Cyber Security Course in Chandigarh – ThinkNEXT
  78374-01000, 78374-02000, 78374-03000      
Whatsapp 78374-04000
Toll Free : 1800-102-4102
  info@thinknext.co.in           Locate Us
PayTM 9815994197
        *Applications are invited for Free 6 Months/6 Weeks Industrial Training. Email your resume at information@thinknext.co.in (Limited Seats).                                 *100% Free 6 weeks summer training for B.Tech LEET Second Year, Third Year and Final Year Students of ECE, Electrical and Instrumentation Engineering Students. Polytechnic Diploma Passout Students of ECE, Electrical and Instrumentation are also Eligible. No hidden charges. No Test. Direct Admission. Limited Seats. Call Now 78374-03000                                
*100% Free 6 weeks summer training for B.Tech LEET Second Year, Third Year and Final Year Students of ECE, Electrical and Instrumentation Engineering Students. Polytechnic Diploma Passout Students of ECE, Electrical and Instrumentation are also Eligible. No hidden charges. No Test. Direct Admission. Limited Seats. Call Now 78374-03000    
Members Members
Stipend based Industrial Training
Cyber Security Training Course in Chandigarh Mohali

CLICK TO CALL

Cyber Security Course in Chandigarh

Module 1: Introduction To Cyber Security
  Hackers & Hacking Methodologies
  Footprinting
  Scanning
  Enumeration
  Escalation of privilege
  Covering tracks
  Types of hackers
  Cyber Security threats
  Computer security
  Layer of security
  Fundamental concepts of Security

Module 2: Information Gathering
  Footprinting Threats
  Methods of Footprinting
  Using Search Engines
  Financial Services and Information Gathering
  Job Sites
  Working with Email
  Social Engineering

Module 3: Google Hacking
  Google Hacking Technique
  Google Advanced Search Operators

Module 4: Scanning
  Types of Scans
  NMAP Tool
  OS Fingerprinting
  Checking the Status of Ports
  Banner Grabbing
  Using Proxies
  Enumeration

Module 5: System Hacking
  Password-Cracking Techniques
  Types of Password Attacks
  Offline Attacks
  Keylogger and AntiKeyloggers
  Spyware and Antispyware
  Steganography Techniques

Module 6: Encryption
  What is Encryption, Data Encryption
  Encryption Standards
  DES, AES, RSA
  md5, SHA-1, SHA-2
  Digital Certificates
  Working of Digital Certificates
  Digital Signature
  Cryptography Tools

Module 7: Data Backup And Recovery
  Data Backup, Online Data backup
  Types of backup
  Raid 0, Raid 1, Raid 5
  Data backup and restore
  Data recovery

Module 8: Internet Security
  Online Gaming Risks
  Child Online Safety
  SSL/TLS
  Guidelines for Internet Security
  Internet Security Laws

Module 9: Network Security and Email Security
  Home Network
  Create Wireless Network
  Create an access point
  Network Security Threats
  Setting up a Wireless Network
  Secure Network Connections
  General Security Practices in Home Networking
  Network firewall
  IDSandIPS
  VPN
  Create inbound and outbound traffic policies
  Email Security and Threats
  Online Email Encryption Service
  Identity Theft and Guidelines for identity theft Protection

Module 9: Mobile Security
  Mobile Device Security
  Mobile Malware and Anti-Virus



Book My Free Demo Class Now!


Whatsapp icon call icon Youtube icon Messenger icon
Call now 7837401000