- Courses & Classes
- Institutes, Tutors & Colleges
View 51 courses from 11 providers |
Location
:- Ambad
Provider Location
|
Active Filters : Category : IT Security and Ethical Hacking | Duration : Unknown Duration | Provider Location : Ambad
Course Content: Who is this course for and what is it all about? If you have an email account, a Facebook account, use the Internet (whether on your phone or laptop, whether at home or in the office or even a cyber café) in India, then you NEED this course. This course will teach you “practically” everything you need to know about the Indian cyber law. Did you know? • Two Air India ... Category: IT Security and Ethical Hacking | Computer & Technology Law | Asian School of Cyber Laws![]() |
Course Content: Certified Information Security and Ethical Hacking(CISEH) certification is one of the most demanded certification by corporates worldwide. Designed by ethical hackers and security experts, the program covers all aspects of Ethical Hacking and Information Security which makes you an expert in the field of Information Security thereby bridging the gap between you and the market demands. With increas... Category: IT Security and Ethical Hacking | IT Certification | Pristine InfoSolutions![]() |
Course Content: Certified Penetration Testing is the advanced level of Ethical Hacking in which the personnel evaluates security of IT network or corporate websites by simulating an attack from external threats and internal threats. This analysis is carried out from the position of a potential attacker and can involve active exploitation of security vulnerabilities. Security issues uncovered through the penetrati... Category: IT Security and Ethical Hacking | IT Certification | Pristine InfoSolutions![]() |
Course Content: Red Hat Enterprise Security: Network Services (RHS333) is an intensive course that equips senior system administrators and security professionals with the skills and knowledge required to harden systems against both internal and external attacks. This class advances beyond the essential security coverage offered in the RHCE curriculum and delves more deeply into the security features, capabilities... Category: IT Security and Ethical Hacking | IT Certification | GRRAS Linux Training And Development Center![]() |
Course Content: Secure a successful career in network security and ethical hacking. With the world becoming one big interconnected entity, network security has become one of the critical issues today. Ensuring that the enterprise network is secure from external as well as internal attacks and threats is a full-time job. In this course you will learn : Concepts of network security • Identifying threats and p... Category: IT Security and Ethical Hacking | Jetking![]() |
Course Content: Checkpoint Security Administrator R75 Course Overview Check Point Security Administrator provides an understanding of the basic concepts and skills necessary to configure Check Point Security Gateway and Management Software During this course you will configure a Security Policy and learn about managing and monitoring a secure network. In addition, you will upgrade and configure a Security Gateway... Category: IT Security and Ethical Hacking | Networxx![]() |
Course Content: Computer Hardware Maintenance: PC Architecture Motherboard, CPUs, RAM and SMPS Different Kind of Storage Display Cards, Add-on-Cards Memory System in computer Printers BIOS (settings) Building a CPU / Computer Assembling Upgrading PC components Network cable crimping Optimizing PC performance, preventive maintenance and safety Hardware Troubleshooting Operating Systems: Introduction to Operating S... Category: IT Security and Ethical Hacking | Computer & Mobile Hardware | Networking | Systems Administration | Operating Systems | Vissicomp![]() |
Course Content: The Red Linux Networking Services and Security (Self-paced eLearning) course provides an introduction to the networking services and security capabilities of Red Hat Enterprise Linux 6. Course participants learn to install, configure, and run web, email, file sharing, and other network services, learn to secure these services. The courses also teach students to understand and modify the authentica... Category: IT Security and Ethical Hacking | Operating Systems | GRRAS Linux Training And Development Center![]() |
Course Content: The growth in the software industry has automatically created a demand for skilled hardware and networking professionals. SAIG aims to fulfill this demand by equipping the students in skills, mapped to international certification standards. SAIG's practical based syllabus gives students that extra edge for becoming the 1st choice of recruiters. Module 1 : Computer (Desktop & Laptop) Assembling... Category: IT Security and Ethical Hacking | Computer & Mobile Hardware | Basic Computer Training | Networking | St Angelo's Computer Education![]() |
Course Content: This advanced course covers Mac Security & Forensics. Category: IT Security and Ethical Hacking | Asian School of Cyber Laws![]() |
Course Content: This is an advanced level course on Cyber Security.. Category: IT Security and Ethical Hacking | Asian School of Cyber Laws![]() |
Course Content: Cyber Crime costs the world more than Rs. 57,000,000,000,000 every year. Companies and Governments need skilled cyber security professionals to contain this US $ 114 billion annual cost. This advanced program prepares you for a career in Cyber Security. The Information Technology Act and its allied rules, regulations, orders etc impose several obligations on corporates. Failure to comply with thes... Category: IT Security and Ethical Hacking | Computer & Technology Law | Asian School of Cyber Laws![]() |
Course Content: This FREE program is a must for anyone with a computer, a smart phone, a PDA, a facebook account, an online banking account or even an email account. Category: IT Security and Ethical Hacking | Asian School of Cyber Laws![]() |
Course Content: This FREE program will help you understand your rights in respect of your personal information such as your passwords, health information, medical records, financial information etc Category: IT Security and Ethical Hacking | Computer & Technology Law | Asian School of Cyber Laws![]() |
Course Content: Red Hat Certified Security Specialist (RHCSS) is a security certification that proves advanced skills in using Red Hat Enterprise Linux, SELinux, and Red Hat Directory Server to meet the security requirements of today`s enterprise environment. Current RHCEs will obtain RHCSS certification upon successfully passing all three Expertise Exams: • EX333 Red Hat Enterprise Security: Network Servic... Category: IT Security and Ethical Hacking | IT Certification | GRRAS Linux Training And Development Center![]() |
Course Content: Best coaching for BSc (IT) *subjects, as per Mumbai University syllabus. Semester I Semester II Professional Communication Skills Web Designing and Programming Applied Mathematics I Applied Mathematics II Fundatmental of Information Technology Microprocessor and Microcontrollers Electronics and Communication Database Management System Introduction to C++ Programming Data Communication and Networki... Category: IT Security and Ethical Hacking | BSc in Information Technology (IT) Coaching | Programming | Database Development | + | Vissicomp![]() |
Course Content: Best coaching for MCA*subjects, as per Mumbai University syllabus. Semester I Semester II Data Structure with 'C' Advanced Data & Files Structures Computer Concepts Operating Systems Computer Organization & Architecture Discrete Mathematics Combinatories & Probability Semester III Semester IV Object Oriented Programming with C++ Introduction to JAVA & Web Technology Computer Graphi... Category: IT Security and Ethical Hacking | MCA Coaching | Software Engineering Concepts | Basic Computer Training | Programming | + | Vissicomp![]() |
Course Content: Take Aways • Acquiring a CEH means the candidate has minimum baseline knowledge of security threats, risks and countermeasures. Organizations can rest assured that they have a candidate who is more than a systems administrator, a security auditor, a hacking tool analyst or a vulnerability tester. The candidate is assured of having both business and technical knowledge. Objectives : You will ... Category: IT Security and Ethical Hacking | IT Certification | Seed Infotech![]() |
Course Content: Take Away: Security Compliance is a must for the companies that have an IT backbone. The requirement of security compliance is very high for IT/ ITES organizations. Information security industry is increasing by leaps and bounds. The worldwide growth rate of Information security industry is billed at 21%. Higher salaries are being offered to professionals in IT security. The current Information se... Category: IT Security and Ethical Hacking | Web Servers/Application Servers | Web Technologies | Networking | Computer & Mobile Hardware | + | Seed Infotech![]() |
Course Content: Take Away: • ENSA is for experienced hands in the industry and is backed by a curriculum designed by the best in the field • Greater industry acceptance as seasoned Network Security professional • Learn to configure firewalls, intrusion detection systems and AV systems • Develop effective security policy in the company Course Contents: • Fundamentals of the Network ... Category: IT Security and Ethical Hacking | Networking | IT Infrastructure Management | IT Certification | Seed Infotech![]() |