hi
i completed as/400 course. I want to give certification test
in as/400 so please give me information in various type of
certification in as/400 and criteria place full information ?

Answer Posted / maniarasan

Learn the latest computer security tools & techniques of
Ethical Hacking from world-renowned Computer Security Guru
Ankit FadiaTM and open various career opportunities for
yourself.

New, advanced Program Contents

Ankit FadiaTM Certified Ethical Hacker (AFCEH) 4.0 is a
one-of-its-kind certification program in Ethical Hacking
that aims at training and certifying a whole new generation
of world-class Ethical Hackers in the field of computer
security.

AFCEH 4.0 updates you on the most dangerous computer
security vulnerabilities and teaches you newly discovered
techniques to safeguard computer systems.

The program contains new and comprehensive training
material, content, lectures and books on the latest tools,
techniques and methods being used in the field of computer
security.

Program Format
This program will be taught on a blended e-learning format,
utilizing Video-on-Demand and Video Conferencing at Reliance
World.

Program Duration
1 Month

Program Fee
Rs. 6999 including taxes

Free Books
Register for AFCEH 4.0 and get eight international
Bestsellers on Computer Security worth Rs. 1900 absolutely
free and Fadia's favorite tools & scripts.

Program Contents

1. Planning an Attack

IP Addresses
Enumerating Remote Systems
Hiding Your IP Address
Tracing an IP Address

2. Preparing an Attack

Network Reconnaissance
Port Scanning
Daemon Banner Grabbing and Port
Enumeration
ICMP Scanning
Firewall Enumeration
OS Detection
Sniffing

3. Hacking Windows

Introduction
Passwords
The Look and Feel
Security Checklists

4. Network Hacking

5. Email Hacking

Introduction
Tracing Emails
Email Forging
The Post Office Protocol (POP)
Mailbombing
Cracking Email Accounts
Securing Email

6. Instant Messenger Hacking

7. Web Hacking

8. Input Validation Attacks

9. Buffer Overflows

10. Intellectual Property Thefts

Introduction & Case Studies
Trojans
Sniffers
Keyloggers
Spyware Software
Traditional Data Hiding Techniques

11. Social Engineering Attacks

12. Password Cracking Decrypted

13. TCP/IP: A Mammoth Description

14. Identity Attacks

Introduction
Proxy Servers
IP Spoofing
Onion Routing

15. Computer Forensics

16. DOS Attacks

17. Cryptography, Firewalls and Error Messages

18. Batch File Programming

19. Viruses Torn Apart

20. Wireless Hacking

21 .Windows Vista Security Analysis

22. USB Hacking

23. System Hacking

24. UNIX Security Loopholes

25. Investigating Cyber Crimes

26. Intrusion Detection Systems

27. Windows 7 Security

28. Advanced Windows Vista Security

29. War Driving

30. Road Sign Hacking

31. Social Networking Website Hacking (Orkut, Facebook,
MySpace & Twitter)

32. Top Security Threats of 2008

33. Software Hacking

Software Piracy Protection Mechanisms CD Copy Protection
Mechanisms Crack it!

AFCEH 4.0 also contains new secrets, tips and tricks on all
the above mentioned topics like scanning, network
reconnaissance, windows hacking, password cracking, email
hacking, DOS attacks, social engineering and many others.

Maniarasan R
Contact : 91 9382662002
044 - 32980013

Is This Answer Correct ?    4 Yes 12 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Can somebody please send me the TERADATAv12 Dumps on my mail id: mushahid.qureishi@gmail.com

1511


I am planning to take informatica 9.x certification.Looking for Informatica 9.x certification dump.

2380


I want take up LoadRunner Testing Certification. Can anyone send me material for that?

2003


1. What is Active Directory? 2. What is LDAP? 3. Can you connect Active Directory to other 3rd-party Directory Services? Name a few options. 4. Where is the AD database held? What other folders are related to AD? 5. What is the SYSVOL folder? 6. Name the AD NCs and replication issues for each NC 7. What are application partitions? When do I use them 8. How do you create a new application partition 9. How do you view replication properties for AD partitions and DCs? 10. What is the Global Catalog? 11. How do you view all the GCs in the forest? 12. Why not make all DCs in a large forest as GCs? 13. Trying to look at the Schema, how can I do that? 14. What are the Support Tools? Why do I need them? 15. What is LDP? What is REPLMON? What is ADSIEDIT? What is NETDOM? What is REPADMIN? 16. What are sites? What are they used for? 17. What’s the difference between a site link’s schedule and interval? 18. What is the KCC? 19. What is the ISTG? Who has that role by default? 20. What are the requirements for installing AD on a new server? 21. What can you do to promote a server to DC if you’re in a remote location with slow WAN link? 22. How can you forcibly remove AD from a server, and what do you do later? • Can I get user passwords from the AD database? 23. What tool would I use to try to grab security related packets from the wire? 24. Name some OU design considerations. 25. What is tombstone lifetime attribute? 26. What do you do to install a new Windows 2003 DC in a Windows 2000 AD? 27. What do you do to install a new Windows 2003 R2 DC in a Windows 2003 AD? 28. How would you find all users that have not logged on since last month? 29. What are the DS* commands? 30. What’s the difference between LDIFDE and CSVDE? Usage considerations? 31. What are the FSMO roles? Who has them by default? What happens when each one fails? 32. What FSMO placement considerations do you know of? 33. I want to look at the RID allocation table for a DC. What do I do? 34. What’s the difference between transferring a FSMO role and seizing one? Which one should you NOT seize? Why? 35. How do you configure a “stand-by operation master” for any of the roles? 36. How do you backup AD? 37. How do you restore AD? 38. How do you change the DS Restore admin password? 39. Why can’t you restore a DC that was backed up 4 months ago? 40. What are GPOs? 41. What is the order in which GPOs are applied? 42. Name a few benefits of using GPMC. 43. What are the GPC and the GPT? Where can I find them? 44. What are GPO links? What special things can I do to them? 45. What can I do to prevent inheritance from above? 46. How can I override blocking of inheritance? 47. How can you determine what GPO was and was not applied for a user? Name a few ways to do that. 48. A user claims he did not receive a GPO, yet his user and computer accounts are in the right OU, and everyone else there gets the GPO. What will you look for? 49. Name a few differences in Vista GPOs 50. Name some GPO settings in the computer and user parts. 51. What are administrative templates? 52. What’s the difference between software publishing and assigning? 53. Can I deploy non-MSI software with GPO? 54. You want to standardize the desktop environments (wallpaper, My Documents, Start menu, printers etc.) on the computers in one department. How would you do that?

2265


what is meant 'histry of arears'? and how to calculate it?

1609






hi i done IBM AS/400 course .....i want to certification any one can information about that and material of soft copy for that....please its urgent

1715


Hi Anyone kidnly assist with exam r dumps for powercenter architecture and administration i need to do the exam. forward to zuenahronoh@gmail.com

2032


is there use of doing CEIS certification by karRox for other industry rather than IBM? if yes name the company's who approve for such certifications?

1939


Please suggest for diploma engr any good certificaations or courses which will fetch a good jobs?

1672


hi, i am MBA (Mkt & Fin) 2008. from UPTU Lucknow, i would like to know, which course (or certificate) can help me to get operational job. and any detail regarding SAP in finance. thanks in advance for reply.

1483


What is antecedent certificate? Which documents come under antecedent certificate?

3093


how can do the process

1652


Business Content (BCT) is developed? true/false

1685


What is the fees of dot net? in various institutes? Frzs plz reply...

1625


For WebSphere MQ clients on some platforms, if a security exit is not defined, the values of two environment variables MQ_USER_ID and MQ_PASSWORD are transmitted to the server. On which of the following platforms are these environment variables used?

1851