security penetration testing

Best Cyber Security Training In Delhi

Best Cyber Security Training In Delhi

Craw Security Delhi offers an inclusive Cyber Security training in delhi. The extensive practical training provided by Cyber Security training institute in delhi equips live projects and simulations. Such detailed Cyber Security course has helped our students secure job in various MNCs. The trainers at Craw Security Delhi are subject specialist corporate professionals providing in-depth study in Cyber Security course in delhi. Participants completing the Cyber Security certification have plethora of job opportunities in the industry.

Further, we have kept the Cyber Security course in delhi duration flexible. From online classroom to fast-track & one-to-one classroom Cyber Security training is provided during weekdays and weekends to the attendees. Our modern lab is equipped with latest technologies helping students avail a successful Cyber Security training and certification from the institute.

6 Level of the Cyber Security-

Level 1- Ethical Hacking

  • Module 1-Intriduction to Basics of Ethical Hacking
  • Module 2-Foot-Printing Active(Tool Based Practical)
  • Module 3-Foot-Printing Passive(Passive Approach)
  • Module 4-In-depth Networking Scanning
  • Module 5-Enumeration User Identification
  • Module 6-System Hacking Password
  • Module 7-Viruses and Worms
  • Module 8-Trojans and Backdoor
  • Module 9-Snidders MITM with Kali
  • Module 10-Bots and Botnets
  • Module 11-Sniffers MITM with Window
  • Module 12-Social Engineering Techniques
  • Module 13-Social Engineering Toolkit Practical Based
  • Module 14-Denial of Service DOS DDOS Attacks
  • Module 15-Web Session Hijiacking
  • Module 16- SQL Injection Manual Testing
  • Module 17-SQL Injection Automated Tool Based Testing
  • Module 18-Basic of web App Security
  • Module 19- Hacking Web Servers Server Rooting
  • Module 20-Hacking Wireless Network:Manual CLI Based
  • Module 21-Hacking Wireless Network:Automated Tool based
  • Module 22-Evading IDS,Firewalls
  • Module 23-Honey pots
  • Module 24-Buffer Overflow
  • Module 25-Cryphotography
  • Module 26-penetration Testing:Basic
  • Module 27-Mobile Hacking
  • Module 28-Cloud Security and many more

 

Level 2-Penetration Testing

 

  • Module1-How to Plan Your Penetration Testing
  • Module2-Scoping Your Penetration Testing
  • Module3-Network And Web-Application
  • Module4-Post Exploitation Phase
  • Module5-In Depth Password Attacks
  • Module6-Web Application Penetration Testing
  • Module7-Penetration Test Reporting

 

Level 3-Cyber Forensics

 

  • Module1-What is a computer Forensics
  • Module2-Methods by Which Computer gets Hacked
  • Module3-Computer Forensics Investigation Process
  • Module4-Digital Evidence Gathering
  • Module5-Computer Forensics Lab
  • Module6-Setting Up Forensics Lab
  • Module7-Understanding Hard Disks
  • Module8-File System Analysis:Linux/Window/Mac
  • Module9-Window Filesystem Forensics
  • Module10-Data Acquisition and Techniques
  • Module11-Data Imaging Techniques and Tool
  • Module12-Recovering Deleted File and Folder
  • Module13-Deleted Partition Recovery Techniques
  • Module14-Forensics Investigation Using Forensics Tool Kit(FTK)
  • Module15- Forensics Investigation Using Forensics Tool Kit(Oxygen)
  • Module16- Forensics Investigation Using Encase Tool
  • Module17-Stenography and Image File Forensics
  • Module18-Application Password Crackers
  • Module19-Log Capturing and Events Correlation
  • Module20-Network Forensics Tool and Techniques
  • Module21-Mobile Forensics Tool-Cellebrite Tool
  • Module22- Investigating Logs
  • Module23- Investigating Network Traffic:Wireshark
  • Module24- Investigating Wireless Attacks
  • Module25-Investigation Web Application Attacks via Logs
  • Module26-Tracking Investigation Various Email Crimes
  • Module27-Detailed Investigation Reporting

 

Level 4-Indepth Networking

 

  • Module1-Operation of Protocols
  • Module2-OSI Layer
  • Module3-TCP/IP Module
  • Module4-Installing
  • Module5-Configuring
  • Module6-Concept of Layers
  • Module7-STP ,VLANs ,CAM
  • Module8-IPV4 and IPV6
  • Module9-OSPF(single and multi area)
  • Module10-Load Balancing
  • Module11-EIGRP
  • Module12-Introduction to WAN
  • Module13-WAP Protocols
  • Module14-HDLC, PPP,NAT
  • Module15-Introduction to WAN
  • Module16-DHCP,SNMP,Netflow
  • Module17-SSH
  • Module18-Secret Password

 

Level 5-Web Application Security

 

  • Module1-SQL Injection Flaws
  • Module2-Cross Site Scripting Flaw
  • Module3-Source Code Disclosure Flaw
  • Module4-OS Command Injection Flaw
  • Module5-Broken Authentication
  • Module6-File Upload Vulnerability
  • Module7-Cross Sites Request Forgery
  • Module8-Sensitive Data Exposure
  • Module9-Remote File Inclusion
  • Module10-Directory Traversal Attacks
  • Module11-Invalid Redirection Flaw
  • Module12-Security Mis-Configuration
  • Module13-Missing Authorization
  • Module14-Session Fixation
  • Module15-Weak Data Encryption
  • Module16-Information Leakage
  • Module17-Dangerous File Upload
  • Module18-Transport Level Communication
  • Module19-Invalid URL Redirection Flaw
  • Module20-Security Mis -Configuration
  • Module21-Insecure Direct Object Reference

 

Level 6-Mobile Application Security

Course Information

  • Duration-45 Days
  • Lecture- 2hrs/3hrs
  • Skill Level-All Level
  • Assessment-Yes

Extra Features-

  • Weekends and weekdays Training
  • Classroom and Online Training
  • 80% Practical and 20% Theortical
  • Internship Opportunity
  • Video Tutorials
  • Audio Tutorials
  • Practice Labs
  • Ebooks
  • Extra Classes /Backup Classes

Contact Info

Welcome to our CRAW Security. We are glad to have you around.

Phone

011-40394315 | +91-9650202445 | +91-9650677445

Email

info@craw.in

Head Office

1st Floor, Plot no. 4, Lane no. 2, Kehar Singh Estate, Westend Marg, Behind Saket Metro Station, New Delhi – 110030

SOURCE CODE REVIEW

SOURCE CODE REVIEW

 Source Code review is a technique to find a weakness and bugs in source code..Source code review is a single most effective techniques for identifying security flaws when used together automated tool and manual penetration testing ,code review can significantly increase the cost effectiveness of an application security verification effort

 

What is a source code review?

Source Code Review means to find the error and  bugs  in  source code . It is a most important technique to find errors and bugs to make it a right code ,source to review is the  part of any software to create the secure and bugs free software and it also helps in secure transactions

Source code review is provide a guideline and to solve the error and bugs .basically source code review tools to check the predefined error

THE CHECKLIST 

  1. Data Validation
  2. Authentication
  3. Session management
  4. Authorization
  5. Cryptography
  6. Error handling
  7. Logging
  8. Security Configuration
  9. Network Architecture

 

CONTACT INFO

Welcome to our CRAW Security. We are glad to have you around.

Phone : +91-9650202445, 011-40394315

Email: info@craw.in

Address:

First Floor, Plot no. 4, Lane no. 2, Kehar Singh Estate,Westend Marg,Behind Saket metro station, New Delhi 110030

 

Mobile VAPT(Vulnerability Assessment Penetration Testing) Services

Mobile VAPT(Vulnerability Assessment Penetration Testing) Services

Craw Security Provide Mobile VAPT(Vulnerability Assessment Penetration Testing).Mobile VAPT are provide to successful tool and technique enhance  user customer retention … As the user is shifting to mobile application.

Craw Security mobile penetration testing is solution organization to the best exploit of the Android, IOS ,Blackberry and Window Application .. Our team of security test experts, with their in-depth expertise, leverage the in-house framework, industry standard tools and best practices   during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.

 

Our Mobile VAPT Security assessment security controls across different application tiers such as:

  • Data storage
  • Mobile platform internal
  • Security Testing in the mobile app development
  • Basis static and dynamic security testing
  • Sensitive information disclosure
  • Authentication & Authorization
  • Server side controls
  • Reporting the results of the Penetration Test

 

CONTACT INFORMATION

Welcome to our CRAW Security. We are glad to have you around.

Phone

011-40394315 | +91-9650202445 | +91-9650677445

Email

info@craw.in

Head Office

1st Floor, Plot no. 4, Lane no. 2, Kehar Singh Estate, Westend Marg, Behind Saket Metro Station, New Delhi – 110030