Course 1
Certified Information Systems Security Professional (CISSP)
E-Learning
LIVE ONLINE
Sl. No. | Chapter |
---|---|
Chapter - 1 | Security and Risk Management |
Chapter - 2 | Asset Security |
Chapter - 3 | Security Engineering |
Chapter - 4 | Communications and Network Security |
Chapter - 5 | Identity and Access Management |
Chapter - 6 | Security Assessment and Testing |
Chapter - 7 | Security Operations |
Chapter - 8 | Software Development Security |
Course 2
EHP (Ethical Hacking Professional)
E-Learning
Sl. No. | Chapter |
---|---|
Chapter - 1 | Introduction to Cyber Security |
Chapter - 2 | Cyber Laws and Standards |
Chapter - 3 | Network Basics |
Chapter - 4 | Cryptography |
Chapter - 5 | Footprinting |
Chapter - 6 | Network Scanning |
Chapter -7 | Spoofing |
Chapter - 8 | System Hacking |
Chapter - 9 | Web Application Hacking |
Chapter - 10 | Injection |
Chapter - 11 | Mobile Security |
Chapter - 12 | Web Server Hacking |
Chapter - 13 | Malwares |
Chapter - 14 | Denial-of-Service (DoS) |
Chapter - 15 | Wireless Hacking |
Chapter - 16 | Social Engineering |
Chapter - 17 | Cloud Security |
Chapter - 18 | Internet of Things (IoT) Security |
Chapter - 19 | Pentesting |
Course 3
Masters in Cyber Security
Sl. No. | Chapter |
---|---|
Chapter - 1 | Computers and Cyber Security |
Chapter - 2 | Cyber Laws |
Chapter - 3 | Introduction to Network Security |
Chapter -4 | Virtual Private Network |
Chapter - 5 | Network Attacks Part 1 |
Chapter - 6 | Wireless Attack |
Chapter - 7 | Encoding |
Chapter - 8 | Web Application Architecture |
Chapter - 9 | Cyber Security & Ethical Hacking |
Chapter - 10 | Application Attacks |
Chapter - 11 | Network Attack |
Chapter - 12 | Cyber Security Analysis & Countermeasures |
Chapter - 13 | Advance Security Analysis |
Chapter - 14 | Indian Information Technology Act |
Chapter - 15 | Vulnerabilities & Attacks |
Chapter - 16 | Penetrating Testing |
Chapter - 17 | Data Acquisition & Forensics |
Chapter -18 | Capstone project |
Course 4
Checkpoint Certification Training
Sl. No. | Chapter |
---|---|
Chapter - 1 | Introduction to Check Point Technology |
Chapter - 1.1 | Check Point Security Management Architecture(SMART) |
Chapter - 1.2 | The Check Point Firewall |
Chapter - 1.3 | Security Gateway Inspection Architecture |
Chapter - 1.4 | Deployment Considerations |
Chapter - 1.5 | Check Point SmartConsole Clients |
Chapter - 1.6 | Security Management Server |
Chapter - 1.7 | Securing Channels of Communication |
Chapter - 2 | Deployment Platforms & Introduction to the Security Policy |
Chapter - 2.1 | Check Point Deployment Platforms |
Chapter - 2.2 | Check Point Gaia |
Chapter - 2.3 | Security Policy Basics |
Chapter - 2.4 | Managing Objects |
Chapter - 2.5 | Creating the Rule Base |
Chapter - 2.6 | Rule Base Management |
Chapter - 2.7 | Policy Management and Revision Control |
Chapter - 3 | Monitoring Traffic and Connections |
Chapter - 3.1 | SmartView Tracker |
Chapter - 3.2 | SmartView Monitor |
Chapter - 3.3 | Monitoring Suspicious Activity Rules |
Chapter - 3.4 | SmartView Tracker vs.SmartView Monitor |
Chapter - 4 | Network Address Translation |
Chapter - 4.1 | Introduction to NAT |
Chapter - 4.2 | Hid NAT |
Chapter - 4.3 | Choosing the Hide Address in Hide NAT |
Chapter -4.4 | Static NAT |
Chapter - 4.5 | Original Packet |
Chapter - 4.6 | Reply Packet |
Chapter - 4.7 | NAT Global Properties |
Chapter - 4.8 | Object Configuration – Hid NAT |
Chapter - 4.9 | Hide NAT Using Another Interface |
Chapter - 4.10 | Static NAT |
Chapter - 4.11 | Configuring Manual NAT |
Chapter - 5 | Using SmartUpdate |
Chapter - 5.1 | SmartUpdate Architecture |
Chapter - 5.2 | SmartUpdate Introduction |
Chapter - 5.3 | Overview of Managing Licenses |
Chapter - 5.4 | License Terminology |
Chapter - 5.5 | Upgrading Licenses |
Chapter - 5.6 | Retrieving License Data from Security Gateways |
Chapter - 5.7 | Accumulating Fresh Licenses to the License & Contract Repository |
Chapter - 5.8 | Importing License Files |
Chapter - 5.9 | Adding License Details Manually |
Chapter - 5.10 | Attaching Licenses |
Chapter - 5.11 | Detaching Licenses |
Chapter - 5.12 | Deleting Licenses From License & Contract Repository |
Chapter - 5.13 | Installation Process |
Chapter - 6 | User Management and Authentication |
Chapter - 6.1 | Creating Users and Groups |
Chapter - 6.2 | Security Gateway Authentication |
Chapter - 6.3 | User Authentication |
Chapter - 6.4 | Session Authentication |
Chapter -6.5 | Client Authentication |
Chapter - 6.6 | LDAP User Management with User Directory |
Chapter - 7 | Introduction to Check Point VPNs |
Chapter - 7.1 | VPN Deployments and Implementation |
Chapter - 7.2 | VPN Topologies |
Chapter - 7.3 | Special VPN Gateway Conditions |
Chapter - 7.4 | Access Control and VPN Communities |
Chapter - 7.5 | Integrating VPNs into a Rule Base |
Chapter - 7.6 | Remote Access VPNs |
Chapter - 8 | Lab Environment Setup |
Chapter - 8.1 | Build the Management Server |
Chapter - 8.2 | Build Gateways |
Chapter - 8.3 | Install and configure NTP |
Chapter - 8.4 | Upgrade to R70.1 |
Chapter - 8.5 | Establish SIC |
Chapter - 9 | Management Portal |
Chapter - 9.1 | Configure Management Portal on corporate site |
Chapter - 9.2 | Test Management Portal access |
Chapter - 9.3 | Configure Management Portal access on partner site |
Chapter - 9.4 | Test Management Portal |
Chapter - 10 | Smart Workflow |
Chapter - 10.1 | Create New Administrators |
Chapter - 10.2 | Configure Smart Workflow |
Chapter - 10.3 | Open and Submit a Session for Approval |
Chapter - 10.4 | Disapprove the Session and Request a Modification |
Chapter - 10.5 | Approve the Session and Install the Policy |
Chapter - 10.6 | Disable Smart Workflow |
Chapter - 11 | Smart Provisioning |
Chapter - 11.1 | Enable Smart Provisioning |
Chapter - 11.2 | Create a New Profile |
Chapter - 11.3 | Assign Profile to Gateways |
Chapter - 11.4 | Verify Profile Changes |
Chapter - 12 | SSL VPN |
Chapter - 12.1 | Configure Connectra R66 Gateway |
Chapter - 12.2 | Enable Connectra Gateway in Smart Dashboard |
Chapter - 12.3 | Generate a file-share application in the SSL VPN tab |
Chapter - 12.4 | Create an Internal User |
Chapter - 12.5 | Assign file-share access to User Group |
Chapter - 12.6 | Update Rule Base for DMZ traffic |
Chapter - 12.7 | Verify file-share access through the User Portal |
Chapter - 12.8 | Configure embedded RDP |
Chapter - 12.9 | Shutdown and remove Connectra Server |
Chapter - 13 | SecureXL |
Chapter - 13.1 | Enable and Configure SecureXL on the Gateway |
Chapter - 13.2 | Open connections and verify acceleration |
Chapter - 14 | Deploying New Mode HA |
Chapter - 14.1 | Create and configure a secondary cluster member |
Chapter - 14.2 | Configure Gateway-Cluster object |
Chapter - 14.3 | Configure ClusterXL properties |
Chapter - 14.4 | Modify the Rule Base |
Chapter - 14.5 | Pass traffic through the cluster |
Chapter - 14.6 | Observe cluster status in Smart View Monitor |
Chapter - 14.7 | Perform test failovers |
Chapter -15 | Load Sharing Modes |
Chapter - 15.1 | Configure Load Sharing Unicast mode |
Chapter - 15.2 | Test Load Sharing Unicast mode |
Chapter - 15.3 | Configure Load Sharing Multicast mode |
Chapter - 15.4 | Test Load Sharing Multicast mode |
Chapter - 16 | VPN with Sticky Decision Function |
Chapter - 16.1 | Configure VPN in a Cluster |
Chapter - 16.2 | Outlook a packet capture of FTP networks without Sticky Decision function |
Chapter - 16.3 | Outlook a packet capture of FTP networks with Sticky Decision function |
Chapter - 17 | Configure Check Point QoS Policy |
Chapter - 17.1 | Enable and Configure Check Point QoS |
Chapter - 17.2 | Create Check Point QoS Rules and adjust Rule weights |
Chapter - 17.3 | Verify and install Policy |
Chapter - 17.4 | Test QoS Policy |
Chapter - 18 | Route-based VPNs with Static Routes |
Chapter - 18.1 | Configure Gateway and VPN Community objects |
Chapter - 18.2 | Add participating Gateway to Community |
Chapter - 18.3 | Configure VTI's on participating Gateways |
Chapter - 18.4 | Add Static Routes for internal networks |
Chapter - 19 | Eventia Analyzer |
Chapter - 19.1 | Install the Eventia Suite on CG_Corporate |
Chapter - 19.2 | Configure the network object in Smart Dashboard |
Chapter - 19.3 | Configure Eventia |
Chapter - 19.4 | Monitor events with Eventia |
Course 5
Trend Micro Certification Training
Sl. No. | Chapter |
---|---|
Chapter - 1 | Introduction |
Chapter - 1.1 | Evolving Threats |
Chapter - 1.2 | Traditional Security |
Chapter - 1.3 | Anatomy of a Targeted Attack |
Chapter - 1.4 | Point of Entry - Spear Phishing |
Chapter - 1.5 | How Long Can Targeted Attacks Stay Hidden? |
Chapter - 1.6 | Why Monitor Your Network? |
Chapter - 1.7 | Why Deep Discovery? |
Chapter - 2 | Deep Discovery Solution Overview |
Chapter - 2.1 | What is Deep Discovery? |
Chapter - 2.2 | Deep Discovery Attack Detection |
Chapter - 2.3 | Deep Discovery Threat Detection Technologies |
Chapter - 2.4 | Deep Discovery Solution Map |
Chapter - 2.5 | Trend Micro Deep Discovery Inspector |
Chapter - 2.6 | Trend Micro Deep Discovery Analyzer |
Chapter - 2.7 | Trend Micro Deep Discovery Email Inspector |
Chapter - 2.8 | Control Manager |
Chapter - 2.9 | Custom Threat Defense |
Chapter - 2.10 | Deep Discovery Director |
Chapter - 3 | Deep Discovery Inspector |
Chapter - 3.1 | Key Features and Benefits |
Chapter - 3.2 | Network Setup |
Chapter - 3.3 | Form Factors |
Chapter - 3.4 | Deep Discovery Inspector Models |
Chapter - 4 | Deep Discovery Inspector Installation and Configuration |
Chapter - 4.1 | Installation Design |
Chapter - 4.2 | Deployment Example and Scenarios |
Chapter - 4.3 | System Requirements |
Chapter - 4.4 | Installing Deep Discovery Inspector |
Chapter - 4.5 | Information Provisioning for Setup |
Chapter - 4.6 | Defining Architecture and Traffic to Capture |
Chapter - 4.7 | Obtaining ISOs, Hot Fixes/Patches |
Chapter - 4.8 | Performing an Installation |
Chapter - 4.9 | Configuring Initial System Settings (Pre-Configuration Console) |
Chapter - 4.10 | Finalizing Deep Discovery Inspector Configuration (Web Console) |
Chapter - 4.11 | Testing the Deployment |
Chapter - 4.12 | Viewing Installation Logs |
Chapter - 4.13 | Linking Deep Discovery Inspector to Deep Discovery Director |
Chapter - 5 | Threat Detect Technologies |
Chapter - 5.1 | Network Content Inspection Engine (NCIE / VSAPI) |
Chapter - 5.2 | Advanced Threat Scan Engine (ATSE / VSAPI) |
Chapter - 5.3 | Network Content Inspection Engine (NCIE / VSAPI) |
Chapter - 5.4 | Network Content Correlation Engine (NCCE / CAV) |
Chapter - 5.5 | Virtual Analyzer |
Chapter - 5.6 | Census |
Chapter - 5.7 | Certified Safe Software Service (CSSS / GRID) |
Chapter - 5.8 | Trend Micro URL Filtering Engine (TMUFE) |
Chapter - 5.9 | Network Reputation with Smart Protection Network |
Chapter - 5.10 | Mobile Application Reputation Service (MARS) |
Chapter - 6 | Deep Discovery Inspector Management and Administration |
Chapter - 6.1 | Administration Methods |
Chapter - 6.2 | Default Accounts |
Chapter - 6.3 | Threat Management and Configuration |
Chapter - 6.4 | System Management and Configuration |
Chapter - 6.5 | Monitoring System Performance and Resources |
Chapter - 6.6 | Troubleshooting Resource Issues |
Chapter - 6.7 | Deep Discovery Inspector Logs and Reports |
Chapter - 6.8 | Accessing System Logs |
Chapter - 6.9 | Debug Logs |
Chapter - 6.10 | Determining Log Entities |
Chapter - 6.11 | Reporting Logs - Event Classification |
Chapter - 6.12 | Debug Portal |
Chapter - 6.13 | Threat Reports |
Chapter - 7 | Virtual Analyzer |
Chapter - 7.1 | What is Virtual Analyzer Looking For? |
Chapter - 7.2 | Virtual Analyzer Components |
Chapter - 7.3 | Process Flow for Samples |
Chapter - 7.4 | Overall Sample Ratings and Risk Level |
Chapter - 7.5 | Virtual Analyzer Outputs |
Chapter - 7.6 | Virtual Analyzer Report |
Chapter - 7.7 | How to Explain a Malicious Result |
Chapter - 7.8 | Sending Files to Virtual Analyzer for Analysis |
Chapter - 7.9 | Virtual Analyzer Feedback in Deep Discovery Inspector |
Chapter - 7.10 | Introducing a Tradition Sandbox into Deep Discovery Inspector for usage by the Virtual Analyzer |
Chapter - 8 | Deep Discovery Analyzer Installation and Configuration |
Chapter - 8.1 | Information Provisioning |
Chapter - 8.2 | Defining the Architecture |
Chapter - 8.3 | Obtaining ISOs, Hot Fixes/Patches |
Chapter - 8.4 | Performing the Installation |
Chapter - 8.5 | Configuring Initial System Settings |
Chapter - 8.6 | Configuring Final Settings for Deep Discovery Analyzer |
Chapter - 8.7 | Testing the Deployment |
Chapter - 9 | Deep Discovery Analyzer Administration |
Chapter - 9.1 | Console Overview |
Chapter - 9.2 | General Administrative Tasks |
Chapter - 9.3 | Troubleshooting |
Chapter - 10 | Deep Discovery Email Inspector |
Chapter - 10.1 | Functionality |
Chapter - 10.2 | Supported Hardware |
Chapter - 10.3 | Deployment Modes |
Chapter - 10.4 | Ports Used |
Chapter - 10.5 | Summary of Operation Modes |
Chapter - 10.6 | Threat Detection in Deep Discovery Email Inspector |
Chapter - 11 | Deep Discovery Email Inspector Installation and Configuration |
Chapter - 11.1 | Information Provisioning |
Chapter - 11.2 | Defining the Architecture |
Chapter - 11.3 | Obtain ISOs, Hot Fixes/Patches |
Chapter - 11.4 | Performing the Installation |
Chapter - 11.5 | Completing Pre-Configuration |
Chapter - 11.6 | Configuring Final Deep Discovery Email Inspector Settings |
Chapter - 11.7 | Testing the Deployment |
Chapter - 12 | Deep Discovery Email Inspector Administration |
Chapter - 12.1 | Management Console Overview |
Chapter - 12.2 | How to View Detections |
Chapter - 12.3 | Configuring Policies |
Chapter - 12.4 | Setting up Recipient Notifications |
Chapter - 12.5 | Defining Email Message Tags |
Chapter - 12.6 | Configuring Redirects (Non-Scanable Attachments) |
Chapter - 12.7 | Adding Policy Exceptions |
Chapter - 12.8 | Configuring Alerts |
Chapter - 12.9 | Generating Reports |
Chapter - 12.10 | Accessing Log Files |
Chapter - 12.11 | System Administration and Management |
Chapter - 12.12 | Performing System Maintenance Tasks |
Chapter - 13 | Threat Connect |
Chapter - 13.1 | Content |
Chapter - 13.2 | Using Threat Connect |
Chapter - 13.3 | Report Content |
Chapter - 14 | Connected Threat Defense |
Chapter - 14.1 | Integration is Key to Effective Security |
Chapter - 14.2 | Connected Threat Defense Requirements |
Chapter - 14.3 | Connected Threat Defense Components |
Chapter - 14.4 | Suspicious Objects |
Chapter - 14.5 | Handling Suspicious Objects |
Chapter - 14.6 | Trend Micro Control Manager |
Chapter - 14.7 | Integrating Deep Discovery Inspector with Control Manager |
Chapter - 15 | Integration |
Chapter - 15.1 | Open Architecture |
Chapter - 15.2 | Deep Discovery Inspector Integration |
Chapter - 15.3 | Integration with Syslog Servers and SIEM Systems |
Chapter - 15.4 | Third-Party Blocking Integration |
Chapter - 15.5 | Deep Discovery Analyzer Integration |
Course 9
COBIT 5 Assessor for Security Certification Training
Sl. No. | Chapter |
---|
Course 11
CISA Certification Training
E-Learning
Sl. No. | Chapter |
---|---|
Chapter - 1 | Information Systems Auditing Process |
Chapter - 2 | Governance and Management of IT |
Chapter - 3 | Information Systems Acquisition, Development and Implementation |
Chapter - 4 | Information SystemsOperation And Business Resilence |
Chapter - 5 | Protection of Information Assets |
Course 13
CSF (Cyber Security Fundamental)
Sl. No. | Chapter |
---|---|
Chapter - 1 | What is Cybersecurity? |
Chapter - 2 | The history of Cybersecurity |
Chapter - 3 | Why is cybersecurity important? |
Chapter - 4 | Introduction of Security and Risk Management. |
Chapter - 5 | Introduction of Asset Security. |
Chapter - 6 | Introduction of Security Architecture and Engineering |
Chapter - 7 | Introduction of Communications and Network Security |
Chapter - 8 | Introduction of Identity and Access Management. |
Chapter - 9 | Introduction of Security Assessment and Testing |
Chapter - 10 | Introduction of Security Operations |
Chapter - 11 | Introduction of Software Development Security |