Cybersecurity or information technology security (IT security) is the protection of computer systems from theft or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.
The field is growing in importance due to increasing reliance on computer systems, the Internet and wireless networks such as Bluetooth and Wi-Fi, and due to the growth of "smart" devices, including smartphones, televisions and the various tiny devices that constitute the Internet of things. Due to its complexity, both in terms of politics and technology, it is also one of the major challenges of the contemporary world.
The growth in the number of computer systems, and the increasing reliance upon them of individuals, businesses, industries and governments means that there are an increasing number of systems at risk.
Information Security Overview
                            What Happens Online in 60 Seconds
                            Elements of Information Security
                            The Security, Functionality, and Usability Triangle
Hacking Concepts
                            What is Hacking?
                            Who is a Hacker?
                            Hacker Classes
                            Hacking Phases
                            Reconnaissance
                            Scanning
                            Gaining Access
                            Maintaining Access
                            Clearing Tracks
Ethical Hacking Concepts
                            What is Ethical Hacking?
                            Why Ethical Hacking is Necessary
                            Scope and Limitations of Ethical Hacking
                            Skills of an Ethical Hacker
Information Security Controls
                            Information Assurance (IA)
                            Information Security Management Program
                            Enterprise Information Security Architecture (EISA)
                            Network Security Zoning
                            Defense-in-Depth
Penetration Testing Concepts
                            Penetration Testing
                            Why Penetration Testing
                            Comparing Security Audit, Vulnerability Assessment, and Penetration Testing
                            Blue Teaming/Red Teaming
                            Types of Penetration Testing
                            Phases of Penetration Testing
                            Security Testing Methodology 
Footprinting Concepts
                            Footprinting through Search Engines
                            Footprinting through Web Services
                            Website Footprinting
                            Email Footprinting
                            Indexing & Selecting Data
Competitive Intelligence
                            Whois Footprinting
                            DNS & Network Footprinting
                            Footprinting through Social Engineering
                            Footprinting Tools 
Scanning Networks
                            Network Scanning Concepts
                            Scanning Tools 
                            Scanning Techniques 
                            Scanning Beyond IDS and Firewall 
                            Banner Grabbing 
                            Scanning Pen Testing 
Cracking Passwords 
                            Escalating Privileges 
                            Executing Applications 
                            Hiding Files 
                            Covering Tracks 
                            Penetration Testing
Malware Threats
                            Malware Concepts 
                            Trojan Concepts 
                            Virus and Worm Concepts 
                            Malware Analysis 
                            Countermeasures 
                            Malware Penetration Testing 
Sniffing
                            Sniffing Concepts 
                            MAC Attacks 
                            DHCP Attacks 
                            ARP Poisoning 
                            Spoofing Attacks
                            DNS Poisoning 
Social Engineering 
                        Social Engineering Techniques 
                        Insider Threats 
                        Impersonation on Social Networking Sites 
                        Identity Theft 
                        Countermeasures
Denial-of-Service 
                        DoS/DDoS Attack Techniques 
                        Botnets
                        DDoS Case Study
                        DoS/DDoS Attack Tools
                        DoS/DDoS Protection Tools
Session Hijacking
                        Application Level Session Hijacking
                        Network Level Session Hijacking
                        Session Hijacking Tools
                        DoS/DDoS Attack Tools
                        DoS/DDoS Protection Tools
Hacking Web Servers
                        Web Server Attacks
                        Web Server Attack Tools
                        Web Server Security Tools 
                        Patch Management
Hacking Web Applications
                        Web App Threats 
                        Hacking Methodology 
                        Web App Hacking Tools 
                        Web App Security Testing Tools
                        Web App Pen Testing 
SQL Injection
                        Types of SQL Injection
                        SQL Injection Methodology
                        SQL Injection Tools 
                        Evasion Techniques
Hacking Wireless Networks
                        Wireless Encryption
                        Wireless Threats 
                        Wireless Hacking Tools 
                        Bluetooth Hacking 
                        Wireless Security Tools 
                        Wireless Pen Testing
Hacking Mobile Platforms 
                        Mobile Platform Attack Vectors 
                        Hacking Android OS 
                        Hacking iOS 
                        Mobile Spyware 
                        Mobile Device Management 
                        Mobile Pen Testing 
IoT Hacking 
                        IoT Attacks 
                        IoT Hacking Methodology 
                        IoT Hacking Tools 
                        IoT Pen Testing
Cloud Computing 
                        Cloud Computing Threats 
                        Cloud Computing Attacks 
                        Cloud Security 
                        Cloud Security Tools 
                        Cloud Penetration Testing 
Cryptography 
                        Encryption Algorithms 
                        Cryptography Tools 
                        Public Key Infrastructure (PKI) 
                        Email Encryption 
                        Disk Encryption 
                        Cryptanalysis 
                        Countermeasures 
2-2.5 hours/day
Total 20 days (40-45 hours)
Fees per head
Start your growth with us today!