Featured Trainings

Featured Trainings

Courses Description Duration
Certified Professional Hacker (CPH NxG)
...Backtrack • Firewall Evasion... Crafting • Metasploit • Hacking Networks • Hacking Servers • Hacking Database • Password Cracking (offline/online) • Application Security • SQL Injection • Cross Site Scripting • OWASP Top 10 • Zombies • Social Engineering • Advance Persistent Threats • Risk Based Penetration Testing • Network Cartography • Mastering Nmap • Packet • Wireless Hacking 5 days
Certified Information Security Consultant Pro (CISC Pro - 6 months)
...Linux Live Response • Packet... • Mastering NmapCrafting • Firewall Evasion • Hacking Networks • Hacking Servers • Hacking Database • Password Cracking (offline/online) • Application Security • SQL Injection • Cross Site Scripting • OWASP Top 10 • Zombies • Social Engineering • Advance Persistent Threats • Risk Based Penetration Testing • Backtrack • Metasploit • Wireless Hacking • Digital Forensics • Incident Response • 6 A’s of Digital Forensics • Chain of Custody • Evidence Acquisition • Evidence Preservation • Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • EnCase Forensics • Windows Live Response • Network Cartography • Network Forensics • Packet Analysis • Log Analysis • Browser Forensics • Registry Forensics Sysinternals • Memory Analysis • IT Act • Compliance • ISO 27001:2005 • PCI DSS • Risk Assessment • BCM • CoBIT • ITIL 6 months, 4 Hrs/day
Certified Information Security Consultant (CISC)
...OWASP Top 10 • SQL Injection... • Mastering Nmap •Crafting • Firewall Evasion • Hacking Networks • Hacking Servers • Hacking Database • Password Cracking (offline/online) • Application Security • IT Act • Cross Site Scripting • Network Cartography • Zombies • Social Engineering • Advance Persistent Threats • Risk Based Penetration Testing • Backtrack • Metasploit • Wireless Hacking • Digital Forensics • Incident Response • 6 A’s of Digital Forensics • Chain of Custody • Evidence Acquisition • Evidence Preservation • Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • EnCase Forensics • Windows Live Response • Linux Live Response • Network Forensics • Packet Analysis • Log Analysis • Browser Forensics • Registry Forensics • Sysinternals • Memory Analysis • Packet • Compliance • ISO 27001:2005 • PCI DSS • Risk Assessment • BCM • CoBIT • ITIL 16 days, 7 Hrs/day
Certified Ethical Hacker (CEH)
...Ethical Hacking • Footprinting and Reconnaissance... • Scanning Networks • Enumeration • System Hacking • Trojans and Backdoors• Viruses and Worms • Sniffing • Social Engineering • Denial of Service • Session Hijacking • Hacking Webservers • Hacking Web Applications • SQL Injection • Hacking Wireless Networks • Hacking Mobile Platforms • Evading IDS, Firewalls and Honeypots • Buffer Overflows • Cryptography • Penetration Testing • Introduction to Ethical Hacking
Exploit Development
...Shell Code • Linux Exploitation... Windows Exploitation • Linux Exploitation • Fuzzing • Windows Exploitation • Stack Smashing • SEH • DEP • ASLR • Heap-spraying • IE Off-by-One • Use of Debug Tools • Metasploit Modules • Writing Metasploit exploits 3 days
Advance Metasploit
...MSF Encoders • MSF Payload... Metasploit Modules • MSF Payload • Metasploit Modules • Creating Malicious Files • Antivirus Evasion • Cross Compilation • Shell Code • Writing Exploit Code • Exploit Automation 2 days
Mobile Security
...Permission Set Auditing • OWASP... • Application Security • Platform Security • Reverse Engineering • OWASP Mobile Security • Dissembling Mobile Application • Bring Your Own Device (BYOD) • Security Testing Methodologies 2 days
Cloud Computing Security
...Amazon AWS • Windows Azure... • Cloud Computing Features • Best Practices • OWASP Top 10 Risk • Cloud Security Alliance 3 days
Security Awareness Training
...Security Controls• Domain Scope... • Security Incidents • Security Introduction • Threats 1 Day
Emerging Security Threats & Countermeasures
...Breaking Crypto• Fingerprinting & Footprinting... • Denial of Service • Remote Code Execution • Threat Modeling • Defensive Measures 2 days
Certified Information Systems Security Professional (CISSP)
...Cryptography • Access Control... Telecommunications and Network Security • Information Security Governance and Risk Management • Software Development Security • CISSP 10 Domains • Security Architecture and Design • Operations Security • Business Continuity and Disaster Recovery Planning • Legal, Regulations, Investigations and Compliance • Physical (Environmental) Security • Practical Tests • Chapter Review Question 5 days
Advanced Reverse Engineering and Malware Analysis
...PE • APT & Malwares... This course introduces the concept of malware, how they function, their types and how they are extensively used in Advanced Persistent attacks (APT's) to siphon off the critical business information from an organization on regular basis. We start off with the concepts of Process explorer, disassembling v/s debugging with advanced debugging features. We also set breakpoints to crack down an application dissecting it to the level where malware code is present. 5 days
Faculty Development Program
...Thread Modelling• Forensics & APTs... This course puts forward the security concepts taking real time examples, practical hands on approach on how the "bad guys" infiltrate our system and also how do we implement defense strategies, incident response and countermeasures. 16 Days

Ethical Hacking Training

This course goes deep down into depths of networking, systems, web applications, actual exploitation & helps beginners to take their confident first step towards information security field.

  • 6 Weeks Comprehensive Training
  • Built by Experienced Professionals
  • Regularly update on tools, techniques in course content