Footprinting through Search Engines
Network Footprinting
Website Footprinting
DNS Footprinting
Footprinting through Social Networking
Email Footprinting
Google Hacking
IP Scanner
Port Scanner
Vulnerability Scanner
Web Application Scanner
Exploits
Denail of Service(DOS)
Proxy
Checking for Email Password Hacking
Password Guessing
Browser Password Hacking
Application Password Hacking
OS Password Hacking
Server Password Hacking
CISCO Password Hacking
SNIFFER
Session Hacking
Virus
Ransomware
Keylogger
Trojon/Rat
Wireless Hacking
Kali Linux
Metasploit Framework
Switch Security- Virtual LANs
Switch Security- PORT Security
Router Security- Auto Secure
Firewall - Cisco ASA
Security Policies
Static NAT
Redirect NAT
Dynamic NAT
Port Address Translation
Web Filtering
Authentication
Logging
Site-to-site VPN (IPSec)
Remote Access VPN(IPSec)
Remote Access VPN(SSL)
Applying Reconnaissance Techniques
Analyzing the Results of Reconnaissance
Responding to Network-Based Threats
Securing a Corporate Network
Implementing Vulnerability Management Processes
Vulnerability Scanning
The Incident Response Process
Determining the Impact of Incidents
Preparing the Incident Response Toolkit
Security Information & Event Management(SIEM)
Frameworks,Policies,Controls and Procedures
Identity and Access Management
Putting in Compensating Controls
Secure Software Development
Tool Sets
© 2021 Next Tech IT Solutions. All Rights Reserved. Designed by Beedata Technology