Certification Trainings

CoursesDescription
IIEH Systems Security Professional
Cryptography • Access Control
Telecommunications • and Network Security • Information Security Governance and Risk Management
• Software Development Security • CISSP 10 Domains • Security Architecture and Design • Operations Security
• Business Continuity and Disaster Recovery Planning • Legal, Regulations, Investigations and Compliance
• Physical (Environmental) Security • Practical Tests • Chapter Review Question.

IIEH Information Systems Auditor
Auditing • Implementation
• Auditing Information Systems
• Governance and Management of IT
• Information Systems Acquisition
• Development and Implementation
• Information Systems Operations
• Maintenance and Support
• Protection of Information Assets

IIEH Professional Hacker
Social Engineering • Metasploit
• Packet • Crafting • Firewall Evasion • Hacking Networks • Hacking Servers • Hacking Database • Password Cracking (offline/online)
• Application Security • SQL Injection • Cross Site Scripting • OWASP Top 10 • Zombies • Backtrack
• Advance Persistent Threats Risk-Based Penetration Testing • Network Cartography • Mastering Nmap • Wireless Hacking

IIEH Information Security Consultant
Firewall Evasion • Mastering Nmap
• Packet • Crafting • Application Security • Hacking Networks • Hacking Servers • Hacking Database • Password Cracking (offline/online)
• CoBIT • SQL Injection • Cross Site Scripting • OWASP Top 10 • Zombies • Social Engineering
• Advance Persistent Threats • Risk Based Penetration Testing • Backtrack • Metasploit • Wireless Hacking
• Digital Forensics • Incident Response • 6 A’s of Digital Forensics • Chain of Custody • Evidence Acquisition
• Evidence Preservation • Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • EnCase Forensics
• Windows Live Response • Linux Live Response • Network Forensics • Packet Analysis • Log Analysis • Browser Forensics
• Registry Forensics • Sysinternals • Memory Analysis • IT Act • Compliance • ISO 27001:2005 • PCI DSS • Risk Assessment
• BCM • Network Cartography • ITIL

IIEH Web Application Security Professional
SQL Injection •Cross Site Scripting
• .Net Security • OWASP Top 10 • Security Prevention Controls • Threat Modeling • Application Security
• Java Security • PHP Security • Secure Coding Best Practices • OWASP Secure Coding Guidelines

IIEH Ethical Hacker
Ethical Hacking • System Hacking
Footprinting and Reconnaissance • Scanning Networks • Enumeration
• Trojans and Backdoors • Viruses and Worms • Sniffing • Social Engineering • SQL Injection
• Denial of Service • Session Hijacking • Hacking Webservers • Hacking Web Applications