page content 2015 ~ Ethical Hacking & CEH Training In Patna

ranjanraja.blogspot.in

My official blog

ranjanraja.blogspot.in

My official blog

ranjanraja.blogspot.in

My official blog

ranjanraja.blogspot.in

My official blog

ranjanraja.blogspot.in

My official blog

6.9.15

Learn Ethical Hacking And CEH Training In Patna Bihar

19.4.15

Ethical Hacking In Patna

patna ethical hacking bihar course
ethical hacking in patna

23.2.15

Learn Ethical Hacking In Patna Bihar By- Ranjan Raja

ethical hacking in patna

5.1.15

ethical hacking syllabus by-ranjan raja

syllabus :-

SYLLABUS :-
INTRODUCTION TO HACKING
Type of hacker
Steps of hacker

PROXY SETTING AND HIDING YOUR DETAILS
Changing & Hiding ip address
Trace a ip address
MAC address spoffing
Browsing anonymously on proxy server
Unblocking website
Offline and online proxy “tools tor”

EMAIL TRACING AND PROTECTION
Email forgery
Self Destructive Message
spamming
bombing
spoofing
tracking
Email security
Encryption and decryption “Hiding secret message”
Plugin and addon
Know ip through email

FACEBOOK AND EMAIL HACKING
Phishing
keylogger
Tabnabbing
Cookies stealing
Ettercap and sniffing
Set
Hacking over usb
URL Shortening Attacks

YAHOO PERMANENT HACKING
Hack yahoo email
Yahoo phising page

GOOGLE HACKING
Play with Google dorks
Live camera expitation

SYSTEM HACKING
Cracking window password by various methods “window based”
Windows login password cracking
Windows xp , 7,8 hacking “Metaexploit”
Window hacking remotely “AMYRTAGE”
Desktop Sharing “Remotely”
Registry tweeks

WORM VIRUS AND TROJANS AND PROTECTION
Cookies Stealing
Remote Accessing Tools
1)dark comet
2) beast
Binding and FUD
Detection and removing of Trojan

ATTACKS ON NETWORK
Lan and wireless attacks
Open Dns
Port scanning

STAGANOGRAPHY
Hiding secret message behing images
Advance Stagnography

WEBSITE EXPLOITATION AND SECURITY
Harvester
Webshag
DNS and WHOIS Lookups
Footprinting “Nmap”
Cross site scripting- xss
SQL Injection
Admin page finder
Blind injection
Website security
Introduction to penetration testing and vulnerability assessment

WEBSITE MAKING AND BLOGGING
Wordpress
jhoomla
PhpBB
Google blogging and designing

SEARCH ENGING OPTIMIZATION “SEO”
Website ranking

WIRELESS EXPLOTATION AND WIRELESS SECURITY
Wep wifi cracking
Wpa and wpa2 wifi network cracking
Reaver attack
Fern attack
Gerix attack
Fake wireless access points
WLAN Sniffers and scanner-Including ac sniffing
Make own wifi networks
Ddos Attacks Toward Wifi Network
Securing routers

MOBILE EXPLOITATION
Call spoofing and tracing
Android hacking
Call details and exploitation
Phone backdooring
Number changing

BACKTRACK AND KALI LINUX & IT’S USES
Tabnapping
Phishing with backtrack
Scanning

ONLINE MONEY MAKING
Odesk
Freelancer
Adsense
Aids
Online payment site

CYBER CRIME AND LAWS
Cyber forensic
Cyber laws

TIPS AND TRICKS
Facebook likes
Free hosting and domain
Cloud computing
Online shopping
Profile visinting
Fake news
orb

Twitter Delicious Facebook Digg Stumbleupon Favorites More