Information Security & Ethical Hacking Course Content
Information Security & Ethical Hacking Course Content
Information Security & Ethical Hacking Course Content
FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY AND ETHICAL HACKING V7 Detailed Course Curriculum (2012-2013)
UNIT 2: DATABACKUP
DATA BACKUP INTRODUCTION DATA BACKUP STRATEGIES OFFLINE DATA BACKUP ONLINE DATA BACKUP
UNIT 3: CRYPTOGRAPHY
STRENGTH OF THE CRYPTOGRAPHY GOALS OF CRYPTOGRAPHY SOME TECHNICAL TERMS TYPES OF CIPHER TEXT TYPES OF CRYPTOGRAPHY DATA ENCRYPTION STANDARD (DES) IDEA: INTERNATIONAL DATA ENCRYPTION ALGORITHM ASYMMETRIC CRYPTOGRAPHY RSA ALGORITHM HASH FUNCTIONS DIGITAL SIGNATURES DIGITAL CERTIFICATION
UNIT 4: STEANOGRAPHY
HOW DOES IT WORK? STEGANOGRAPHY IN IMAGES STEGANOGRAPHY IN AUDIO GENETIC ALGORITHM APPROACH STEGANOGRAPHY IN VIDEO
MODULE: VAPT
UNIT 1:
INTRODUCTION IMPORTANT TECHNICAL TERMS INFORMATION GATHERING SCANNING AND FINGERPRINTING
UNIT 1: MALWARES
INTRODUCTION TO MALWARES MALWARE DETECTION TECHNIQUES COUNTER MEASURES TYPES OF MALWARES INSTALLING BOTS ON TARGET MACHINES ATTACKING METHODS WORKING OF BOTS
INTRODUCTION TO ATTACKS TYPES OF ATTACKS NON-TECHNICAL ATTACK TABNABBING: A NEW TYPE OF PHISHING ATTACK TECHNICAL ATTACKS PASSWORD ATTACKS BACKTRACK BACKDOOR ROOTKITS MALWARE GLOSSARY
MODULE: CYBER LAWS AND IT ACTS INTRODUCTION CYBER LAWS: INTERNATIONAL PERSPECTIVE E-GOVERNANCE IMPEDIMENTS IN IMPLEMENTING E-GOVERNANCE PROJECTS FROM LEGAL PERSPECTIVE ANALYSIS OF PROBLEMS REPERCUSSIONS RELEVANT LAWS JURISPRUDENCE OF INDIAN CYBER LAW THE INFORMATION TECHNOLOGY ACT, 2000 (SOME LAWS) AMENDMENT TO THE IT ACT 2000 BY ITAA2008 ADVANTAGES OF CYBER LAWS PROSECUTION OF CYBER CRIMES UNDER INDIAN CYBER LAWS (IT ACT, 2000) PROBABLE SOLUTIONS ARTICLES ON CYBER LAWS CASES ON CYBER LAWS