FLYERS

Click on any image thumbnail to enlarge... then click again to hide it

                 

TRAININGS OFFERED

Certified Ethical Hacker

The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. CEHv7 provides a comprehensive ethical hacking and network security-training program to meet the standards of highly skilled security professionals. This class will immerse the students into a hands-on environment where they will be shown how to conduct ethical hacking. They will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it!
To beat a hacker, you need to think like one and this is exactly what this class will teach you! [...]

EC-Council Certified Security Analyst

EC Council Certified Security Analyst, ECSA an advanced ethical hacking training certification that complements the Certified Ethical Hacker, CEH certification by exploring the analytical phase of ethical hacking. While the Certified Ethical Hacker certification exposes the learner to hacking tools and technologies, the Certified Security Analyst course takes it a step further by exploring how to analyze the outcome from these tools and technologies. Through groundbreaking network penetration testing methods and techniques, this pen testing computer security certification helps students perform the intensive assessments required to effectively identify and mitigate risks to the information security of the infrastructure.
This makes the Certified Security Analyst "Pen Tesing" certification a relevent milestone towards achieving EC-Council's Licensed Penetration Tester. [...]

Computer Hacking Forensic Investigator

CHFI v8 Program certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. It is a comprehensive course covering major forensic investigation scenarios that enables students to acquire necessary hands-on experience on various forensic investigation techniques and standard forensic tools necessary to successfully carryout a computer forensic investigation leading to prosecution of perpetrators. [...]

Certified Information Systems Auditor

The Certified Information Systems Auditor (CISA) is ISACA's cornerstone certification. The CISA certification has been earned by more than 70,000 professionals since inception and is for the IS audit, control, assurance and/or security professionals who wish to set themselves apart from their peers. Since 1978, the CISA certification has been renowned as the globally recognized achievement for those who control, monitor and assess an organization's information technology and business systems. [...]

ISO 27001:2005 Lead Auditor

The ISO 27001:2005 Information Security Management Systems (ISMS) standard considers everything about risk. There are three core principles involved: confidentiality, integrity and availability, which cover eleven areas:

  • Security policy;
  • Organisation of information security;
  • Asset management;
  • Human resources security;
  • Physical and environmental security;
  • Communications and operations management;
  • Access control;
  • Information systems acquisition, development and maintenance;
  • Information security incident management;
  • Business continuity management; and
  • Compliance

[...]

Computer Information Security Manager

The Certified Information Security Manager (CISM) certification is a unique management focused certification that has been earned by over 10,000 professionals since its introduction in 2003. Unlike other security certifications, CISM is for the individual who manages, designs, oversees and assesses an enterprise's information security program. CISM defines the core competencies and international performance standards that those who have information security management responsibilities must master. [...]




End User Computer Security

Purpose of the EUCS training is to provide the End User with the essential awareness and skills to protect their information assets. It is the basic need of this era to aware every user of the organization about InfoSec, attacks and their countermeasures as human are the weakest links in an organization`s security. The course is an ONLINE training comprising of 10 Modules, giving the trainee a complete 360° overview of secure usage of their systems. Each module terminates in interactive quiz sessions evaluating the learning and performance of the End-User. This course targets every person who sits behind a computer and browses the internet, as they may unknowingly turnout to be a potential threat to their respective infrastructure. By the end of the course the User will have a clear understanding about the security threats such as Viruses, Worms, Malwares, Social Engineering, Identity theft, Phishing scams, Malicious Emails and Cyber Bullying. This will help the End User to take the essentially required steps to encounter their security exposure. There is an option of custom module which can be tailored to the organization’s business type, policies/procedures and any other needs.