Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

hi,i want to do the certification course in ethical hacking&
hacking....wats is the difference...can any one suggest the
good institutes.....wat r the fee particulars.....wat job
opportunitie will be there? thanks in advance

Answer Posted / s.m.feroz ahmed

Hi,
Ethical Hacking is something defined as think like an
Hacker and provide Counter measure to overcome hacking this
concept is called as Ethical Hacking and it covers Hacking
concept to within Ethical Hacking.Job oppurtunities
available in Ethical Hacking will be on Securities which is
a highly paid job.

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Explain Salient difference between ISO-OSI and TCP/IP models.

1863


what is scsi?. what we do if scsi/scsi drive failed?.

2335


Differentiate between IEEE 802.3, IEEE 802.4 and IEEE 802.5 standards.

4888


IN MY SYSTEM IAM USING VM WARE I INSTALLED 2003 SREVER AND TWO CLIENTS USING SAME 2003SERVER NOW I WOULD LIKE TO INSTALL EXCHANGE SREVER IN MY VM WARE IS IT POSSIBLE IF IT IS PLEASE SHOW ME A ROOT HOW CAN I

2062


hi , can you Suggest me the books (with author names) to learn Network programming from basics. Thanks in Advance... Prakash

1807


1. What ports does FTP traffic travel over? 2. What ports does mail traffic utilize? 3. What ports do HTTP and HTTPS use? 4. Why is NTP required in an NFS network? 5. Name some common mal software on the server side 6. What is CPAN? How do you access it? 7. What is PEAR? 8. What advantages does mod_perl have over a perl CGI? 9. What is required to do SSL in Apache 1.x? 10. What is Tcl? 11. What is a servlet engine/container? 12. What is BIND? 13. Name the steps to setup a slave zone in BIND 14. Name the steps to setup a primary zone in BIND 15. What commands would you use under Solaris or Linux to modify/view an LDAP tree?

2731


What is Proxy ARP

1069


What is passive topology

1154


Discuss the different factors affecting congestion control algorithms. ?

3373


what is Voltage levels of rs232x?

1179


Define Enterprise Networks

1116


Differentiate between Optical fibre and twisted pair

1578


What is ISO-OSI reference model ? Compare it with TCP/IP reference model.

1672


Explain Traffic shaping using token bucket algorithm

1500


how to take backup of BIOS ?

3233