Skip to main content

White Hat Hacker -


"Certified WhiteHat Hacker (CWHH)", a course that will be helpful for a person to get into the Ethical Hacking world. - 

Why CWHH? 
There are totally 5 Lakhs security professional needed in India. People do a general certification course to get into the InfoSec field.  But most of them lack the tech knowledge needed for cyber security.  There are countable number of whitehat hackers who are at cyber security.  CSPF felt that there is need for creating awareness on cybersecurity and Ethical Hacking practices for students in colleges. 

How many levels are in CWHH and can you give more info on that? 
CWHH level-I is subsidized course on Ethical Hacking for college students.  It happens in two ways, most often colleges invite us to do the course in their premises;The second method, we announce the course in common place where students of all colleges can register online and do attend the course.  

CWHH level-II focuses on advanced cybersecurity and provides hands on training.

CWHH level-III and CWHH level-IV are for advanced users. It will be imparted to candidates from corporate who have minimum 2 experience in cybersecurity. We will conduct psychometric test to assess ethics of a person.

CWHH level-V is awarded to white hat hackers who are talented by themselves.  It is mostly given to exploit finders and exploit writers.  It is more given as mark of respect.  CSPF  invites applications from such talented experts.

See more at: http://www.ehackingnews.com/2013/10/certified-whitehat-hacker-training.html#sthash.7fK2qeXY.dpuf

WhiteHat Hacker Level I

 

The Course Contents are:

a)    Introduction.

b)    Information Gathering.

c)    Email Hacking Methodologies.

d)    Password Cracking Techniques.

e)    Sniffing and MITM’s.

f)    Google Hacking.

g)    Facebook Hacking.

h)    Proxies and Anonymity.

i)     Deep Dark Web.

j)     Incapsula Introduction.

k)    Windows Hacking.

l)     Sandboxing and Virtual Machines.

m)  Session Hijacking.

n)    Website Hacking Techniques/Web Application Hacking Techniques.

 o)    Social Engineering.

p)    Hacking Online Games.

q)    Hands on DEMO of various Security Tools.

r)    Credit Card Frauds.

s)    Backtrack Basics.

t)     Steganography.

 

Refer : http://www.meraevents.com/event/39805

Comments

Popular posts from this blog

IPv4 header to requests when a client is using IPv6

  What is Pseudo IPv4? As a stopgap to accelerate the adoption of IPv6, Cloudflare offers Pseudo IPv4 which supports IPv6 addresses in legacy applications expecting IPv4 addresses. The goal is to provide a nearly unique IPv4 address for each IPv6 address, using Class E IPv4 address space, which is designated as experimental and would not normally see traffic. To learn more see  here . Options Add header:  Add additional Cf-Pseudo-IPv4 header only Overwrite headers:  Overwrite the existing Cf-Connecting-IP and X-Forwarded-For headers with a pseudo IPv4 address Cloudflare

Intrusion detection system

An   intrusion detection system   ( IDS ) is a device or   software application   that monitors network or system activities for malicious activities or policy violations and produces reports to a management station.  IDS come in a variety of “flavors” and approach the goal of detecting suspicious traffic in different ways. There are network based (NIDS) and host based (HIDS) intrusion detection systems. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system.  Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, and reporting attempts. In addition, organizations use IDPSes for other purposes, such as identifying problems with security policies, documenting existing threats and deterring individuals from violating security policies.  IDPSes have become a necessary addition to the security infrastru...

Amazon AWS - Cloudfront configuration

Amazon Cloudfront Dynamic Content Delivery HTTP GET and HEAD   requests are currently supported by Amazon CloudFront. Over time, we will add support for POST requests.   Our sample setup You can convert your existing blog or setup a new blog from scratch to use cloudfront. For demonstration purpose, I'm going to setup a new blog called www.contentdeliverynetworklog.com and serve the whole blog via cloudfront as follows: Blog domain name:   www.contentdeliverynetworklog.com   (CNAME to cloudfront) Blog origin domain name:   cp.contentdeliverynetworklog.com . To fetch web content from this origin web server. Static asset domain name:   s0.contentdeliverynetworklog.net   (CNAME to cloudfront). Static asset origin domain name:   origin.contentdeliverynetworklog.net . Custom origin IP address for both static/dynamic assets:   75.126.153.203 Caching ruleset for your dynamic and static assets: I am going to use a combination of Batca...