Trainings for Security Enthusiasts

Trainings for Security Enthusiasts

Courses Description Duration
Certified Web Application Security Professional (CWASP)
...SQL Injection • OWASP Top 10... •Application SecurityScripting • Cross Site • Security Prevention Controls • Threat Modeling • .Net Security • Java Security • PHP Security • Secure Coding Best Practices • OWASP Secure Coding Guidelines 3 days
Wireless Security
...Weak IV • WEP Security Issues... • Packet & Protocol Analysis • WarDriving • PSK • Man In The Middle (MITM) • Cracking WEP Keys • RC4 Security Hole • WPA • WPA2 • TKIP • 802.11x Packets • Wireless Authentication • Enterprise Wireless Security • Best Practices 2 Days
Virtualization and Security
...Storage Security • Cluster Protocol... Guest OS Security • Secure Designing • Types of virtualization • Virtualization Infra Security • Secure Deployment • Cluster Security • Hypervisor Security • Migration Failure • Best Practices 3 days
Certified Professional Forensic Analyst (CPFA)
...Windows Live Response • IT Act... • 6 A’s of Digital Forensics • Chain of Custody • Memory Analysis • Evidence Preservation • Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • EnCase Forensics • Evidence Acquisition • Linux Live Response • Network Forensics • Packet Analysis • Log Analysis • Browser Forensics • Registry Forensics • Sysinternals • Digital Forensics • Incident Response 4 days
Network Security
...Nmaping the Network• VPN Testing... • Packet & Protocol Analysis • Security Architecture & Design • DMZ Configuration • Portscan • Service Enumeration • Device Auditing • Configuration Review • Firewall Rule Based Auditing • Vulnerability Scan • Network Cartography • Wireless Security • Best Practices 2 Days
Operating Systems Security
...Principle of least privilege • Linux... • Active Directory • Domain Controller • Service Enumeration • Roles & Privileges • Patch Management • Permission • Basic Security Module • Solaris • Web Server Security • Hardening Services • Windows • IIS • Apache • Best Practices 2 Days
Database Security
...MS SQL Server • TNS Listener Security... Configuration • Vulnerability Scan • Enumerating Database Parameters• Default v/s Secured Installation • Oracle • SQL Server Dangerous Procedures • MySQL • TRACE in MySQL • Security 2 Days

Ethical Hacking Training

This course goes deep down into depths of networking, systems, web applications, actual exploitation & helps beginners to take their confident first step towards information security field.

  • 6 Weeks Comprehensive Training
  • Built by Experienced Professionals
  • Regularly update on tools, techniques in course content