Certificate in Information Security & Cyber Security (CISCS)
Duration 12 MONTHS
Fee (INR) ₹ 60,000
Students who want to go abroad to study should have the knowledge of cyber security for getting the best job. They may get jobs of handsome salary part-time too. This course teaches the basics regarding Information Security in theoretical aspect. Students will learn the basics of Information Security and Cyber Security, learning many concepts of the world of security.
Demand for cybersecurity solutions continues to grow across the world as a changing regulatory environment, increased awareness of online threats and an upsurge in digital business strategies drive global enterprise security spending increases.
While high salaries and benefits are attractive, cyber pros are more likely to be driven by love for the technology and the interesting, challenging, and meaningful work that a cyber security career provides. Those who work in the cybersecurity field rarely receive any publicity for their hard work, even when that work is of national importance.
✔ Start from 0 up to a high-intermediate level. ✔ Discover vulnerabilities & exploit them to hack into servers. ✔ Secure systems from all the attacks shown. ✔ Handsome pay scale in India and Abroad ✔ Great Job Opportunity ✔ Some cybersecurity jobs are completely remote and will enable you to live or travel anywhere, while you work. ✔ Good Income in part time job. ✔ Your cybersecurity skills mean you can get a job wherever you want to live. ✔ Greatly Job Culture ✔ You can choose government or private sector work in cybersecurity. ✔ Cybersecurity professionals can choose self-employment. ✔ Specialties in cybersecurity provide plentiful career and promotion options. ✔ You can increase your value and earnings potential in cybersecurity easily. ✔ With the right set of cybersecurity skills, recruiters will seek you out ✔ Cybersecurity can provide a real work/life balance.
✔ & more…..
➥ What is Cyber Space?
➥ What is Virtual World?
➥ Career in Cyber Space
➥ Job Opportunities in Hacking & Cyber Security
➥ Roles & Responsibility of Cyber Expert
➥ Job Areas & Designation
➥ Introduction Of Internet
➥ How Does Internet Works?
➥ Internet vs Intranet
➥ Network Introduction
➥ Types of Network
➥ Network Topology
➥ Network Devices
➥ What is LAN, MAN & WAN?
➥ What is IP Address?
➥ Types of IP Address
➥ IP Address and Architecture
➥ What is Internet Service Provider?
➥ Introduction of Web Server/ISP
➥ Devices Used in ISP Architecture
➥ Information Security
➥ Types of Information
➥ CIA Module
➥ Types of Threats to Info. Security
➥ What is Hack?
➥ What is Hacking?
➥ 5 Phases For Hackers & Cyber Expert
➥ Social Engineering
➥ Social Engineering Techniques
➥ What is Social Media?
➥ Negative things on Social Media
➥ Secure Access Of Facebook
➥ Secure Access of Instagram
➥ Secure Access of Whatsapp
➥ Secure Online Banking
➥ Types of Banking Transaction
➥ Steps for Safe Banking Transaction
➥ What is Web Browser?
➥ Different Web Browser
➥ What type of Data Browser Stores?
➥ How hackers steals & use our Data?
➥ How to Secure Browser?
➥ What is Browser extension?
➥ How to use or download extension?
➥ Email Option
➥ Email Security
➥ Introduction to Digital Data & Security
➥ Prevent Data from Cut, Copy And Paste
➥ Restrict Pen Drive from Computer
➥ USB Port Security
➥ USB drive & Storage Devices Security
➥ Monitoring Folder Activity
➥ Unrecoverable Delete
➥ Tracking Computer Activity
➥ Virus Protected Computer With Antivirus
➥ Remove Malware, Spyware, Rootkit , Backdoor, Trojan From Computer
➥ Computer Security
➥ Window TIPs
➥ What is Portable USB PC?
➥ Why It's Important in Digital Security?
➥ Create USB PC using Portable Apps.
➥ Working of USB PC
➥ What is Windows Registry?
➥ Importance of Windows Registry
➥ How to open Win Reg?
➥ How to Back up Windows Registry?
➥ Important Techniques of Win. Reg.
➥ Funny Techniques of Win. Reg.
➥ What is Cloud Technology?
➥ Paid & Free Clouds
➥ File Sharing Using Cloud System
➥ Google Drive & Dropbox.Com
➥ Top 10 Cloud Storages
➥ What is Linux?
➥ What is Kali Linux?
➥ Introduction of Offensive Security
➥ How to Download Kali Linux?
➥ Kali Linux : OS for Hackers
➥ Live USB of Kali Linux
➥ Introduction of virtualisation Technology
➥ What is Virtual Machines?
➥ How to Download VM?
➥ How to install VM in Windows?
➥ How To Install Kali Linux in Vmware/Virtual Box?
➥ Installing Dual Boot Kali Linux
➥ One Step Kali Installation in VM
➥ Introduction Of Penetration Testing
➥ Need Of Penetration Testing
➥ Security Audits Vs Vulnerability Assessment Vs Pen Test
➥ Types Of Penetration Testing
➥ Real world Penetration Testing Team Video
➥ Phases Of Penetration Testing
➥ Security Testing Methodology
➥ Foot-printing Concept
➥ Benefits Of Foot-printing
➥ Foot-printing Methodology
➥ Foot-printing Through Search Engine
➥ Foot-printing Using Advanced Google Hacking Techniques
➥ GHDB Database
➥ Search Diggity Tool
➥ Foot-printing Through Social Networking Websites
➥ Website Foot-printing
➥ WHOIS Foot-printing
➥ DNS Foot-printing
➥ Cyber Crime Introduction
➥ Types of Cyber Crime
➥ IT ACT 2008
➥ Cyber Crime Cases
➥ Cyber Law
➥ What is Server Log?
➥ Introduction of Nodal/Grievance officer
➥ What is Email?
➥ How Email Works?
➥ Top 5 Email Services for Regular Users
➥ Top 5 Email Services used by Corporates
➥ What is Email Tracing & Tracking?
➥ Find Root Of Email
➥ What is Email Spoofing?
➥ Email Spoofing Techniques
➥ What is Encrypted Email Service?
➥ Top 5 Encrypted Email Service
➥ The reality
➥ What is Data Loss?
➥ Your responsibility
➥ Common Computer Problems
➥ What Causes Data Loss?
➥ How to Prevent Data Loss?
➥ Data Backup
➥ Backup Hardware
➥ After Backup
➥ Data Recovery
➥ Data Recovery TIPs
➥ Data Recovery Techniques
➥ Data Recovery Software's
➥ Use of machines to recover data
➥ Scanning Probe Microscopy (SPM)
➥ Magnetic Force Microscopy (MFM)
➥ Scanning Tunnelling Microscopy (STM)
➥ Data Destroy
➥ Tools for Data Destroy
➥ Cyber Fraud Detection
➥ What is Social Media Fraud?
➥ What is Fake Profile?
➥ What is Imposter Profile?
➥ Types of Social Media Frauds
➥ Fake Facebook Profile Detection
➥ Fake Instagram Profile Detection
➥ Other Social Media Fake Profile Detection
➥ Tracking & Tracing Process of Fake/Imposter Profile
➥ Required Document from Victim of Social Media Fraud
➥ Process of Deleting Fake/Imposter Profile
➥ How to write a Report on Social Media Fraud?
➥ How to complaint in Cyber Cell?
➥ Report online for Cyber Crime?
➥ Reporting For Private Investigation
➥ Introduction to Financial Frauds
➥ What is ATM cards?
➥ Types of ATM Cards
➥ What is Offline Banking?
➥ What is Online Banking?
➥ What is Virtual Wallet?
➥ What is Virtual Card?
➥ What is UPI?
➥ What is Payment Gateways?
➥ How to build own Payment Gateway?
➥ How online Fraud done?
➥ How to Investigate all types of Financial Fraud?
➥ Required Document from Victim of Online Financial Fraud
➥ How to Report in Bank?
➥ How to complaint in Cyber Cell?
➥ Report online for Cyber Crime?
➥ Reporting For Private Investigation
➥ What is Website?
➥ Types of Website
➥ What is Domain?
➥ What is Web Hosting?
➥ Types of Web Hosting Servers
➥ Top 5 Web Hosting Providers
➥ What is Database in Website?
➥ What is front-end & Back-end?
➥ How Database is connected to website?
➥ What is SQL?
➥ Command to manipulate database
➥ What is Phishing?
➥ How to create phishing page?
➥ How to send and grab credentials using Phishing links?
➥ What is Dos & DDos attack?
➥ Network and Website DoS attack methods
➥ What is SQL Injection?
➥ Types of SQL Injection
➥ SQL Login bypass
➥ Website data dump using SQL Map
➥ Digital Forensic
➥ What Is Forensic?
➥ Why Does Forensic Require?
➥ Computer Forensic
➥ MD5, SHA1, SHA256 Hash Techniques
➥ Image Cloning
➥ Types of Cryptography/Steganography
➥ Tools for Cryptography/Steganography
➥ Nirlauncher Utilities
➥ Network Forensic
➥ Registry Forensic
➥ Browser Forensic
➥ ID Search : Data Indexing
➥ What is Cellular Technology?
➥ What is 2G,3G,4G & 5G Technology?
➥ How Cell Tower works?
➥ How Mobile Networks Works?
➥ Devices on Cell Tower?
➥ What is CDR?
➥ Types of CDR
➥ What is Cell ID?
➥ What is MCC & MNC?
➥ What is CGI?
➥ Understanding CDR Files
➥ Trace Spoof Mobile Call
➥ Applications for Virtual Numbers
➥ Mobile Number Hacking/Spoofing
➥ Introduction to Malware
➥ Malware Example
➥ Malware Propagation
➥ Trojan Concept
➥ Use of Trojan by hacker
➥ Infecting Systems through Trojan
➥ Deploying Trojan
➥ Virus And warm
➥ Stage of Virus Life
➥ Working With Viruses
➥ Types Of Virus
➥ Computer Warms
➥ Malware Reverse Engineering
➥ Malware analysis Procedure
➥ Malware Detection
➥ Detecting Trojans
➥ Detecting Viruses
➥ Introduction to Keyloggers/RATS
➥ Types of Keyloggers/RATS
➥ Incidence Management
➥ Benefits of Incidence Management
➥ The Incidence Management Process
➥ Best Practice For Implementing Management
➥ Importance Of Security Policy
➥ Acceptable Encryption Policy
➥ Acceptable Use Policy
➥ Clean Desk Policy
➥ Data Breach Response Policy
➥ Disaster Recovery Plan Policy 58
➥ Digital Signature Acceptance Policy
➥ Email Policy
➥ Ethics Policy
➥ Pandemic Response Planning Policy
➥ Password Construction Guideline
➥ Password Protection Policy
➥ Security Response Plan Policy
➥ End Users Encryption Key protection Policy
➥ Acquisition Assessment Policy
➥ Bluetooth Baseline Requirements Policy
➥ Remote Access Police
➥ Remote Access Tools Policy
➥ Router And Switch Security Policy
➥ Wireless Communication Policy
➥ Wireless Communication Standard
➥ Database Credentials Policy
➥ Technology Equipment Disposal Policy
➥ Information Logging Standard
➥ Lab Security Policy
➥ Server Security Policy
➥ Software Installation Policy
➥ Workstation Security Policy
➥ Application Security
➥ Web Application Security Policy
➥ Network Foot-printing
➥ Network Scanning
➥ Network Mapping
➥ TCP Communication
➥ Creating Custom Data Packets Using TCP Flags
➥ Live System Scanning
➥ Port Scanning
➥ Scanning Beyond IDS
➥ Banner Grabbing
➥ Tech of Enumeration
➥ Netbios Enumeration
➥ Netbios Enumeration Tool: Superscan
➥ Tool: Net BIOS Enumeration
➥ NBT State, Super Scan
➥ ID Server, Nmap, NetCat, Net Craft, CURL
➥ NET Penetration Testing Using Android
➥ Proxy Preparing
➥ Proxy Chaining
➥ Proxy Tools
➥ Proxy & VPN
➥ IP Spoofing
➥ IP Spoofing Detection-IP Identification Number
➥ IP Spoofing Detection-Direct TTL Probes
➥ IP Spoofing Counter Measures
➥ Scanning Pen Testing
➥ MAC Spoofing-SMAC
➥ Defend Against MAC Spoofing
➥ What Is Sniffer?
➥ Types of Sniffer: Passive Sniffer/Active Sniffer
➥ Sniffer: Wireshark CACE Pilot
➥ Password Sniffer: ACE
➥ Employee Tracking Active Track
➥ Packet Sniffer Capsa Network
➥ Sniffing Prevention/ Detection Technique
➥ Data Security With Registry
➥ Browser Forensics
➥ Computer Forensics
➥ Improve Performance
➥ Backup and Recovery
➥ Comandline Editing
➥ OS, BIOS Password
➥ Recovery (Windows, Linux)
➥ Password Recovery And Dumping (Passcap)
➥ Application Password Cracking
➥ Wifi- Password Recovery
➥ Strong And Unbreakable Password
➥ Social Media Profile Analysis
➥ Find Compromised Password
➥ Foot-printing Using Script
➥ Anonymous Location Tracking
➥ Ten Plus Scripts
➥ What is Metasploit?
➥ How to Run Metasploit?
➥ Metasploit Basic Command Tutorial
➥ Metasploit Desktop Exploit
➥ Advanced Penetration Using Metasploit
➥ Integrated Nessus With MT And Kali Linux
➥ Autopwn Metasploit
➥ Vulnerability Assessment
➥ Type of Vulnerability Assessment
➥ Vulnerability Research
➥ Web Server Attacks
➥ Website Attacks Methodology
➥ Website Information Gathering
➥ Web Server Foot-printing
➥ Mirroring a Website
➥ Vulnerability Scanning
➥ Web Server Security Scanner: Acunetix Scanner
➥ Burp Suites Professional - Vulnerability Scanner