need students

Avg Bid (USD)
Project Budget (USD)
$250 - $750

Project Description:
Need students for my ethical hacking course contact me [The Administrator removed this message for containing contact details which breaches our Terms and Conditions.]

Chapter 1-Introduction To Hacking
-What is a Hacker
-Hacker Types
-Types of Attacks
-What is an Exploit
-Identifying Vulnerabilities
-Session Hijacking
-What a Hacker should know

Chapter 2-Email Hacking
-Phishing Attacks
-Sniffing Passwords
-Password Guessing
-Brute Force
-Password Recovering
-Email Bombing Attack
-Email Spoofing Attack
-Social Engineering Attacks

Chapter 3-Facebook Hacking

-Deleting facebook accounts
-Facebook message spoofer
-Deleting images
-Securing Accounts

Chapter 4-Website Hacking
-Website Hacking Methods
-How to find a vulerability on a Website
-SQL Injection
-Tools for Website Hacking
-Port Scanning
-Information Gathering

Chapter 5-Denial Of Service
-What is Denial Of Service
-How to Perform Denial of Service Attack
-How to prevent your Website from Denial Of Service Attacks
-How to Crash a Server

Chapter 6-Virus
-What is a Virus
-Virus Types
-How to create a virus
-How to make a virus undetectable
-How to spread a virus on the Internet
-How to protect your Computer from viruses

Chapter 7-Wireless Network Hacking
-Wireless Network Types
-Identifying Wireless Networks
-Cracking WPA Wireless Network Password
-Cracking WEP Wireless Network Password
-Cracking WPA2 Wireless Network Password
-How to Protect your Wireless Network

Chapter 8-Hiding Identity
-What is an IP Address
-How to surf anonymously on internet
-What is a proxy
-How to hide and change your IP Address
-What is a Mac Adress and how to change it
-How to find somebody IP Address and trace it
-How to remove your tracks

Chapter 9-Operation System Hacking
-Introduction to Windows
-How to Crack Windows Passwords
-Windows Vulnerabilities
-System Hacking
-Windows Tips and Tricks
-How to recover deleted files
-Mac Address Spoofing
-Increasing your System's Performance
-Introduction about Linux
-Buffer overflow Attack
-Securing your System

Chapter 10-Networking
-Introduction to Network
-Hacking Security Cameras
-Network Passwords Sniffing
-What is Switch
-What is Hub
-Network Ports

Chapter 11-Exploits
-What is an Exploit
-Exploit Types
-How to set an Exploit
-Proxy pivoting
-VPN pivoting
-Unauthorized Data Acess
-Information Leakage

Chapter 12-Backtrack
-Introduction to Backtrack
-How to install Backtrack
-How to set Metasploit using Backtrack
-Website Information gathering
-Email Collector
-DNS Spoofing
-Metasploit Backdoor
-Hacking into Remote Computer

Chapter 13-Cracking
-Introduction to Cracking
-What is a Cracker
-Cracking Software
-Cracking Hashes
-Cracking Passwords


Skills required:
eLearning, Internet Marketing, Link Building, SEO, Website Design
Hire rajatgroverrg
Project posted by:
rajatgroverrg India
Public Clarification Board
Bids are hidden by the project creator. Log in as the employer to view bids or to bid on this project.
You will not be able to bid on this project if you are not qualified in one of the job categories. To see your qualifications click here.