Aakash Android Application Programming Workshop for Students

Aakash Android Application Programming Workshop for Students

Enroll here on or before 16 Feb

http://www.it.iitb.ac.in/nmeict/moodlelink.do

for moodle login

http://www.it.iitb.ac.in/nmeict/home.do

Good Health Without Medicines

Our Ancient Science

Stay Happy without Medicines

From community to community

http://98.130.113.92/stay_happy_without_medicine.zip

( Download from Here )

Courtesy: Late Shri Rajiv Dixit

Open Source Technology (18.02.2013 to 22.02.2013)

Open Source Technology (18.02.2013 to 22.02.2013)

STC on OPEN SOURCE TECHNOLOGY (18.02.2013 to 22.02.2013) at NITTTR Chandigarh

Apply Online

Detail Contents

OVERVIEW OF OPEN SOURCE TECHNOLOGY

VIRTUALIZATION, OPEN SOURCE SOFTWARES AND INSTALLATION

DATA MINING USING WEKA

RESERACH DOCUMENTS USING MENDELY

PODCASTS AND SCREENCASTS USING OPEN SOURCE

CONTENT MANAGEMENT USING OPEN SOURCE JOOMLA

CYBER ATTACKS AND FORENSIC TOOLS USING BACKTRACK

ANDROID APPS DEVELOPMENT

SCILAB PROGRAMMING


Apply Online

Cyber Forensics and Information Security from 28/01/2013 to 08/02/2013

Cyber Forensics and Information Security
Course Duration : 28/01/2013 to 08/02/2013
Venue : Govt. College of Engg and Technology, Bikaner( Raj)

Detail Contents

Overview of Information Security

Overview of Cryptography

Cryptography Techniques and Algorithms

Digital Signatures and Email Security

Wireless Threats and Security

Cyber Crime and Threats

Cyber Crime Investigation Models

IP Security
Practical Implementation of Digital Signatures

Proxy Websites, Proxy bouncing, VPN Tunnel Proxy

Installation and Setup of Open Source Forensic Tools

e-Commerce Hacking, SQL injections, Social Engineering

Privilege Escalation, Hacking Windows Password, Changing DNS records

Man-in-Middle Attack and Packet Analysis

Information Security Implementation using ADS

Metasploit Hacking, Taking webcam snapshots, Remote key-logging,changing the timestamp of documents (HJ)

Metasploit Hacking, Firewall bypassing and cracking Anti-Virus

Port Security, E-mail Tracing, DDOS Attack,MD5 Hash Cracking, Web File Harvesting

Cyber Forensics, System Password Recovery/Hacking

Wi-Fi hacking and Security Measures (Cracking WEP)