Name               : Shankar Das

Experience        : 18+ Years of Industry

Trainee Details   :

** An ardent academician, trainer and consultant with proven proficiency in the fields of IT focusing on AI/Machine Learning, Data Science, Business Analytics and Cyber Security.
** Overseas experience in university-level post-graduate teaching and guidance.
** Working with pure play analytics vendors as AI/ Machine Learning, Data Science and Cyber Security Trainer and Consultant.
** Carried out a number of IT projects based on Machine Learning, Data Science, Cyber Security and Cloud Computing.

Course Timings  :2 Hours/Day

Course Duration : 120 Hours

work work work

What you learn in Cyber Security Course?

  • Security Risk Assessments (Ethical Hacking)
  • Footprinting through Search Engines
    Network Footprinting
    Website Footprinting
    DNS Footprinting
    Footprinting through Social Networking
    Email Footprinting
    Google Hacking
    IP Scanner
    Port Scanner
    Vulnerability Scanner
    Web Application Scanner
    Exploits
    Denail of Service(DOS)
    Proxy
    Checking for Email Password Hacking
    Password Guessing
    Browser Password Hacking
    Application Password Hacking
    OS Password Hacking
    Server Password Hacking
    CISCO Password Hacking
    SNIFFER
    Session Hacking
    Virus
    Ransomware
    Keylogger
    Trojon/Rat
    Wireless Hacking
    Kali Linux
    Metasploit Framework

  • Proactive Defense & Counter Measures
  • Switch Security- Virtual LANs
    Switch Security- PORT Security
    Router Security- Auto Secure
    Firewall - Cisco ASA
    Security Policies
    Static NAT
    Redirect NAT
    Dynamic NAT
    Port Address Translation
    Web Filtering
    Authentication
    Logging
    Site-to-site VPN (IPSec)
    Remote Access VPN(IPSec)
    Remote Access VPN(SSL)

  • Threat Management
  • Applying Reconnaissance Techniques
    Analyzing the Results of Reconnaissance
    Responding to Network-Based Threats
    Securing a Corporate Network

  • Vulnerability Management
  • Implementing Vulnerability Management Processes
    Vulnerability Scanning

  • Cyber Incident Response & Management
  • The Incident Response Process
    Determining the Impact of Incidents
    Preparing the Incident Response Toolkit
    Security Information & Event Management(SIEM)

  • Security Architectures
  • Frameworks,Policies,Controls and Procedures
    Identity and Access Management
    Putting in Compensating Controls
    Secure Software Development
    Tool Sets