ETHICAL HACKING COURSE

    1. INTRODUCTION TO COMPUTERS. ( Big Story Small Discussion)
    2. Networking Concepts.
    3. Encounter with Network Devices.
    4. Protocols
    5. Introduction to UNIX/Linux Environment.
    6. Cyber Laws ( INDIA)
    7. Introduction to Hacking
    8. Google Hacking
    9. Footprinting.
    10. Scanning
    11. Enumeration
    12. Email Analysis and Spam Mails.
    13. Proxy Servers
    14. Spoofing
    15. Banner Grabbing
    16. System Hacking
    17. Web Based Password Hacking
    18. Social Engineering
    19. DOS & DDOS
    20. Sniffers
    21. Servers
    22. Hacking WEB SERVERS
    23. Session Hijacking
    24. Defending Virus
    25. Defending Trojans
    26. Backdoor ,Rootkits and Worms 
    27. Keyloggers
    28. SQL Injection
    29. PHP Injections
    30. Code Injection (2)
    31. Cross Site Scripting.(XSS)
    32. Cross Site Request Forgery (CSRF)
    33. Countermeasures.

 Buffer Overflows.

    1. Physical Security
    2. Firewalls
    3. HoneyPots
    4. Cryptography
    5. Reverse Engineering. (RE)
    6. Expert Levels Hands on OWASP
    7. IP Tracing. (Hunting Hacker's)
    8. Mini Project
    9. INTRODUCTION TO CYBER FORENSICS