Keylogger
- What is Keylogger?
- Categorization of Keystroke Loggers
- Advanced Keylogger
USB Hacking & Browser Hacking
- USB Hacking USB for Coping Data
- Blocking USB Devices
- Browser Security
Crypotography
- Introduction to Cryptography
- Advantages and uses of Cryptography
- Symmetric Algorithms Asymmetric Algorithms
Stenography
- Art of Hiding
- How Steganography Works
- Steganography Today
- Steganography With CMD
Social Engineering attacks Through SET - Set Social Engineering toolkit.
SQL Injection Concepts
- Basics of SQL
- Web Application Working
- Introduction to Server Side Technologies
- SQL injection
Social Engineering
- What is Social Engineering?
- Techniques of Social Engineering
- Attempt Using Phone, E-mail, Traditional Mail, In person, Dumpster Diving, Websites, Shoulder
- surfing, Third Person Approach.
- Spam Emails
Firewalls & Honeypots
- What Does a Firewall Do?
- What a Firewall cannot do
- How does a Firewall work?
- Types of Firewall
- Working of Firewall
Penetration Testing
- Pen Testing Concepts
- Types of Pen Testing
- Pen Testing Phases & Tools
Miscellaneous techniques:
- How to fake call
- How to fake mail
- How to trace both of the aforementioned techniques
- How to enter into any email with self made permutation machines
- Lateral thinking methods
- Also there will be Case Studies of various real time hacks!