Ethical-Hacking Work Shop


The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization's information systems.


Project Description


Overview
Topics Covered
Requirements
Gallery
Course duration
Overview

Overview


Hacking is not about the illegal things it's all about how to secure your system. This is a 2 day workshop with Rigorous Hands-On sessions. This workshop aims to give knowledge of hacking and how to protect your system against hazardous effects.

Topics Covered

Topic Covered


  1. Introduction to Ethical Hacking
  2. Google Hacking
  3. Email Hacking
  4. Windows Hacking & Security (Key loggers)
  5. Trojans
  6. Foot-printing
  7. Virus & Worms
  8. Scanning
  9. Enumeration
  10. Sniffers
  11. Denial of Service (DoS)
  12. Cryptography
  13. Data Hiding Techniques
  14. Web Browser Security
  15. SQL Injection
  16. Spoofing Methods
  17. Penetration Testing & Vulnerability Assessment
  18. Mobile Hacking
Requirements

Requirements


  1. Students can bring their own laptops
  2. No preinstalled software required.
  3. No prerequisites is required, we‟ll start from basics
Gallery

Photo Gallery


Course duration:

Course duration


S NO Duration Fee Take Away Kit Provided
1 Two days 400/- NO
2 One day 400/- NO

Overview


Hacking is not about the illegal things it's all about how to secure your system. This is a 2 day workshop with Rigorous Hands-On sessions. This workshop aims to give knowledge of hacking and how to protect your system against hazardous effects.

Topic Covered


  1. Introduction to Ethical Hacking
  2. Google Hacking
  3. Email Hacking
  4. Windows Hacking & Security (Key loggers)
  5. Trojans
  6. Foot-printing
  7. Virus & Worms
  8. Scanning
  9. Enumeration
  10. Sniffers
  11. Denial of Service (DoS)
  12. Cryptography
  13. Data Hiding Techniques
  14. Web Browser Security
  15. SQL Injection
  16. Spoofing Methods
  17. Penetration Testing & Vulnerability Assessment
  18. Mobile Hacking

Requirements


  1. Students can bring their own laptops
  2. No preinstalled software required.
  3. No prerequisites is required, we‟ll start from basics

Course duration


S NO Duration Fee Take Away Kit Provided
1 Two days 500/- NO
2 One day 400/- NO

Photo Gallery


Key Benefits

  1. SYNXA IT will provid recent Technology aid to the Organizations and to the techocrats.
  2. Demo and support on recent tools and technology.
  3. The students will get an opportunity to interact with experts from industry and research organizations.
  4. Rhe Inteactive sessions with the experts is an experience to learn new concepts and with live demonstration.

Salient Features

  1. Demo on recent advancements in technologies and industry application.
  2. Software and workshop modules will provide to the student on demand.
  3. Heighest Priority will be given to the workshop participants for forthcoming training programs for one academic year
  4. Interaction With Eminent personalities
  5. Real time project and research exposure