Software Training Videos In Telugu
Software Training Videos In Telugu
Blog Archive
-
2011
(42)
- October(15)
-
September(27)
- Find Specific Types of Systems
- Mirror Website
- Command-Line Whois Searches
- Query Whois Databases
- Network Reconnaissance & DNS Search
- TerraServer is a commercial website[1] specializin...
- Find Information by the Target (Edgar)
- Typical Vulnerability Life Cycle
- Ec-Council Certified Security Analyst and Licensed...
- Career Academy Hacking, Penetration Testing and Co...
- Footprinting/Reconnaissance
- skill set
- Network Layer of the OSI Model
- Data Link Layer of the OSI Model
- Physical Layer of the OSI Model
- layers of osi
- The OSI Model
- Reading terms
- TCP Header format
- google terms
- google search terms
- Information Security / IT Audit - Executive / Sr E...
- Application Security Specialist - C++/Java for Top...
- Consultant & Assoc. Consultant VAPT
- Security Testing, Audit
- Information Security Analyst
- Common Responsibilities for Information Security J...
Tuesday, 27 September 2011
skill set
Candidate must have hands-on experience in Penetration and Vulnerability assessment of Internet and Intranet Scanning, Discovery, Exploiting, Detailed analysis, Review and Reporting.
Candidate must have good knowledge in Ethical Hacking tools and techniques.
Candidate must have relevant experience into Information security / Data security / forensic.
Candidate should be aware of the governing cyber laws of India.
Candidate should be expertise in Installation and Configuration of Security products, Security patches, Assist in log analysis.
Candidate must have strong knowledge in Firewalls, IDS (Intrusion Detection System), IPS (Intrusion Prevention System).
Should have In depth knowledge on Networking protocols: TCP/IP, SMTP, DNS, DHCP, POP3/IMAP, OSI, VPN (Basics), Secure Sockets Layer (SSL), PGP, IPSec.
Candidate must have 1 to 3 years experience in information security / Cyber Forensics / BCP / Incident Handling.
TRAINING / CERTIFICATIONS (ANY):
Information security/computer forensics/Cyber Law.
Certified Ethical Hacker (CEH)
Certified Security Expert
Cyberoam Certified Network & Security Professional (CCNSP)
Candidate must have good knowledge in Ethical Hacking tools and techniques.
Candidate must have relevant experience into Information security / Data security / forensic.
Candidate should be aware of the governing cyber laws of India.
Candidate should be expertise in Installation and Configuration of Security products, Security patches, Assist in log analysis.
Candidate must have strong knowledge in Firewalls, IDS (Intrusion Detection System), IPS (Intrusion Prevention System).
Should have In depth knowledge on Networking protocols: TCP/IP, SMTP, DNS, DHCP, POP3/IMAP, OSI, VPN (Basics), Secure Sockets Layer (SSL), PGP, IPSec.
Candidate must have 1 to 3 years experience in information security / Cyber Forensics / BCP / Incident Handling.
TRAINING / CERTIFICATIONS (ANY):
Information security/computer forensics/Cyber Law.
Certified Ethical Hacker (CEH)
Certified Security Expert
Cyberoam Certified Network & Security Professional (CCNSP)
Labels:
skills
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment