Trainings for Security Enthusiasts
Courses | Description |
---|---|
IIEH Web Application Security Professional | SQL Injection • OWASP Top 10 •Application SecurityScripting • Cross Site • Security Prevention Controls • Threat Modeling • .Net Security • Java Security • PHP Security • Secure Coding Best Practices • OWASP Secure Coding Guidelines |
Wireless Security | Weak IV • WEP Security Issues • Packet & Protocol Analysis • WarDriving • PSK • Man In The Middle (MITM) • Cracking WEP Keys • RC4 Security Hole • WPA • WPA2 • TKIP • 802.11x Packets • Wireless Authentication • Enterprise Wireless Security • Best Practices |
Virtualization and Security | Storage Security • Cluster Protocol Guest OS Security • Secure Designing • Types of virtualization • Virtualization Infra Security • Secure Deployment • Cluster Security • Hypervisor Security • Migration Failure • Best Practices |
IIEH Professional Forensic Analyst | Windows Live Response • IT Act • 6 A’s of Digital Forensics • Chain of Custody • Memory Analysis • Evidence Preservation • Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • EnCase Forensics • Evidence Acquisition • Linux Live Response • Network Forensics • Packet Analysis • Log Analysis • Browser Forensics • Registry Forensics • Sysinternals • Digital Forensics • Incident Response |
Network Security | Nmaping the Network• VPN Testing • Packet & Protocol Analysis • Security Architecture & Design • DMZ Configuration • Portscan • Service Enumeration • Device Auditing • Configuration Review • Firewall Rule-Based Auditing • Vulnerability Scan • Network Cartography • Wireless Security • Best Practices |
Operating Systems Security | The principle of least privilege • Linux • Active Directory • Domain Controller • Service Enumeration • Roles & Privileges • Patch Management • Permission • Basic Security Module • Solaris • Web Server Security • Hardening Services • Windows • IIS • Apache • Best Practices |
Database Security | MS SQL Server • TNS Listener Security Configuration • Vulnerability Scan • Enumerating Database Parameters• Default v/s Secured Installation • Oracle • SQL Server Dangerous Procedures • MySQL • TRACE in MySQL • Security |