CYBER SECURITY TRAINING IN DEHRADUN

Career Prospect
Who should Attend?
Course Content
Batch & Fee
Download Detail
Review/Feedback

ABOUT CYBER SECURITY TRAINING

Cyber security is the state or process of protecting and recovering networks, devices and programs from any type of cyberattack. A strong cyber security system has multiple layers of protection spread across computers, devices, networks and programs. But a strong cyber security system doesn’t rely solely on cyber defense technology; it also relies on people making smart cyber defense choices. . If you are going to make your career in Cyber security field and want training in Dehradun then join Slog Solutions for best Cyber security training in Dehradun.

Apply Now Take Free Demo Classes Call Us
Slog Training in dehradun

CAREER OPTIONS

• Information Security Analyst. • Lead Software Security Engineer. • Chief Information Security Officer (CISO). • Security Architect. • Penetration Tester. Cyber security careers are complex and many roles can be found with banks, retailers and government organizations. On the job, you can expect to safeguard an organization's files and network, install firewalls, create security plans and monitor activity. If a breach occurs, you'll be responsible for identifying the problem and finding a solution quickly.

CYBER SEC TRAINING IN DEHRADUN


    Introduction to Hacking
    Types of Hackers
    Data Breach
    Elements of Information Security
    Essential Terminology
    The Security Functionality and Usability triangle
    Types of attacks
    Information Warfare
    Threat Modeling
    Network Security Zoning
    Incident Management
    Vulnerability Assessment
    Types of Penetration Testing
    Phases of Penetration Testing
    Payment card Industry data security standard
    Footprinting Concepts
    Pseudonymous Footprinting
    Internet Footprinting
    Advance Google hacking Techniques
    Website Footprinting
    Email Footprinting
    Competitive Footprinting
    WHOIS Footprinting
    DNS Footprinting
    Using RECON-NG for Footprinting
    Using Maltego for Footprinting


    TCP Communication
    Creating custom packets using TCP flags
    Checking for Live Systems
    Checking for Open Ports
    HPING3
    XMAS Scanning
    OS Fingerprinting and Banner Grabbing
    NETBIOS Enumeration
    LDAP Enumeration
    NTP Enumeration
    SMTP Enumeration
    System Hacking
    Password Cracking
    Rainbow table using Winrtgen tool
    Password cracking using Ophcrack tool
    Hiding files
    NTFS stream manipulation
    Steganography
    Malware concept
    Trojans
    Viruses
    Worms
    Rootkits
    Sleep dipping
    Sniffing
    Wiretapping
    MAC attacks
    MAC flooding
    DHCP attacks


    DHCP starvation attack
    DHCP server attack
    ARP spoofing
    ARP Poisoning
    Introduction to Wireshark
    Introduction to Social Engineering
    Types of Social Engineering attacks
    Insider attack
    Identity Theft
    Denial of Service
    Distributed denial of service attack
    BOTNET setup
    Pandora DDOS attack toolkit
    SYN flooding using metasploit
    Session Hijacking
    Spoofing vs Hijacking
    Man in the middle attack
    Man in the browser attack
    Session Replay attack
    Session fixation attack
    The 3 way Handshake
    Source Routing
    RST Hijacking
    Blind Hijacking
    Forged ICMP and ARP
    Intrusion Detection Systems
    Firewalls


    Honeypots
    Obfuscating
    False positive generation
    Hacking webservers
    Website defacement
    HTTP response splitting attack
    Mirroring a website
    Patch management
    SQL injection
    Evading IDS
    Using IBM Security Appscan standard
    Wireless networks
    Wireless Encryption
    WEP/WPA/WPA2 Encryption
    Access control attacks
    Authentication attacks
    Rogue access point attacks
    AD hoc connection attack
    Wi-Fi Discovery
    GPS mapping
    Bluetooth Hacking
    Jailbreaking IOS
    Android rooting
    Blackberry attack vectors
    Bring your own device(BYOD) architecture

StartingEvery Tuesday

  • CYBER SECURITY TRAINING IN DEHRADUN

  • 6 Weeks(s)

  • 10 students

  • 1 Day

  • CALL 7456000240

  • Dual Certificate

12000

StartingEvery Tuesday

  • CYBER SECURITY TRAINING IN DEHRADUN

  • 6 Weekss(s)

  • 10 students

  • 1 Day

  • CALL 7456000240

  • Dual Certificate

12000