The term ethical hacker refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems. Ethical hacking is a term first coined by IBM.
Skyphi Technologies stepped ahead to bring expert knowledge and experience packaged together into a well-designed course content suiting the current industry needs. Our training program will gives you in-depth knowledge
and offers you full learning and understanding of the topics in a highly interactive manner.
1 - Operating System Concepts
2 - Networking Basics
3 - Networking Models
4 - Introduction to Ethical Hacking
6 - Hacking Laws
5 - Footprinting
8 - Scanning
7 - Enumeration
9 - Viruses and Worms, Adware & Botnets
10 - Trojans and Backdoors, Spyware
11 - SPAM, Email Bombing
12 - Sniffers
14 - Basics of programming
13 - System Hacking
15 - Keyloggers
16 - Social Engineering
17 - Package Capturing
18 - Phishing Attacks
20 - Denial of Service
19 - Cryptography
21 - Buffer Overflows
22 - Session Hijacking
23 - Hacking Webservers
24 - Hacking Websites
25 - Cookie Studying
26 - SQL Injection
27 - Penetration Testing
28 - Evading IDS, Honeypots
29 - Hacking Wireless Networks
30 - Call Spoofing & SMS Spoofing
31 - Firewall, Proxy Server & VPN