Services
Staffing
Software Development & Digital Marketing
IT Infrastructure, Security & Cloud
Training
Insights
Careers
Contact
Login
Ethical Hacking
wave
DAY - 1- SESSION 1: Level 1
Introduction to Hacking
Elite Hacker
Intermediate Hacker
Script Kiddies
Brief Introduction Anounmous and who ?
What is the purpose of anonymous?
What did the anonymous hackers do?
Anonymous (group)
Information Gathering
Footprinting
What is Scanning Techniques?
Power of Real Attacks
Shell nicto
Local Network Attack
Capture packets through the network
Password Grab
Browsing Data Capture(Text & Images)
ARP Spoofing
Countermeasures
DAY - 1- SESSION 2: Level 2
Brief intro Operating Systems
MacOS
Windows
Linux vs Unix
Security OS
Phishing & Keylogger
Google Accounts
Facebook
Keylogger
Hotspot vs Routers
MiMT
Cryptography
What is Cryptography ?
Three types of cryptographic techniques used in general.
Hidding Data inside media files - Chill
Virus
What is Virus explain?
Trojan
Countermeasures
DAY - 2- SESSION 1: Level 3
Step-in Anonymous
Wifi WPA/PSK Hac
What is WAP/WPA
Hack Wifi
Mobile
Can mobile phone be hacked?
Can you hack a phone with just the number?
HACK MOBILE
WhatsApp Hacking
SQL Injection
Countermeasures
DAY - 2- SESSION 2: Level 4 -video teaser 4
Intro of Cloud Technology
Web Hacking
DDoS attack
Addon attack
Cryptocurrency
Penetration Testing
Exploit
Form Registration Attack
Hightlights
Brief Introduction Anounmous and who ?
Stepin Anounmous
Cryptography & Tojans
Sniffing and Mobile Hack
Web Hacking
Man in the Middle Attack (MITM)
Phishing & Security
Windows Hacking dia files - Chill
Ethical Hacking
July 27 & 28 | 10AM & 5PM
2nd floor, Srigiri Complex, Beside,
venkathadri theatre, Dilsukhnagar, Hyderabad. Telangana.
info@cyberaegis.com
India :+91- 40 - 29550955
© Copyright - 2021 | Cyberaegis . All Rights Reserved.