Expert Advice Logo  Expert Advice

Junior Cyber Expert facebook

Junior Cyber Expert (JCE)


 

Duration
1 MONTHS

Fee (INR)
₹ 5,000

The purpose of this training program is to provide individuals with the necessary knowledge and skills to protect their information assets and digital devices. Specially Design for Kids.


Benefits

Secure you from digital world
Secure you from digital financial fraud
Secure you from online shopping fraud
Secure you from valuable data loos in future

Course Contents

    • ➥ Introduction Of Internet
    • ➥ How Does Internet Works?
    • ➥ Network Introduction
    • ➥ IP Address and Architecture
    • ➥ Introduction of Web Server/ISP
    • ➥ Devices Used in ISP Architecture
    • ➥ Information Security
    • ➥ Hacking Explained
    • ➥ 5 Phases For Hackers & Investigator
    • ➥ Social Engineering
    • ➥ Social Engineering Techniques
    • ➥ Need Of Ethical Hacker
    • ➥ Kali Linux : OS for Hackers
    • ➥ How To Install Kali Linux in VMware
    • ➥ Installing Dual Boot Kali Linux
    • ➥ Live USB of Kali Linux
    • ➥ Introduction Of Penetration Testing
    • ➥ Need Of Penetration Testing
    • ➥ Security Audits Vs Vulnerability Assessment Vs Pen Test
    • ➥ Types Of Penetration Testing
    • ➥ Phases Of Penetration Testing
    • ➥ Security Testing Methodology
    • ➥ Footprinting Concept
    • ➥ Benefits Of Footprinting
    • ➥ Footprinting Methodology
    • ➥ Footprinting Through Search Engine
    • ➥ Footprinting Using Advanced Google Hacking Techniques
    • ➥ GHDB Database
    • ➥ Search Diggity Tool
    • ➥ Footprinting Through Social Networking Websites
    • ➥ Website Footprinting
    • ➥  WHOIS Foot printing
    • ➥ DNS Footprinting
    • ➥ Recon-NG
    • ➥ Browser Security
    • ➥ Email Option
    • ➥ Email Security
    • ➥ Secure Access Of Facebook
    • ➥ Secure Use of Twitter
    • ➥ Banking Transaction
    • ➥ Secure And Safe Banking Transaction
    • ➥ Introduction to Digital Data & Security
    • ➥ Prevent Data from Cut, Copy And Paste
    • ➥ Restrict Pen Drive from Computer
    • ➥ USB Port Security
    • ➥ Udrive & Storage Devices Security
    • ➥ Monitoring Folder Activity
    • ➥ Unrecoverable Delete
    • ➥ Tracking Computer Activity
    • ➥ Virus Protected Computer With Antivirus
    • ➥ Remove Malware, Spyware, Rootkit , Backdoor, Trojan From Computer
    • ➥ Computer Security
    • ➥ Window Tips
    • ➥ File Sharing Using Cloud System
    • ➥ Google Drive & Dropbox.Com
    • ➥ Funny Tricks Using Regedit
    • ➥ Hardware Introduction
    • ➥ Typing
    • ➥ MS Word
    • ➥ Software Installation


Eligibility

7th Standard.

For Whom?

Any Computer/Laptop User
Net Banking User
Smartphone User
Online Shopping User
Parents
Guardian
Teachers
Head of Employees

Career Opportunities

Personal use

Student Kit

  Hard page Book
  Printable Digital Copy Material
  Necessary Tool (Academic Version)
  Course Certificate