Monday, 8 June 2015

SPARKHEDKAR

PHP – Hypertext Preprocessor

PHP is an HTML-embedded scripting language used to write dynamically generated pages quickly. It is open source software, created in 1995 by Rasmus Lerdorf and its scripts are executed on the server.
PHP files can contain text, HTML tags and scripts with a file extension of ".php". It can be used to create login pages, design a form, create forums, surveys, dynamic and static websites and many more.
A Sample PHP Script to print "Hello World"

Ethical Hacking

Ethical Hacking is learning the Loopholes in your computers , emails and web pages so that you can take care of security of your computer. Ethical Hacking is learning to attack the security system on behalf of its owners to test its loopholes.  Ethical Hacking courses are conducted at Atlanta Computer Institutes in Nagpur. For Classes and Batch Timings of Ethical Hacking you can contact Atlanta Computer Institute at  Mobile: 9595 321479 

EC-Council Certified Ethical Hacking (CEH)


Course Name: CEHDuration: 40 hrs.
The Certified Ethical Hacker V8 is a revolution in the field of information security training. It goes far beyond the usual courses that talk about the same old port scanning and vulnerability assessments. It goes deep down into the depths of networking, systems, web applications and actual exploitation. Here is a top reason why the CEH V8 is the ideal choice in comparison to other ethical hacking courses. EC-Council the name stands for the pioneer organisation (US Based) in the field of information security.
Take Away: After completion of this course you will be able to
Acquiring a CEH means the candidate has minimum baseline knowledge of security threats, risks and countermeasures. Organizations can rest assured that they have a candidate who is more than a systems administrator, a security auditor, a hacking tool analyst or a vulnerability tester. The candidate is assured of having both business and technical knowledge.
Target AudiencePre-requisites
  • Undergraduate students from computer background - BE (IT), BE (Comp), BCA, BSc (Comp.), BSc (IT), BCS, BCA
  • Post graduate students – MCA, MCM, MSc (IT), MSc (Comp. Sci.) etc.
  • Security officers, Auditors, Security professional’s site administrators
  • Operating System
  • Basic networking knowledge
Objectives : You will learn
  • Introduction to Ethical Hacking
  • Footprinting
  • Scanning
  • Enumeration
  • System Hacking
  • Trojans & Backdoors
  • Sniffers
  • Denial of Service
  • Social Engineering
  • Session Hijacking
  • Hacking Web Servers
  • Web Application Vulnerabilities
  • Web based Password Cracking Techniques
  • SQL Injection
  • Hacking Wireless Networks
  • Viruses & Worms
  • Physical Security
  • Linux Hacking
  • Evading Firewalls, IDSs & Honeypots
  • Buffer Overflows
  • Cryptography
  • Penetration Testing

No comments:

Post a Comment