Certification Trainings

CoursesDescriptionDuration

Certified Information Systems Security Professional (CISSP)

…Cryptography • Access Control…Telecommunications • and Network Security • Information Security Governance and Risk Management • Software Development Security • CISSP 10 Domains • Security Architecture and Design • Operations Security • Business Continuity and Disaster Recovery Planning • Legal, Regulations, Investigations and Compliance • Physical (Environmental) Security • Practical Tests • Chapter Review Question.4 days

Certified Information Systems Auditor (CISA)

…Auditiing • Implementation…• Auditing Information Systems • Governance and Management of IT • Information Systems Acquisition • Development and Implementation • Information Systems Operations • Maintenance and Support • Protection of Information Assets4 days

Certified Professional Hacker (CPH NxG)

…Social Engineering • Metasploit…• Packet • Crafting • Firewall Evasion • Hacking Networks • Hacking Servers • Hacking Database • Password Cracking (offline/online) • Application Security • SQL Injection • Cross Site Scripting • OWASP Top 10 • Zombies • Backtrack • Advance Persistent Threats • Risk Based Penetration Testing • Network Cartography • Mastering Nmap • Wireless Hacking5 days

Certified Information Security Consultant (CISC)

…Firewall Evasion • Mastering Nmap…• Packet • Crafting • Application Security • Hacking Networks • Hacking Servers • Hacking Database • Password Cracking (offline/online) • CoBIT • SQL Injection • Cross Site Scripting • OWASP Top 10 • Zombies • Social Engineering • Advance Persistent Threats • Risk Based Penetration Testing • Backtrack • Metasploit • Wireless Hacking • Digital Forensics • Incident Response • 6 A’s of Digital Forensics • Chain of Custody • Evidence Acquisition • Evidence Preservation • Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • EnCase Forensics • Windows Live Response • Linux Live Response • Network Forensics • Packet Analysis • Log Analysis • Browser Forensics • Registry Forensics • Sysinternals • Memory Analysis • IT Act • Compliance • ISO 27001:2005 • PCI DSS • Risk Assessment • BCM • Network Cartography • ITIL16 days, 7 Hrs/day

Certified Web Application Security Professional (CWASP)

…SQL Injection •Cross Site Scripting…• .Net Security • OWASP Top 10 • Security Prevention Controls • Threat Modeling • Application Security • Java Security • PHP Security • Secure Coding Best Practices • OWASP Secure Coding Guidelines3 Days

Certified Ethical Hacker (CEH)

… Ethical Hacking • System Hacking…Footprinting and Reconnaissance • Scanning Networks • Enumeration • Trojans and Backdoors • Viruses and Worms • Sniffing • Social Engineering • SQL Injection • Denial of Service • Session Hijacking • Hacking Webservers • Hacking Web Applications5 days

Leave a Reply

Your email address will not be published. Required fields are marked *

Other Menu
This is the official Menu of GFSoft.download