Certified Information Security  Professional 

Who should attend?

This course is focusing on Security Enthusiasts, IT professionals, and Mobile Application Developers seeking to understand typical mobile application security issues in detail.

Information Security ,Ethical hacking & Network Fundamentals
  • Cyber Security In Present & Future  
  • Ethical Hacking Concepts
  • Information Security Policies
  • Cyber Laws & Info Sec Standards
  • Network Fundamentals
Social Engineering
  • Techniques in Social Engineering
  • Phishing attacks
Concept of Footprinting
Network Scanning
Vulnerability Assessment Professional Tools and Practices
Exploit Kung-fu
• Exploitation With Metasploit Exploit Framework
• Exploit generation
• Post Exploitation & Privilege Escalation Methodologies
• CTF Best Practices
Web application Security

• Global Standards & Frameworks
• OWASP Top 10
• Burpsuite essentials
• Web Application Scanners
• Web Application Manual Penetration testing
• Countermeasures

Wireless security
Cloud Security
Cryptography, Steganography & Malware
IOT Security