ETHICAL HACKING COURSE IN SURAT
1.ADVANCED GOOGLE & SECURITY
- ADVANCED GOOGLE
- UNBREAKABLE PASSWORD
- PERFECT SEARCH
- TRACE STOLEN LAPTOP
- PROXY
- BLACK BROWSER
2.LAB SETUP
- INTRODUCTION OF VMWARE WORKSTATION
- STAYING SAFE IN THE INTERNET
- HOW TO INSTALLED VMWARE WORKSTATION
- RESTORE & SECURE YOUR SYSTEM
- SETUP YOUR WINDOWS SECURITY
- ALL PLUG-IN VMWARE WORKSTATION SOFTWARE
- HOW TO NETWORK SET & RESET
- INTRODUCTION OF VPN
- VPN SECURITY
- HAT IS FIREWALL
- FIREWALL SECURITY
3.SYSTEM SECURITY & HACKING
- INTRODUCTION OF OS
- TYPES OF OS
- SETUP SYSTEM SECURITY
- SET SECURITY OF BIOS
- HACK SECURITY OF BIOS
- SET WINDOWS PASSWORD
- HACK WINDOWS PASSWORD
- RETRIEVE WINDOWS PASSWORD
- SWINDOWS SECURITY THROUGH USB
- ADVANCE WINDOWS HACKING
- WINDOWS MODIFICATION
- WINDOWS GENUINE
- MAC SPOOFING
- USB SECURITY
- CONTROL PANEL SECURITY
4.ANDROID FORENSIC
- INTRODUCTION OF ANDROID
- ANDROID FORENSIC TOOLS
- ANDROID DATA RECOVERY
- ANDROID IP SPOOFING
- ANDROID THROUGH CALL SPOOFING
- ANDROID THROUGH SMS TEXT SPOOFING
- ANDROID ADVANCED TRICKS
- SYSTEM MONITORING THOUGH ANDROID
- ANDROID FORENSIC USING WIN HEX AND FTK
- ANDROID CONTROL
- ANDROID ROOTING
- ANDROID KEY LOGGER
- CREATE FB ACCOUNT WITHOUT EMAIL ADDRESS
- DOS ATTACK
- SPY
- WHATSAPP WITHOUT NUMBER
- SYSTEM MONITORING
- SMS BOMBER
- TRACE STOLEN ANDROID PHONE
- TWO HIKE
- ANDROID WEBCAM
- ANDROID ADVANCED BACKUP
- FAKE CALL, SMS RECEIVER
- SESSION HIJACKING
5.TROJAN ATTACK & SECURITY
- WHAT IS TROJAN
- VIRUS
- TROJAN ATTACK
- LOCK PC USING PATTEN LOCK
- TROJAN ATTACK DETECTION
- PROTECT SYSTEM AGAINST TROJAN
- WHAT IS RAT
- PROTECT AGAINST VIRUS & SPYWARE, ROOT KIT
- RESET COMPUTER SYSTEM
- SYSTEM SECURITY MORE POWERFUL
6.KEY LOGGER
- KEY LOGGER
- TYPE OF KEY LOGGER
- HOW TO USE KEY LOGGER
- HOW TO USE ONLINE KEY LOGGER
- HOW TO USE OFFLINE KEY LOGGER
- SECURE PC AGAINST KEY LOGGER
7.WEB SECURITY & ATTACK
- INTRODUCTION OF WEBSITE
- TYPES OF WEBSITE
- PROCESS OF MADE WEBSITE
- WEB ADMIN PAGE FINDING
- SQL INJECTION
- DOS ATTACK
- FAKE WEBSITE REPORTING
- DDOS ATTACK
- WEBSITE SECURITY AGAINST DOSDDOS ATTACKS
- C PANEL SECURITY
- DATABASE GATHERING
- WEBSITE REPUTATION HISTORY
- WEBSITE BLOCK WITHOUT SOFTWARE
8.SNIFFERS
- HOW TO SNIFFERS PASSWORD
9.WI-FI HACKING SECURITY (KALI LINUX BACK TRACK)
- INTRODUCTION OF WI-FI
- WI-FI TECHNOLOGY
- DATA POCKETS SNIFFING
- WI-FI PENETRATION TESTING
- APPLICATION FOR ROOTED ANDROID
- WI-FI FINDER
- WI-FI SCANNING
10.NETWORK HACKING SECURITY
- NETWORK SCANNING
- LIVE SYSTEM CHECKING
- NETWORK PACKETS TRACING
- PORT PENETRATION TESTING
- IP SPOOFING
- MAC SPOOFING
- NETWORK PENTRATION TESTING
- NETWORK DISCOVERY PENETRATION TESTING
- NET WORK SECURITY
- NETWORK INTERNET CONTROL
11.FOLDER LOCK HACKING
- WITH SOFTWARE
- WITHOUT SOFTWARE
12.PHISHING ATTACKS
- WHAT IS PHISHING
- SOCIAL ENGINEERING ATTACKS
- TAB NAPPING ATTACKS
- ONLINE LOTTERY WING ATTACKS
- CALL SPOOFING ATTACKS
- PROTECT YOUR SELF
13.BLUETOOTH SECURITY HACKING
- HOW TO BLUETOOTH
14.LIVE CAMERA HACKING
- HOW TO LIVE CAMERA HACKING
15.SOFTWARE CRACKING
- HOW TO SOFTWARE CRACKING
16.HONEY PORT & HONEY NET
- WHAT IS HONEY PORT HONEY NET
17.INTRODUCTION TO REMOTE EXPLOITS
- HOW TO REMOTE EXPLOITS
18.KALI LINUX
- HOW TO USE KALI LINUX
19.BACK TRACK
- BACK TRACK OS