Search in
Courses Providers, List Your Courses for FREE
Menu

Regular Classroom IT Security and Ethical Hacking Courses in India

View 15 courses from 2 providers
Location :- India  
Provider Location
Active Filters : Category : IT Security and Ethical Hacking | Duration : Upto 7 Days (Short Courses) | Delivery : Classroom | Mode : Regular

Hacking - Workshop on Ethical Hacking & Information Security

Regular | Classroom | Workshop

Duration: 2 Days (Total 16 Hrs)
INR 1,000
Per Course
(Taxes As Applicable)
Learn: Ethical Hacking | Information Security

Course Content: Hacking is not about the illegal things it's all about how to secure your system. In the two days workshop Google Hacking, Email Hacking, Dos Attacks, Torjens, SQL Injection, Windows Hacking, Mobile Hacking etc. topics will be covered. This workshop aims to give Technocrats a basic knowledge of hacking and how to protect your system against hazardous effects. Topics to be covered in Ethical Hackin...

Category: IT Security and Ethical Hacking

Innovians Technologies

India (Delhi)
Innovians TechnologiesWe, Innovians Technologies (A Unit of PRATS Technologies Pvt. Ltd.), are the India’s fastest growing company in the field of Web & IT Servic...

Workshop on Cyber Forensics & Crime Investigation

Regular | Classroom | Workshop

Duration: 2 Days (Total 8 Hrs)
INR 1,200
Per Course
(Taxes As Applicable)
Learn: Cyber Forensics | Cyber Crime Investigation

Course Content: This workshop is dedicated on Cyber Forensics & Crime Investigation. Computer Forensics is a detailed and scientific study, research and implementation of computer science subjects for the purpose of gathering digital evidence in cases of cyber crimes or for other scientific research purposes also it introduces the needs of the current cyber security sector. Topics to be covered in CF&CI W...

Category: IT Security and Ethical Hacking

Innovians Technologies

India (Delhi)
Innovians TechnologiesWe, Innovians Technologies (A Unit of PRATS Technologies Pvt. Ltd.), are the India’s fastest growing company in the field of Web & IT Servic...

Workshop on Network Security

Regular | Classroom | Workshop

Duration: 2 Days (Total 16 Hrs)
INR 1,200
Per Course
(Taxes As Applicable)
Learn: Network Security

Course Content: Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or...

Category: IT Security and Ethical Hacking

Innovians Technologies

India (Delhi)
Innovians TechnologiesWe, Innovians Technologies (A Unit of PRATS Technologies Pvt. Ltd.), are the India’s fastest growing company in the field of Web & IT Servic...

Cryptography - Workshop on Cryptography & Security

Regular | Classroom | Workshop

Duration: 2 Days (Total 16 Hrs)
INR 1,000
Per Course
(Taxes As Applicable)
Learn: Cryptography | Information Security

Course Content: The art of protecting information by transforming it (encrypting it) into an unreadable format & then re-transforming it to plain text. Cryptography is a key technology for achieving information security in communications, computer systems, electronic commerce, and, more generally, in the emerging information society. This workshop will provide them the understanding of Cryptography & Secu...

Category: IT Security and Ethical Hacking

Innovians Technologies

India (Delhi)
Innovians TechnologiesWe, Innovians Technologies (A Unit of PRATS Technologies Pvt. Ltd.), are the India’s fastest growing company in the field of Web & IT Servic...

1- Day Workshop for Cyber Smart Businessmen

Regular | Classroom | Workshop

Duration: 1 Days
Learn: Cyber Security | Web Security | Cyber Law

Course Content: This workshop is designed for business persons who use computers, the Internet, eCommerce, online banking and online share trading etc for commercial purposes. Topics include: •   Cyber threats to your business •   Hack-proofing your laptop and smartphone •   Securing your website •   Online Reputation Management •   Cyber Law   Availabil...

Category: IT Security and Ethical Hacking | Computer & Technology Law

Asian School of Cyber Laws

India (Maharashtra, Goa)
Asian School of Cyber LawsThousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La...

1- Day Workshop on Data Privacy Law in India

Regular | Classroom | Workshop

Duration: 1 Days
Learn: Privacy and Security | Privacy & Data Protection

Course Content: The primary law for data privacy in India is the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 issued by the Central Government in exercise of the powers conferred by clause (ob) of subsection (2) of section 87 read with section 43A of the Information Technology Act, 2000. The data privacy rules define sensitive persona...

Category: IT Security and Ethical Hacking | Computer & Technology Law

Asian School of Cyber Laws

India (Maharashtra, Goa)
Asian School of Cyber LawsThousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La...

1- Day Workshop on Cyber Security & Incident Response

Regular | Classroom | Workshop

Duration: 1 Days
Learn: Cyber Security | Incident Response | Denial of Service

Course Content: Computer security incident response has become an important component of information technology (IT) programs. Security-related threats have become not only more numerous and diverse but also more damaging and disruptive. New types of security-related incidents emerge frequently. Preventative activities based on the results of risk assessments can lower the number of incidents, but not all inciden...

Category: IT Security and Ethical Hacking

Asian School of Cyber Laws

India (Maharashtra, Goa)
Asian School of Cyber LawsThousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La...

1- Day Workshop on Information Technology Act Audit & Compliance

Regular | Classroom | Workshop

Duration: 1 Days
Learn: Information Security | IT Act Audit | IT Act Compliance

Course Content: The Information Technology Act and its allied rules, regulations, orders etc impose several obligations on corporates. Failure to comply with these obligations may be penalized with fines, compensation and even imprisonment. The primary law for data privacy in India is the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 i...

Category: IT Security and Ethical Hacking | Computer & Technology Law

Asian School of Cyber Laws

India (Maharashtra, Goa)
Asian School of Cyber LawsThousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La...

1- Day Workshop on Windows Forensics

Regular | Classroom | Workshop

Duration: 1 Days
Learn: Computer Forensics

Course Content: Windows forensics relates to legal evidence found in computers and digital devices running the Windows operating system. The goal of Windows Forensics is to examine these digital devices in a forensically sound manner and identify, preserve, recover, analyze and present relevant evidence.   Topics include: •   Windows Disks, Files and Partitions •   Windows Boot Sequence...

Category: IT Security and Ethical Hacking

Asian School of Cyber Laws

India (Maharashtra, Goa)
Asian School of Cyber LawsThousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La...

1- Day Workshop on Linux Forensics

Regular | Classroom | Workshop

Duration: 1 Days
Learn: Computer Forensics | Linux Forensics

Course Content: Linux forensics relates to legal evidence found in computers and digital devices running the Linux operating system. The goal of Linux Forensics is to examine these digital devices in a forensically sound manner and identify, preserve, recover, analyze and present relevant evidence.   Topics include: •   Linux Disks, Files and Partitions •   Linux Boot Sequence • &...

Category: IT Security and Ethical Hacking

Asian School of Cyber Laws

India (Maharashtra, Goa)
Asian School of Cyber LawsThousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La...

1- Day Workshop on Mac Forensics

Regular | Classroom | Workshop

Duration: 1 Days
Learn: Mac Forensics | Computer Forensics

Course Content: Mac forensics relates to legal evidence found in computers and digital devices running the Macintosh operating system. The goal of Macintosh Forensics is to examine these digital devices in a forensically sound manner and identify, preserve, recover, analyze and present relevant evidence.   Topics include: •   Macintosh File Systems •   Macintosh Operating Systems •...

Category: IT Security and Ethical Hacking

Asian School of Cyber Laws

India (Maharashtra, Goa)
Asian School of Cyber LawsThousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La...

1- Day Workshop on Facebook Forensics

Regular | Classroom | Workshop

Duration: 1 Days
Learn: Computer Forensics

Course Content: In many cyber crime cases, the use of the Facebook platform and Facebook App for mobiles needs to be investigated. Facebook Forensics involves forensic analysis and investigation of various activities like instant chats, wall comments, group events etc.   Topics include: •   Facebook Protocol Format •   Forensics on Common Facebook Activities •   Facebook Fore...

Category: IT Security and Ethical Hacking

Asian School of Cyber Laws

India (Maharashtra, Goa)
Asian School of Cyber LawsThousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La...

1- Day Workshop on Malware Forensics

Regular | Classroom | Workshop

Duration: 1 Days
Learn: Malware Analysis | Computer Forensics | Incident Response

Course Content: Malware (malicious software) is designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to a computer system. In many cyber crime cases, the forensic analysis of malware is essential.   Topics include: •   Malware categories, Incident Prevention & Response •   Volatile Data Collection & Examination on a Live Windows Syste...

Category: IT Security and Ethical Hacking

Asian School of Cyber Laws

India (Maharashtra, Goa)
Asian School of Cyber LawsThousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La...

1- Day Workshop on Applied Encryption

Regular | Classroom | Workshop

Duration: 1 Days
Learn: Encryption | Digital Signature | Cryptography

Course Content: Applied Encryption is the application of cryptography to modern data protection and information security. In this workshop, you will first learn about how symmetric encryption, asymmetric encryption and digital signatures work in a real-world environment. You will then learn the practical methods of file encryption, disk encryption, full disk encryption and email encryption.   Availability: T...

Category: IT Security and Ethical Hacking

Asian School of Cyber Laws

India (Maharashtra, Goa)
Asian School of Cyber LawsThousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La...

1- Day Workshop on Mobile Device Forensics

Regular | Classroom | Workshop

Duration: 1 Days
Learn: Mobile Device Forensics | Computer Forensics

Course Content: Nowadays almost all crimes (cyber and conventional) involve some usage of mobile devices such as cell phones and tablets. Mobile devices such as cell phones contain important digital evidence such as: •   Phonebook/Contact information, •   Text messages, •   Dialled, incoming, and missed call logs, •   Electronic mail, •   Photos, • &nbs...

Category: IT Security and Ethical Hacking

Asian School of Cyber Laws

India (Maharashtra, Goa)
Asian School of Cyber LawsThousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La...

Subscribe & get details about interesting courses & events free in your mail