engineering & Countermeasures

Cyber Crime Investigation

Introduction to Cyber Crime Investigation
Handling Real World Cyber Crimes
Investigating Emails

Cyber Forensics & Cyber Law

Understanding Cyber Forensics
Cyber Law

Who should attend

Students
IT Students & Professionals
Web Developers
Network Engineers
System Administrators
Law Professionals
Banking & finance Sector.

Pre-requisites

Basic HTML,C,C++,php
JavaScript
Basic knowledge of Internet surfing
last Your Briliant mind

What you need to bring

Laptop/Desktop
Internet High-Speed Requrement
Skype
Team-VIewer"

Key Takeaways

Be a Professional Hacker
Learning Different Knowledge
Security analyst
Web pentester
HACK YOUR SELF FIRST BECAUSE WE BELIEVE IN SECURITY
Gallery

Ethical Hacking and Information...


Reviews
There are no Reviews yet. Be the First to Review
Questions and Comments

Thousands of experts Tutors, Trainers & other Professionals are available to answer your questions

Comment ?

Questions Guidelines

  • Start your question with simple statements like "what", "when", "where", or "how".
  • Ensure your question or answer is not offensive or insensitive - it may be voted down or banned.
  • Please provide as much detail as possible as this will allow our members to better understand and respond to your question.
  • Take some time to categorize your question. This will greatly help other users find the question.


You can add upto 6 Images

Ask


Ethical Hacking and Information...


There are no Reviews yet. Be the First to Review

Date and Time

Not decided yet.

About the Trainer

Maulik Kotak picture

Maulik Kotak

Diplome+B.Tech+CEH+CCNA+Web Pentester


Now currently I am working as business management executive Security Analyst and also php developer.professional with expertise in Information Security and related policies; Deep understanding of IT domain/Technology with focus on delivering business solutions.
Persuasive communicator with exceptional relationship management skills with the ability to relate to people at any level of business and management; highly ethical, trustworthy and discreet.

Specialists : Session hijacking,Advance SQL Injection,cross site scripting,Social Engineering,Ajax injection,LDAP injection,CSRF,Brute force attack,user Enumeration,i-fame busting,Remote Command execution,SEO
Seats Left-

Students Interested 0

Course Id: 23056