This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

<div id="slider"> <a href="http://www.spiceupyourblog.com"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisdP7VBy7OkYcmJ0YM0PDhTk-GhgSDXXs8rVPdMdp8HG2difgXNB4_1sUZzDUz9rpB78zMvu_snGiHgdKUELENNuQjml8c_iTXdge5BrfPHptLPEsXvc0ANYz_W3fkuedCcMpfDgmuwDE/s1600/toystory.jpg" title="This Is A Caption" /></a> <a href="http://www.spiceupyourblog.com"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZb9A64F_M4G0CiFWohJk8DGpkFOTEVNH6rdUPULcMX6lZ7OZiUwx0J34vOLfjE7jjEPfTcX8HZ3d2D6Eqp7pdixXYsppzawCFt-nXyeH_Wk3u5RQyuHVYnzYOdudLU6kbnhsvhrC6nUo/s1600/up.jpg" title="This Is Another Caption" /></a> <a href="http://www.spiceupyourblog.com"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDiQK9ZDERVD5EuDOJ1oxTKkKVRamZVsx8clW3oqECuwkVn62-8ggeXZShnBeo4iOvWTzOPB1zYRmq69S_q2G99esr94u10FMWQ8DZmzzFmbY7nx8W_ecsiC_iKXRBmK0a_hpKTWX1IZ8/s1600/walle.jpg" title="This is an example of a caption" /></a> <a href="http://www.spiceupyourblog.com"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifUzlio7FH9-Gu3EqOOi8NfPIBS7NOFxsBhn9USQURiccHz6j6eKk78_l3sYpcTKk7OJ0ry58RzZQOqPmyDjHJM_Ebf8iAvSPuCEZ9nsZNQULzuF0UHMs3lqaZzv6-aygfP7J6NflQ3lc/s1600/nemo.jpg" title="This is another Caption" /></a> </div>
Showing posts with label Ethical hacking boot camp. Show all posts
Showing posts with label Ethical hacking boot camp. Show all posts

Tuesday, 1 May 2012

Ethical Hacking and Cyber Securit Boot Camp at Delhi

All you script kiddeis put your hacking hats on and get ready for a Boot camp on Ethical Hacking and Cyber security being arranged by The hacking News[THN] in New Delhi,India. Though its not just for the scriptkiddies only but for every aspiring hacker.Their Hacker Boot Camp training session will teach you how SYSTEM INTRUSIONS and many more stuff are done. You will be shown the techniques, tools and methods that the hacker uses. This insight will help you understand how to better protect your IT architecture and identify the vectors of attack that hackers use. 


CCSN is a revolutionary new certification in the field of information security training program for amateurs and professionals to help you gain the skills you need to become an expert in the field of information security. This specialized certification assures potential employers and customers that you have a level of advanced knowledge to detect and offer support for some of the most advanced security vulnerabilities. The CCSN is the only completely hands-on, real world oriented security certification.

Batches with limited Registrations in order to provide best Training Quality and Personal Interaction between students and Trainers. Course comes with a custom-built practical labs specially designed to clear up concepts, reinforce techniques, and make you comfortable with the tools of the trade.


To get Registration and Details, Please do Email to info@thehackernews.com

Course Outline:


  • Php, Database and Linux - These are Pre-Required Knowledge that students will learn within CCSN package.
  • Information Gathering and Scanning - Enumeration using various Backtrack Tools
  • Privacy is the number one issue facing by internet users. You will learn to use Proxy Servers, Anonymity Techniques, Various Tools, Tunneling & VPN usage and Concepts.
  • Email Hacking & Social Engineering - If you ever wonder how hackers actually hack into any email account? This Lesson is going to give each and every possible solution of this Question.
  • Cryptography and Encryption Basics, Understanding various Hashes and Encryption Algorithms and various password cracking techniques.
  • Camp will include various types techniques that can be used to Hack a System, Cracking system password, Using Stealers, Key loggers and Remote Administrations Tools (RATs) and Creating Undetectable Viruses using Crypters, Binders and Assembly Codes.
  • Web Application Hacking using - Advance SQL Injection, Cross Site Scripting, Local File Inclusion (LFI), Remote File Inclusion (RFI), Parameter Manipulation, Session and Cookies Hijacking, Click Jacking, Shell Injection, Brute force Attacks against Website login pages.
  • Server Hacking via Rooting Servers, Remote Code Execution, Buffers Overflows,  Brute force against Servers, Using Dos, DDos and Creating Botnets, Using various Exploits and Exploits Databases.
  • Understanding Wireshark, Cain & Abel and TCP Dump, Man in the middle attacks, Router Hacking, Sniffing Data and Passwords, ARP , DNS, DHCP Spoofing attacks,  DNS poising , DOS attack against an IP address, Flood the LAN with random MAC addresses, Packet Injection.
  • In labs of this lesson a CCSN student will learn practically to crack Wireless Encryptions and Prevention Techniques. The Complete Demonstration will have various real World scenarios to clear the Advantages of Wireless Hacking.
  • Using Wikto, Nessus , skipfish, w3af, SQLmap Websecurify for vulnerability Scanning and ExploitingII. Wordpress-scan , Drupal scan, Joomscan, cms-explorer for CMS Hacking and Pen-testing.
  • Using Metasploit Framework for Exploitation, Websploit, SET, Fast-Track SQL Pwnage, Winautopwn for various System/Network/web Attacks.
  • Using IP tables and Firewalls Policies to Protect Network/ System, Installing and Configuring Honeypots to trap hackers, Installing and Configuring IDS (Intrusion Detection System).
  • Computer Forensics and Incident Management.
Prerequisites : Dedication! Because Rest base programming and other things Students will learn within CCSN package.

Course Date
21th May 2012
No. of Seats
50
Course Duration
15 Days (6 Hours/Day)
Who can join this Course
Students, Professionals, Programmers, Developers, Security Enthusiasts

Venue : New Delhi, India

Contact :
Kislay Bhardwaj,
CTO - The Hacker News,
Ph: +91-9711223284

To get Registration and Details, Please do Email to info@thehackernews.com

Subscribe and Like:D PEACE.