Cours d'informatique
á FRANCE

Vous trouverez sur cette page la liste des annonces Cours d'informatique en occasion ou neuves au meilleur prix

Providing Certified Ethical hacking courses Online, Learn Comfortably from you with guaranteed international certification by i-ceh.com. Become a Computer Savvy today by pursuing over ISEH Course and secure your future. Short Term Fee Euro 400 , Long Term Euro 400 ICEH- ISEH COURSE MODULES Introduction to Data o Security, and its need o Operating System Basics. o DBMS Basics o Data Communication Basics. o Basics of "Computer networking" o An approach for ethical hacking. Introduction o Windows Security. o Registries. o Ports and Services. Desktop & Server Security Counter Measure & Securing Windows. o How to look for vulnerability? o Deleted file recovery. o Introduction to Backtrack. Malwares o VIRUS & Worm. o Spy ware. o Trojan o Bots. o LAN Security o Threats of LAN o Hacking MAC Address Malwares, Lan Security, Firewall Security o Introduction to Wi-Fi LAN Security o Firewall Security o Working of a Firewall o Types of Firewall o Port Filtering o Finding an IP Address o Anonymous Surfing o Proxies Servers o Free Proxy servers o Email Hacking o INTERNET SECURITY Scanning, Fingerprinting and Information Gathering o Daemon-Banner grabbing. o Port Scanning. o ICMP Scanning. o Active Fingerprinting. o Passive Fingerprinting. o Attacking the System o Technical Attacks o DOS Attacks o Input Validation Attack o XSS Attack o Buffer Overflow Attack o Key logger Attack o Sniffing Attack Technical Attacks & Password Cracking o Password Cracking/ Enumeration o Art of Googling o Terminologies o Basic Search Techniques o Advanced Search Techniques o Data Backup o ART OF GOOGLING AND DATA BACKUP o Various Data Backup Strategies. Penetration Testing and Catching Criminals o Penetration Testing o Catching Criminals o Cyber Terrorism o Honey Pots o CRYPTOGRAPHY,STAGNOGRAPHY & CYBER FORENSICS Cryptography o Goals o Types Of Cryptography o Digital Signature o Digital Certificate o Kerberos o Steganagraphy o Cyber Forensics o Introduction to Forensics o Digital Evidence o Requirements for Forensics o Audit Objectives o Risk Analysis o Auditing Steps o Planning & Organization o Network Control - Policies Security Audting And Cyber Laws o Network Ctrl - Hardware / Software o Network Data Standards and Data Access o Hardware and Software Backup and Recovery o Data Encryption and Filtering o Internet Applications o Password Protection o Security Trends Contact us today

Vente
0,00 €
FRANCE
99 - Autres