CYBER SEC TRAINING IN DEHRADUN
Introduction to Hacking
Types of Hackers
Data Breach
Elements of Information Security
Essential Terminology
The Security Functionality and Usability triangle
Types of attacks
Information Warfare
Threat Modeling
Network Security Zoning
Incident Management
Vulnerability Assessment
Types of Penetration Testing
Phases of Penetration Testing
Payment card Industry data security standard
Footprinting Concepts
Pseudonymous Footprinting
Internet Footprinting
Advance Google hacking Techniques
Website Footprinting
Email Footprinting
Competitive Footprinting
WHOIS Footprinting
DNS Footprinting
Using RECON-NG for Footprinting
Using Maltego for Footprinting