The Certified Information Security Consultant is a program designed to help the security enthusiasts to venture into the domain of information security. This unique program arms you with the necessary consulting skills in order to help you make your mark in this exciting field of information security.
LATEST UPDATE: Now get the EC-Council CEH Certification as well along with the CPH and CISC!
Why should you attend this course?
The CISC is a completely hands-on, real-world oriented security certification. This course is designed by experienced security professionals focusing on delivering the best and updated knowledge, and ensures that you get personally mentored by the best in the business. Check out the profiles of our team members to know more about your mentors. This is a group of people who have worked on prestigious international projects, presented at the leading security conferences around the world, constantly working on various research and developments, and written numerous books and articles. The best part about the CISC is the fact that you get a chance to try your learned skills on hands-on practical lab sessions. This makes sure that the learned concepts are easily imbibed by you during the programs. The upside of joining this program is that you will be able to cover a wide variety of topics, starting from the basics, and then leading up to compliance standards, and even digital forensics and cybercrime investigations.
How does the CISC Training work?
The CISC is an 16 day (or 8 weekends) training program, which comprehensively covers all the main aspects of information security. Our training experts help you clear the basic concepts, discuss technical issues, and take you through the various real time scenarios.
The CISC training is for those candidates who have background in IT and are enthusiastic to learn about information security by filling the missing gaps in the security domain knowledge or skills. Say for instance, that you've been a network administrator and are very well-versed with firewall configurations, VLANs, Active Directory, etc. However, you may lack knowledge regarding the compliance standards such as ISO 27001, ISO 20000, BS 25999, or how to do security auditing of databases and operating systems, etc. Here, the CISC profile fits perfectly and helps you to develop and have well-rounded portfolio of information security skills.
What is Practice/Advanced Labs and how do I benefit from it?
The USP of the CISC Program is the fact that we provide students a platform to practice stimulating real world scenarios with a lab that hosts multiple applications and servers. The lab is constructed with many levels of interactive challenges and fun exercises that keep you hooked and interested to try out your testing skills. This in turn greatly increases your hands-on experience and hence your confidence levels to conduct VAPT’s on actual assignments.
What are the benefit after the completion of CISC course?
A world of opportunities open up for you after the completion of CISC course. You can seek out better opportunities as security consultant or analyst in other firms or get a chance to do a short internship project at NII. As an added bonus, you also get a chance to groom your presentation skills such as communication and report writing which are the necessary things to be a successful security consultant. You also get to have 3 certifications such as CPH, CPFA and CISC with this unique program which gives you an extensive and rich experience of information security field.
What are my options after the CISC?
The whole world opens up to you after the CISC. The opportunities are many and quite lucrative. Depending on your previous experience, and your performance during the CISC:
- The CIA Triad
- Identification, Authentication and Authorization
- Security Principles and Models
- Reconnaissance Concepts
- Internet Suite (TCP/IP) Fundamentals
- Network Cartography
- Social Engineering
- Password Cracking
- Hacking Servers
- Hacking Web Applications
- Proxy Based Attacks
- Covert Hacking
- Hacking Wireless 802.11 Networks
- Network Attacks - Types and Sources
- Architecture Security
- Secure Network design
- Concept of Network Segregation (DMZ)
- Administration Controls
- Security Auditing Methodologies
- Network Device Configuration Review
- Firewall Review
- Intrusion Controls (IDS/IPS)
- Testing VPN Networks
- WLAN Security
- Windows 2008 Server Security
- Linux Security
- Security in Oracle Database Systems
- Security in MS SQL Database Systems
- Web Application Vulnerabilities
- OWASP Top 10 Overview
- Secure Coding Techniques
- Standards & Methodologies
- Digital Forensics Fundamentals
- Understanding Events &Incidents
- Defining Forensics Process
- Incident Response
- Digital Forensics Essentials - The six A's
- Preserving the Chain of Custody
- Disk Based Forensics
- EnCase Forensics
- Live Forensics
- Windows Forensics
- Linux Forensics
- Memory Forensics
- Network Based Forensics
- Log Analysis
- Forensics with Open Source Distro
- Auditing Principle
- Information Security Management System
- Risk Assessment
- Business Continuity
- PCI DSS
- ITIL Framework Overview
- Cobit Framework Overview
The course is designed to cover infosec from depth & cover many aspects (Forensics, Network, System etc.). The course material is good. Trainers are friendly, knowledgeable and approachable.
Overall a very good course. It covered various different topics. In Summary, happy with training course.
Excellent and knowledgeable faculty. I would recommend CPH aspirants to join IIS for their certifications.
I have cleared all my concepts about hacking, cyber forensics, auditing & compliance, from this course. All the trainers and management persons are co-operative.
The course is very relevant and the trainers are good. I have no regrets. The time and the money is well spent.
Overall course is excellent.
Ajeet K. Mishra
Faculties were very knowledgeable & helpful. Provided relevant examples for the better understanding.
Just like to say overall it was more than good .
In IIS came to know exact meaning of Security. Thanks to all trainers & management for being helpful. CISC course is overall excellent!
I have never felt so enthusiastic before joining IIS for any trainings
Sumit Shrivastava, Student
The course has comprehensively taught me loads of core concepts absolutely essential in order to strengthen the knowledge base. Besides introducing me to a variety of tools and aspects of Information Security, it has also imparted a positive outlook in me. I had never imagined that I would be learning so much in such a little span of time
Sameer Modgi, Student
The Environment is conducive good and has enough training material and equipment. Support Staff are also good , friendly and always available for any assistance required. I extend my thanks to our trainer Mr. Ravikant Rai for being patient, understanding and knows what he delivers.
Mrs. Eluby Chirwa, Assistant Director of Management Information System- Department of Human Resource Management and Development (HRMAD) Republic of Malawi
Good course and excellently presented by the presenter. The Marketing officer “Rutuja” was very good, helped a lot for our booking, arrangements from Malawi to Mumbai for our course. We had nice support staff like “Shruti” who arranged nice taste of Indian dishes.
Mr. Mathews F Chapuma, Assistant Director (ICT) - Department of Human Resource Management and Development (HRMAD) Republic of Malawi
I Salute the IIS for pursuing Information Security course which is one of the mission critical component in managing our organization assets. The course is hard to obtain in my region. I applaud the coordination , support and assistance rendered by the Marketing team to ensure that the course is conducted and supported to its extended objectives. I also salute the instructor for the delivering the course.
Mr. Jerome N. M. Kawonga, Deputy Director of Management Information System- Department of Human Resource Management and Development (HRMAD) Republic of Malawi