support@jairnetwork.com  +91 836 851 1901

Cyber Security Training Course

Cyber Security WORKSHOP TRAINING

Course Description

Cyber Security Training provides comprehensive knowledge as well as specific methodologies that must be put into practice to ensure information security of an organization.This Cyber Security course at Jairnetworks offers a combo of two of the best security courses in the market today: CHFI v8 and CEH v9.

  • CHFI v8: CHFI v8 is a globally recognized advanced Computer Forensic Investigation program. It illustrates a specified practical approach to computer forensics and data analysis. This Cyber Security training all-inclusively covers the key forensic analysis methodologies that allow learners to get practical understanding on a variety of forensic analysis techniques and tools required to conduct a computer forensic investigation.
  • CEH v9: An individual who is Certified Ethical Hacker CEH v9 certified is a master in ethical hacking techniques which can be used in cyber security and penetration testing. Ethical hackers uncover threats and vulnerabilities to an enterprise by ethically hacking the network/system and presenting srategies to fill in the loopholes so that no malicious intruder can exploit those vulnerabilities.
COURSE CONTENT
  • Module 01: Introduction to Basics of Ethical Hacking
  • Module 02: Foot-printing Active (Tool Based Practical)
  • Module 03: Foot-printing Passive (Passive Approach)
  • Module 04: In-depth Network Scanning
  • Module 05: Enumeration User Identification
  • Module 06: System Hacking Password Cracking &Bypassing
  • Module 07: Viruses and Worms
  • Module 08: Trojans and Backdoor
  • Module 09: Bots and Botnets
  • Module 10: Sniffers MITM with Kali
  • Module 11: Sniffers MITM with Windows
  • Module 12: Social Engineering Techniques Theoretical Approach
  • Module 13: Social Engineering Toolkit Practical Based Approach
  • Module 14: Denial of Service DOS & DDOS Attacks
  • Module 15: Web Session Hijacking
  • Module 16: SQL Injection Manual Testing
  • Module 17: SQL Injection Automated Tool Based Testing
  • Module 18: Basics of Web App Security
  • Module 19: Hacking Web servers Server Rooting
  • Module 20: Hacking Wireless Networks Manual CLI Based
  • Module 21: Hacking Wireless Network: Automated Tool Based
  • Module 22: Evading IDS, Firewalls
  • Module 23: Honey pots
  • Module 24: Buffer Overflow
  • Module 25: Cryptography
  • Module 26: Penetration Testing: Basics
  • Module 27: Mobile Hacking
  • Module 28: Cloud Security
How you will benefit
  • You will get to know about how things in field of Hackers work.
  • Your misconceptions about hacking will be resolved.
  • You problems regarding hacking can be solved by the Expert.
  • You will have a permanent routine for learning about hacking.
  • You will understand that Hacking is not merely about getting unauthorized access to computers or FB accounts. It is much more than that. It is an art.
  • You will get to know that at which subdiscipline of CEH are you good at so that you can further give more attention at that subdiscipline
Course Duration
  • Regular Track – 10 days ( Cyber Security )
  • Fast Track – 8 days ( Cyber Security )
  • Super Fast Track – 6 days ( Cyber Security )

For more information, kindly contact +91 8368511901 / 011 40073536 or mail us at support@jairnetwork.com

COURSE CONTENT
  • Module 01: HOW TO PLAN YOYR PENERTRATION TESTNG
  • Module 02: SCOPING YOUR PENERTRATION TESTNG (CONTENT)
  • Module 03: NETWORK & WEB-APPLICATIONS SCANNING TECHNIQUES
  • Module 04: NETWORK EXPLOITATION ATTACK VECTORS
  • Module 05: POST EXPLOITATION PHASE
  • Module 06: IN DEPTH PASSWORD ATTACKS
  • Module 07: WEB APPLICATION PENETRATION TESTING
  • Module 08: PENETRATION TEST REPORTING
How you will benefit
  • You will get to know about how things in field of Hackers work.
  • Your misconceptions about hacking will be resolved.
  • You problems regarding hacking can be solved by the Expert.
  • You will have a permanent routine for learning about hacking.
  • You will understand that Hacking is not merely about getting unauthorized access to computers or FB accounts. It is much more than that. It is an art.
  • You will get to know that at which subdiscipline of CEH are you good at so that you can further give more attention at that subdiscipline
Course Duration
  • Regular Track – 10 days ( Cyber Security )
  • Fast Track – 8 days ( Cyber Security )
  • Super Fast Track – 6 days ( Cyber Security )

For more information, kindly contact +91 8368511901 / 011 40073536 or mail us at support@jairnetwork.com

COURSE CONTENT
  • DWAV20.1 : SQL Injections Flaws
  • DWAV20.2 : Cross Site Scripting Flaw
  • DWAV20.3 : Source Code Disclosure Flaw
  • DWAV20.4 : OS Command Injection Flaw
  • DWAV20.5 : Broken Authentication and Session Management
  • DWAV20.6 : File Upload Vulnerability (Dangerous File Upload)
  • DWAV20.7 : CSRF – Cross Site Request Forgery
  • DWAV20.8 : Sensitive Data Exposure
  • DWAV20.9 : Insecure Direct Object Reference
  • DWAV20.10 : Local file Inclusion and Remote File Inclusion(LFI and RFI attack)
  • DWAV20.11 : Directory Traversal Attack
  • DWAV20.12 : Insecure Transport Level Communication
  • DWAV20.13 : Information Exposure Through an Error Message
  • DWAV20.14 : Invalid URL Redirection Flaw
  • DWAV20.15 : Hard-coded Credentials in Static Code
  • DWAV20.16 : Security Mis-Configuration
  • DWAV20.17 : Missing Authorization and Authentication for Critical Functions
  • DWAV20.18 : Session Fixation
  • DWAV20.19 : Weak Data Encryption
  • DWAV20.20 : Information Leakage
HANDS ON PRACTICAL PROJECT
  • DWAV20.1 : Sql Injections Flaws : Login Authentication Bypass,Blind Sql Injeciton Manual and Automated using Havij,SQLMAP,Html Injection.
  • DWAV20.2 : Cross Site Scripting Flaw : Reflected and Stored XSS using Manual and Tool Based : Using Burp Suite
  • DWAV20.3 : Source Code Disclosure Flaw : Manual Process and File Inclusion
  • DWAV20.4 : OS Command Injection Flaw: On DVWA (Damn Vulnerable Web Application) and Metasploitable
  • DWAV20.5 : Broken Authentication and Session Management : DVWA -Damn Vulnerable Web Application, Samurai OS
  • DWAV20.6 : File Upload Vulnerability (Dangerous File Upload) Live Practical Based Example
  • DWAV20.7 : CSRF – Cross Site Request Forgery
  • DWAV20.8 : Sensitive Data Exposure : Live WebSite
  • DWAV20.9 : Insecure Direct Object Reference: Instructor Special
  • DWAV20.10 : Local file Inclusion and Remote File Inclusion(LFI and RFI attack): BURP SUITE
  • DWAV20.11 : Directory Traversal Attack Traversing Directories on a Web Site
  • DWAV20.12 : Insecure Transport Level Communication: Weak SSL Version Detection
  • DWAV20.13 : Information Exposure Through an Error Message
  • DWAV20.14 : Invalid URL Redirection Flaw
  • DWAV20.15 : Hard-coded Credentials in Static Code
  • DWAV20.16 : Security Mis-Configuration
  • DWAV20.17 : Missing Authorization and Authentication for Critical Functions
  • DWAV20.18 : Session Fixation
  • DWAV20.19 : Weak Data Encryption
  • DWAV20.20 : Information Leakage
How you will benefit
  • You will get to know about how things in field of Hackers work.
  • Your misconceptions about hacking will be resolved.
  • You problems regarding hacking can be solved by the Expert.
  • You will have a permanent routine for learning about hacking.
  • You will understand that Hacking is not merely about getting unauthorized access to computers or FB accounts. It is much more than that. It is an art.
  • You will get to know that at which subdiscipline of CEH are you good at so that you can further give more attention at that subdiscipline
Course Duration
  • Regular Track – 10 days ( Cyber Security )
  • Fast Track – 8 days ( Cyber Security )
  • Super Fast Track – 6 days ( Cyber Security )

For more information, kindly contact +91 8368511901 / 011 40073536 or mail us at support@jairnetwork.com

Design and Deploy customized solutions for your business

We are committed to offer solutions and services that elevate your business and lower costs.

Scroll to Top