security courses

Best Cyber Security Training In Delhi

Best Cyber Security Training In Delhi

Craw Security Delhi offers an inclusive Cyber Security training in delhi. The extensive practical training provided by Cyber Security training institute in delhi equips live projects and simulations. Such detailed Cyber Security course has helped our students secure job in various MNCs. The trainers at Craw Security Delhi are subject specialist corporate professionals providing in-depth study in Cyber Security course in delhi. Participants completing the Cyber Security certification have plethora of job opportunities in the industry.

Further, we have kept the Cyber Security course in delhi duration flexible. From online classroom to fast-track & one-to-one classroom Cyber Security training is provided during weekdays and weekends to the attendees. Our modern lab is equipped with latest technologies helping students avail a successful Cyber Security training and certification from the institute.

6 Level of the Cyber Security-

Level 1- Ethical Hacking

  • Module 1-Intriduction to Basics of Ethical Hacking
  • Module 2-Foot-Printing Active(Tool Based Practical)
  • Module 3-Foot-Printing Passive(Passive Approach)
  • Module 4-In-depth Networking Scanning
  • Module 5-Enumeration User Identification
  • Module 6-System Hacking Password
  • Module 7-Viruses and Worms
  • Module 8-Trojans and Backdoor
  • Module 9-Snidders MITM with Kali
  • Module 10-Bots and Botnets
  • Module 11-Sniffers MITM with Window
  • Module 12-Social Engineering Techniques
  • Module 13-Social Engineering Toolkit Practical Based
  • Module 14-Denial of Service DOS DDOS Attacks
  • Module 15-Web Session Hijiacking
  • Module 16- SQL Injection Manual Testing
  • Module 17-SQL Injection Automated Tool Based Testing
  • Module 18-Basic of web App Security
  • Module 19- Hacking Web Servers Server Rooting
  • Module 20-Hacking Wireless Network:Manual CLI Based
  • Module 21-Hacking Wireless Network:Automated Tool based
  • Module 22-Evading IDS,Firewalls
  • Module 23-Honey pots
  • Module 24-Buffer Overflow
  • Module 25-Cryphotography
  • Module 26-penetration Testing:Basic
  • Module 27-Mobile Hacking
  • Module 28-Cloud Security and many more

 

Level 2-Penetration Testing

 

  • Module1-How to Plan Your Penetration Testing
  • Module2-Scoping Your Penetration Testing
  • Module3-Network And Web-Application
  • Module4-Post Exploitation Phase
  • Module5-In Depth Password Attacks
  • Module6-Web Application Penetration Testing
  • Module7-Penetration Test Reporting

 

Level 3-Cyber Forensics

 

  • Module1-What is a computer Forensics
  • Module2-Methods by Which Computer gets Hacked
  • Module3-Computer Forensics Investigation Process
  • Module4-Digital Evidence Gathering
  • Module5-Computer Forensics Lab
  • Module6-Setting Up Forensics Lab
  • Module7-Understanding Hard Disks
  • Module8-File System Analysis:Linux/Window/Mac
  • Module9-Window Filesystem Forensics
  • Module10-Data Acquisition and Techniques
  • Module11-Data Imaging Techniques and Tool
  • Module12-Recovering Deleted File and Folder
  • Module13-Deleted Partition Recovery Techniques
  • Module14-Forensics Investigation Using Forensics Tool Kit(FTK)
  • Module15- Forensics Investigation Using Forensics Tool Kit(Oxygen)
  • Module16- Forensics Investigation Using Encase Tool
  • Module17-Stenography and Image File Forensics
  • Module18-Application Password Crackers
  • Module19-Log Capturing and Events Correlation
  • Module20-Network Forensics Tool and Techniques
  • Module21-Mobile Forensics Tool-Cellebrite Tool
  • Module22- Investigating Logs
  • Module23- Investigating Network Traffic:Wireshark
  • Module24- Investigating Wireless Attacks
  • Module25-Investigation Web Application Attacks via Logs
  • Module26-Tracking Investigation Various Email Crimes
  • Module27-Detailed Investigation Reporting

 

Level 4-Indepth Networking

 

  • Module1-Operation of Protocols
  • Module2-OSI Layer
  • Module3-TCP/IP Module
  • Module4-Installing
  • Module5-Configuring
  • Module6-Concept of Layers
  • Module7-STP ,VLANs ,CAM
  • Module8-IPV4 and IPV6
  • Module9-OSPF(single and multi area)
  • Module10-Load Balancing
  • Module11-EIGRP
  • Module12-Introduction to WAN
  • Module13-WAP Protocols
  • Module14-HDLC, PPP,NAT
  • Module15-Introduction to WAN
  • Module16-DHCP,SNMP,Netflow
  • Module17-SSH
  • Module18-Secret Password

 

Level 5-Web Application Security

 

  • Module1-SQL Injection Flaws
  • Module2-Cross Site Scripting Flaw
  • Module3-Source Code Disclosure Flaw
  • Module4-OS Command Injection Flaw
  • Module5-Broken Authentication
  • Module6-File Upload Vulnerability
  • Module7-Cross Sites Request Forgery
  • Module8-Sensitive Data Exposure
  • Module9-Remote File Inclusion
  • Module10-Directory Traversal Attacks
  • Module11-Invalid Redirection Flaw
  • Module12-Security Mis-Configuration
  • Module13-Missing Authorization
  • Module14-Session Fixation
  • Module15-Weak Data Encryption
  • Module16-Information Leakage
  • Module17-Dangerous File Upload
  • Module18-Transport Level Communication
  • Module19-Invalid URL Redirection Flaw
  • Module20-Security Mis -Configuration
  • Module21-Insecure Direct Object Reference

 

Level 6-Mobile Application Security

Course Information

  • Duration-45 Days
  • Lecture- 2hrs/3hrs
  • Skill Level-All Level
  • Assessment-Yes

Extra Features-

  • Weekends and weekdays Training
  • Classroom and Online Training
  • 80% Practical and 20% Theortical
  • Internship Opportunity
  • Video Tutorials
  • Audio Tutorials
  • Practice Labs
  • Ebooks
  • Extra Classes /Backup Classes

Contact Info

Welcome to our CRAW Security. We are glad to have you around.

Phone

011-40394315 | +91-9650202445 | +91-9650677445

Email

info@craw.in

Head Office

1st Floor, Plot no. 4, Lane no. 2, Kehar Singh Estate, Westend Marg, Behind Saket Metro Station, New Delhi – 110030

SOURCE CODE REVIEW

SOURCE CODE REVIEW

 Source Code review is a technique to find a weakness and bugs in source code..Source code review is a single most effective techniques for identifying security flaws when used together automated tool and manual penetration testing ,code review can significantly increase the cost effectiveness of an application security verification effort

 

What is a source code review?

Source Code Review means to find the error and  bugs  in  source code . It is a most important technique to find errors and bugs to make it a right code ,source to review is the  part of any software to create the secure and bugs free software and it also helps in secure transactions

Source code review is provide a guideline and to solve the error and bugs .basically source code review tools to check the predefined error

THE CHECKLIST 

  1. Data Validation
  2. Authentication
  3. Session management
  4. Authorization
  5. Cryptography
  6. Error handling
  7. Logging
  8. Security Configuration
  9. Network Architecture

 

CONTACT INFO

Welcome to our CRAW Security. We are glad to have you around.

Phone : +91-9650202445, 011-40394315

Email: info@craw.in

Address:

First Floor, Plot no. 4, Lane no. 2, Kehar Singh Estate,Westend Marg,Behind Saket metro station, New Delhi 110030

 

Top 10 In-Depth Advanced Networking Course

 Top 10 In-Depth Advanced Networking Course

Craw security is the Best Cyber Security Company .Craw Security Provide In-Depth Advanced Networking Course. In-Depth Advanced Networking  Course is focus on the Networking on in-depth skill required for understanding Network ..Craw Security trainers are briefly provide Network on focus various kind of TCP IP, OSI Layer. This Course helps you to understand more about Advanced networking Technologies used in the Industry.

 

Course Module

  • Module1-Operation of Protocols
  • Module2-OST Layers
  • Module3-TCP/IP models
  • Module4-Installing
  • Module5-Configuring
  • Module6-Concepts of Layer
  • Module7-STP,VLANs,CAM
  • Module8-IPV4 and IPV6
  • Module9-OSPF(single and multi area)
  • Module10-Load Balancing
  • Module11-EIGRP
  • Module12-Introduction to WAN
  • Module13-WAN Protocols
  • Module14-HDLC, PPP, NAT
  • Module15-Introduction to MPLS
  • Module16-DHCP,SNMP,Netflow
  • Module 17-SSH
  • Module 18-Secret Password

Craw Security provide by Extra Features

  • Weekends and Weekdays Training
  • Classroom and Online Training
  • 80% Practical and 20% Theortical
  • Internship Opportunity
  • GNS/Packets Tracer
  • Video Nuggets
  • Audio Tutorials
  • Ebooks
  • Certification Available
  • Exam Code-200-125
  • Exam Free 325 USD

Course Detail

  • Duration- 45 Days
  • Lecture- 2hrs/3hrs
  • Skill Level- All level

FOR MORE INFORMATION  CONTACT :-

Phone

011-40394315 | +91-9650202445 | +91-9650677445

Email

info@craw.in

Head Office

1st Floor, Plot no. 4, Lane no. 2, Kehar Singh Estate, Westend Marg, Behind Saket Metro Station, New Delhi – 110030

 

现在我的胸部比没生孩子之前还要漂亮丰胸食物,就像怀孕时候那样饱满,对着老公再也没有自卑感了,一家三口好幸福丰胸方法,这都是用粉嫩公主酒酿蛋后的收获丰胸产品,真是太感谢这个粉嫩公主酒酿蛋了!添加WeChat获取免费一对一丰胸指导丰胸产品粉嫩公主