Tuesday, February 19, 2013

CEH Syllabus V7 AND V8



Module 01: Introduction to Ethical Hacking

Module 02: Footprinting and Reconnaissance

Module 03: Scanning Networks

Module 04: Enumeration

Module 05: System Hacking

Module 06: Trojans and Backdoors

Module 07: Viruses and Worms

Module 08: Sniffers

Module 09: Social Engineering

Module 10: Denial of Service

Module 11: Session Hijacking

Module 12: Hacking Webservers

Module 13: Hacking Web Applications

Module 14: SQL Injection

Module 15: Hacking Wireless Networks

Module 16: Evading IDS, Firewalls, and Honeypots

Module 17: Buffer Overflow

Module 18: Cryptography

Module 19: Penetration Testing

Tuesday, January 15, 2013

CERTIFIED CYBER SECURITY EXPERT AND CEH SYLLABUS

Session 1: Cyber Ethics, Hacking introduction.
Session 2: Basic Networking Terminologies
Session 3: Information Gathering and foot-printing
Session 4: Scanning and Enumeration
Session 5: Trojans and Backdoors
Session 6: Virus and Worms
Session 7: Sniffers and keyloggers
Session 8: Phishing and its preventions
Session 9: System Hacking and Security
Session 10: Social Engineering and Honey pots
Session 11: Bots, Botnets and DoS
Session 12: Cryptography
Session 13: Google Hacking Databases
Session 14: SQL injection 1
Session 15: SQL injection 2
Session 16: Proxy servers and VPNs
Session 17: Cross site Scripting ( XSS )
Session 18: Local File Inclusion / Remote File Inclusion ( LFI / RFI )
Session 19: Secure Coding practises
Session 20: Information Disclosure vulnerabilities
Session 21: Session Hijacking ( Side jacking )
Session 22: Hacking web servers
Session 23: Vulnerability Assessment and Penetration Testing ( VAPT )
Session 24: Assembly language basics
Session 25: Buffer Overflow attacks 1
Session 26: Buffer Overflow attacks 2
Session 27: Exploit writing
Session 28: Metasploit framework
Session 29: Reverse Engineering
Session 30: Firewalls, IDS and Evading IDS
Session 31: Wireless hacking
Session 32: Mobile and VOIP hacking
Session 33: Bluetooth hacking
Session 34: Cyber crime investigation and IT ACT 2000
Session 35: Case studies of various cases solved by Techdefence
Session 36: Cyber Forensics
Session 37: Enterprise Information Security Management
Session 38: Project work 1
Session 39: Project work 2
Session 40: Online Examination


Tuesday, December 25, 2012

REDHAT VIRTUALIZATION SYLLABUS RH318

  • Red Hat Enterprise Virtualization overview
  •  Understand general virtualization, KVM concepts, and Red Hat® Enterprise Virtualization platform.
  • Red Hat Enterprise Virtualization Manager
  •  Install, test, remove, and troubleshoot Red Hat Enterprise Virtualization Manager.
  • Red Hat Enterprise Virtualization Hypervisor
  •  Install, configure, upgrade, and troubleshoot Red Hat Enterprise Virtualization Hypervisor.
  • Red Hat Enterprise Virtualization environment configuration 
  •  Create and configure datacenters, clusters, and storage domains.
  • Red Hat Enterprise Virtualization for Servers 
  •  Install, perform basic management of, and troubleshoot virtual servers.
  • Red Hat Enterprise Virtualization for Desktops 
  •  Install virtual desktops and configure paravirtualized drivers.
  • Manage virtual machines 
  •  Create and use image snapshots, and explore high availability.
  • Virtual machine templates 
  •  Create Microsoft Windows and Red Hat Enterprise Linux® virtual machines with template images.
  • Desktop pools and users 
  •  Use desktop pools and deploy the power user portal with multilevel administrative roles.
  • Monitoring and reports 
  •  Monitor Red Hat Enterprise Virtualization and create custom reports.
  • Red Hat Enterprise Linux hosts 
  •  Manage virtual machines with Red Hat Network.
  • Advanced Red Hat Enterprise Virtualization 
  •  Performance-tune Linux hosts and guests; back up and restore Red Hat Enterprise Virtualization