NETWORK & INTERNET SECURITY TRAINER Model LT 02

 

– Theory topics are explained with the help of animation and simulation.

PC/network identification

Cryptography

 

SKU: 911ac614e16c Categories: ,

User options

-Hacker

-Tracker

Simulation techniques
HTTP technique

Brute force algorithm

View/add/edit update contents

Login history

FTP technique

Brute force algorithm

Upload/download files

Phishing technique

Compose mail/inbox

Spyware technique

Brute force algorithm

Upload/download Spyware

Virus technique

Upload/download e-mail virus

- Symmetric-key algorithms - Public-key algorithms - Digital signature - Hashing function - Management of public keys - Stagenography - Communication security - Authentication protocols - Web security - E-Mail security Simulated operation of hacking and tracking activities - Hacking via HTTP - Hacking via FTP - Hacking via phishing - Hacking via spywares - Hacking via virus - Hacking via software