All Information Security Trainings

India, Asia, Africa, Middle East, Europe, Malaysia, Singapore

Featured Trainings

Courses Description Duration
Certified Professional Hacker (CPH NxG)
...Backtrack • Firewall Evasion... Crafting • Metasploit • Hacking Networks • Hacking Servers • Hacking Database • Password Cracking (offline/online) • Application Security • SQL Injection • Cross Site Scripting • OWASP Top 10 • Zombies • Social Engineering • Advance Persistent Threats • Risk Based Penetration Testing • Network Cartography • Mastering Nmap • Packet • Wireless Hacking 5 days
Certified Information Security Consultant Pro (CISC Pro - 6 months)
...Linux Live Response • Packet... • Mastering NmapCrafting • Firewall Evasion • Hacking Networks • Hacking Servers • Hacking Database • Password Cracking (offline/online) • Application Security • SQL Injection • Cross Site Scripting • OWASP Top 10 • Zombies • Social Engineering • Advance Persistent Threats • Risk Based Penetration Testing • Backtrack • Metasploit • Wireless Hacking • Digital Forensics • Incident Response • 6 A’s of Digital Forensics • Chain of Custody • Evidence Acquisition • Evidence Preservation • Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • EnCase Forensics • Windows Live Response • Network Cartography • Network Forensics • Packet Analysis • Log Analysis • Browser Forensics • Registry Forensics Sysinternals • Memory Analysis • IT Act • Compliance • ISO 27001:2005 • PCI DSS • Risk Assessment • BCM • CoBIT • ITIL 6 months, 4 Hrs/day
Certified Information Security Consultant (CISC Fast)
...OWASP Top 10 • SQL Injection... • Mastering Nmap •Crafting • Firewall Evasion • Hacking Networks • Hacking Servers • Hacking Database • Password Cracking (offline/online) • Application Security • IT Act • Cross Site Scripting • Network Cartography • Zombies • Social Engineering • Advance Persistent Threats • Risk Based Penetration Testing • Backtrack • Metasploit • Wireless Hacking • Digital Forensics • Incident Response • 6 A’s of Digital Forensics • Chain of Custody • Evidence Acquisition • Evidence Preservation • Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • EnCase Forensics • Windows Live Response • Linux Live Response • Network Forensics • Packet Analysis • Log Analysis • Browser Forensics • Registry Forensics • Sysinternals • Memory Analysis • Packet • Compliance • ISO 27001:2005 • PCI DSS • Risk Assessment • BCM • CoBIT • ITIL 16 days, 7 Hrs/day
Certified Ethical Hacker (CEH)
...Ethical Hacking • Footprinting and Reconnaissance... • Scanning Networks • Enumeration • System Hacking • Trojans and Backdoors• Viruses and Worms • Sniffing • Social Engineering • Denial of Service • Session Hijacking • Hacking Webservers • Hacking Web Applications • SQL Injection • Hacking Wireless Networks • Hacking Mobile Platforms • Evading IDS, Firewalls and Honeypots • Buffer Overflows • Cryptography • Penetration Testing • Introduction to Ethical Hacking
Exploit Development
...Shell Code • Linux Exploitation... Windows Exploitation • Linux Exploitation • Fuzzing • Windows Exploitation • Stack Smashing • SEH • DEP • ASLR • Heap-spraying • IE Off-by-One • Use of Debug Tools • Metasploit Modules • Writing Metasploit exploits 3 days
Advance Metasploit
...MSF Encoders • MSF Payload... Metasploit Modules • MSF Payload • Metasploit Modules • Creating Malicious Files • Antivirus Evasion • Cross Compilation • Shell Code • Writing Exploit Code • Exploit Automation 2 days
Mobile Security
...Permission Set Auditing • OWASP... • Application Security • Platform Security • Reverse Engineering • OWASP Mobile Security • Dissembling Mobile Application • Bring Your Own Device (BYOD) • Security Testing Methodologies 2 days
Cloud Computing Security
...Amazon AWS • Windows Azure... • Cloud Computing Features • Best Practices • OWASP Top 10 Risk • Cloud Security Alliance 3 days
Security Awareness Training
...Security Controls• Domain Scope... • Security Incidents • Security Introduction • Threats 1 Day
Emerging Security Threats & Countermeasures
...Breaking Crypto• Fingerprinting & Footprinting... • Denial of Service • Remote Code Execution • Threat Modeling • Defensive Measures 2 days
Certified Information Systems Security Professional (CISSP)
...Cryptography • Access Control... Telecommunications and Network Security • Information Security Governance and Risk Management • Software Development Security • CISSP 10 Domains • Security Architecture and Design • Operations Security • Business Continuity and Disaster Recovery Planning • Legal, Regulations, Investigations and Compliance • Physical (Environmental) Security • Practical Tests • Chapter Review Question 4 days
Advanced Reverse Engineering and Malware Analysis
...PE • APT & Malwares... This course introduces the concept of malware, how they function, their types and how they are extensively used in Advanced Persistent attacks (APT's) to siphon off the critical business information from an organization on regular basis. We start off with the concepts of Process explorer, disassembling v/s debugging with advanced debugging features. We also set breakpoints to crack down an application dissecting it to the level where malware code is present. 5 days
Faculty Development Program
...Thread Modelling• Forensics & APTs... This course puts forward the security concepts taking real time examples, practical hands on approach on how the "bad guys" infiltrate our system and also how do we implement defense strategies, incident response and countermeasures. Days

Beginners Trainings

Courses Description Duration
Certified Information Security Consultant (CISC- 3 months)
...Linux Live Response • Packet... • Mastering NmapCrafting • Firewall Evasion • Hacking Networks • Hacking Servers • Hacking Database • Password Cracking (offline/online) • Application Security • SQL Injection • Cross Site Scripting • OWASP Top 10 • Zombies • Social Engineering • Advance Persistent Threats • Risk Based Penetration Testing • Backtrack • Metasploit • Wireless Hacking • Digital Forensics • Incident Response • 6 A’s of Digital Forensics • Chain of Custody • Evidence Acquisition • Evidence Preservation • Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • EnCase Forensics • Windows Live Response • Network Cartography • Network Forensics • Packet Analysis • Log Analysis • Browser Forensics • Registry Forensics Sysinternals • Memory Analysis • IT Act • Compliance • ISO 27001:2005 • PCI DSS • Risk Assessment • BCM • CoBIT • ITIL 3 months, 4 Hrs/day
Certified Security and Forensics Analyst (CSFA)
...Firewalls • Secure Network Design... • DMZ • VLAN • TCP/IP Fundamentals • IDS/IPS • WLAN Security • Operating System Security • Database Security • Network Cartography • Exploitation • Social Engineering • Digital Forensics • Chain of Custody • Incident Response • Evidence Collection • Disc Based Forensics • Network Forensics • Log Analysis • EnCase • IT Act 4 months, 4 Hrs/day
Ethical Hacking for Beginners
...Backtrack • Firewall Evasion... Crafting • Metasploit • Hacking Networks • Hacking Servers • Hacking Database • Password Cracking (offline/online) • Application Security • SQL Injection • Cross Site Scripting • OWASP Top 10 • Zombies • Social Engineering • Advance Persistent Threats • Risk Based Penetration Testing • Network Cartography • Mastering Nmap • Packet • Wireless Hacking 6 Weeks 4 Hrs/day
Network Security & Exploitation
...Fingerprinting & Footprinting • Google hacking... Portscanning • Mastering Nmap • Netcat Kungfu • Packet crafting using hping3 • Nessus Vulnerability scanner • GFI scanner • Getting into the system • Secure Network design • DMZ • VLANs • Firewalls • IDS / IPS • Wireless LAN Security 6 Weeks 4 Hrs/day
Web App & Wifi Security Training
...OWASP Top 10 & 802.11 Standard • Proxy Based Attack... 802.11 Protocol Analysis • 802.11 authentication types • 802.11 Discovery • Aircrack-ng Kungfu • Attacking Open Wireless Network • WEP Cracking • Concept of IVs • WPA/WPA2 Cracking • Understanding PSK, TKIP, EAP, PEAP • Database Fundamental • Wired Equivalent Privacy (WEP • Securing 802.11 Networks • EvilTwin Attack 6 Weeks 4 Hrs/day

Developers Trainings

Courses Description Duration
Certified Secure Java Developer (CSJD)
...ESAPI Framework • OWASP Top 10... • Countermeasures in JAVA • J2EE Security • Application Security • Testing Methodologies • Struts • JAAS • Authentication & Authorization • Cryptography • Framework Security • OWASP Secure Code Guidelines • Secure Coding Best Practices 3 days
Certified Secure .NET Developer (CSDD)
...Cryptography • OWASP Top 10... • Countermeasures in .Net • Testing Methodologies • Role Based Security • Code - Access Security • Application Security • Authentication & Authorization • Framework Security • OWASP Secure Code Guidelines • Secure Coding Best Practices 3 days
Certified Secure PHP Developer (CSPD)
...Security in php.ini • OWASP Top 10... • Security in php.ini • Secure File Upload• Authentication & Authorization Issues • Code - Access Security • Application Security • Authentication & Authorization • Framework Security • OWASP Secure Code Guidelines • Secure Coding Best Practices 3 days
Certified Web Application Security Professional (CWASP)
...Threat Modeling • Cross Site Scripting... • SQL Injection • Application Security • Security Prevention Controls • OWASP Top 10 • .Net Security • Java Security • PHP Security • Secure Coding Best Practices • OWASP Secure Coding Guidelines 3 days
Cloud Computing Security
...OWASP Top 10 • Windows Azure... • RiskCloud Security Alliance • Best Practices • Amazon AWS • Cloud Computing Features 3 days

Advanced Trainings

Courses Description Duration
Big Data Security Analytics
...Big Data technologies • Security Analytics... • ELK • Hadoop • Vulnerability Dashboard • Map-Reduce • Stack Smashing • SEH • Hive • Yarn • Forensic and Application Log Analysis • Data Enrichment using TI • brute-force attacks • Apache Metron 3 days
Windows Internals Essentials
...Windows Internals Essentials • Cyber Security Analysts... • LiveKD • Sysinternals Suite • Debugging Tools for Window • Masm32 • VC++/MASM32 • API function • Windows Architecture • data structures • System Mechanisms • Windbg • Object Manager 4 days
Exploit Development
...Fuzzing • Linux Exploitation... • Windows Exploitation • Shell Code • Windows Exploitation • Linux Exploitation • Stack Smashing • SEH • DEP • ASLR • Heap-spraying • IE Off-by-One • Use of Debug Tools • Metasploit Modules • Writing Metasploit exploits 2 days
Advance Metasploit
...Shell Code • Cross Compilation... • MSF Encoders • Creating Malicious Files • Antivirus Evasion • MSF Payload • Metasploit Modules • Writing Exploit Code • Exploit Automation 2 days
Mobile Security
...Application Security • OWASP... • Platform Security • Dissembling Mobile Application • Reverse Engineering • OWASP Mobile Security • Permission Set Auditing • Bring Your Own Device (BYOD) • Security Testing Methodologies 2 days
Advanced Reverse Engineering and Malware Analysis
...PE • APT & Malwares... This course introduces the concept of malware, how they function, their types and how they are extensively used in Advanced Persistent attacks (APT's) to siphon off the critical business information from an organization on regular basis. We start off with the concepts of Process explorer, disassembling v/s debugging with advanced debugging features. We also set breakpoints to crack down an application dissecting it to the level where malware code is present. 3 days
Reverse Engineering Training
...Reversing .NET applications • delphi applications... Reverse engineering is the process of discovering the technological principles of a device, object, or system through analysis of its structure, function, and operation. This allows us to visualize the software’s structure, its operations, and the features that drive its behavior. The techniques of analysis, and the application of automated tools for software examination, give us a reasonable way to comprehend the complexity of the software and to uncover its truth. 3 days

Forensics Trainings

Courses Description Duration
Certified Professional Forensics Analyst (CPFA)
...Log Analysis • Incident Response... • 6 A’s of Digital Forensics • Chain of Custody • Evidence Acquisition • Evidence Preservation • Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • EnCase Forensics • Windows Live Response • Linux Live Response • Network Forensics • Packet Analysis • Digital Forensics • Browser Forensics • Registry Forensics • Sysinternals • Memory Analysis • IT Act 4 days
Certified Digital Forensics Expert (CDFE)
...Mobile Forensics • Forensics Imagine... • Mobile Forensics • Forensics Imagine • Forensic Analysis of the evidence • Introduction to Forensics • History of Forensics • How to approach to crime scene • Computer Investigation Process • Forensic Imaging of the evidence • Forensic Analysis of the evidence • Steganography • Email Crimes • Investigating attacks • Investigating Network & log • Forensic Report Writing • Types of investigation • Becoming an Expert witness 5 days
Intrusion Detection and Analysis
...SOC Best Practices • Indian IT Act... • Wireshark • Security Information Management • OSSIM • Portscan Signature Detection • DNS Attack • RPC Buffer Overflow • SQL Injection • Incident Analysis • Concept of 6 A’s • Packet/Protocol Analysis • TCP/IP 3 days
Course for Law Enforcement
...Digital Forensics • Legal Challenges... • Tools for audit and investigation • Computer Based Fraud & Implications • Fraud Case Studies • Financial Fraud Investigation Technique 2 days
Fraud Detection, Investigation and Prevention
...Inverse Logic • Tiger Team Test... • Benford’s Theorem • Barium Test • Birbal Tricks and Traps • Accounting Fraud • Space-time dimension in data evaluation • surprise repetition in audit tests • CAAT • Evidence Collection • File Recovery • Email Tracing • Internet History • Data Dump Analysis • Transaction Log 2 days
E-Crime and Computer Forensics
...Stuxnet • Chain of custody ... • Dead Forensics • IT Act • Incident Response • Evidence Collection • Disc Based Forensics • Network Forensics • Log Analysis • EnCase • Live Forensics 4 days

Compliance Trainings

Courses Description Duration
Hipaa Training
...What is HIPAA • Examples of PHI... • What is HIPAA • Why compliance to HIPAA is important • Examples of PHI • When is health information considered identifiable • What are permitted uses of PHI • HIPAA rules • Do’s and Don’ts • HIPAA violations 1 days
IRCA Approved - ISO 27001 LA
...PDCA Cycle • Operation Management... • Audit’s DOs & DONTs • ISO2700 Series Overview • ISO 27001:2005 Requirements • IRCA Code of Conduct• Audit Planning & Preparation • Process Audit Technique • Evidence Collection • Risk Assessment Methodologies • Incident Management • CIA & DAD • Nonconformities • Observations • Corrective Action • Preventive Action • Reporting 5 days
ISO 27001 LI
...Evidence Collection • PDCA Cycle... • ISO2700 Series • Overview • ISO 27001:2005 Requirements • Audit’s DOs & DONTs • Audit Planning & Preparation • Process Audit Technique • CIA & DAD • Risk Assessment Methodologies • Incident Management • Operation Management • Nonconformities • Observations • Corrective Action • Preventive Action • Reporting 4 days
ISO 22301 LA
...BCM Life Cycle • BCM Audit... • BCM Strategy • Incident Response • Mission Critical Activities • Business Impact Analysis (BIA) • Risk Assessment • Process Level BCM • Resource Recovery • BCM v/s DRP • BCM Exercise & Maintenance • Standard v/s Specification 4 days
ISO 22301 LI
...Amazon AWS • Windows Azure... • Cloud Computing Features • Amazon AWS • Best Practices • OWASP Top 10 Risk • Cloud Security Alliance 4 days
IT Risk Management
...IT Risk Assessment • OCTAVE... • IT Risk Management Cycle • NIST • ISO 31000:2009 • Risk Mitigation 2 days
Certified Payment Industry Data Security Implementer(CPI DSI)
...PCI Requirements • PA DSS... Practices • Compliance Process • PTS • Customer Card Information • Storage Best Practices • POS terminal Security • Payment Application Security • PTS • Self-Assessment Questionnaire (SAQ) • Best Practices 3 days
Enterprise Risk Management
...COSO Framework • Risk Analysis... • Risk Assessment • Risk Evaluation • Risk Perception • Risk Treatment • BCP • ERM Essentials • Risk Monitoring • Risk Management 2 days
IT Infrastructure Library (ITIL)
...Service Design • Service Strategy... • Changes from ITIL v2 • ITIL v3 • Service Translation • Service Operation • Service Improvement • Processes definition and implementation • Functions definitions and allocation • Roles definitions and function-wise appropriation • Case Studies 2 days

Trainings for Security Enthusiasts

Courses Description Duration
Certified Web Application Security Professional (CWASP)
...SQL Injection • OWASP Top 10... •Application SecurityScripting • Cross Site • Security Prevention Controls • Threat Modeling • .Net Security • Java Security • PHP Security • Secure Coding Best Practices • OWASP Secure Coding Guidelines 3 days
Wireless Security
...Weak IV • WEP Security Issues... • Packet & Protocol Analysis • WarDriving • PSK • Man In The Middle (MITM) • Cracking WEP Keys • RC4 Security Hole • WPA • WPA2 • TKIP • 802.11x Packets • Wireless Authentication • Enterprise Wireless Security • Best Practices 2 Days
Virtualization and Security
...Storage Security • Cluster Protocol... Guest OS Security • Secure Designing • Types of virtualization • Virtualization Infra Security • Secure Deployment • Cluster Security • Hypervisor Security • Migration Failure • Best Practices 3 days
Certified Professional Forensic Analyst (CPFA)
...Windows Live Response • IT Act... • 6 A’s of Digital Forensics • Chain of Custody • Memory Analysis • Evidence Preservation • Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • EnCase Forensics • Evidence Acquisition • Linux Live Response • Network Forensics • Packet Analysis • Log Analysis • Browser Forensics • Registry Forensics • Sysinternals • Digital Forensics • Incident Response 4 days
Network Security
...Nmaping the Network• VPN Testing... • Packet & Protocol Analysis • Security Architecture & Design • DMZ Configuration • Portscan • Service Enumeration • Device Auditing • Configuration Review • Firewall Rule Based Auditing • Vulnerability Scan • Network Cartography • Wireless Security • Best Practices 2 Days
Operating Systems Security
...Principle of least privilege • Linux... • Active Directory • Domain Controller • Service Enumeration • Roles & Privileges • Patch Management • Permission • Basic Security Module • Solaris • Web Server Security • Hardening Services • Windows • IIS • Apache • Best Practices 2 Days
Database Security
...MS SQL Server • TNS Listener Security... Configuration • Vulnerability Scan • Enumerating Database Parameters• Default v/s Secured Installation • Oracle • SQL Server Dangerous Procedures • MySQL • TRACE in MySQL • Security 2 Days

Certification Trainings

Courses Description Duration
Certified Information Systems Security Professional (CISSP)
...Cryptography • Access Control... Telecommunications • and Network Security • Information Security Governance and Risk Management • Software Development Security • CISSP 10 Domains • Security Architecture and Design • Operations Security • Business Continuity and Disaster Recovery Planning • Legal, Regulations, Investigations and Compliance • Physical (Environmental) Security • Practical Tests • Chapter Review Question. 4 days
Certified Information Systems Auditor (CISA)
...Auditiing • Implementation... • Auditing Information Systems • Governance and Management of IT • Information Systems Acquisition • Development and Implementation • Information Systems Operations • Maintenance and Support • Protection of Information Assets 4 days
Certified Professional Hacker (CPH NxG)
...Social Engineering • Metasploit... • Packet • Crafting • Firewall Evasion • Hacking Networks • Hacking Servers • Hacking Database • Password Cracking (offline/online) • Application Security • SQL Injection • Cross Site Scripting • OWASP Top 10 • Zombies • Backtrack • Advance Persistent Threats • Risk Based Penetration Testing • Network Cartography • Mastering Nmap • Wireless Hacking 5 days
Certified Information Security Consultant (CISC)
...Firewall Evasion • Mastering Nmap... • Packet • Crafting • Application Security • Hacking Networks • Hacking Servers • Hacking Database • Password Cracking (offline/online) • CoBIT • SQL Injection • Cross Site Scripting • OWASP Top 10 • Zombies • Social Engineering • Advance Persistent Threats • Risk Based Penetration Testing • Backtrack • Metasploit • Wireless Hacking • Digital Forensics • Incident Response • 6 A’s of Digital Forensics • Chain of Custody • Evidence Acquisition • Evidence Preservation • Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • EnCase Forensics • Windows Live Response • Linux Live Response • Network Forensics • Packet Analysis • Log Analysis • Browser Forensics • Registry Forensics • Sysinternals • Memory Analysis • IT Act • Compliance • ISO 27001:2005 • PCI DSS • Risk Assessment • BCM • Network Cartography • ITIL 16 days, 7 Hrs/day
Certified Web Application Security Professional (CWASP)
...SQL Injection •Cross Site Scripting... • .Net Security • OWASP Top 10 • Security Prevention Controls • Threat Modeling • Application Security • Java Security • PHP Security • Secure Coding Best Practices • OWASP Secure Coding Guidelines 3 Days

Technology Trainings

Courses Description Duration
Palo Alto Training
...This training is about Palo Alto firewalls • What are Palo Alto Firewalls?... Identify the requirements to deploy Palo Alto in your network • Deploy a Palo Alto firewall in your network • NGFW • Firewalls • Next Generation Firewall Training • Cyber Security 2 days
Source Code Analysis
...What is SCA? • Need for SCA security solution... What is SCA? • Need for SCA security solution • Various types of SCA security solutions • Selection criteria for SCA security solution • Implementation strategy for SCA 2 days
NAC for wired and wireless
...Introduction to Wireless LAN Security... • Introduction to Wireless LAN Security • What is Wireless LAN Security? • Need for WLAN security solution • Various types of WLAN security solutions • Selection criteria for WLAN security solution • Implementation strategy for WLAN 2 Days
Mobile Device Management (MDM)
...Introduction to Mobile Device Management... Introduction to Mobile Device Management • What is MDM? • Need for MDM solution • Various types of MDM • Selection criteria for MDM solution • Implementation strategy for MDM 2 days
Information Rights Management
...Introduction to IRM • What is IRM?... Introduction to IRM • What is IRM? • Need for IRM solution • Various types of IRM solutions • Selection criteria for IRM solution • Implementation strategy for IRM • File Protection 2 days
Privileged Identity Management
...Introduction to PIM... • What are Privileged IDs • Need for PIM • Various types of PIM • Selection criteria for PIMs • Implementation strategy • Pre Implementation • Post Implementation 2 days
Web Application Firewall
...Introduction to WAF • What is a WAF?... • Introduction to WAF • What is a WAF? • Need for WAF’s • Various types of WAF • Selection criteria for WAF’s 2 days

CCNA Trainings

Courses Description Duration
Cisco Certified Network Associate (Routing & Switching)
...Cisco Certified Network Associate (CCNA) Routing and Switching ... Cisco Certified Network Associate (CCNA) Routing and Switching is a certification program for entry-level network engineers that helps maximize your investment in foundational networking knowledge and increase the value of your employer's network. CCNA Routing and Switching is for Network Specialists, Network Administrators, and Network Support Engineers with 1-3 years of experience. The CCNA Routing and Switching validates the ability to install, configure, operate, and troubleshoot medium-size routed and switched networks.
Cisco Certified Network Associate (Security)
...Cisco Certified Network Associate Security (CCNA Security)... Cisco Certified Network Associate Security (CCNA Security) validates associate-level knowledge and skills required to secure Cisco networks. With a CCNA Security certification, a network professional demonstrates the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. The CCNA Security curriculum emphasizes core security technologies, the installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices, and competency in the technologies that Cisco uses in its security structure.

Ethical Hacking Training

This course goes deep down into depths of networking, systems, web applications, actual exploitation & helps beginners to take their confident first step towards information security field.

  • 6 Weeks Comprehensive Training
  • Built by Experienced Professionals
  • Regularly update on tools, techniques in course content