You are on page 1of 7

CYBER SECURITY

TRAINING

 Conducted By:- Dhruv Pandit

 Profile:-
1. Associate Member at National Cyber Safety and
Security Standards.
2. Cyber Crime Advisor at Gujarat Police.
3. Certified Penetration Tester Profession.
4. Certified Information Security Profession.
5. ISC2 Certified Cloud Security Profession.
6. Certified Ethical Hacker.
7. Cyber Security Researcher.
Courses which should be provided:-
I. Certified Cyber Security Expert.
II. Certified Forensics Expert.
III. Certified Network & System Security Expert.

Courseware:-

A.Certified Cyber Security Expert

Why Should Attend this course?


The Certified Cyber Security Expert is a completely hands-on,
real-world oriented security certification. This course is
designed by experienced security professionals focusing on
delivering the best and updated knowledge, and ensures that
you get personally mentored by the best in the business.

Check out the profiles of our team members to know more


about your mentors. This is a group of people who have
worked on prestigious international projects, presented at the
leading security conferences around the world, constantly
working on various research and developments, and written
numerous books and articles.

The best part about the Cyber security Expert Certification


program is the fact that you get a chance to try your learned
skills on hands-on practical lab sessions. This makes sure that
the learned concepts are easily imbibed by you during the
programs.
The upside of joining this program is that you will be able to
cover a wide variety of topics, starting from the basics, and
then leading up to compliance standards, and even digital
forensics and cybercrime investigations.

Contents:-
I. Introduction.
II. Footprinting & Reconnaissance.
III. Scanning Networks.
IV. Enumeration.
V. System Hacking.
VI. Malware Threats.
VII. Sniffing,
VIII. Social Engineering.
IX. Denial of Service.
X. Session Hijacking.
XI. SQL Injection.
XII. Web Servers Attacks.
XIII. Web Application Attacks.
XIV. Mobile Security.
XV. Evading IDS, Firewalls and Honeypot.
XVI. Cloud Computing.
XVII. Cryptography.

 Time Duration:-3 to 4 weeks.


 FEES:- 27,500/-
B. Certified Forensics Expert

Why Should Attend this course?


This specialist-level course in which they requires to capture
and analyze data from ‘live’ systems.

It introduces the latest guidelines and artifacts on current


Windows operating systems, and teaches essential skills for
conducting an efficient and comprehensive investigation.

This course will enable you to:

a. Develop your forensic investigation skills to an


advanced level.
b. Practice new techniques suitable for evidence
identification, capture and analysis in a ‘live’
environment..
c. Acquire an industry-recognized qualification to
support your career progress.

Contents:-
I. Computer Forensics In Today’s World.
II. Computer Forensics Investigations Process.
III. Understanding Hard Disks and File Systems.
IV. Data Acquisition and Duplication.
V. Defeating Anti-Forensics Techniques.
VI. Operating System Forensics.
VII. Network Forensics.
VIII. Investigating Web Attacks.
IX. Database Forensics.
X. Cloud Forensics.
XI. Malware Forensics.
XII. Investigating Email Crimes.
XIII. Mobile Forensics.
XIV. Forensics Report Writing and Presentation.

 Time Duration:- 3 to 4 weeks.


 FEES:- 25,000/-

C. Certified Network & System Security Expert.

 Why Should Attend this course?


This Course enables you to test the systems and
find the vulnerabilities and solve it.

Contents:-
1. Introduction of Penetration 24.system password hacking.
Testing.
2.Advance googling. 25.external system hacking.
3.Introduction of network 26.System penetration
topologies &server. testing.
4.Internal Network 27.Trojan attack.
penetration testing.
5.Network Scanning. 28.Trojan attack detection.
6.Network discovery 29.GPS location Tracing.
penetration testing.
7.Network and system utility. 30.Exploit system using
backtrack and meta spoilt.
8.Port penetration testing. 31.Using meta spoilt to
exploit a web server
vulnerability.
9.Network packet tracing. 32.Social engineering attack
using SET.
10.Network penetration 33.Website cloning.
testing.
11.Web cracking. 34.Bluetooth hacking for
selected model.
12.Phishing attack & 35.Smart phone security
penetration testing. hacking.
13.ntroduction of wifi lan 36.Android PC remote.
technology.
14.Wi-Fi forensics. 37.PC monitor by android.
15.Data Packets sniffing. 38.Android remote control.
16.Wireless penetration 39.Hack pc by android.
testing
17.web server penetration 40.Hack android phone by PC.
testing.
18.call spoofing. 41.Antihack network in
android.
19.SMS spoofing. 42.Whatsapp Hacking.
20.Password stealing. 43.Android rooting.
21.Folder security hacking. 44.Phone hacking.
22.Firewall penetration 45.Android Hacking.
testing.
23.system password 46.Smart phone penetration
recovery. testing.

 Time Duration:- 6 to 8 weeks.


 FEES:- 40,000 /-

 NOTE:- All Courses will have


live demo and the tools which we
will use they will be given to
students also.

You might also like