Trainings for Security Enthusiasts

CoursesDescription
IIEH Web Application Security Professional
SQL Injection • OWASP Top 10
•Application SecurityScripting • Cross Site • Security Prevention Controls • Threat Modeling
• .Net Security
• Java Security • PHP Security • Secure Coding Best Practices • OWASP Secure Coding Guidelines

Wireless Security
Weak IV • WEP Security Issues
• Packet & Protocol Analysis • WarDriving • PSK • Man In The Middle (MITM)
• Cracking WEP Keys • RC4 Security Hole • WPA • WPA2 • TKIP • 802.11x Packets • Wireless Authentication
• Enterprise Wireless Security
• Best Practices

Virtualization and Security
Storage Security • Cluster Protocol
Guest OS Security • Secure Designing • Types of virtualization • Virtualization Infra Security
• Secure Deployment • Cluster Security • Hypervisor Security • Migration Failure • Best Practices

IIEH Professional Forensic Analyst
Windows Live Response • IT Act
• 6 A’s of Digital Forensics • Chain of Custody • Memory Analysis • Evidence Preservation
• Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • EnCase Forensics • Evidence Acquisition
• Linux Live Response • Network Forensics • Packet Analysis • Log Analysis • Browser Forensics • Registry Forensics
• Sysinternals • Digital Forensics • Incident Response

Network Security
Nmaping the Network• VPN Testing
• Packet & Protocol Analysis • Security Architecture & Design • DMZ Configuration
• Portscan • Service Enumeration • Device Auditing • Configuration Review • Firewall Rule-Based Auditing
• Vulnerability Scan • Network Cartography • Wireless Security • Best Practices

Operating Systems Security
The principle of least privilege • Linux
• Active Directory • Domain Controller • Service Enumeration • Roles & Privileges
• Patch Management • Permission • Basic Security Module • Solaris • Web Server Security
• Hardening Services • Windows • IIS • Apache • Best Practices

Database Security
MS SQL Server • TNS Listener Security
Configuration • Vulnerability Scan • Enumerating Database Parameters• Default v/s Secured Installation
• Oracle • SQL Server Dangerous Procedures • MySQL • TRACE in MySQL • Security