Search in
Courses Providers, List Your Courses for FREE
Menu

Classroom IT Security and Ethical Hacking Courses in Maharashtra by Suyash Computer Training & Services

View 5 courses from 1 providers
Location :- Maharashtra  
Provider Location
Active Filters : Category : IT Security and Ethical Hacking | Delivery : Classroom | Provider : Suyash Computer Training & Services | Provider Location : Maharashtra

Networking Proficiency Courses

Regular | Classroom | Training/Coaching/Tuition

Learn: Network Security | Networking | OSI Reference Model | TCP/IP | Disaster Recovery Management (DRM)

Course Content: • Overview of Networking • Overview of Network Concepts • Network Hardware • Installation Ethernet Devices • Transmission of Data/Media • The OSI model, • TCP/IP Fundamentals Concepts, • TCP/IP Utilities Model • Types of LAN Card &Configuration • Cabling of Communication Channels • Types of Crimping, Color Codes, • Types o...

Category: IT Security and Ethical Hacking | Networking | IT Infrastructure Management

Suyash Computer Training & Services

Maharashtra (Thane)
Suyash Computer Training & ServicesSuyash Computer Training & Services (SCTS) was formed since year 2000, from that time onwards; it is constantly imparting training in Information ...

SCTS Certified Ethical Hacking

Regular | Classroom | Certificate

Learn: Ethical Hacking | System Hacking | Hacking Web Servers | Web Application Vulnerabilities | SQL Injection | Cryptography | Linux | +

Course Content: • Ethical Hacking, Ethics, and Legality • Footprinting and Social Engineering • Scanning and Enumeration • System Hacking ,Trojans, Backdoors • Viruses, and Worms, Sniffers • Denial of Service and Session Hijacking • Hacking Web Servers • Web Application Vulnerabilities • Web-Based Password Cracking Techniques • SQL Injection and Buffer O...

Category: IT Security and Ethical Hacking | Operating Systems | Networking

Suyash Computer Training & Services

Maharashtra (Thane)
Suyash Computer Training & ServicesSuyash Computer Training & Services (SCTS) was formed since year 2000, from that time onwards; it is constantly imparting training in Information ...

SCTS Cyber Crime Investigator

Regular | Classroom | Training/Coaching/Tuition

Learn: Cyber Crime | Cyber Crime Investigation | Cyber Forensics | Cyber Law

Course Content: • Networking Basic, Internet • An Introduction to Cyber Crime • Intro to Cyber Crime Investigation • Investigating Emails • Investigating Server Logs • Understanding Cyber Forensics • Password Breaking • Investigate Intellectual Property • Digital Signature Crimes • Cyber Crime & the Law

Category: IT Security and Ethical Hacking | Computer & Technology Law

Suyash Computer Training & Services

Maharashtra (Thane)
Suyash Computer Training & ServicesSuyash Computer Training & Services (SCTS) was formed since year 2000, from that time onwards; it is constantly imparting training in Information ...

SCTS Cyber Space Evidence Analyst

Regular | Classroom | Training/Coaching/Tuition

Learn: Cyber Forensics | Cyber Security | Web Attack | Router Forensics | Internet Crime | E Mail Crime | Corporate Espionage | +

Course Content: • Network Forensics and Investigating Logs, • Investigating Network Traffic • Investigating Web Attacks, Router Forensics, Investigating DOS Attacks • Investigating Internet Crimes, Tracking E-Mails • Investigating E-Mail Crimes , • Investigating Corporate Espionage, • Investigating Trademark and Copyright issues • Investigating Sexual Harassment iss...

Category: IT Security and Ethical Hacking

Suyash Computer Training & Services

Maharashtra (Thane)
Suyash Computer Training & ServicesSuyash Computer Training & Services (SCTS) was formed since year 2000, from that time onwards; it is constantly imparting training in Information ...

SCTS Certified Cyber Security Professional (CCSP)

Regular | Classroom | Certificate

Learn: Cyber Security | Snort Analysis | Network Vulnerability Assessment | Password Cracking | Email Security | TCP/IP | +

Course Content: • Need for Cyber Security • Advanced Googling • TCP/IP Packet Analysis • Advanced Sniffing Techniques • Vulnerability Analysis with Nessus • Advanced Wireless Testing • Snort Analysis, Log Analysis • Advanced Exploits and Tools • Pen Testing Methodologies • Customers and Legal Agreements • Rules of Engagement • Planning and Sc...

Category: IT Security and Ethical Hacking | Networking

Suyash Computer Training & Services

Maharashtra (Thane)
Suyash Computer Training & ServicesSuyash Computer Training & Services (SCTS) was formed since year 2000, from that time onwards; it is constantly imparting training in Information ...

Subscribe & get details about interesting courses & events free in your mail