Security Audit

Our Web Application Pentest ( WAP) attempts to address the Owasp top 10 & SANS top 20 web application vulnerabilities and other exploitable loopholes of your web application . Along with it our WAP team also test web applications for Business logic flaws that can directly or indirectly effect the functioning of application.

Trainings

We are here to help you solve your biggest query- where and how to start? CDI has brought various courses in Ethical Hacking in Chandigarh where all you technology lovers will be given the much needed push to move forward and create a niche for yourself in the field. From Beginner to Expert level we have many kinds of training patterns.

Call Us : +91-771045-0011 | +91-771045-0022

Certified Information Security Expert: Information Security Training

Time duration : 6 months

Certified Information Security expert is the 6 months training course provided by Cyber Defence Intelligence. In this course, a complete detailed study of each and every topic in the information security and ethical hacking course are taught by expert professionals, working regularly on cyber security and information security projects and having wide experience in this field.


 

What is Certified Information security Expert Training?

1. CISE has been drafted in such a pattern that it concentrates just at the right place- Making an individual a Cyber Security Expert.

2. It is the Master Course by CDI covering each and every topic in detail.

3. It has been delineated to transform a learner into a full fledged Cyber Security Specialist.

4. The course is for all those who are looking for a destination to utilize their 6 Months training time in the best way.

5. It has been specially designed for 3rd and 4th year students who want to undergo their 6 months training in the filed of Cyber Security.


 

ABOUT CERTIFIED INFORMATION SECURITY EXPERT

1. It gives full knowledge of all the aspects of Cyber Security leaving no stone unturned.

2. It provides in depth study.

3. All the subjects covered under 6 week course are studied in detail with special feature of the study of Forensics+Compliance.

4. In this course, the trainee will be provided with Study Material completely.

5. Also, live sessions will take place and one on one interaction will be given stress on.

6. Practical Demonstrations of hacking will be given.

7. Maximum exposure will be provided for all the Industry events.

8. Exams will be held.

9. Study hours will be divided into different quality sessions.

10. After 6 months, complete career assistance will be provided.


 

WHY Cyber Defence Intelligence for Information security training?

Following are the highlights of the training programs at Cyber Defence Intelligence:

1. Quality

2. Affordable

3. Expert Guidance

4. Exams

5. Professional Environment

6. Best Time-Utilization


DURATION The course is for 6 Months divided into different regular sessions.


This CISE Program is designed in a way to cover every aspect of cyber security so as to help information security enthusiast to dive in deep into the domain of cyber security . This course Prepares you to attain the knowledge to be an information security consultant.

This course goes deep down to almost each and every topic of information security: Forensics , compliance , network security and web application security . On successful completion of 6 month training a candidate can assume the stage of information security professional. He/She will be provided with career assistance only if He/She meets the criteria of minimum score in tests being conducted.

Course Detail: Overview of Topics Covered


PART 1 - NETWORK SECURITY

(TOOLS WE WILL LEARN IN THIS DOMAIN - SCAPY,NMAP,HPING3,AIRCRACK-NG SUITE )

  • Basic study of networks and Linux
  • Mastering Nmap scanner ( OS detection, service detection and more )
  • Firewall Evasion (Firewalls are just false sense of security )
  • Mastering Metasploit ( msfconsole,armitage etc)
  • Packet crafting with hping2 hping3 & scapy.
  • Nessus vulnerability scanner
  • Hacking Networks (get into network,evade firewall,grab the root access,"BE THE RULER" )
  • Hijacking Servers (the Way to hijack server goes through the creepy website hosted on it )
  • Advance persistence threats
  • WIRELESS hacking and data sniffing ( Rule the air waves)
  • Packet crafting (MODIFY IP,PACKET HEADER , PARAMETERS , be fool the server)
  • Netcat kungfu
  • Secure Network design
  • Countermeasures

PART 2 - OS AND DATABASE SECURITY

  • Possible threats to Windows OS and countermeasures
  • Linux security measures ( Taking access to /etc/shadow or /etc/users )
  • Database security principles
  • Remote computer hijacking with trojan and RAT
  • Secure windows server architecture
  • Server hardening of linux server

 

PART 3 - WEB APPLICATION SECURITY

  • Basic introduction to "How websites work"
  • Intercepting requests using burpsuit and tamper data tools
  • SQL injection attack and countermeasures (Lets play the game of tables and columns )
  • Cross site scripting attack and countermeasures ( Love javascript )
  • Security mis-configuration
  • Session hijacking.
  • Cross site request forgery attack and countermeasures ( because i love redirection)
  • Remote code execution vulnerabilty study
  • RFI & LFI ( remote file inclusion & local file inclusion ) vulnerability study
  • Denial of service (DOS) and distributed denial of service (DDOS) attacks and countermeasures ( a click and bang ! )
  • Miscellaneous web platform security issues and countermeasures
  • Website code review and secure coding principles.
  • Hands on LIVE WEBSITE ( Project)

 

PART 4 FORENSICS

  • Chain of custody & 6 A's of forensics
  • Legal study of evidence acquisition
  • Disk based forensics
  • Network Forensics
  • Data packet analysis
  • Browser and USB forensics
  • Memory analysis & windows forensics
  • Volatility and encase (tools) based forensic study

 

PART 5 COMPLIANCE

  • Basic principles of assessment & auditing
  • IT LAWS and ACTS
  • ISO 27001:2005
  • PCI DSS
  • Risk Assessment
  • BCM

 

PART 6

  • Projects and report making
  • Live Vulnerability assessment
  • Final theory & practical exam

 

Where is Course Carried out?

At the moment Cyber Defence Intelligence is providing the courses offline in Chandigarh, India. But if you are interested in learning such courses online or sitting at home from any where in the world: Check Online Training Courses. Complete satisfaction in training is provided and every student is provided full support at any time.Note: This is overview of the topics to be covered, there are much more to learn here in Cyber Defence Intelligence.

Loveleen kaur i m b.tech 7th sem Electronics n Communication engg student..i want to do my 6 months training in cyber security.. what is the procedure to take admission here or fee stucture??

Oct 7, 2017

kuljeet singh  I am interested in this course.Tell me more details about the 6 month course, and when the courses start and the how much fees. Sir,Ljsingh

Apr 22, 2017

Kuldeep Course starting date and fees??

Mar 22, 2017

jill I am interested in learning more details about the 6 month course, and when the courses start. Jill

Jan 14, 2017

Manish I am in 2nd year.Can i apply?. If so then what is the total fees of the course.Please inform me.

Nov 29, 2016

Harsha Need to know the information regarding the course details and fee structure

Nov 23, 2016

Vishal Rajwar What is the fee structure and start date ?

Nov 14, 2016

Akpa samuel okai Hell0-Greetings! I am much interested in the CDI offline training,please where can I undergo the course here in nigeria. Best regard!

Oct 13, 2016

NIKHIL KUMAR TIWARI I AM FINAL YEAR STUDENT OF M.TEch in Cyber Security.i want to a thesis for submit to final year.Can you helpwith me or make a new thesis related to cyber security.please mail me.

Sep 21, 2016

Alvaro Melo Please send me information about cost, dates to 2017 and programs of: CISE, Certified Web Application Pentester and Certified Malware Analyst. Thanks.

Aug 4, 2016

Ratika Siwan I want to know about cisc Im doing 12th

Apr 3, 2016

Jeremy I'd like to know how much the 6 month program is and when does it start?

Mar 28, 2016

Cheerag Please provide me info about the course

Mar 28, 2016

Mahmud Dear Concern, I am interested about this training. I need to know about this in details. When is this training going to start? What will be the cost? Thanks for your cooperation. Best Regards Mahmud

Feb 13, 2016

mohanduraisolomonraj I WANT STUDY ABOUT THIS COURSE PLEASE HELP ME `

Dec 31, 2015

vijay thakur I m intersted in this course

Dec 18, 2015

Martin situo I kindly want to find out the cost of the training for the six months and when is it beginning in 2016.

Dec 2, 2015

Leave a Reply

Name
Email id
Contact No
Comment

See more of Cyber Intelligence by logging in.
Connect with cyber security experts,Discover job opportunities,Online Training, Information Security Advisory and lot more.