Beginners Trainings

Courses Description Duration
Certified Information Security Consultant Pro (CISC Pro – 6 months)
…Linux Live Response • Packet…• Mastering NmapCrafting • Firewall Evasion • Hacking Networks • Hacking Servers • Hacking Database • Password Cracking (offline/online) • Application Security • SQL Injection • Cross Site Scripting • OWASP Top 10 • Zombies • Social Engineering • Advance Persistent Threats • Risk Based Penetration Testing • Backtrack • Metasploit • Wireless Hacking • Digital Forensics • Incident Response • 6 A’s of Digital Forensics • Chain of Custody • Evidence Acquisition • Evidence Preservation • Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • EnCase Forensics • Windows Live Response • Network Cartography • Network Forensics • Packet Analysis • Log Analysis • Browser Forensics • Registry Forensics Sysinternals • Memory Analysis • IT Act • Compliance • ISO 27001:2005 • PCI DSS • Risk Assessment • BCM • CoBIT • ITIL 6 months, 4 Hrs/day
Certified Information Security Consultant (CISC- 3 months)
…Linux Live Response • Packet…• Mastering NmapCrafting • Firewall Evasion • Hacking Networks • Hacking Servers • Hacking Database • Password Cracking (offline/online) • Application Security • SQL Injection • Cross Site Scripting • OWASP Top 10 • Zombies • Social Engineering • Advance Persistent Threats • Risk Based Penetration Testing • Backtrack • Metasploit • Wireless Hacking • Digital Forensics • Incident Response • 6 A’s of Digital Forensics • Chain of Custody • Evidence Acquisition • Evidence Preservation • Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • EnCase Forensics • Windows Live Response • Network Cartography • Network Forensics • Packet Analysis • Log Analysis • Browser Forensics • Registry Forensics Sysinternals • Memory Analysis • IT Act • Compliance • ISO 27001:2005 • PCI DSS • Risk Assessment • BCM • CoBIT • ITIL 3 months, 4 Hrs/day
Certified Security and Forensics Analyst (CSFA)
…Firewalls • Secure Network Design…• DMZ • VLAN • TCP/IP Fundamentals • IDS/IPS • WLAN Security • Operating System Security • Database Security • Network Cartography • Exploitation • Social Engineering • Digital Forensics • Chain of Custody • Incident Response • Evidence Collection • Disc Based Forensics • Network Forensics • Log Analysis • EnCase • IT Act 4 months, 4 Hrs/day
Ethical Hacking for Beginners
…Backtrack • Firewall Evasion…Crafting • Metasploit • Hacking Networks • Hacking Servers • Hacking Database • Password Cracking (offline/online) • Application Security • SQL Injection • Cross Site Scripting • OWASP Top 10 • Zombies • Social Engineering • Advance Persistent Threats • Risk Based Penetration Testing • Network Cartography • Mastering Nmap • Packet • Wireless Hacking 6 Weeks 4 Hrs/day
Network Security & Exploitation
…Fingerprinting & Footprinting • Google hacking…Portscanning • Mastering Nmap • Netcat Kungfu • Packet crafting using hping3 • Nessus Vulnerability scanner • GFI scanner • Getting into the system • Secure Network design • DMZ • VLANs • Firewalls • IDS / IPS • Wireless LAN Security 6 Weeks 4 Hrs/day
Web App & Wifi Security Training
…OWASP Top 10 & 802.11 Standard • Proxy Based Attack…802.11 Protocol Analysis • 802.11 authentication types • 802.11 Discovery • Aircrack-ng Kungfu • Attacking Open Wireless Network • WEP Cracking • Concept of IVs • WPA/WPA2 Cracking • Understanding PSK, TKIP, EAP, PEAP • Database Fundamental • Wired Equivalent Privacy (WEP • Securing 802.11 Networks • EvilTwin Attack 6 Weeks 4 Hrs/day

Leave a Reply

Your email address will not be published. Required fields are marked *

Other Menu
This is the official Menu of GFSoft.download