- Courses & Classes
- Institutes, Tutors & Colleges
View 11 courses from 6 providers |
Location
:- Maharashtra
Provider Location
|
Active Filters : Category : IT Security and Ethical Hacking | Learn : Cryptography | Duration : Unknown Duration | Mode : Regular | Provider Location : Maharashtra
Course Content: Certified Information Security and Ethical Hacking(CISEH) certification is one of the most demanded certification by corporates worldwide. Designed by ethical hackers and security experts, the program covers all aspects of Ethical Hacking and Information Security which makes you an expert in the field of Information Security thereby bridging the gap between you and the market demands. With increas... Category: IT Security and Ethical Hacking | IT Certification | Pristine InfoSolutionsMaharashtra (Mumbai) ![]() |
Course Content: Certified Penetration Testing is the advanced level of Ethical Hacking in which the personnel evaluates security of IT network or corporate websites by simulating an attack from external threats and internal threats. This analysis is carried out from the position of a potential attacker and can involve active exploitation of security vulnerabilities. Security issues uncovered through the penetrati... Category: IT Security and Ethical Hacking | IT Certification | Pristine InfoSolutionsMaharashtra (Mumbai) ![]() |
Course Content: The growth in the software industry has automatically created a demand for skilled hardware and networking professionals. SAIG aims to fulfill this demand by equipping the students in skills, mapped to international certification standards. SAIG's practical based syllabus gives students that extra edge for becoming the 1st choice of recruiters. Module 1 : Computer (Desktop & Laptop) Assembling... Category: IT Security and Ethical Hacking | Computer & Mobile Hardware | Basic Computer Training | Networking | St Angelo's Computer EducationMaharashtra (Mumbai, Thane ...) ![]() |
Course Content: • Ethical Hacking, Ethics, and Legality • Footprinting and Social Engineering • Scanning and Enumeration • System Hacking ,Trojans, Backdoors • Viruses, and Worms, Sniffers • Denial of Service and Session Hijacking • Hacking Web Servers • Web Application Vulnerabilities • Web-Based Password Cracking Techniques • SQL Injection and Buffer O... Category: IT Security and Ethical Hacking | Operating Systems | Networking | Suyash Computer Training & ServicesMaharashtra (Thane) ![]() |
Course Content: Take Aways • Acquiring a CEH means the candidate has minimum baseline knowledge of security threats, risks and countermeasures. Organizations can rest assured that they have a candidate who is more than a systems administrator, a security auditor, a hacking tool analyst or a vulnerability tester. The candidate is assured of having both business and technical knowledge. Objectives : You will ... Category: IT Security and Ethical Hacking | IT Certification | Seed InfotechMaharashtra (Pune, Mumbai ...) ![]() |
Course Content: Take Away: Security Compliance is a must for the companies that have an IT backbone. The requirement of security compliance is very high for IT/ ITES organizations. Information security industry is increasing by leaps and bounds. The worldwide growth rate of Information security industry is billed at 21%. Higher salaries are being offered to professionals in IT security. The current Information se... Category: IT Security and Ethical Hacking | Web Servers/Application Servers | Web Technologies | Networking | Computer & Mobile Hardware | + | Seed InfotechMaharashtra (Pune, Mumbai ...) ![]() |
Course Content: Take Away: • ENSA is for experienced hands in the industry and is backed by a curriculum designed by the best in the field • Greater industry acceptance as seasoned Network Security professional • Learn to configure firewalls, intrusion detection systems and AV systems • Develop effective security policy in the company Course Contents: • Fundamentals of the Network ... Category: IT Security and Ethical Hacking | Networking | IT Infrastructure Management | IT Certification | Seed InfotechMaharashtra (Pune, Mumbai ...) ![]() |
Course Content: This course covers Advanced Linux Network Administration and Security. Take Away: After completion of this course you will be able to • Design and implement an adequate security profile for critical enterprise systems • Properly respond to sophisticated security threats aimed at enterprise systems Objective • Design and implement an adequate security profile for critical e... Category: IT Security and Ethical Hacking | IT Certification | Networking | Seed InfotechMaharashtra (Pune, Mumbai ...) ![]() |
Course Content: Introduction The skills and knowledge measured by the Security+ examination were derived and validated though input from a committee and over 1,000 subject matter experts representative of industry. A job task analysis (JTA), global survey, beta examination and beta results review were each milestones in the development process. The results of these milestones were used in weighing the domains and... Category: IT Security and Ethical Hacking | IT Certification | Networking | Operating Systems | Compufield Computer InstituteMaharashtra (Mumbai) ![]() |
Course Content: Cyber Crime costs the world more than Rs. 57,000,000,000,000 every year. Companies and Governments need skilled digital forensic investigators to contain this US $ 114 billion annual cost. As per Ministry of Human Resources Development estimates - India needs 2.5 lakh cyber experts and professionals to effectively tackle cyber crimes. (Source: Times of India Feb 10, 2011). "Taking into acco... Category: IT Security and Ethical Hacking | Computer & Technology Law | Asian School of Cyber LawsMaharashtra (Pune, Mumbai) ![]() |
Course Content: Cyber Crime costs the world more than Rs. 57,000,000,000,000 every year. Companies and Governments need skilled digital forensic investigators to contain this US $ 114 billion annual cost. As per Ministry of Human Resources Development estimates - India needs 2.5 lakh cyber experts and professionals to effectively tackle cyber crimes. (Source: Times of India Feb 10, 2011). "Taking into account the... Category: IT Security and Ethical Hacking | Computer & Technology Law | Asian School of Cyber LawsMaharashtra (Pune, Mumbai) ![]() |