All Trainings
Courses | Description |
---|---|
Critical Infrastructure Security - An Introductory Course | Critical Infrastructure Security This preparation is centered around giving rules to building up secure modern control frameworks (ICS). SCADA, DCS, different control framework arrangements, for example, PLC, and so forth., are normally found in ICS areas. Wellbeing and unwavering quality are the two vital elements to guarantee secure tasks of an ICS framework. To legitimately address these two factors alongside 'security' as the key useful component, 'Basic Infrastructure Security' course was produced as it is basic to know the dangers had to an ICS situation and how to assess and relieve dangers to the ICS. |
Exploiting IoT | Exploiting IoT "Exploiting IoT" is an extraordinary course intended to offer you the capacity to assess the security of these shrewd gadgets. This course is perfect for those needing to comprehend the security issues related with IoT and empowering them to settle on better choices when assembling, sending and evaluating IoT advances.
|
Exploiting IoT | Exploiting IoT "Exploiting IoT" is a novel course intended to offer you the capacity to assess the security of these keen gadgets. This course is perfect for those needing to comprehend the security issues related with IoT and empowering them to settle on better choices when constructing, conveying and surveying IoT advancements.
|
Featured Trainings
Courses | Description |
---|---|
IIEH Information Security | Linux Live Response • Packet • Firewall Evasion • Hacking Networks • Hacking Servers |
IIEH CybersecurityExpert | OWASP Top 10 • SQL Injection • Mastering Nmap •Crafting • Firewall Evasion • Hacking Networks • Hacking Servers • Hacking Database • Password Cracking • Application Security • IT Act • Cross Site Scripting • Network Cartography • Zombies • Social Engineering • Advance Persistent Threats • Risk-Based Penetration Testing • Backtrack • Metasploit • Wireless Hacking • Digital Forensics • Incident Response • 6 A’s of Digital Forensics • Chain of Custody • Evidence Acquisition • Evidence Preservation • Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • EnCase Forensics • Windows Live Response • Linux Live Response • Network Forensics • Packet Analysis • Log Analysis • Browser Forensics • Registry Forensics • Sysinternals • Memory Analysis • Packet • Compliance • ISO 27001:2005 • PCI DSS • Risk Assessment • BCM • CoBIT • ITIL |
IIEH Ethical Hacker (CEH) | Ethical Hacking • Footprinting and Reconnaissance... • Scanning Networks • Enumeration • System Hacking • Trojans and Backdoors• Viruses and Worms • Sniffing • Social Engineering • Denial of Service • Session Hijacking • Hacking Web servers • Hacking Web Applications • SQL Injection • Hacking Wireless Networks • Hacking Mobile Platforms • Evading IDS, Firewalls and Honeypots • Buffer Overflows • Cryptography • Penetration Testing • Introduction to Ethical Hacking |
Exploit Development | hell Code • Linux Exploitation Windows Exploitation • Linux Exploitation • Fuzzing • Windows Exploitation • Stack Smashing • SEH • DEP • ASLR • Heap-spraying • IE Off-by-One • Use of Debug Tools • Metasploit Modules • Writing Metasploit exploits |
Advance Metasploit | MSF Encoders • MSF Payload Metasploit Modules • MSF Payload • Metasploit Modules • Creating Malicious Files • Antivirus Evasion • Cross Compilation • Shell Code • Writing Exploit Code • Exploit Automation |
Mobile Security | Permission Set Auditing • OWASP • Application Security • Platform Security • Reverse Engineering • OWASP Mobile Security • Dissembling Mobile Application • Bring Your Own Device (BYOD) • Security Testing Methodologies |
Cloud Computing Security | Amazon AWS • Windows Azure • Cloud Computing Features • Best Practices • OWASP Top 10 Risk • Cloud Security Alliance |
Security Awareness Training | ...Security Controls• Domain Scope... • Security Incidents • Security Introduction • Threats |
Emerging Security Threats & Countermeasures | Breaking Crypto• Fingerprinting & Footprinting • Denial of Service • Remote Code Execution • Threat Modeling • Defensive Measures |
IIEH Information Systems Security Professional | Cryptography • Access Control Telecommunications and Network Security • Information Security Governance and Risk Management • Software Development Security • CISSP 10 Domains • Security Architecture and Design • Operations Security • Business Continuity and Disaster Recovery Planning • Legal, Regulations, Investigations and Compliance • Physical (Environmental) Security • Practical Tests • Chapter Review Question |
Advanced Reverse Engineering and Malware Analysis | PE • APT & Malware This course presents the idea of malware, how they work, their sorts and how they are broadly utilized as a part of Advanced Persistent assaults (APT's) to redirect the basic business data from an association on customary premise. We begin off with the ideas of Process Explorer, dismantling v/s investigating with cutting-edge troubleshooting highlights. We likewise put breakpoints to split down an application analyzing it to the level where malware code is available. |
Faculty Development Program | Thread Modelling• Forensics & APTs This course advances the security ideas taking ongoing cases, reasonable hands-on approach on how the "terrible folks" penetrate our framework and furthermore how would we execute barrier procedures, episode reaction, and countermeasures. |
Beginners Trainings
Courses | Description |
---|---|
IIEH Information Security Consultant Pro | Linux Live Response • Packet • Mastering NmapCrafting • Firewall Evasion • Hacking Networks • Hacking Servers • Hacking Database • Password Cracking (offline/online) • Application Security • SQL Injection • Cross Site Scripting • OWASP Top 10 • Zombies • Social Engineering • Advance Persistent Threats • Risk-Based Penetration Testing • Backtrack • Metasploit • Wireless Hacking • Digital Forensics • Incident Response • 6 A’s of Digital Forensics • Chain of Custody • Evidence Acquisition • Evidence Preservation • Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • EnCase Forensics • Windows Live Response • Network Cartography • Network Forensics • Packet Analysis • Log Analysis • Browser Forensics • Registry Forensics Sysinternals • Memory Analysis • IT Act • Compliance • ISO 27001:2005 • PCI DSS • Risk Assessment • BCM • CoBIT • ITIL |
IIEH Information Security Consultant | ...Linux Live Response • Packet... • Mastering NmapCrafting • Firewall Evasion • Hacking Networks • Hacking Servers • Hacking Database • Password Cracking (offline/online) • Application Security • SQL Injection • Cross Site Scripting • OWASP Top 10 • Zombies • Social Engineering • Advance Persistent Threats • Risk-Based Penetration Testing • Backtrack • Metasploit • Wireless Hacking • Digital Forensics • Incident Response • 6 A’s of Digital Forensics • Chain of Custody • Evidence Acquisition • Evidence Preservation • Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • EnCase Forensics • Windows Live Response • Network Cartography • Network Forensics • Packet Analysis • Log Analysis • Browser Forensics • Registry Forensics Sysinternals • Memory Analysis • IT Act • Compliance • ISO 27001:2005 • PCI DSS • Risk Assessment • BCM • CoBIT • ITIL |
IIEH Security and Forensics Analyst | Firewalls • Secure Network Design • DMZ • VLAN • TCP/IP Fundamentals • IDS/IPS • WLAN Security • Operating System Security • Database Security • Network Cartography • Exploitation • Social Engineering • Digital Forensics • Chain of Custody • Incident Response • Evidence Collection • Disc Based Forensics • Network Forensics • Log Analysis • EnCase • IT Act |
Ethical Hacking for Beginners | ...Backtrack • Firewall Evasion... Crafting • Metasploit • Hacking Networks • Hacking Servers • Hacking Database • Password Cracking (offline/online) • Application Security • SQL Injection • Cross-Site Scripting • OWASP Top 10 • Zombies • Social Engineering • Advance Persistent Threats • Risk-Based Penetration Testing • Network Cartography • Mastering Nmap • Packet • Wireless Hacking |
Network Security & Exploitation | ...Fingerprinting & Footprinting • Google hacking... Portscanning • Mastering Nmap • Netcat Kungfu • Packet crafting using hping3 • Nessus Vulnerability scanner • GFI scanner • Getting into the system • Secure Network design • DMZ • VLANs • Firewalls • IDS / IPS • Wireless LAN Security |
Web App & Wifi Security Training | OWASP Top 10 & 802.11 Standard • Proxy-Based Attack 802.11 Protocol Analysis • 802.11 authentication types • 802.11 Discovery • Aircrack-ng Kungfu • Attacking Open Wireless Network • WEP Cracking • Concept of IVs • WPA/WPA2 Cracking • Understanding PSK, TKIP, EAP, PEAP • Database Fundamental • Wired Equivalent Privacy (WEP • Securing 802.11 Networks • EvilTwin Attack |
Developers Trainings
Courses | Description |
---|---|
IIEH Secure Java Developer | ESAPI Framework • OWASP Top 10 • Countermeasures in JAVA • J2EE Security • Application Security • Testing Methodologies • Struts • JAAS • Authentication & Authorization • Cryptography • Framework Security • OWASP Secure Code Guidelines • Secure Coding Best Practices |
IIEH Secure .NET Developer | Cryptography • OWASP Top 10 • Countermeasures in.Net • Testing Methodologies • Role-Based Security • Code - Access Security • Application Security • Authentication & Authorization • Framework Security • OWASP Secure Code Guidelines • Secure Coding Best Practices |
IIEH PHP Developer | Security in php.ini • OWASP Top 10 • Security in php.ini • Secure File Upload• Authentication & Authorization Issues • Code - Access Security • Application Security • Authentication & Authorization • Framework Security • OWASP Secure Code Guidelines • Secure Coding Best Practices |
Certified Web Application Security Professional (CWASP) | Threat Modeling • Cross-Site Scripting... • SQL Injection • Application Security • Security Prevention Controls • OWASP Top 10.Net Security • Java Security • PHP Security • Secure Coding Best Practices • OWASP Secure Coding Guidelines |
Cloud Computing Security | OWASP Top 10 • Windows Azure • RiskCloud Security Alliance • Best Practices • Amazon AWS • Cloud Computing Features |
Advanced Trainings
Courses | Description |
---|---|
Big Data Security Analytics | Big Data technologies • Security Analytics • ELK • Hadoop • Vulnerability Dashboard • Map-Reduce • Stack Smashing • SEH • Hive • Yarn • Forensic and Application Log Analysis • Data Enrichment using TI • brute-force attacks • Apache Metron |
Incident Response Training | Incident Response • Advanced Persistent Threat • Data Leakage • Ransomware Infection |
Windows Internals Essentials | Windows Internals Essentials • Cyber Security Analysts • LiveKD • Sysinternals Suite • Debugging Tools for Window • Masm32 • VC++/MASM32 • API function • Windows Architecture • data structures • System Mechanisms • Windbg • Object Manager |
Exploit Development | Fuzzing • Linux Exploitation • Windows Exploitation • Shell Code • Windows Exploitation • Linux Exploitation • Stack Smashing • SEH • DEP • ASLR • Heap-spraying • IE Off-by-One • Use of Debug Tools • Metasploit Modules • Writing Metasploit exploits |
Advance Metasploit | Shell Code • Cross Compilation • MSF Encoders • Creating Malicious Files • Antivirus Evasion • MSF Payload • Metasploit Modules • Writing Exploit Code • Exploit Automation |
Mobile Security | Application Security • OWASP • Platform Security • Dissembling Mobile Application • Reverse Engineering • OWASP Mobile Security • Permission Set Auditing • Bring Your Own Device (BYOD) • Security Testing Methodologies |
Advanced Reverse Engineering and Malware Analysis | PE • APT & Malware This course presents the idea of malware, how they work, their sorts and how they are broadly utilized as a part of Advanced Persistent assaults (APT's) to redirect the basic business data from an association on normal premise. We begin off with the ideas of Process Explorer, dismantling v/s troubleshooting with cutting-edge investigating highlights. We additionally put breakpoints to split down an application dismembering it to the level where malware code is available. |
Reverse Engineering Training | Reversing .NET applications • Delphi applications Figuring out is the way toward finding the mechanical standards of a gadget, question, or framework through examination of its structure, capacity, and activity. This enables us to imagine the product's structure, its activities, and the highlights that drive its conduct. The strategies of investigation and the use of mechanized apparatuses for programming examination give us a sensible method to grasp the unpredictability of the product and to reveal its reality. |
Forensics Trainings
Courses | Description |
---|---|
IIEH Computer Hacking Forensic Investigator | ...Log Analysis • Incident Response... Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • Cloud Forensics • Malware Forensics Network Forensics • Packet Analysis • Digital Forensics • Browser Forensics • Registry Forensics • Sysinternals • Memory Analysis • IT Act • Investigating email crime • Mobile forensics • Forensics report writing and presentation. |
IIEH Professional Forensics Analyst | Log Analysis • Incident Response • 6 A’s of Digital Forensics • Chain of Custody • Evidence Acquisition • Evidence Preservation • Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • EnCase Forensics • Windows Live Response • Linux Live Response • Network Forensics • Packet Analysis • Digital Forensics • Browser Forensics • Registry Forensics • Sysinternals • Memory Analysis • IT Act |
IIEH Digital Forensics Expert | Mobile Forensics • Forensics Imagine... • Mobile Forensics • Forensics Imagine • Forensic Analysis of the evidence • Introduction to Forensics • History of Forensics • How to approach crime scene • Computer Investigation Process • Forensic Imaging of the evidence • Forensic Analysis of the evidence • Steganography • Email Crimes • Investigating attacks • Investigating Network & log • Forensic Report Writing • Types of investigation • Becoming an Expert witness |
Intrusion Detection and Analysis | ...SOC Best Practices • Indian IT Act... • Wireshark • Security Information Management • OSSIM • Portscan Signature Detection • DNS Attack • RPC Buffer Overflow • SQL Injection • Incident Analysis • Concept of 6 A’s • Packet/Protocol Analysis • TCP/IP |
Course for Law Enforcement | Digital Forensics • Legal Challenges • Tools for audit and investigation • Computer Based Fraud & Implications • Fraud Case Studies • Financial Fraud Investigation Technique |
Fraud Detection, Investigation and Prevention | ...Inverse Logic • Tiger Team Test... • Benford’s Theorem • Barium Test • Birbal Tricks and Traps • Accounting Fraud • Space-time dimension in data evaluation • surprise repetition in audit tests • CAAT • Evidence Collection • File Recovery • Email Tracing • Internet History • Data Dump Analysis • Transaction Log |
E-Crime and Computer Forensics | Stuxnet • Chain of custody • Dead Forensics • IT Act • Incident Response • Evidence Collection • Disc Based Forensics • Network Forensics • Log Analysis • EnCase • Live Forensics |
Compliance Trainings
Enterprise Risk Management
COSO Framework • Risk Analysis
• Risk Assessment • Risk Evaluation • Risk Perception • Risk Treatment
• BCP • ERM Essentials • Risk Monitoring • Risk Management
Courses | Description |
---|---|
HIPAA Training | HIPAA • Examples of PHI... • What is HIPAA • Why compliance with HIPAA is important • Examples of PHI • When is health information considered identifiable • What are permitted uses of PHI • HIPAA rules • Do’s and Don’ts • HIPAA violations |
IRCA Approved - ISO 27001 LA | PDCA Cycle • Operation Management • Audit’s DOs & DONTs • ISO2700 Series Overview • ISO 27001:2005 Requirements • IRCA Code of Conduct• Audit Planning & Preparation • Process Audit Technique • Evidence Collection • Risk Assessment Methodologies • Incident Management • CIA & DAD • Nonconformities • Observations • Corrective Action • Preventive Action • Reporting |
ISO 27001 LI | ...Evidence Collection • PDCA Cycle... • ISO2700 Series • Overview • ISO 27001:2005 Requirements • Audit’s DOs & DONTs • Audit Planning & Preparation • Process Audit Technique • CIA & DAD • Risk Assessment Methodologies • Incident Management • Operation Management • Nonconformities • Observations • Corrective Action • Preventive Action • Reporting |
ISO 22301 LA | BCM Life Cycle • BCM Audit • BCM Strategy • Incident Response • Mission Critical Activities • Business Impact Analysis (BIA) • Risk Assessment • Process Level BCM • Resource Recovery • BCM v/s DRP • BCM Exercise & Maintenance • Standard v/s Specification |
ISO 22301 LI | Amazon AWS • Windows Azure • Cloud Computing Features • Amazon AWS • Best Practices • OWASP Top 10 Risk • Cloud Security Alliance |
IT Risk Management | IT Risk Assessment • OCTAVE • IT Risk Management Cycle • NIST • ISO 31000:2009 • Risk Mitigation |
IIEH Payment Industry Data Security Implementer | PCI Requirements • PA DSS Practices • Compliance Process • PTS • Customer Card Information • Storage Best Practices • POS terminal Security • Payment Application Security • PTS • Self-Assessment Questionnaire (SAQ) • Best Practices |
IT Infrastructure Library | Service Design • Service Strategy • Changes from ITIL v2 • ITIL v3 • Service Translation • Service Operation • Service Improvement • Processes definition and implementation • Functions definitions and allocation • Roles definitions and function-wise appropriation • Case Studies |
Trainings for Security Enthusiasts
Courses | Description |
---|---|
IIEH Web Application Security Professional | SQL Injection • OWASP Top 10 •Application SecurityScripting • Cross Site • Security Prevention Controls • Threat Modeling.Net Security • Java Security • PHP Security • Secure Coding Best Practices • OWASP Secure Coding Guidelines |
Wireless Security | Weak IV • WEP Security Issues • Packet & Protocol Analysis • WarDriving • PSK • Man In The Middle (MITM) • Cracking WEP Keys • RC4 Security Hole • WPA • WPA2 • TKIP • 802.11x Packets • Wireless Authentication • Enterprise Wireless Security • Best Practices |
Virtualization and Security | Storage Security • Cluster Protocol Guest OS Security • Secure Designing • Types of virtualization • Virtualization Infra Security • Secure Deployment • Cluster Security • Hypervisor Security • Migration Failure • Best Practices |
IIEH Professional Forensic Analyst | Windows Live Response • IT Act • 6 A’s of Digital Forensics • Chain of Custody • Memory Analysis • Evidence Preservation • Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • EnCase Forensics • Evidence Acquisition • Linux Live Response • Network Forensics • Packet Analysis • Log Analysis • Browser Forensics • Registry Forensics • Sysinternals • Digital Forensics • Incident Response |
Network Security | mapping the Network• VPN Testing... • Packet & Protocol Analysis • Security Architecture & Design • DMZ Configuration • Portscan • Service Enumeration • Device Auditing • Configuration Review • Firewall Rule-Based Auditing • Vulnerability Scan • Network Cartography • Wireless Security • Best Practices |
Operating Systems Security | The principle of least privilege • Linux... • Active Directory • Domain Controller • Service Enumeration • Roles & Privileges • Patch Management • Permission • Basic Security Module • Solaris • Web Server Security • Hardening Services • Windows • IIS • Apache • Best Practices |
Database Security | ...MS SQL Server • TNS Listener Security... Configuration • Vulnerability Scan • Enumerating Database Parameters• Default v/s Secured Installation • Oracle • SQL Server Dangerous Procedures • MySQL • TRACE in MySQL • Security |
Certification Trainings
Courses | Description |
---|---|
IIEH Information Systems Security Professional | Cryptography • Access Control Telecommunications • and Network Security • Information Security Governance and Risk Management • Software Development Security • CISSP 10 Domains • Security Architecture and Design • Operations Security • Business Continuity and Disaster Recovery Planning • Legal, Regulations, Investigations and Compliance • Physical (Environmental) Security • Practical Tests • Chapter Review Question. |
IIEH Information Systems Auditor | ...Auditing • Implementation... • Auditing Information Systems • Governance and Management of IT • Information Systems Acquisition • Development and Implementation • Information Systems Operations • Maintenance and Support • Protection of Information Assets |
IIEH Professional Hacker | Social Engineering • Metasploit • Packet • Crafting • Firewall Evasion • Hacking Networks • Hacking Servers • Hacking Database • Password Cracking (offline/online) • Application Security • SQL Injection • Cross Site Scripting • OWASP Top 10 • Zombies • Backtrack • Advance Persistent Threats • Risk-Based Penetration Testing • Network Cartography • Mastering Nmap • Wireless Hacking |
IIEH Information Security Consultant | Firewall Evasion • Mastering Nmap • Packet • Crafting • Application Security • Hacking Networks • Hacking Servers • Hacking Database • Password Cracking (offline/online) • CoBIT • SQL Injection • Cross Site Scripting • OWASP Top 10 • Zombies • Social Engineering • Advance Persistent Threats • Risk-Based Penetration Testing • Backtrack • Metasploit • Wireless Hacking • Digital Forensics • Incident Response • 6 A’s of Digital Forensics • Chain of Custody • Evidence Acquisition • Evidence Preservation • Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • EnCase Forensics • Windows Live Response • Linux Live Response • Network Forensics • Packet Analysis • Log Analysis • Browser Forensics • Registry Forensics • Sysinternals • Memory Analysis • IT Act • Compliance • ISO 27001:2005 • PCI DSS • Risk Assessment • BCM • Network Cartography • ITIL |
IIEH Web Application Security Professional | SQL Injection •Cross-Site Scripting • .Net Security • OWASP Top 10 • Security Prevention Controls • Threat Modeling • Application Security • Java Security • PHP Security • Secure Coding Best Practices • OWASP Secure Coding Guidelines |
IIEH Computer Hacking Forensic Investigator | Log Analysis • Incident Response Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • Cloud Forensics • Malware Forensics Network Forensics • Packet Analysis • Digital Forensics • Browser Forensics • Registry Forensics • Sysinternals • Memory Analysis • IT Act • Investigating email crime • Mobile forensics • Forensics report writing and presentation. |
Technology Trainings
Courses | Description |
---|---|
Palo Alto Training | Palo Alto firewalls • What are Palo Alto Firewalls? Identify the requirements to deploy Palo Alto in your network • Deploy a Palo Alto firewall in your network • NGFW • Firewalls • Next-Generation Firewall Training • Cyber Security
|
Source Code Analysis | What is SCA? • Need for SCA security solution What is SCA? • Need for SCA security solution • Various types of SCA security solutions • Selection criteria for SCA security solution • Implementation strategy for SCA
|
NAC for wired and wireless | ...Introduction to Wireless LAN Security... • Introduction to Wireless LAN Security • What is Wireless LAN Security? • Need for WLAN security solution • Various types of WLAN security solutions • Selection criteria for WLAN security solution • Implementation strategy for WLAN
|
Mobile Device Management (MDM) | Introduction to Mobile Device Management Introduction to Mobile Device Management • What is MDM? • Need for MDM solution • Various types of MDM • Selection criteria for MDM solution • Implementation strategy for MDM
|
Information Rights Management | Introduction to IRM • What is IRM? Introduction to IRM • What is IRM? • Need for IRM solution • Various types of IRM solutions • Selection criteria for IRM solution • Implementation strategy for IRM • File Protection |
Privileged Identity Management | Introduction to PIM • What are Privileged IDs • Need for PIM • Various types of PIM • Selection criteria for PIMs • Implementation strategy • Pre Implementation • Post Implementation |
Web Application Firewall | Introduction to WAF • What is a WAF? • Introduction to WAF • What is a WAF? • Need for WAF’s • Various types of WAF • Selection criteria for WAF’s |
CCNA Trainings
Courses | Description |
---|---|
IIEH Network Associate (Routing & Switching) | Cisco Certified Network Associate (CCNA) Routing and Switching Cisco Certified Network Associate (CCNA) Routing and Switching is a confirmation program for passage level system designs that expand your interest in foundational organizing learning and increment the estimation of your manager's system. CCNA Routing and Switching are for Network Specialists, Network Administrators, and Network Support Engineers with 1-3 years of experience. The CCNA Routing and Switching approve the capacity to introduce, arrange, work, and investigate medium-measure directed and exchanged systems.
|
Cisco IIEH Network Associate (Security) | Cisco Certified Network Associate Security (CCNA Security) Cisco Certified Network Associate Security (CCNA Security) approves relate level learning and abilities required to secure Cisco systems. With a CCNA Security confirmation, a system proficient shows the abilities required to build up a security framework, perceive dangers and vulnerabilities to systems, and alleviate security dangers. The CCNA Security educational programs underscore center security advances, the establishment, investigating and observing of system gadgets to look after trustworthiness, secrecy, and accessibility of information and gadgets, and competency in the innovations that Cisco utilizes as a part of its security structure.
|