Learning Path

  • Course 1

    Certified Information Systems Security Professional (CISSP)

    • Upcoming Batches
    • Curriculum
      Sl. No. Chapter
      Chapter - 1 Security and Risk Management
      Chapter - 2 Asset Security
      Chapter - 3 Security Engineering
      Chapter - 4 Communications and Network Security
      Chapter - 5 Identity and Access Management
      Chapter - 6 Security Assessment and Testing
      Chapter - 7 Security Operations
      Chapter - 8 Software Development Security

    Read More

  • Course 2

    EHP (Ethical Hacking Professional)

    • Upcoming Batches
    • Curriculum
      Sl. No. Chapter
      Chapter - 1 Introduction to Cyber Security
      Chapter - 2 Cyber Laws and Standards
      Chapter - 3 Network Basics
      Chapter - 4 Cryptography
      Chapter - 5 Footprinting
      Chapter - 6 Network Scanning
      Chapter -7 Spoofing
      Chapter - 8 System Hacking
      Chapter - 9 Web Application Hacking
      Chapter - 10 Injection
      Chapter - 11 Mobile Security
      Chapter - 12 Web Server Hacking
      Chapter - 13 Malwares
      Chapter - 14 Denial-of-Service (DoS)
      Chapter - 15 Wireless Hacking
      Chapter - 16 Social Engineering
      Chapter - 17 Cloud Security
      Chapter - 18 Internet of Things (IoT) Security
      Chapter - 19 Pentesting

    Read More

  • Course 3

    Masters in Cyber Security

    • Upcoming Batches
    • Curriculum
      Sl. No. Chapter
      Chapter - 1 Computers and Cyber Security
      Chapter - 2 Cyber Laws
      Chapter - 3 Introduction to Network Security
      Chapter -4 Virtual Private Network
      Chapter - 5 Network Attacks Part 1
      Chapter - 6 Wireless Attack
      Chapter - 7 Encoding
      Chapter - 8 Web Application Architecture
      Chapter - 9 Cyber Security & Ethical Hacking
      Chapter - 10 Application Attacks
      Chapter - 11 Network Attack
      Chapter - 12 Cyber Security Analysis & Countermeasures
      Chapter - 13 Advance Security Analysis
      Chapter - 14 Indian Information Technology Act
      Chapter - 15 Vulnerabilities & Attacks
      Chapter - 16 Penetrating Testing
      Chapter - 17 Data Acquisition & Forensics
      Chapter -18 Capstone project

    Read More

  • Course 4

    Checkpoint Certification Training

    • Upcoming Batches
    • Curriculum
      Sl. No. Chapter
      Chapter - 1 Introduction to Check Point Technology
      Chapter - 1.1 Check Point Security Management Architecture(SMART)
      Chapter - 1.2 The Check Point Firewall
      Chapter - 1.3 Security Gateway Inspection Architecture
      Chapter - 1.4 Deployment Considerations
      Chapter - 1.5 Check Point SmartConsole Clients
      Chapter - 1.6 Security Management Server
      Chapter - 1.7 Securing Channels of Communication
      Chapter - 2 Deployment Platforms & Introduction to the Security Policy
      Chapter - 2.1 Check Point Deployment Platforms
      Chapter - 2.2 Check Point Gaia
      Chapter - 2.3 Security Policy Basics
      Chapter - 2.4 Managing Objects
      Chapter - 2.5 Creating the Rule Base
      Chapter - 2.6 Rule Base Management
      Chapter - 2.7 Policy Management and Revision Control
      Chapter - 3 Monitoring Traffic and Connections
      Chapter - 3.1 SmartView Tracker
      Chapter - 3.2 SmartView Monitor
      Chapter - 3.3 Monitoring Suspicious Activity Rules
      Chapter - 3.4 SmartView Tracker vs.SmartView Monitor
      Chapter - 4 Network Address Translation
      Chapter - 4.1 Introduction to NAT
      Chapter - 4.2 Hid NAT
      Chapter - 4.3 Choosing the Hide Address in Hide NAT
      Chapter -4.4 Static NAT
      Chapter - 4.5 Original Packet
      Chapter - 4.6 Reply Packet
      Chapter - 4.7 NAT Global Properties
      Chapter - 4.8 Object Configuration – Hid NAT
      Chapter - 4.9 Hide NAT Using Another Interface
      Chapter - 4.10 Static NAT
      Chapter - 4.11 Configuring Manual NAT
      Chapter - 5 Using SmartUpdate
      Chapter - 5.1 SmartUpdate Architecture
      Chapter - 5.2 SmartUpdate Introduction
      Chapter - 5.3 Overview of Managing Licenses
      Chapter - 5.4 License Terminology
      Chapter - 5.5 Upgrading Licenses
      Chapter - 5.6 Retrieving License Data from Security Gateways
      Chapter - 5.7 Accumulating Fresh Licenses to the License & Contract Repository
      Chapter - 5.8 Importing License Files
      Chapter - 5.9 Adding License Details Manually
      Chapter - 5.10 Attaching Licenses
      Chapter - 5.11 Detaching Licenses
      Chapter - 5.12 Deleting Licenses From License & Contract Repository
      Chapter - 5.13 Installation Process
      Chapter - 6 User Management and Authentication
      Chapter - 6.1 Creating Users and Groups
      Chapter - 6.2 Security Gateway Authentication
      Chapter - 6.3 User Authentication
      Chapter - 6.4 Session Authentication
      Chapter -6.5 Client Authentication
      Chapter - 6.6 LDAP User Management with User Directory
      Chapter - 7 Introduction to Check Point VPNs
      Chapter - 7.1 VPN Deployments and Implementation
      Chapter - 7.2 VPN Topologies
      Chapter - 7.3 Special VPN Gateway Conditions
      Chapter - 7.4 Access Control and VPN Communities
      Chapter - 7.5 Integrating VPNs into a Rule Base
      Chapter - 7.6 Remote Access VPNs
      Chapter - 8 Lab Environment Setup
      Chapter - 8.1 Build the Management Server
      Chapter - 8.2 Build Gateways
      Chapter - 8.3 Install and configure NTP
      Chapter - 8.4 Upgrade to R70.1
      Chapter - 8.5 Establish SIC
      Chapter - 9 Management Portal
      Chapter - 9.1 Configure Management Portal on corporate site
      Chapter - 9.2 Test Management Portal access
      Chapter - 9.3 Configure Management Portal access on partner site
      Chapter - 9.4 Test Management Portal
      Chapter - 10 Smart Workflow
      Chapter - 10.1 Create New Administrators
      Chapter - 10.2 Configure Smart Workflow
      Chapter - 10.3 Open and Submit a Session for Approval
      Chapter - 10.4 Disapprove the Session and Request a Modification
      Chapter - 10.5 Approve the Session and Install the Policy
      Chapter - 10.6 Disable Smart Workflow
      Chapter - 11 Smart Provisioning
      Chapter - 11.1 Enable Smart Provisioning
      Chapter - 11.2 Create a New Profile
      Chapter - 11.3 Assign Profile to Gateways
      Chapter - 11.4 Verify Profile Changes
      Chapter - 12 SSL VPN
      Chapter - 12.1 Configure Connectra R66 Gateway
      Chapter - 12.2 Enable Connectra Gateway in Smart Dashboard
      Chapter - 12.3 Generate a file-share application in the SSL VPN tab
      Chapter - 12.4 Create an Internal User
      Chapter - 12.5 Assign file-share access to User Group
      Chapter - 12.6 Update Rule Base for DMZ traffic
      Chapter - 12.7 Verify file-share access through the User Portal
      Chapter - 12.8 Configure embedded RDP
      Chapter - 12.9 Shutdown and remove Connectra Server
      Chapter - 13 SecureXL
      Chapter - 13.1 Enable and Configure SecureXL on the Gateway
      Chapter - 13.2 Open connections and verify acceleration
      Chapter - 14 Deploying New Mode HA
      Chapter - 14.1 Create and configure a secondary cluster member
      Chapter - 14.2 Configure Gateway-Cluster object
      Chapter - 14.3 Configure ClusterXL properties
      Chapter - 14.4 Modify the Rule Base
      Chapter - 14.5 Pass traffic through the cluster
      Chapter - 14.6 Observe cluster status in Smart View Monitor
      Chapter - 14.7 Perform test failovers
      Chapter -15 Load Sharing Modes
      Chapter - 15.1 Configure Load Sharing Unicast mode
      Chapter - 15.2 Test Load Sharing Unicast mode
      Chapter - 15.3 Configure Load Sharing Multicast mode
      Chapter - 15.4 Test Load Sharing Multicast mode
      Chapter - 16 VPN with Sticky Decision Function
      Chapter - 16.1 Configure VPN in a Cluster
      Chapter - 16.2 Outlook a packet capture of FTP networks without Sticky Decision function
      Chapter - 16.3 Outlook a packet capture of FTP networks with Sticky Decision function
      Chapter - 17 Configure Check Point QoS Policy
      Chapter - 17.1 Enable and Configure Check Point QoS
      Chapter - 17.2 Create Check Point QoS Rules and adjust Rule weights
      Chapter - 17.3 Verify and install Policy
      Chapter - 17.4 Test QoS Policy
      Chapter - 18 Route-based VPNs with Static Routes
      Chapter - 18.1 Configure Gateway and VPN Community objects
      Chapter - 18.2 Add participating Gateway to Community
      Chapter - 18.3 Configure VTI's on participating Gateways
      Chapter - 18.4 Add Static Routes for internal networks
      Chapter - 19 Eventia Analyzer
      Chapter - 19.1 Install the Eventia Suite on CG_Corporate
      Chapter - 19.2 Configure the network object in Smart Dashboard
      Chapter - 19.3 Configure Eventia
      Chapter - 19.4 Monitor events with Eventia

    Read More

  • Course 5

    Trend Micro Certification Training

    • Upcoming Batches
    • Curriculum
      Sl. No. Chapter
      Chapter - 1 Introduction
      Chapter - 1.1 Evolving Threats
      Chapter - 1.2 Traditional Security
      Chapter - 1.3 Anatomy of a Targeted Attack
      Chapter - 1.4 Point of Entry - Spear Phishing
      Chapter - 1.5 How Long Can Targeted Attacks Stay Hidden?
      Chapter - 1.6 Why Monitor Your Network?
      Chapter - 1.7 Why Deep Discovery?
      Chapter - 2 Deep Discovery Solution Overview
      Chapter - 2.1 What is Deep Discovery?
      Chapter - 2.2 Deep Discovery Attack Detection
      Chapter - 2.3 Deep Discovery Threat Detection Technologies
      Chapter - 2.4 Deep Discovery Solution Map
      Chapter - 2.5 Trend Micro Deep Discovery Inspector
      Chapter - 2.6 Trend Micro Deep Discovery Analyzer
      Chapter - 2.7 Trend Micro Deep Discovery Email Inspector
      Chapter - 2.8 Control Manager
      Chapter - 2.9 Custom Threat Defense
      Chapter - 2.10 Deep Discovery Director
      Chapter - 3 Deep Discovery Inspector
      Chapter - 3.1 Key Features and Benefits
      Chapter - 3.2 Network Setup
      Chapter - 3.3 Form Factors
      Chapter - 3.4 Deep Discovery Inspector Models
      Chapter - 4 Deep Discovery Inspector Installation and Configuration
      Chapter - 4.1 Installation Design
      Chapter - 4.2 Deployment Example and Scenarios
      Chapter - 4.3 System Requirements
      Chapter - 4.4 Installing Deep Discovery Inspector
      Chapter - 4.5 Information Provisioning for Setup
      Chapter - 4.6 Defining Architecture and Traffic to Capture
      Chapter - 4.7 Obtaining ISOs, Hot Fixes/Patches
      Chapter - 4.8 Performing an Installation
      Chapter - 4.9 Configuring Initial System Settings (Pre-Configuration Console)
      Chapter - 4.10 Finalizing Deep Discovery Inspector Configuration (Web Console)
      Chapter - 4.11 Testing the Deployment
      Chapter - 4.12 Viewing Installation Logs
      Chapter - 4.13 Linking Deep Discovery Inspector to Deep Discovery Director
      Chapter - 5 Threat Detect Technologies
      Chapter - 5.1 Network Content Inspection Engine (NCIE / VSAPI)
      Chapter - 5.2 Advanced Threat Scan Engine (ATSE / VSAPI)
      Chapter - 5.3 Network Content Inspection Engine (NCIE / VSAPI)
      Chapter - 5.4 Network Content Correlation Engine (NCCE / CAV)
      Chapter - 5.5 Virtual Analyzer
      Chapter - 5.6 Census
      Chapter - 5.7 Certified Safe Software Service (CSSS / GRID)
      Chapter - 5.8 Trend Micro URL Filtering Engine (TMUFE)
      Chapter - 5.9 Network Reputation with Smart Protection Network
      Chapter - 5.10 Mobile Application Reputation Service (MARS)
      Chapter - 6 Deep Discovery Inspector Management and Administration
      Chapter - 6.1 Administration Methods
      Chapter - 6.2 Default Accounts
      Chapter - 6.3 Threat Management and Configuration
      Chapter - 6.4 System Management and Configuration
      Chapter - 6.5 Monitoring System Performance and Resources
      Chapter - 6.6 Troubleshooting Resource Issues
      Chapter - 6.7 Deep Discovery Inspector Logs and Reports
      Chapter - 6.8 Accessing System Logs
      Chapter - 6.9 Debug Logs
      Chapter - 6.10 Determining Log Entities
      Chapter - 6.11 Reporting Logs - Event Classification
      Chapter - 6.12 Debug Portal
      Chapter - 6.13 Threat Reports
      Chapter - 7 Virtual Analyzer
      Chapter - 7.1 What is Virtual Analyzer Looking For?
      Chapter - 7.2 Virtual Analyzer Components
      Chapter - 7.3 Process Flow for Samples
      Chapter - 7.4 Overall Sample Ratings and Risk Level
      Chapter - 7.5 Virtual Analyzer Outputs
      Chapter - 7.6 Virtual Analyzer Report
      Chapter - 7.7 How to Explain a Malicious Result
      Chapter - 7.8 Sending Files to Virtual Analyzer for Analysis
      Chapter - 7.9 Virtual Analyzer Feedback in Deep Discovery Inspector
      Chapter - 7.10 Introducing a Tradition Sandbox into Deep Discovery Inspector for usage by the Virtual Analyzer
      Chapter - 8 Deep Discovery Analyzer Installation and Configuration
      Chapter - 8.1 Information Provisioning
      Chapter - 8.2 Defining the Architecture
      Chapter - 8.3 Obtaining ISOs, Hot Fixes/Patches
      Chapter - 8.4 Performing the Installation
      Chapter - 8.5 Configuring Initial System Settings
      Chapter - 8.6 Configuring Final Settings for Deep Discovery Analyzer
      Chapter - 8.7 Testing the Deployment
      Chapter - 9 Deep Discovery Analyzer Administration
      Chapter - 9.1 Console Overview
      Chapter - 9.2 General Administrative Tasks
      Chapter - 9.3 Troubleshooting
      Chapter - 10 Deep Discovery Email Inspector
      Chapter - 10.1 Functionality
      Chapter - 10.2 Supported Hardware
      Chapter - 10.3 Deployment Modes
      Chapter - 10.4 Ports Used
      Chapter - 10.5 Summary of Operation Modes
      Chapter - 10.6 Threat Detection in Deep Discovery Email Inspector
      Chapter - 11 Deep Discovery Email Inspector Installation and Configuration
      Chapter - 11.1 Information Provisioning
      Chapter - 11.2 Defining the Architecture
      Chapter - 11.3 Obtain ISOs, Hot Fixes/Patches
      Chapter - 11.4 Performing the Installation
      Chapter - 11.5 Completing Pre-Configuration
      Chapter - 11.6 Configuring Final Deep Discovery Email Inspector Settings
      Chapter - 11.7 Testing the Deployment
      Chapter - 12 Deep Discovery Email Inspector Administration
      Chapter - 12.1 Management Console Overview
      Chapter - 12.2 How to View Detections
      Chapter - 12.3 Configuring Policies
      Chapter - 12.4 Setting up Recipient Notifications
      Chapter - 12.5 Defining Email Message Tags
      Chapter - 12.6 Configuring Redirects (Non-Scanable Attachments)
      Chapter - 12.7 Adding Policy Exceptions
      Chapter - 12.8 Configuring Alerts
      Chapter - 12.9 Generating Reports
      Chapter - 12.10 Accessing Log Files
      Chapter - 12.11 System Administration and Management
      Chapter - 12.12 Performing System Maintenance Tasks
      Chapter - 13 Threat Connect
      Chapter - 13.1 Content
      Chapter - 13.2 Using Threat Connect
      Chapter - 13.3 Report Content
      Chapter - 14 Connected Threat Defense
      Chapter - 14.1 Integration is Key to Effective Security
      Chapter - 14.2 Connected Threat Defense Requirements
      Chapter - 14.3 Connected Threat Defense Components
      Chapter - 14.4 Suspicious Objects
      Chapter - 14.5 Handling Suspicious Objects
      Chapter - 14.6 Trend Micro Control Manager
      Chapter - 14.7 Integrating Deep Discovery Inspector with Control Manager
      Chapter - 15 Integration
      Chapter - 15.1 Open Architecture
      Chapter - 15.2 Deep Discovery Inspector Integration
      Chapter - 15.3 Integration with Syslog Servers and SIEM Systems
      Chapter - 15.4 Third-Party Blocking Integration
      Chapter - 15.5 Deep Discovery Analyzer Integration

    Read More

  • Course 6

    Implementing the NIST Standards using COBIT 5

    Read More

  • Course 7

    COBIT5 Certification Training

    Read More

  • Course 8

    COBIT 5 Implementation Certification Training

    Read More

  • Course 9

    COBIT 5 Assessor for Security Certification Training

    Read More

  • Course 10

    COBIT 5 Assessor Certification Training

    Read More

  • Course 11

    CISA Certification Training

    • Upcoming Batches
    • Curriculum
      Sl. No. Chapter
      Chapter - 1 Information Systems Auditing Process
      Chapter - 2 Governance and Management of IT
      Chapter - 3 Information Systems Acquisition, Development and Implementation
      Chapter - 4 Information SystemsOperation And Business Resilence
      Chapter - 5 Protection of Information Assets

    Read More

  • Course 12

    CISM Certification Training

    Read More

  • Course 13

    CSF (Cyber Security Fundamental)

    • Upcoming Batches
    • Curriculum
      Sl. No. Chapter
      Chapter - 1 What is Cybersecurity?
      Chapter - 2 The history of Cybersecurity
      Chapter - 3 Why is cybersecurity important?
      Chapter - 4 Introduction of Security and Risk Management.
      Chapter - 5 Introduction of Asset Security.
      Chapter - 6 Introduction of Security Architecture and Engineering
      Chapter - 7 Introduction of Communications and Network Security
      Chapter - 8 Introduction of Identity and Access Management.
      Chapter - 9 Introduction of Security Assessment and Testing
      Chapter - 10 Introduction of Security Operations
      Chapter - 11 Introduction of Software Development Security

    Read More

Top