Cyber security certification program
What We Do
Our mission is to empower individuals to build a successful career in the IT industry through comprehensive and accessible cybersecurity training programs.
We offer both onsite and online training courses, catering to a diverse audience that includes beginners and seasoned professionals alike. Our expert instructors bring real- world experience and knowledge to the classroom, ensuring that each participant gains practical skills and insights that are immediately applicable in the workforce.
Our Program
N.B. Ethical Hacking and VAPT courses will include live recorded videos, while the rest will be delivered through live sessions.
Live Training Modules
Networking
– What is Network
– IP Classifications
– Subnetting, MAC/Switch/Router/HUB – Network Topology & Architecture
– OSI Layers
– IP Header & TCP Header
– TCP 3-Way Handshake
– TCP/UDP
– Ports/Protocols
– Encoding / Encryption / Hashing
SOC Operation Concept
– What is SOC (Security Operation Center)?
– What is SIEM (Security Information and Event Management)?
– Different Levels in SOC
– Event/Incident/Alert/Monitoring/Triage/Incident Types
– True Positive/False Positive/True Negative/False Negative
– Incident Life Cycle
– CIA (Confidentiality, Integrity, Availability)
– IAAA (Identification, Authentication, Authorization, Accountability)
– Firewall
– IDS/IPS (Intrusion Detection Systems & Intrusion Prevention Systems) – Proxy
– Endpoint Protection
– EDR (Endpoint Detection Response)
– WAF (Web Application Firewall)
Malware Threats
– Malware Concepts – Trojan Concepts
– Virus and Worm
– Concepts of Malware Analysis – Countermeasures
– Anti-Malware Software
– DMZ (Demilitarized Zone)
– Risk/Threat/Vulnerability
– What is Security and Types of Security
SOC Practical
– Technologies and Tools – Setup Splunk: SPL Basic to Advanced – Creating Dashboards
– Incident Investigation
– Log Analysis
– Understanding Details about Correlation Rules
– Log Source Integration
Cloud Security
– Cloud Fundamentals
– Cloud Introductions
– Virtual Machine Deployment Using Azure Bastion – Key Vault Sharing Files via Encryption
– Development of Firewall
– DDoS Protection
– Azure Sentinel Deployment
– Creating Roles for Incident Management
Security Compliance
– Data Security Standards (PCI DSS)
– HIPAA and HITECH
– General Data Protection Regulation (GDPR) – ISO 27000
Pre Recorded Modules
Ethical Hacking
1. Getting Started with Ethical Hacking Lab
– Download and Install Metasploitable
– VM Metasploitable Basics to Advanced
– Kali Linux Basics: Terminal and CLI 2. Anonymous Online
– Best Operating Systems for Anonymity
– Setting Up for Anonymity
– Actions and Behavior Required for Anonymity – Setting Up Tor, Tails, and Proxy Tunneling
3. DOS and DDoS Ethical Hacking
– Denial of Service Attack on Wireless Networks – Live DDoS Attack Demonstration
4. Using Metasploit Operating System
– Exploiting Android Devices
– Undetectable Payloads and Backdoors
5. Ethical Hacking Using Passwords
– Hydra Attack Cracking and Hash Password Cracking – Steganography and Alternate Data Streams
6. Social Engineering Methods
– Identity Theft and Spear Phishing
– Advanced Social Engineering Techniques
7. Phishing Attacks for Ethical Hacking – Phishing Attack Demonstration
8. Wireshark and Nmap Tools
– Installing Wireshark
– Nmap Basics and Interaction
Vulnerability Assessment and Penetration Testing
– Introduction to Penetration Testing Tools
– Various Types of Attacks Including SQL Injection and Cross-Site Scripting
Interview Preparation
– Self-introduction to Real-Time Scenarion
Tools We cover




