NETWORK & INTERNET SECURITY TRAINER Model LT 02
– Theory topics are explained with the help of animation and simulation.
PC/network identification
Cryptography
SKU:
911ac614e16c
Categories: Microprocessor Trainers, Trainers
User options
-Hacker
-Tracker
Simulation techniques
HTTP technique
Brute force algorithm
View/add/edit update contents
Login history
FTP technique
Brute force algorithm
Upload/download files
Phishing technique
Compose mail/inbox
Spyware technique
Brute force algorithm
Upload/download Spyware
Virus technique
Upload/download e-mail virus
- Symmetric-key algorithms
- Public-key algorithms
- Digital signature
- Hashing function
- Management of public keys
- Stagenography
- Communication security
- Authentication protocols
- Web security
- E-Mail security
Simulated operation of hacking and tracking activities
- Hacking via HTTP
- Hacking via FTP
- Hacking via phishing
- Hacking via spywares
- Hacking via virus
- Hacking via software
RELATED PRODUCTS
Automated Sludge Sewage Treatment Plant ENV 004
Rated 0 out of 5
Ion Exchange Chamber ENV 013
Rated 0 out of 5
Marine Engineering: Water Tunnel ENV 007
Rated 0 out of 5
Spray Chamber Trainer System ENV 009
Rated 0 out of 5
Wind Power Generation AT005
Rated 0 out of 5