• OSI Model,TCP/IP Model, Networking Devices & Peer-Peer Networking
  • Introduction to Ethical hacking & its Phases
  • System Security
  • Viruses And Worms
  • Sql Injections & shell Uploading  and  much more..

 

Duration: 2 Months

Leave a Reply

Your email address will not be published. Required fields are marked *