Beginners Trainings

CoursesDescription
IIEH Information Security
Linux Live Response • Packet
• Mastering NmapCrafting
• Firewall Evasion
• Hacking Networks
• Hacking Servers
• Hacking Database • Password Cracking (offline/online)
• Application Security • SQL Injection
• Cross Site Scripting • OWASP Top 10 • Zombies • Social Engineering • Advance Persistent Threats
• Risk Based Penetration Testing • Backtrack • Metasploit • Wireless Hacking • Digital Forensics
• Incident Response • 6 A’s of Digital Forensics • Chain of Custody • Evidence Acquisition • Evidence Preservation
• Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • EnCase Forensics • Windows Live Response
• Network Cartography • Network Forensics • Packet Analysis • Log Analysis • Browser Forensics • Registry Forensics
Sysinternals • Memory Analysis • IT Act • Compliance • ISO 27001:2005 • PCI DSS • Risk Assessment • BCM • CoBIT • ITIL

IIEH Information Security
Linux Live Response • Packet
• Mastering NmapCrafting • Firewall Evasion • Hacking Networks • Hacking Servers
• Hacking Database • Password Cracking (offline/online)
• Application Security • SQL Injection
• Cross Site Scripting • OWASP Top 10 • Zombies • Social Engineering • Advance Persistent Threats
• Risk Based Penetration Testing
• Backtrack
• Metasploit • Wireless Hacking
• Digital Forensics
• Incident Response
• 6 A’s of Digital Forensics
• Chain of Custody
• Evidence Acquisition
• Evidence Preservation
• Dead v/s Live Forensics
• Disc Based Forensics • Forensics Imaging
• EnCase Forensics • Windows Live Response
• Network Cartography • Network Forensics • Packet Analysis • Log Analysis • Browser Forensics • Registry Forensics
Sysinternals • Memory Analysis • IT Act • Compliance • ISO 27001:2005 • PCI DSS • Risk Assessment • BCM • CoBIT • ITIL

IIEH Security and Forensics Analyst
Firewalls • Secure Network Design
• DMZ • VLAN • TCP/IP Fundamentals • IDS/IPS • WLAN Security • Operating System Security
• Database Security • Network Cartography • Exploitation • Social Engineering • Digital Forensics • Chain of Custody
• Incident Response
• Evidence Collection
• Disc Based Forensics
• Network Forensics
• Log Analysis • EnCase • IT Act

Ethical Hacking for Beginners
…Backtrack • Firewall Evasion…
Crafting • Metasploit • Hacking Networks • Hacking Servers • Hacking Database
• Password Cracking (offline/online) • Application Security • SQL Injection • Cross Site Scripting
• OWASP Top 10 • Zombies • Social Engineering • Advance Persistent Threats • Risk Based Penetration Testing
• Network Cartography • Mastering Nmap • Packet • Wireless Hacking

Network Security & Exploitation
…Fingerprinting & Footprinting • Google hacking…
Portscanning • Mastering Nmap • Netcat Kungfu • Packet crafting using hping3 • Nessus Vulnerability scanner
• GFI scanner • Getting into the system • Secure Network design • DMZ
• VLANs • Firewalls • IDS / IPS • Wireless LAN Security

Web App & Wifi Security Training
…OWASP Top 10 & 802.11 Standard • Proxy-Based Attack…
802.11 Protocol Analysis • 802.11 authentication types • 802.11 Discovery • Aircrack-ng Kungfu • Attacking Open Wireless Network
• WEP Cracking • Concept of IVs • WPA/WPA2 Cracking • Understanding PSK, TKIP, EAP, PEAP
• Database Fundamental • Wired Equivalent Privacy (WEP • Securing 802.11 Networks • EvilTwin Attack