- Courses & Classes
- Institutes, Tutors & Colleges
Page 2 of 37 courses from 7 providers |
Location
:- Ambernath
Provider Location
|
Active Filters : Category : IT Security and Ethical Hacking | Price (Fees) : Unknown | Delivery : Classroom | Mode : Regular | Provider Location : Ambernath
Course Content: In many cyber crime cases, the use of the Facebook platform and Facebook App for mobiles needs to be investigated. Facebook Forensics involves forensic analysis and investigation of various activities like instant chats, wall comments, group events etc. Topics include: • Facebook Protocol Format • Forensics on Common Facebook Activities • Facebook Fore... Category: IT Security and Ethical Hacking | Asian School of Cyber Laws![]() |
Course Content: The EC-COUNCIL Certified Security Specialist (ECSS) program is designed primarily for students of academic institutions. It covers the fundamental basics of information security, computer forensics and network security. The program will on give holistic overview of the key components of information security. Students who complete the ECSS program, will be equipped with the adequate foundation know... Category: IT Security and Ethical Hacking | IT Certification | IANT (Institute of Advance Network Technology)![]() |
Course Content: Malware (malicious software) is designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to a computer system. In many cyber crime cases, the forensic analysis of malware is essential. Topics include: • Malware categories, Incident Prevention & Response • Volatile Data Collection & Examination on a Live Windows Syste... Category: IT Security and Ethical Hacking | Asian School of Cyber Laws![]() |
Course Content: The purpose of the CSCU training program is to provide students with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, ... Category: IT Security and Ethical Hacking | IANT (Institute of Advance Network Technology)![]() |
Course Content: Applied Encryption is the application of cryptography to modern data protection and information security. In this workshop, you will first learn about how symmetric encryption, asymmetric encryption and digital signatures work in a real-world environment. You will then learn the practical methods of file encryption, disk encryption, full disk encryption and email encryption. Availability: T... Category: IT Security and Ethical Hacking | Asian School of Cyber Laws![]() |
Course Content: EC-Council’s program on Project Management in IT Security is a highly interactive 2-day class designed to teach Information Technology Security Professionals real time implementation of project management practices in IT security planning. It comprehensively covers corporate security project plan components, costs involved in security, basis for a successful project, limitations of a Project... Category: IT Security and Ethical Hacking | IANT (Institute of Advance Network Technology)![]() |
Course Content: Nowadays almost all crimes (cyber and conventional) involve some usage of mobile devices such as cell phones and tablets. Mobile devices such as cell phones contain important digital evidence such as: • Phonebook/Contact information, • Text messages, • Dialled, incoming, and missed call logs, • Electronic mail, • Photos, • &nbs... Category: IT Security and Ethical Hacking | Asian School of Cyber Laws![]() |
Course Content: Cyber Marketing combines the creative and technical aspects of the Internet with design, development, advertising, and marketing part of a business. The purpose of this course is to acquaint you with the special behavioral considerations for buyers that emerge when the Internet plays a role in the firm’s marketing. • Introduction to Cyber Marketing • E-Commerce Concepts • E... Category: IT Security and Ethical Hacking | IT Certification | IANT (Institute of Advance Network Technology)![]() |
Course Content: The purpose of the CSCU training program is to provide students with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, ... Category: IT Security and Ethical Hacking | IANT (Institute of Advance Network Technology)![]() |
Course Content: Take Aways • Acquiring a CEH means the candidate has minimum baseline knowledge of security threats, risks and countermeasures. Organizations can rest assured that they have a candidate who is more than a systems administrator, a security auditor, a hacking tool analyst or a vulnerability tester. The candidate is assured of having both business and technical knowledge. Objectives : You will ... Category: IT Security and Ethical Hacking | IT Certification | Seed Infotech![]() |
Course Content: Take Away: Security Compliance is a must for the companies that have an IT backbone. The requirement of security compliance is very high for IT/ ITES organizations. Information security industry is increasing by leaps and bounds. The worldwide growth rate of Information security industry is billed at 21%. Higher salaries are being offered to professionals in IT security. The current Information se... Category: IT Security and Ethical Hacking | Web Servers/Application Servers | Web Technologies | Networking | Computer & Mobile Hardware | + | Seed Infotech![]() |
Course Content: Take Away: • ENSA is for experienced hands in the industry and is backed by a curriculum designed by the best in the field • Greater industry acceptance as seasoned Network Security professional • Learn to configure firewalls, intrusion detection systems and AV systems • Develop effective security policy in the company Course Contents: • Fundamentals of the Network ... Category: IT Security and Ethical Hacking | Networking | IT Infrastructure Management | IT Certification | Seed Infotech![]() |
Course Content: Introduction The Microsoft Certified Systems Administrator (MCSA) certification helps validate your ability to manage and troubleshoot network environments based on the Windows Server 2003 operating system. It reflects a unique set of skills required to succeed in a variety of job roles, such as systems administrator, network administrator, information systems administrator, network operations ana... Category: IT Security and Ethical Hacking | IT Infrastructure Management | Operating Systems | IT Certification | Networking | Seed Infotech![]() |
Course Content: This course covers Advanced Linux system administration topics on Red Hat Linux. Take Away: After completion of this course you will be able to • Deploy and manage network service like DNS, FTP, NFS, SAMBA etc. • Implement security features like iptables, SELinux Objective • Establish network and secure network services • Perform disk management with iSCSI • We... Category: IT Security and Ethical Hacking | Systems Administration | Information Technology (IT) Management | IT Infrastructure Management | + | Seed Infotech![]() |
Course Content: This course covers Advanced Linux Network Administration and Security. Take Away: After completion of this course you will be able to • Design and implement an adequate security profile for critical enterprise systems • Properly respond to sophisticated security threats aimed at enterprise systems Objective • Design and implement an adequate security profile for critical e... Category: IT Security and Ethical Hacking | IT Certification | Networking | Seed Infotech![]() |
Course Content: Any computer user needs to know how to protect their information assets and securely connect to another system over a network. Security 5 is the entry level certification in Information Security domain for every knowledge worker and helps in achieving better efficiency in using computer resources. Take Away After completion of Security 5, candidate gets the knowledge of security threats, ri... Category: IT Security and Ethical Hacking | Basic Computer Training | Seed Infotech![]() |
Course Content: Cyber Crime costs the world more than Rs. 57,000,000,000,000 every year. Companies and Governments need skilled cyber security professionals to contain this US $ 114 billion annual cost. This advanced program prepares you for a career in Cyber Security. The Information Technology Act and its allied rules, regulations, orders etc impose several obligations on corporates. Failure to comply with thes... Category: IT Security and Ethical Hacking | Computer & Technology Law | Asian School of Cyber Laws![]() |