TRAINING AND CERTIFICATIONS
CERTIFIED ETHICAL HACKER
This program is the core of the most desired information security training system . The CEH, is the first part of a 3 part EC-Council Information Security Tracks which helps you master hacking technologies. You will become a hacker, but an ethical one!
This course is meant for security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of their network infrastructure.
EC COUNCIL CERTIFIED SECURITY ANALYST
The ECSA is a security credential like no other! The ECSA course provides you with a real world hands-on penetration testing (PT) experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.
COMPUTER HACKING FORENSICS INVESTIGATOR
CHFI v9 covers detailed methodological approach to computer forensic and evidence analysis. It provides necessary skill set for identification of intruder’s footprints and gathers necessary evidence for its prosecution.
All major tools and theories used by cyber forensic industry are covered in the curriculum.
The world’s most used penetration testing framework, a collaboration between the open source community and Rapid7, Metasploit helps security teams do more than just verify vulnerabilities, manage security assessments, and improve security awareness; it empowers and arms defenders to always stay one step (or two) ahead of the game.
Metasploit training will teach you to utilize the deep capabilities of Metasploit for penetration testing and help you to prepare to run vulnerability assessments for organizations of any size.
The world's most popular Vulnerability Scanner, Nessus is deployed by millions of users worldwide to identify vulnerabilities, policy-violating configurations and malware that attackers use to penetrate your or your customer's network.
Participants in this training will learn about vulnerability and event analysis tools, basic reporting for data dissemination, and basic analysis concepts.
Wireshark is the world’s foremost and widely-used network protocol analyzer. It lets you see what’s happening on your network at a microscopic level and is the de facto (and often de jure) standard across many commercial and non-profit enterprises, government agencies, and educational
This training will help you to speed up your learning with Wireshark with hands on tutorials showing you exactly what you can do in Wireshark founded on explanations of basic network terminology.The course begins with the basics and continues to dive deeper allowing you to follow along and try everything you see for yourself.
Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. It is popular among many systems and network administrators as it is useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.
The Nmap training covers how to use one of this powerful and flexible network scanners. The course will start off with the basics of network scanning with Nmap and move into how you can use it safely and effectively in your network using practical examples and demonstrations