

OUR COURSES
Our courses are meticulously crafted to ensure that every student receives a thorough understanding of critical concepts and practical applications in the cybersecurity field.
1.Flexible Learning
2.Expert-Led Training Program
3.Hands – on Experience
1
Cyber Security - Pre-Attack Phase
Module 1. Anatomy of Cyber Security
Module 2. Cyber Security Roles
Module 3. Introduction to Transformation of Data
Module 4. SOC Management Processes
Module 5. Footprinting (Information Gathering)
Module 6. Scanning and Enumerating Networks
Module 7. Analysing Vulnerability
2
Cyber Security - Attack Phase
Module 8. Endpoint Hacking
Module 9. Malware and Virus Attacks
Module 10. Sniffing Networks
Module 11. Social Engineering And Phishing.
Module 12. DoS, DDoS and Ransomware
Module 13. Session Hijacking And MITM Attack
Module 14. Defence Evasion Techniques (Firewall, IDS, Honeypots)
Module 15. Compromising Web Servers
Module 16. Hacking Web Applications
Module 17. Compromising Database using Sql Injection
Module 18. Hacking Mobile Platforms
Module 19. Hacking Wireless Networks
Module 20. Hacking IoT Devices
Module 21. Introduction to Cloud Computing
Module 22. Cryptography Techniques
Module 23. Introduction to Shell GPT and Automation in Cyber Security
3
Forensic Investigations
Module 1. Introduction to Computer Forensics
Module 2. Endpoint Investigation Process.
Module 3. Understanding Storage Devices (HDD, SSD).
Module 4. Introduction to different File Systems.
Module 5. Data Acquisition and Duplication.
Module 6. Anti-forensics Techniques.
Module 7. Windows OS Forensics.
Module 8. Linux OS and Mac OS Forensics.
Module 9. Network Inspections.
Module 10. Investigating Web Server Attacks.
Module 11. Dark Web Investigations.
Module 12. Database Investigations.
Module 13. Cloud Investigations.
Module 14. Email Crime Forensics.
Module 15. Malware and Virus Forensics.
Module 16. Mobile Forensics.
Module 17. IoT Forensics.
4
AWS Cloud
1)To launch Linux EC2 Instance
•1a. To connect to Amazon Linux instance from linux client operating system
•1b. To connect to Amazon Linux instance from windows client operating system.
2)To launch Windows EC2 instance in AWS
•2a. To connect to Amazon Linux instance from linux client operating system
•2b. To connect to Amazon Linux instance from windows client operating system.
3)To configure webserver on Amazon on Linux instance with elastic IP.
4)To assign Elastic IP address.
5)To manage Elastic Block Store (EBS)
6)To manage IAM users, Groups, and Policies.
7)To configure Simple Storage Service (S3).
8)To configure Versioning on S3
9)To configure Static Website Using S3
10)To configure Amazon Glacier.
11)To configure Amazon Virtual Private Cloud (VPC).
12)To create your own VPC
13)To create public cloud
14)To create private subnet
15)Create a Internet Gateway and attach to your VPC
16)Create Public Routing Table, associate subnet and add routing rules
17)Create Private Routing Table, associate subnet and add routing rules
18)To launch Windows instance in Public Subnet
19)To launch Windows instance in Private Subnet under PRIVATE VPC
20)To connect public subnet instance
21)To connect to private subnet instance
22)To connect to linux instance in private subnet
23)To connect to linux instance in private subnet
24)To configure Amazon Cloudwatch
25)To configure Amazon Simple Notification Service (SNS)
26)To configure Amazon Elastic Load Balancer
27)To configure Auto Scaling With Load Balancer
28)To configure an Elastic Beanstalk with Tomcat Application
29)To configure an Amazon Relational Database Service
30)To configure Amazon DynamoDB
31)To configure Amazon CloudFormation
32)To configure Amazon Simple E-Mail Service (SES)
33)To configure Amazon Simple QUEUE Service (SQS)
34)To configure Amazon Route53
35)To configure Amazon EFS Service
36)To configure Amazon CloudFront Service
37)Creating AMI
38)CloudTrail
Address
SF-202, Vini Apartment, N.S Phadke chowk, Sadashiv Peth, Pune, Maharashtra- 411030
Phone
+91 9998047993
​
+91 9998046993