Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

hi
i completed as/400 course. I want to give certification test
in as/400 so please give me information in various type of
certification in as/400 and criteria place full information ?

Answer Posted / maniarasan

Learn the latest computer security tools & techniques of
Ethical Hacking from world-renowned Computer Security Guru
Ankit FadiaTM and open various career opportunities for
yourself.

New, advanced Program Contents

Ankit FadiaTM Certified Ethical Hacker (AFCEH) 4.0 is a
one-of-its-kind certification program in Ethical Hacking
that aims at training and certifying a whole new generation
of world-class Ethical Hackers in the field of computer
security.

AFCEH 4.0 updates you on the most dangerous computer
security vulnerabilities and teaches you newly discovered
techniques to safeguard computer systems.

The program contains new and comprehensive training
material, content, lectures and books on the latest tools,
techniques and methods being used in the field of computer
security.

Program Format
This program will be taught on a blended e-learning format,
utilizing Video-on-Demand and Video Conferencing at Reliance
World.

Program Duration
1 Month

Program Fee
Rs. 6999 including taxes

Free Books
Register for AFCEH 4.0 and get eight international
Bestsellers on Computer Security worth Rs. 1900 absolutely
free and Fadia's favorite tools & scripts.

Program Contents

1. Planning an Attack

IP Addresses
Enumerating Remote Systems
Hiding Your IP Address
Tracing an IP Address

2. Preparing an Attack

Network Reconnaissance
Port Scanning
Daemon Banner Grabbing and Port
Enumeration
ICMP Scanning
Firewall Enumeration
OS Detection
Sniffing

3. Hacking Windows

Introduction
Passwords
The Look and Feel
Security Checklists

4. Network Hacking

5. Email Hacking

Introduction
Tracing Emails
Email Forging
The Post Office Protocol (POP)
Mailbombing
Cracking Email Accounts
Securing Email

6. Instant Messenger Hacking

7. Web Hacking

8. Input Validation Attacks

9. Buffer Overflows

10. Intellectual Property Thefts

Introduction & Case Studies
Trojans
Sniffers
Keyloggers
Spyware Software
Traditional Data Hiding Techniques

11. Social Engineering Attacks

12. Password Cracking Decrypted

13. TCP/IP: A Mammoth Description

14. Identity Attacks

Introduction
Proxy Servers
IP Spoofing
Onion Routing

15. Computer Forensics

16. DOS Attacks

17. Cryptography, Firewalls and Error Messages

18. Batch File Programming

19. Viruses Torn Apart

20. Wireless Hacking

21 .Windows Vista Security Analysis

22. USB Hacking

23. System Hacking

24. UNIX Security Loopholes

25. Investigating Cyber Crimes

26. Intrusion Detection Systems

27. Windows 7 Security

28. Advanced Windows Vista Security

29. War Driving

30. Road Sign Hacking

31. Social Networking Website Hacking (Orkut, Facebook,
MySpace & Twitter)

32. Top Security Threats of 2008

33. Software Hacking

Software Piracy Protection Mechanisms CD Copy Protection
Mechanisms Crack it!

AFCEH 4.0 also contains new secrets, tips and tricks on all
the above mentioned topics like scanning, network
reconnaissance, windows hacking, password cracking, email
hacking, DOS attacks, social engineering and many others.

Maniarasan R
Contact : 91 9382662002
044 - 32980013

Is This Answer Correct ?    4 Yes 12 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

How can i get certificate of competency as electrical superviser if i have completed diploma in mechanical engineering at mumbai?

2104


What is difference between null Nat and NAT 0

2242


Please could anyone send me WebSphere Application Server (WAS Admin) Technical questions/certification dumps @    yogesh.birje@gmail.com? Thanks in advance

1978


For called program components that are of type transaction or report, what is true about the roll area (assuming processing will resume in the calling program). a) They run in their own roll area b) They run in the roll area of the caller c) Share the same roll area Note: I think Answer is C. Any comments?

2697


write a prog to count and print the no of negative and positive nos in a given set of nos. Test your prog with suitable set of nos. Use scanf to read the nos. Reading should be terminated when the value 0 is encountered.

1903


i have certification in Remedy Tools But anybady tell me in Hydrabad remedt certification is available and which institute and give me the address...

2212


Hi I want to do certification on security trading.Any idea ?

1908


Hi, If anyone has the Informatica power center 7 dump available for advance mapping design then please post it on the following id: garvitas@gmail.com

3297


Do you know at least 5 principles of an online system(IMS DC n CICS)?

2732


Hi I am E&C B,E graduate..From past 3 yers working in ICICI Bank non technology gruop..what certification helps me to get advatage of both Technical and banking knowledge?

2582


1. What is Active Directory? 2. What is LDAP? 3. Can you connect Active Directory to other 3rd-party Directory Services? Name a few options. 4. Where is the AD database held? What other folders are related to AD? 5. What is the SYSVOL folder? 6. Name the AD NCs and replication issues for each NC 7. What are application partitions? When do I use them 8. How do you create a new application partition 9. How do you view replication properties for AD partitions and DCs? 10. What is the Global Catalog? 11. How do you view all the GCs in the forest? 12. Why not make all DCs in a large forest as GCs? 13. Trying to look at the Schema, how can I do that? 14. What are the Support Tools? Why do I need them? 15. What is LDP? What is REPLMON? What is ADSIEDIT? What is NETDOM? What is REPADMIN? 16. What are sites? What are they used for? 17. What’s the difference between a site link’s schedule and interval? 18. What is the KCC? 19. What is the ISTG? Who has that role by default? 20. What are the requirements for installing AD on a new server? 21. What can you do to promote a server to DC if you’re in a remote location with slow WAN link? 22. How can you forcibly remove AD from a server, and what do you do later? • Can I get user passwords from the AD database? 23. What tool would I use to try to grab security related packets from the wire? 24. Name some OU design considerations. 25. What is tombstone lifetime attribute? 26. What do you do to install a new Windows 2003 DC in a Windows 2000 AD? 27. What do you do to install a new Windows 2003 R2 DC in a Windows 2003 AD? 28. How would you find all users that have not logged on since last month? 29. What are the DS* commands? 30. What’s the difference between LDIFDE and CSVDE? Usage considerations? 31. What are the FSMO roles? Who has them by default? What happens when each one fails? 32. What FSMO placement considerations do you know of? 33. I want to look at the RID allocation table for a DC. What do I do? 34. What’s the difference between transferring a FSMO role and seizing one? Which one should you NOT seize? Why? 35. How do you configure a “stand-by operation master” for any of the roles? 36. How do you backup AD? 37. How do you restore AD? 38. How do you change the DS Restore admin password? 39. Why can’t you restore a DC that was backed up 4 months ago? 40. What are GPOs? 41. What is the order in which GPOs are applied? 42. Name a few benefits of using GPMC. 43. What are the GPC and the GPT? Where can I find them? 44. What are GPO links? What special things can I do to them? 45. What can I do to prevent inheritance from above? 46. How can I override blocking of inheritance? 47. How can you determine what GPO was and was not applied for a user? Name a few ways to do that. 48. A user claims he did not receive a GPO, yet his user and computer accounts are in the right OU, and everyone else there gets the GPO. What will you look for? 49. Name a few differences in Vista GPOs 50. Name some GPO settings in the computer and user parts. 51. What are administrative templates? 52. What’s the difference between software publishing and assigning? 53. Can I deploy non-MSI software with GPO? 54. You want to standardize the desktop environments (wallpaper, My Documents, Start menu, printers etc.) on the computers in one department. How would you do that?

2753


Any peoplesoft certification is there. If it is there please send the details.

1967


Do you have a set of questions regarding to M.I.S.[Management Information System] profile(Means Excel Test)?

1223


dosto bank ki interview me challan jaroori hota h ka sbi ka interview h plz btao me

2849


how to get iso certificate and which is the best for steel wire product and bathroom accessories , and how many percent central sales tax on it , please tell me as soon as possible

1903