Cinque Terre

This workshop is specifically designed to provide the right knowledge to the aspiring Cyber-Forensics & Ethical Hacking enthusiasts.White hat hacking is all about employing the white hat hacker skills to prevent the black hat hackers from damaging important information and secure your cyberspace and system from attacks.And the chief area of concern for the field of cyber security is the balanced protection of the Confidentiality, Integrity and Availability of data, also known as the CIA Triad, while maintaining a focus on efficient policy implementation and no major hampering of organization productivity.


    • Introduction
      Hacker & Cracker
      Attacker & Victims
      Most Common Attacks
      Committing a Computer Crime
      ASCII Code - making a folder invisible
      Email Threats
      Chatting Messenger
      Website Hacking
      Mobile Phone & online Apps Hacking
      Hacking chatting apps
      Hacking online database portals
      Yellow-Pages & Just Dial
      Spying through cell phone
      Call Spoofing
      Other types of Attack
      Input Validation
  • Day2

    • Network Security
      Allotment of IP Address
      IPv4 & Ipv6
      IP Address Basic, Detecting
      Ping & Ping Sweep
      Tools (Ping Sweeping)
      Foot-Printing Techniques
      Tracing Target Location
      Tools to trace
      Detecting Victim's OS
      Detecting Firewall
      Buffer Overflow
      DOS & DDOS Attacks
      Social Engineering Attacks
      Cyber Law and Consulting
      What is Cyber Law?
    Ankita Nath-7567195564
    Karansinh Chauhan-9924677710