Oh Come on moderators.... Ban this guy. I have had enough of his crap !!!!!
On 4/25/07, candra <[EMAIL PROTECTED]> wrote: > > > This course on certified ethical hacker will explore the existence and > the use of hacking tools and security systems in any network > environment. Within each domain, you will be presented with several > tools that a hacker can use, and which countermeasures are most > effective against their use. > > Some of these include: > > 1. Ethics and legal issues > 2. Footprinting techniques > 3. Scanning > 4. Enumeration > 5. System hacking > 6. Trojans and backdoors > 7. Sniffers > 8. Denial of service > 9. Social engineering > 10. Session hijacking > 11. CEH hacking web servers > 12. Web application vulnerabilities > 13. Web based password cracking > 14. SQL injection > 15. Hacking wireless networks > 16. Virus and worms > 17. Hacking novell > 18. Hacking linux > 19. IDS, Firewalls and honeypots > 20. Buffer overflows > 21. Cryptography > 22. Penetration testing methodologies > > You will begin to understand how perimeter defenses work, and then you > will move on to scanning and attacking your own networks. You will > also learn about escalated privileges, intrusion detection, DDOS > attacks, buffer overflows, and virus creation. > > For more information, you can visit our website at : > http://www.ilmuhacker.com > > Best regards, > > ilmuhacker.com > > > > > -- Shashi Kant Sharma III Yr CSE NIT, Allahabad --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "Algorithm Geeks" group. To post to this group, send email to algogeeks@googlegroups.com To unsubscribe from this group, send email to [EMAIL PROTECTED] For more options, visit this group at http://groups.google.com/group/algogeeks -~----------~----~----~----~------~----~------~--~---