NETWORK & INTERNET SECURITY TRAINER Model LT 02

 

– Theory topics are explained with the help of animation and simulation.

PC/network identification

Cryptography

 

Item Description

User options

-Hacker

-Tracker

Simulation techniques
HTTP technique

Brute force algorithm

View/add/edit update contents

Login history

FTP technique

Brute force algorithm

Upload/download files

Phishing technique

Compose mail/inbox

Spyware technique

Brute force algorithm

Upload/download Spyware

Virus technique

Upload/download e-mail virus

Technical Specifications

– Symmetric-key algorithms
– Public-key algorithms
– Digital signature
– Hashing function
– Management of public keys
– Stagenography
– Communication security
– Authentication protocols
– Web security
– E-Mail security
Simulated operation of hacking and tracking activities
– Hacking via HTTP
– Hacking via FTP

– Hacking via phishing
– Hacking via spywares
– Hacking via virus
– Hacking via software