Skip to main content

White Hat Hacker -


"Certified WhiteHat Hacker (CWHH)", a course that will be helpful for a person to get into the Ethical Hacking world. - 

Why CWHH? 
There are totally 5 Lakhs security professional needed in India. People do a general certification course to get into the InfoSec field.  But most of them lack the tech knowledge needed for cyber security.  There are countable number of whitehat hackers who are at cyber security.  CSPF felt that there is need for creating awareness on cybersecurity and Ethical Hacking practices for students in colleges. 

How many levels are in CWHH and can you give more info on that? 
CWHH level-I is subsidized course on Ethical Hacking for college students.  It happens in two ways, most often colleges invite us to do the course in their premises;The second method, we announce the course in common place where students of all colleges can register online and do attend the course.  

CWHH level-II focuses on advanced cybersecurity and provides hands on training.

CWHH level-III and CWHH level-IV are for advanced users. It will be imparted to candidates from corporate who have minimum 2 experience in cybersecurity. We will conduct psychometric test to assess ethics of a person.

CWHH level-V is awarded to white hat hackers who are talented by themselves.  It is mostly given to exploit finders and exploit writers.  It is more given as mark of respect.  CSPF  invites applications from such talented experts.

See more at: http://www.ehackingnews.com/2013/10/certified-whitehat-hacker-training.html#sthash.7fK2qeXY.dpuf

WhiteHat Hacker Level I

 

The Course Contents are:

a)    Introduction.

b)    Information Gathering.

c)    Email Hacking Methodologies.

d)    Password Cracking Techniques.

e)    Sniffing and MITM’s.

f)    Google Hacking.

g)    Facebook Hacking.

h)    Proxies and Anonymity.

i)     Deep Dark Web.

j)     Incapsula Introduction.

k)    Windows Hacking.

l)     Sandboxing and Virtual Machines.

m)  Session Hijacking.

n)    Website Hacking Techniques/Web Application Hacking Techniques.

 o)    Social Engineering.

p)    Hacking Online Games.

q)    Hands on DEMO of various Security Tools.

r)    Credit Card Frauds.

s)    Backtrack Basics.

t)     Steganography.

 

Refer : http://www.meraevents.com/event/39805

Comments

Popular posts from this blog

SSL Certificate for IIS 8 in win 2012

                                                                       SSL How to create / import and configure self signed ssl certificate for IIS 8 in win 2012 Refer : http://www.youtube.com/watch?v=BYwOMuBDhPU http://www.entrust.net/knowledge-base/technote.cfm?tn=8713 1. Go to IIS 2. Select servername(TOP) 3. Middle area iis---->server certificate-->double click-->right side chosse & click created self certificate-->Specify a friendly name---> choose certificate type & click OK 4. Select site and right side BINDINGS--->Add-->Choose type https--->enter hostname and choose SSL cerificate---> ...

How to add Microsoft Excel Application

Start Run mmc -32  or   DCOMCNFG -32 or dcomcnfg File Add Remove Snap-in Component Services Add OK Console Root Component Services Computers My Computer DCOM Config Microsoft Excel Application  Step to add:       Right click and select Properties->Select Identity Tab->Select This user and add the Administrator  accout and password  Select Security Tab, Under "Launch and Activation Permissions", Choose "Customize", Click "Edit" button, Add the everyone account and add all the Permissions        Do the same thing in "Access Permissions" and "Configuration Permissions".   Refer : http://journeytodotnetauthority.blogspot.in/2012/03/how-to-add-microsoft-excel-application.html

IIS 7 Tip # 5 Run a command when Rapid Fail Protection is triggered

Rapid-Fail Protection disables application pools if they crash multiple times within in a specified time period. This prevents the failing application pool from getting into a continuous loop of crashing and restarting. This protects other application pools running on the server as repeated failures can consume lot of system resources. When rapid-fail protection kicks in it stops the application pool that is repeatedly crashing and your clients will start getting a 503 – Service Unavailable error. An administrator will have to manually enable the application pool again. You also have to option to configure an executable to run when ever rapid-fail protection is triggered. For example below I have configured the application pool to restart the IIS service using iisreset.exe … the /rebootonerror will reboot the whole server if iisreset.exe for some reason fails to restart the services. Refer http://blogs.msdn.com/b/vijaysk/archive/2009/03/13/iis-7-tip-5-run-a-command-when-rapid-f...