Workshop

 

Workshop topic details (Select a topic to view details)
Ethical Hacking / Cyber Security / Network Security
  • Introduction to Ethical Hacking
  • Legality & Ethics
  • Networking & Basics
  • Foot Printing
  • Windows Hacking
  • Google Hacking
  • Scanning
  • Enumeration
  • System Hacking
  • Windows Hacking
  • Trojans & Backdoors
  • Virus & Worms
  • Sniffers
  • Social Engineering
  • Proxy Server & Packet Filtering
  • Denial of Service Attack
  • Session Hijacking
  • Penetration Testing
  • Vulnerability Assessment
  • Physical Security
  • Hacking Web servers
  • Web Application Vulnerabilities
  • SQL Injection Vulnerabilities
  • Cryptography
  • Wireless Network Hacking and Countermeasures
  • Evading IDS, Firewalls and Detecting Honey Pots
  • Buffer Overflows
  • Project
Network Security - CCNA
  • OSI Model and TCP/IP
  • Networking Protocols
  • TCP and UDP Ports
  • Important Routing Protocols
  • Virtual Private Network (VPN)
  • Segmenting a Layer 2 Network by VLAN
  • IPv6
  • Classifications of Networks
  • IP Address
  • Connecting different devices by UTP and Serial Cable
  • Access List (ACL) and Packet Filtering
  • How a Router connects to the WAN?
  • Preventing Layer 2 Loops by Spanning Tree Protocol (STP)
  • Networking Devices and Media
  • MAC Address, DLCI, VPI/VCI
  • Routing
  • Network Address Translation (NAT)
  • Switching
  • Wireless LAN
Digital Marketing in Depth (SEO, SEM, SMO)
  • Introduction to E-Commerce and Internet Marketing
  • Advertising on Search Engines
  • E-Mail Marketing
  • Video Marketing
  • Podcast Advertising
  • Building E-Commerce Websites
  • Web Analytics
  • Mobile Marketing
  • Affiliate Marketing
  • Generating Leads and Converting Them to Business
  • SEO and Increasing Website Traffic
  • Advertising Campaign
  • Advertising on Social Networking Sites
  • Blog Advertising and Marketing
Java Programming
  • Object oriented programming using JAVA
  • User defined Packages
  • Applets
  • Util packages
  • JavaDatabase Connectivity(JDBC)
  • Creating and Reading Cookies
  • Class, Object, Inheritence
  • Exception in JAVA
  • Event handling
  • File handling
  • Java Server Page(JSP)
  • Tracking Sessions
  • Interface
  • Thread Programming
  • Abstract Window Toolkit
  • Swing
  • Servlet
Python Programming
  • Introducing Python
  • The if Statement
  • The while Statement
  • in Operator with Lists
  • Defining Functions
  • Using Global Variables and Constants
  • Using Constructor and Attributes
  • Private Attributes and Methods
  • Polymorphism
  • Using Mathematical Operators with Numbers
  • Using the in Operator
  • Accessing Dictionary values
  • The open Function
  • Handling Exceptions
  • Importing Modules
  • Creating port scanner using python
  • Creating forensic tools using Python
  • Installing Python on Windows
  • The else Clause
  • Creating and Using Lists
  • Deleting List Element
  • Using Parameters and Return Values
  • Introduction to Object-Oriented Python
  • Using Class Attributes and Static Methods
  • Controlling Attribute Access
  • Using quotes and escape character
  • Using for Loops
  • Indexing and Slicing Strings
  • Adding, Replacing and Deleting key-value pairs
  • Input from Text Files
  • Using Modules in Programs
  • Network Communications
  • Creating a HTTP banner grabber
  • Installing Python on Linux and other Operating Systems
  • Using elif Clause
  • len() with Lists
  • Common list and operations
  • Using Arguments and Defaults Parameters
  • Creating Classes, Methods and Objects
  • Understanding Object Encapsulation
  • Inheritance
  • String Concatenation and Repeater Operators
  • Using Sequence Operators and Functions with Strings
  • Using Dictionaries
  • Functions: get(), keys(), values() and items()
  • Output to Text Files
  • Writing Modules
  • Creating a socket
  • Creating packet sniffer under Linux