Your cart is currently empty.
Key Skills – Understanding application level attack, Trojan and spyware, rule-based and brute attack, Google hacking techniques, traceroot analysis, footprinting penetration test, LDAP enumeration, SuperScan, Open ports, Detecting spoofing, Hidden crypter, Trojan horse, MAC attacks, ARP spoofing attack, Session hacking, attack session mangement, SQL injection, GPS mapping tools, WiFi chalking, hacking iOS devices
Key Skills – Hybrid IT architecture, Identity and Access Management (IAM), access to IAM, subnets, Amazon VPC, network ACLs, personalized VPC, EC2 and AMI, Amazon EBS, AWS services, Elastic Container Service, Amazon S3, CloudFront
Key Skills – CAPEX and OPEX, cloud computing advantages, AWS console tour, IAM, AWS networking, VPC and its concepts, NACLS, Elastic Compute Cloud (EC2), autoscaling, AWS S3, Elastic load balancer, CloudFront, CloudTrail, SQL RDS, AWS Lambda
Key Skills – Google Cloud Services like Storage, Computing, Database, Networking & Security; Google Global Infrastructure, Machine Learning; Google Cloud Solution Design & Deployment, Google Cloud APIs, IAM, Google Cloud Migration, etc.
Key Skills – Leadership, Innovation, Entrepreneurship, Marketing, Financial Management, Corporate Finance, Managerial Economics, Strategy Management
Key Skills – Expansion cards for PC, types of connectors, TCP IP, internet connections, network troubleshooting, control panel, command line, mobile synchronization, SOHO network security, OS troubleshooting, environmental controls
Key Skills – Shell Scripting, Parameters, Variables & Arguments, Loops & Iterations, Regular Expressions & Text Manipulations, Writing Functions & Advanced Scripts, Open Source System, Booting Linux, Linux PS Commands, Package Manager, IP Configuration, etc.