Security Audit

Our Web Application Pentest ( WAP) attempts to address the Owasp top 10 & SANS top 20 web application vulnerabilities and other exploitable loopholes of your web application . Along with it our WAP team also test web applications for Business logic flaws that can directly or indirectly effect the functioning of application.

Trainings

We are here to help you solve your biggest query- where and how to start? CDI has brought various courses in Ethical Hacking in Chandigarh where all you technology lovers will be given the much needed push to move forward and create a niche for yourself in the field. From Beginner to Expert level we have many kinds of training patterns.

Call Us : +91-771045-0011 | +91-771045-0022

One of the popular online database storage website Evernote was hacked today. The official Evernote Forum site is hacked affecting 164,644 members. The hackers stole the ID, password, date of birth and other private data.[caption id="attachment_332" align="aligncenter" width="278"] Evernote Forum site hacked[/caption] Evernote Forum Site Hacked As soon as the hackers hacked the Evernote Forum site, the company sent a mail to all its users to change the password of

Do you love to eat Dominos Pizza? Are you a big fan of Dominos Pizza? Have you made online account at Dominos Website? If your answer is yes to every question then you may get surprised after knowing a breaking news i.e Dominos website hacked. [caption id="attachment_302" align="aligncenter" width="433"] Dominos order pizza online[/caption] Dominos website hacked by Turkish hacker A famous Turkish group named as Ajan hacker group today hacked the official dominos

Do you use PayPal? Do you really think that the modern day method of doing the online transaction is really safe enough? If your answer is yes then you really need to think once again. See how. [caption id="attachment_286" align="aligncenter" width="554"] PayPal chargeback scam working loopwhole[/caption] What actually is PayPal? Have you heard about Ebay? PayPal is a service provided by the online E-commerce business company with which online transactions can be

One of the major cryptographic library, GnuTLS is now vulnerable to a major attack. The major vulnerability found is about the remote execution of the GnuTLS by hackers. What is GnuTLS? GNUTLS is a secure communication library that uses the major SSL, TLS, and DTLS protocols. GNUTLS is basically used when a user want to have a communicate securely and port-ably. official website: click here What's bug found in GNUTLS SSL Security? It's the GNUTLS hello flaw bug that is found by Joona

Certified Information Security Expert: Information Security Training Time duration : 6 months Certified Information Security expert is the 6 months training course provided by Cyber Defence Intelligence. In this course, a complete detailed study of each and every topic in the information security and ethical hacking course are taught by expert professionals, working regularly on cyber security and information security projects and having wide experience in this field.   What is Ce

Certified forensic analyst training (CFA)Certified Forensic analyst is course designed by Cyber Defence Intelligence to make you an expert in security and also in forensic analyst. This course is a complete package for becoming a professional and certified Forensic analyst. This course starts with the study from basics of Database security, network security, operating system security and then this goes on to the advance study of network forensics and professionals ethical hacking. This is a sho

Course ContentThis Course on Web Application Security Training covers all OWASP TOP 10 web attacks and there prevention techniques.SQL injection attack and countermeasuresXSS attack ( Cross site scripting ) and countermeasuresCSRF attack ( Cross site request forgery ) and countermeasuresRFI & LFI ( Remote file inclusion and local file inclusion) and protection techniquesSecurity mis-configurationMalicious file inclusionBroken authentication and session hijackingInsecure direct object referenceIn

Certified security ninja - 6 weeks ethical hacking and information security Training In Chandigarh Certified Security Ninja is a 6 weeks ethical hacking training and information security course which has been started in our Chandigarh branch. Ethical hacking is a expert in technology, who is employed by an IT firm or an organization to penetrate into the security of the firm or organization and check the vulnerabilities in the security of the organization. The main difference between the ethic

See more of Cyber Intelligence by logging in.
Connect with cyber security experts,Discover job opportunities,Online Training, Information Security Advisory and lot more.