Cours d'informatique
á 99 - Autres

Vous trouverez sur cette page la liste des annonces Cours d'informatique en occasion ou neuves au meilleur prix

Vous voulez découvrir les tops secrets des formation professionnelles informatique: Cisco,Microsoft,Zend PHP, Oracle........ ses concepts fondamentaux ainsi que les cursus de formation qui vous mèneront à la certification ? Rejoignez NANOSOFTMEDIA partenaire de BEKKALIINFO le spécialiste de la formation certifiante en informatique au MAROC. Formation en ligne disponible

Vente
0,00 €
Maroc : Rabat
99 - Autres

Providing Certified Ethical hacking courses Online, Learn Comfortably from you with guaranteed international certification by i-ceh.com. Become a Computer Savvy today by pursuing over ISEH Course and secure your future. Short Term Fee Euro 400 , Long Term Euro 400 ICEH- ISEH COURSE MODULES Introduction to Data o Security, and its need o Operating System Basics. o DBMS Basics o Data Communication Basics. o Basics of "Computer networking" o An approach for ethical hacking. Introduction o Windows Security. o Registries. o Ports and Services. Desktop & Server Security Counter Measure & Securing Windows. o How to look for vulnerability? o Deleted file recovery. o Introduction to Backtrack. Malwares o VIRUS & Worm. o Spy ware. o Trojan o Bots. o LAN Security o Threats of LAN o Hacking MAC Address Malwares, Lan Security, Firewall Security o Introduction to Wi-Fi LAN Security o Firewall Security o Working of a Firewall o Types of Firewall o Port Filtering o Finding an IP Address o Anonymous Surfing o Proxies Servers o Free Proxy servers o Email Hacking o INTERNET SECURITY Scanning, Fingerprinting and Information Gathering o Daemon-Banner grabbing. o Port Scanning. o ICMP Scanning. o Active Fingerprinting. o Passive Fingerprinting. o Attacking the System o Technical Attacks o DOS Attacks o Input Validation Attack o XSS Attack o Buffer Overflow Attack o Key logger Attack o Sniffing Attack Technical Attacks & Password Cracking o Password Cracking/ Enumeration o Art of Googling o Terminologies o Basic Search Techniques o Advanced Search Techniques o Data Backup o ART OF GOOGLING AND DATA BACKUP o Various Data Backup Strategies. Penetration Testing and Catching Criminals o Penetration Testing o Catching Criminals o Cyber Terrorism o Honey Pots o CRYPTOGRAPHY,STAGNOGRAPHY & CYBER FORENSICS Cryptography o Goals o Types Of Cryptography o Digital Signature o Digital Certificate o Kerberos o Steganagraphy o Cyber Forensics o Introduction to Forensics o Digital Evidence o Requirements for Forensics o Audit Objectives o Risk Analysis o Auditing Steps o Planning & Organization o Network Control - Policies Security Audting And Cyber Laws o Network Ctrl - Hardware / Software o Network Data Standards and Data Access o Hardware and Software Backup and Recovery o Data Encryption and Filtering o Internet Applications o Password Protection o Security Trends Contact us today

Vente
0,00 €
FRANCE
99 - Autres