Certification Trainings

Certification Trainings

Courses Description Duration
Certified Information Systems Security Professional (CISSP)
...Cryptography • Access Control... Telecommunications • and Network Security • Information Security Governance and Risk Management • Software Development Security • CISSP 10 Domains • Security Architecture and Design • Operations Security • Business Continuity and Disaster Recovery Planning • Legal, Regulations, Investigations and Compliance • Physical (Environmental) Security • Practical Tests • Chapter Review Question. 4 days
Certified Information Systems Auditor (CISA)
...Auditiing • Implementation... • Auditing Information Systems • Governance and Management of IT • Information Systems Acquisition • Development and Implementation • Information Systems Operations • Maintenance and Support • Protection of Information Assets 4 days
Certified Professional Hacker (CPH NxG)
...Social Engineering • Metasploit... • Packet • Crafting • Firewall Evasion • Hacking Networks • Hacking Servers • Hacking Database • Password Cracking (offline/online) • Application Security • SQL Injection • Cross Site Scripting • OWASP Top 10 • Zombies • Backtrack • Advance Persistent Threats • Risk Based Penetration Testing • Network Cartography • Mastering Nmap • Wireless Hacking 5 days
Certified Information Security Consultant (CISC)
...Firewall Evasion • Mastering Nmap... • Packet • Crafting • Application Security • Hacking Networks • Hacking Servers • Hacking Database • Password Cracking (offline/online) • CoBIT • SQL Injection • Cross Site Scripting • OWASP Top 10 • Zombies • Social Engineering • Advance Persistent Threats • Risk Based Penetration Testing • Backtrack • Metasploit • Wireless Hacking • Digital Forensics • Incident Response • 6 A’s of Digital Forensics • Chain of Custody • Evidence Acquisition • Evidence Preservation • Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • EnCase Forensics • Windows Live Response • Linux Live Response • Network Forensics • Packet Analysis • Log Analysis • Browser Forensics • Registry Forensics • Sysinternals • Memory Analysis • IT Act • Compliance • ISO 27001:2005 • PCI DSS • Risk Assessment • BCM • Network Cartography • ITIL 16 days, 7 Hrs/day
Certified Web Application Security Professional (CWASP)
...SQL Injection •Cross Site Scripting... • .Net Security • OWASP Top 10 • Security Prevention Controls • Threat Modeling • Application Security • Java Security • PHP Security • Secure Coding Best Practices • OWASP Secure Coding Guidelines 3 Days
Certified Ethical Hacker (CEH)
... Ethical Hacking • System Hacking... Footprinting and Reconnaissance • Scanning Networks • Enumeration • Trojans and Backdoors • Viruses and Worms • Sniffing • Social Engineering • SQL Injection • Denial of Service • Session Hijacking • Hacking Webservers • Hacking Web Applications 5 days

Ethical Hacking Training

This course goes deep down into depths of networking, systems, web applications, actual exploitation & helps beginners to take their confident first step towards information security field.

  • 6 Weeks Comprehensive Training
  • Built by Experienced Professionals
  • Regularly update on tools, techniques in course content