|Course or Certification Name||Category||Location||Mode of learning|
|Certified Information Systems Security Professional (CISSP) - Online Self Paced||Cloud Computing||Online self study|
|Security Engineering||Information Security||Online self study|
|Network Security Monitoring (NSM) with Security Onion||Information Security||Online self study|
|CompTIA Cybersecurity Analyst (CSA+)||Cyber Security||Online self study|
|Certified Information Systems Security Professional (CISSP)||cissp||Classroom|
|Certified Security Analyst (ECSA): Penetration Testing||Cyber Security||Online self study|
|CISSP (Online Classroom - Flexi Pass)||cissp||Noida , Delhi , Gurgaon , Chandigarh , Bangalore , Hyderabad , Chennai , Ernakulam||Online Classroom|
|Introduction to Cyber Attacks||Cyber Security||Online self study|
|DESGN 2.1: Designing for Cisco Internetwork Solutions||Cisco Security Certifications||Online self study|
|CompTIA A+ Certification||Cloud Computing||Online self study|
|Fundamentals of Computer Network Security Specialization||CCNP||Offline self study|
|Certified Network Defender Certification||Online self study|
|DevOps Certification Training||DevOps||Offline self study|
|IINS 2.0: Implementing Cisco IOS Network Security||Cisco Security Certifications||Online self study|
|Vskills Certified Cyber Security Analyst Government Certification||Cyber Security||Offline self study|
Certified Information Systems Security Professional (CISSP) is an information security certification that was developed by the International Information System Security Certification Consortium, also known as (ISC)2. This CISSP course was prepared by professional experts and has carefully-designed modules that offer comprehensive learning content covering all the topics that will help candidates in the preparation for the CISSP exam. Offering unlimited online content access for six months, the course will help candidates gain expertise in areas like security principles, security engineering, asset management and network security as per an organisationâ€™s requirements.
Security Engineering addresses the problem of inadequate and incomplete security solutions. The configuration of an integrated and resilient security framework is the goal of this course on Security Engineering.
Network security monitoring is a skill that is at the core of the broad set of skills security professionals can master to prevent, detect, and respond to attacks which are so common today. In this course, Network Security Monitoring (NSM) with Security Onion, you will learn about network security monitoring as well as how to use Security Onion to perform network security monitoring.
CompTIA Cybersecurity Analyst (CSA+) is an international, vendor-neutral cybersecurity certification offered by a non-profit trade association, The Computing Technology Industry Association. This CompTIA CSA+ course will provide the requisite training to the candidates to have critical knowledge and skills that are required to prevent, detect and combat cybersecurity threats | Candidates get a boost to their career by gaining expertise in securing and analysing IT assets at the hardware and software levels | The course covers various topics like network architecture, threat identification, threat mitigation, monitoring security issues, and other related areas
The CISSP certification was the first credential in the field of information security, accredited by the ANSI (American National Standards Institute) to ISO (International Standards Organization) Standard 17024:2003. It is approved by the U.S. Department of Defense (DoD) in both their Information Assurance Technical (IAT) and Managerial (IAM) categories.
The ECSA pentest program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and enhances your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing EC-Councilâ€™s published penetration testing methodology. It focuses on pentesting methodology with an emphasis on hands-on learning
Certified Information Systems Security Professional (CISSP) training facilitates the learning and knowledge in designing, building, and maintaining a secure business environment using globally approved Information Security standards. The aim of the course is to develop expertise in architecture, and design of security and earn the 30 CPEs required for the CISSP certification exam. IT Security professionals such as Security Consultants and Managers, IT Directors and Managers, and Security Auditors and Architects are best suited for this course enhancing their skills and knowledge on business continuity planning & disaster recovery planning vital for the smooth running of any organization
This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service (DDOS) and botnet- attacks are also described and illustrated using real examples from the past couple of decades. | Familiar analytic models are outlined such as the confidentiality/integrity/availability (CIA) security threat framework, and examples are used to illustrate how these different types of threats can degrade real assets. The course also includes an introduction to basic cyber security risk analysis, with an overview of how threat-asset matrices can be used to prioritize risk decisions. Threats, vulnerabilities, and attacks are examined and mapped in the context of system security engineering methodologies.
The course starts with an introduction of the Cisco Network Architecture for the enterprise that allows consumers to create a more intelligent infrastructure. Scores of consumers build the module presenting ways of characterizing the existing network. It also takes you through the role of a WAN, the traits of the WAN technologies and the needs for accomplishing an effective WAN design. The course ends with a discussion on the implementation process encompassing verification of the design solution, prototypes and actual implementation.
CompTIA A+ is an entry-level certification that has been designed by The Computing Technology Industry Association, a non-profit trade association, to help IT professionals to boost their IT career. | This CompTIA A+ Certification course offers in-depth understanding of the most common hardware and software technologies in business and certifies the skills necessary to support complex IT infrastructures | The course has been developed by some of the expert professionals in the industry and offers quality online learning content | It offers a learning path that covers the objectives for the CompTIA A+ Certification Exam (220-901) and CompTIA A+ Certification Exam (220-902) and consists of a comprehensive list of topics like computer hardware knowledge, networking, troubleshooting, virtualisation and security
This specialization is intended for IT professionals, computer programmers, managers, IT security professionals who like to move up ladder, who are seeking to develop network system security skills. Through four courses, we will cover the Design and Analyze Secure Networked Systems, Develop Secure Programs with Basic Cryptography and Crypto API, Hacking and Patching Web Applications, Perform Penetration Testing, and Secure Networked Systems with Firewall and IDS, which will prepare you to perform tasks as Cyber Security Engineer, IT Security Analyst, and Cyber Security Analyst.
Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. The course is designed and developed after extensive market research and surveys. | The program prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect and respond approach to network security. The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real world expertise on current network security technologies and operations. The study-kit provides you with over 10 GB of network security best practices, assessments and protection tools. The kit also contains templates for various network policies and a large number of white papers for additional learning.
The DevOps Certification Training Program will provide you with in-depth knowledge of various DevOps tools including Git, Jenkins, Docker, Ansible, Puppet, Kubernetes and Nagios. This training is completely hands-on and designed in a way to help you become a certified practitioner through best practices in Continuous Development, Continuous Testing, Configuration Management and Continuous Integration, and finally, Continuous Monitoring of software throughout its development life cycle.
Designed to be as efficient as classroom training, Cisco IOS Network Security makes it significant for business to focus on the security of the networks. It is also challenging due to increased availability requirements and regulatory requirements. While organizations move their business to the public sector, they have to make certain that the data doesnâ€™t come in front of wrong individuals. The course covers the development of a comprehensive security and different phases of the process and significance of a sound security policy.
This certification institutes & enhances awareness of aspirants as per the company need for cyber security and forensics. Knowledge acquired by the certification includes cybercrime, IT Act 2000, cyber offenses, wireless devices cybercrime, phishing, keyloggers, backdoors, SQL injection, DDoS attacks, identity theft, computer and wireless forensics, cyber terrorism, social media marketing, incident handling and privacy.