Certification Trainings
Courses | Description |
---|---|
IIEH Systems Security Professional | Cryptography • Access Control Telecommunications • and Network Security • Information Security Governance and Risk Management • Software Development Security • CISSP 10 Domains • Security Architecture and Design • Operations Security • Business Continuity and Disaster Recovery Planning • Legal, Regulations, Investigations and Compliance • Physical (Environmental) Security • Practical Tests • Chapter Review Question. |
IIEH Information Systems Auditor | Auditing • Implementation • Auditing Information Systems • Governance and Management of IT • Information Systems Acquisition • Development and Implementation • Information Systems Operations • Maintenance and Support • Protection of Information Assets |
IIEH Professional Hacker | Social Engineering • Metasploit • Packet • Crafting • Firewall Evasion • Hacking Networks • Hacking Servers • Hacking Database • Password Cracking (offline/online) • Application Security • SQL Injection • Cross Site Scripting • OWASP Top 10 • Zombies • Backtrack • Advance Persistent Threats Risk-Based Penetration Testing • Network Cartography • Mastering Nmap • Wireless Hacking |
IIEH Information Security Consultant | Firewall Evasion • Mastering Nmap • Packet • Crafting • Application Security • Hacking Networks • Hacking Servers • Hacking Database • Password Cracking (offline/online) • CoBIT • SQL Injection • Cross Site Scripting • OWASP Top 10 • Zombies • Social Engineering • Advance Persistent Threats • Risk Based Penetration Testing • Backtrack • Metasploit • Wireless Hacking • Digital Forensics • Incident Response • 6 A’s of Digital Forensics • Chain of Custody • Evidence Acquisition • Evidence Preservation • Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • EnCase Forensics • Windows Live Response • Linux Live Response • Network Forensics • Packet Analysis • Log Analysis • Browser Forensics • Registry Forensics • Sysinternals • Memory Analysis • IT Act • Compliance • ISO 27001:2005 • PCI DSS • Risk Assessment • BCM • Network Cartography • ITIL |
IIEH Web Application Security Professional | SQL Injection •Cross Site Scripting • .Net Security • OWASP Top 10 • Security Prevention Controls • Threat Modeling • Application Security • Java Security • PHP Security • Secure Coding Best Practices • OWASP Secure Coding Guidelines |
IIEH Ethical Hacker | Ethical Hacking • System Hacking Footprinting and Reconnaissance • Scanning Networks • Enumeration • Trojans and Backdoors • Viruses and Worms • Sniffing • Social Engineering • SQL Injection • Denial of Service • Session Hijacking • Hacking Webservers • Hacking Web Applications |