Network and Internet Security Trainer (Advance)
FEATURES:
THEORY TOPICS
- CRYPTOGRAPHY
- CRYPTOGRAPHIC ALGORITHMS
- CRYPTOGRAPHY-KEY MANAGEMENT
- STEGANOGRAPHY
- WEB SECURITY
- COMMUNICATION SECURITY
- AUTHENTICATION PROTOCOL
- EMAIL SECURITY
- HACKING AND TRACKING
- PHISHING
- DENIAL OF SERVICE ATTACK (DOS)
- HTTP: SQL INJECTION
- HTTP: ANONYMOUS IDENTITY
- FTP: SQL INJECTION
- MALWARE
SIMULATIONS:
- SOFTWARE SIMULATION
- PHISHING
- DENIAL OF SERVICE (DOS)
- FTP: SQL INJECTION
- SPYWARE
- HTTP: SQL INJECTION
- HTTP: ANONYMOUS IDENTITY
- HARDWARE SIMULATION
- VIRUS
- SPYWARE
- DENIAL OF SERVICE
- PHISHING
SPECIFICATIONS:
SOFTWARE SPECIFICATION
- PHISHING
- COMPOSE MAIL/INBOX
- HACKER/ TRACKER ACTIVITY
- DENIAL OF SERVICE (DOS ATTACK)
- SERVER/ CLIENT SIDE SIMULATION
- REQUEST HANDLING ANIMATION
- HTTP: SQL INJECTION
- BRUTE FORCE ALGORITHM
- VIEW/EDIT CONTENTS
- HTTP: ANONYMOUS USER
- ANONYMOUS USER LOGIN
- VIEW CONTENT
- FTP: SQL INJECTION
- BRUTE FORCE ALGORITHM
- VIEW FILES
- SPYWARE
- BRUTE FORCE ALGORITHM
- HACKER/TRACKER
- VIRUS
- UPLOAD/DOWNLOAD E-MAIL VIRUS
HARDWARE SPECIFICATION:
- VIRUS
- USER/ATTACKER INTERFACE
- VIRUS ATTACK THROUGH KIT (ATTACKER END)
- EFFECTS OF VIRUS ON USER END
- SPYWARE
- USER/ATTACKER INTERFACE
- REALTIME SPYWARE ATTACK UPDATION ON KIT (ATTACKER END)
- DENIAL OF SERVICE (DOS ATTACK)
- SERVER SIDE SIMULATION
- ATTACKER SIDE SIMULATION (KIT)
- REQUEST HANDLING ANIMATION
- PHISHING
- USER/ATTACKER INTERFACE
- REALTIME PHISHING ATTACK UPDATION ON KIT (ATTACKER END)