CYBER SCURITY SERVICE

A Professional Master program is ideal for any graduates who wants to start their career in below technologies

Software testing is the process of evaluating and verifying that a software product or application does what it is supposed to do. The benefits of testing include preventing bugs, reducing development costs and improving performance.

#
Cyber Scurity Service

Training We Offer's

Information Security Awareness:

– Types of Phishing attacks, Internal & External Threats, Policies & Decision Cyber Attacks: Response & Recovery Ransomware Attack

Cyber Security & Ethical Hacking:

– Introduction to Ethical Hacking Introduction to Kali Linux Foot printing and Reconnaissance, System hacking, DDOS Attack, OWASPTOP10 Vulnerabilities

CCNA: Switching, Routing, Enterprise Networking and Wireless Essentials

Achieving CCNA certification is the first step in preparing for a career in IT technologies. Profiles like Network Engineer, Systems Engineer, Network Architect are required CCNA Certification. To earn CCNA certification, you must clear online exam that covers a broad range of fundamentals for IT careers, based on the latest networking technologies, software development skills, and job roles. CCNA gives you the foundation you need to take your career in any direction.

Digital Forensics & Corporate Crime investigation:

Cyber Forensic Investigations, Incident Response, e-Discovery, Multimedia Forensics, Web and Server technologies, Server & Client-side scripting, Incident Response, VoIP Technologies, Multimedia Photo / Video Analysis, Augmented Reality, Mobile / Computer / Network Evidence Advanced Acquisition and Analysis and tools such as FTK, EnCase, and other leading open source Cyber Forensic Software’s. Experience in Palo Alto Cortex XDR, XSOAR, Playbooks, Sentinel, Code42, Microsoft Cloud Defender and OSINT.

Security Operation Centre (SOC):

Verify the scope of information assets and system components to be monitored with authorised persons. Use specified monitoring and data collection methods and tools following organisational procedures and policies using SPLUNK, Monitor organization's traffic and logs originating from ICT systems using varius secuirty technologies to Detect security threat and health of the ICT systems using SIEM. Monitor external data sources (e.g., computer network defence (CND) vendor sites, Computer Emergency response Team, SANS25, Security Focus)

Training to Law & Enforcement agency for Cyber Crime Investigation:

Introduction to Cyber Crime. Cyber Crime mapping with ITAA 2008, IPC & Other Laws, MLAT & Rogatory. Standard Operating Procedure (SoP) for Investigation Officer (IO) Crime Scene Investigation: Search & Seizer. Collection of Digital Evidence. Forensic Duplication: FTK imager, Write Blocker, Uffed-Cellebrite. Gathering of Information from Intermediaries, External Agencies. Guidelines for Investigation Officer. Search & Seizer of digital Evidence Scene Of Crime Management Documentation the Scene of crime Panchanama (Seizure Memo) and Seizure Proceedings, Producing Digital Evidence in court of Laws. Dark Web Investigation using OSINT Tools: Tor Browser etc. Role of MHA: National Cyber Crime Reporting Portal, NCRB, RBI, Cert-In, NCPCR, CyberTipLine,

Cyber Crime Awareness:

Social Media Frauds Financial Frauds Ransomware Attacks Lottery Fraud/ Nigerian Fraud Online Job Fraud Computer or Device Hacking Mobile Application Fraud Unauthorized Access/data breach Cyber Laws Where to report cyber Crime

ISO 27001:

Establish the nature and scope of information security audits and your responsibilities in presenting for them. Identify the procedure/guidelines/checklists that will be used for information security audit. Organise data/information require for information security audit using standard templates & tools Comply with organization policies, standards, procedure, guidelines & checklist.