Oh Come on moderators.... Ban this guy. I have had enough of his crap !!!!!




On 4/25/07, candra <[EMAIL PROTECTED]> wrote:
>
>
> This course on certified ethical hacker will explore the existence and
> the use of hacking tools and security systems in any network
> environment. Within each domain, you will be presented with several
> tools that a hacker can use, and which countermeasures are most
> effective against their use.
>
> Some of these include:
>
> 1.   Ethics and legal issues
> 2.   Footprinting techniques
> 3.   Scanning
> 4.   Enumeration
> 5.   System hacking
> 6.   Trojans and backdoors
> 7.   Sniffers
> 8.   Denial of service
> 9.   Social engineering
> 10. Session hijacking
> 11. CEH hacking web servers
> 12. Web application vulnerabilities
> 13. Web based password cracking
> 14. SQL injection
> 15. Hacking wireless networks
> 16. Virus and worms
> 17. Hacking novell
> 18. Hacking linux
> 19. IDS, Firewalls and honeypots
> 20. Buffer overflows
> 21. Cryptography
> 22. Penetration testing methodologies
>
> You will begin to understand how perimeter defenses work, and then you
> will move on to scanning and attacking your own networks. You will
> also learn about escalated privileges, intrusion detection, DDOS
> attacks, buffer overflows, and virus creation.
>
> For more information, you can visit our website at :
> http://www.ilmuhacker.com
>
> Best regards,
>
> ilmuhacker.com
>
>
> >
>


-- 
Shashi Kant Sharma
III Yr CSE
NIT, Allahabad

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"Algorithm Geeks" group.
To post to this group, send email to algogeeks@googlegroups.com
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at http://groups.google.com/group/algogeeks
-~----------~----~----~----~------~----~------~--~---

Reply via email to