You are on page 1of 2

Information Security & Ethical Hacking

APPIN TECHNOLOGY LAB


INTRODUCTION
8Introduction to Data
8 Security, and its need
8Operating System Basics.
8DBMS Basics
8 Data Communication Basics.
8 Basics of “Computer networking”
8 An approach for ethical hacking.

DESKTOP & SERVER SECURITY


8Windows Security.
8Registries.
8Ports and Services.
8Counter Measure & Securing Windows.
8How to look for vulnerability?
8Deleted file recovery.
8Introduction to LINUX.

MALWARES, LAN SECURITY, FIREWALL SECURITY


8Malwares
8VIRUS & Worm.
8Spy ware.
8Trojan
8Bots.
8LAN Security
8Threats of LAN
8Hacking MAC Address
8Introduction to Wi-Fi LAN Security
8Firewall Security
8Working of a Firewall
8Types of Firewall
8Port Filtering

INTERNET SECURITY
8Finding an IP Address
8Anonymous Surfing
8Proxies Servers
8Free Proxy servers
8Email Hacking

SCANNING, FINGERPRINTING,AND INFORMATION GATHERING


8Daemon-Banner grabbing.
8Port Scanning.
8ICMP Scanning.
8Active Fingerprinting.
8Passive Fingerprinting.
8Attacking the System

TECHNICAL ATTACKS & PASSWORD CRACKING


8Technical Attacks
8DOS Attacks
8Input Validation Attack
8XSS Attack
8Buffer Overflow Attack
8Key logger Attack
8Sniffing Attack
8Password Cracking/ Enumeration

www.appinonline.com
ART OF GOOGLING AND DATA BACKUP
8Art of Googling
8Terminologies
8Basic Search Techniques
8Advanced Search Techniques
8Data Backup
8Various Data Backup Strategies.

PENETRATION TESTING AND CATCHING CRIMINALS

8Penetration Testing
8Catching Criminals
8Cyber Terrorism
8Honey Pots

CRYPTOGRAPHY,STAGNOGRAPHY & CYBER FORENSICS

8Cryptography
8Goals
8Types Of Cryptography
8Digital Signature
8Digital Certificate
8Kerberos
8Steganagraphy
8Cyber Forensics
8Introduction to Forensics
8Digital Evidence
8Requirements for Forensics

SECURITY AUDTING AND CYBER LAWS


8Audit Objectives
8Risk Analysis
8Auditing Steps
8Planning & Organization
8Network Control - Policies
8Network Ctrl - Hardware / Software
8Network Data Standards and Data Access
8Hardware and Software Backup and Recovery
8Data Encryption and Filtering
8Internet Applications
8Password Protection
8Security Trends

www.appinonline.com

You might also like