Cyber security certification program

At Pazane Services, we are committed to providing high-quality training that not only prepares you for certification but also equips you with the skills needed to thrive in the cybersecurity field. Join us today and take the next step in your IT career!
What We Do

Our mission is to empower individuals to build a successful career in the IT industry through comprehensive and accessible cybersecurity training programs.

We offer both onsite and online training courses, catering to a diverse audience that includes beginners and seasoned professionals alike. Our expert instructors bring real- world experience and knowledge to the classroom, ensuring that each participant gains practical skills and insights that are immediately applicable in the workforce.

Our Program

N.B. Ethical Hacking and VAPT courses will include live recorded videos, while the rest will be delivered through live sessions.

Live Training Modules

Networking

– What is Network
– IP Classifications
– Subnetting, MAC/Switch/Router/HUB – Network Topology & Architecture
– OSI Layers
– IP Header & TCP Header
– TCP 3-Way Handshake
– TCP/UDP
– Ports/Protocols
– Encoding / Encryption / Hashing

SOC Operation Concept

– What is SOC (Security Operation Center)?
– What is SIEM (Security Information and Event Management)?
– Different Levels in SOC
– Event/Incident/Alert/Monitoring/Triage/Incident Types
– True Positive/False Positive/True Negative/False Negative
– Incident Life Cycle
– CIA (Confidentiality, Integrity, Availability)
– IAAA (Identification, Authentication, Authorization, Accountability)
– Firewall
– IDS/IPS (Intrusion Detection Systems & Intrusion Prevention Systems) – Proxy
– Endpoint Protection
– EDR (Endpoint Detection Response)
– WAF (Web Application Firewall)

Malware Threats

– Malware Concepts – Trojan Concepts
– Virus and Worm

– Concepts of Malware Analysis – Countermeasures

– Anti-Malware Software
– DMZ (Demilitarized Zone)
– Risk/Threat/Vulnerability
– What is Security and Types of Security

SOC Practical

– Technologies and Tools – Setup Splunk: SPL Basic to Advanced – Creating Dashboards
– Incident Investigation
– Log Analysis
– Understanding Details about Correlation Rules
– Log Source Integration

Cloud Security

– Cloud Fundamentals
– Cloud Introductions
– Virtual Machine Deployment Using Azure Bastion – Key Vault Sharing Files via Encryption
– Development of Firewall
– DDoS Protection
– Azure Sentinel Deployment
– Creating Roles for Incident Management

Security Compliance

– Data Security Standards (PCI DSS)
– HIPAA and HITECH
– General Data Protection Regulation (GDPR) – ISO 27000

Pre Recorded Modules

Ethical Hacking

1. Getting Started with Ethical Hacking Lab

– Download and Install Metasploitable
– VM Metasploitable Basics to Advanced

– Kali Linux Basics: Terminal and CLI 2. Anonymous Online

– Best Operating Systems for Anonymity
– Setting Up for Anonymity
– Actions and Behavior Required for Anonymity – Setting Up Tor, Tails, and Proxy Tunneling

3. DOS and DDoS Ethical Hacking
– Denial of Service Attack on Wireless Networks – Live DDoS Attack Demonstration

4. Using Metasploit Operating System
– Exploiting Android Devices
– Undetectable Payloads and Backdoors

5. Ethical Hacking Using Passwords
– Hydra Attack Cracking and Hash Password Cracking – Steganography and Alternate Data Streams

6. Social Engineering Methods
– Identity Theft and Spear Phishing
– Advanced Social Engineering Techniques

7. Phishing Attacks for Ethical Hacking – Phishing Attack Demonstration

8. Wireshark and Nmap Tools
– Installing Wireshark
– Nmap Basics and Interaction

Vulnerability Assessment and Penetration Testing

– Introduction to Penetration Testing Tools
– Various Types of Attacks Including SQL Injection and Cross-Site Scripting

Interview Preparation

– Self-introduction to Real-Time Scenarion

Tools We cover

Join us today and take the next step in your IT career!