Cyber Security Training Courses

Cyber Security Training Courses

Local, instructor-led live Cyber Security (also known as Cybersecurity, Internet Security or IT Security) training courses demonstrate through interactive discussion and hands-on practice how to understand, plan and implement an Cybersecurity strategy within their organization. Special focus is given to setting up the proper systems and procedures needed to detect and mitigate threats. Internet Security courses are available as interactive trainings and a number of them include a testing and certification component. Cybersecurity training is available as "onsite live training" or "remote live training". Onsite live Cyber Security trainings in India can be carried out locally on customer premises or in NobleProg corporate training centers. Remote live training is carried out by way of an interactive, remote desktop. NobleProg -- Your Local Training Provider

Testimonials

★★★★★
★★★★★

Cyber Security Course Outlines

CodeNameDurationOverview
cissprevCertified Information System Security Professional (CISSP) CBK Review35 hoursA CISSP is an information assurance professional who defines the architecture, design, management and/or controls that assure the security of business environments. The vast breadth of knowledge and the experience it takes to pass the exam is what sets a CISSP apart. The credential demonstrates a globally recognized level of competence provided by the (ISC)2® CBK®, which covers critical topics in security today, including cloud computing, mobile security, application development security, risk management and more.

This course helps you review the 10 domains of the information security practices. It also serves as a strong learning tool for mastering concepts and topics related to all aspects of information systems security.

Objectives:

- To review of the main topics of CISSP CBK (Common Body of Knowledge).
- To prepare for a CISSP examination
iastInteractive Application Security Testing (IAST)14 hoursInteractive Application Security Testing (IAST) is a form of application security testing that combines Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST) or Runtime Application Self-protection (RASP) techniques. IAST is able to report the specific lines of code responsible for a security exploit and replay the behaviors leading to and following such an exploit.

In this instructor-led, live training, participants will learn how to secure an application by instrumenting runtime agents and attack inducers to simulate application behavior during an attack.

By the end of this training, participants will be able to:

- Simulate attacks against applications and validate their detection and protection capabilities
- Use RASP and DAST to gain code-level visibility into the data path taken by an application under different runtime scenarios
- Quickly and accurately fix the application code responsible for detected vulnerabilities
- Prioritize the vulnerability findings from dynamic scans
- Use RASP real-time alerts to protect applications in production against attacks.
- Reduce application vulnerability risks while maintaining production schedule targets
- Devise an integrated strategy for overall vulnerability detection and protection

Audience

- DevOps engineers
- Security engineers
- Developers

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice
cl-jpwCombined JAVA, PHP and Web Application Security28 hoursEven experienced programmers do not master by all means the various security services offered by their development platforms, and are likewise not aware of the different vulnerabilities that are relevant for their developments. This course targets developers using both Java and PHP, providing them essential skills necessary to make their applications resistant to contemporary attacks through the Internet.

Levels of Java security architecture are walked through by tackling access control, authentication and authorization, secure communication and various cryptographic functions. Various APIs are also introduced that can be used to secure your code in PHP, like OpenSSL for cryptography or HTML Purifier for input validation. On server side, the best practices are given for hardening and configuring the operating system, the web container, the file system, the SQL server and the PHP itself, while a special focus is given to client-side security through security issues of JavaScript, Ajax and HTML5.

General web vulnerabilities are discussed by examples aligned to the OWASP Top Ten, showing various injection attacks, script injections, attacks against session handling, insecure direct object references, issues with file uploads, and many others. The various Java- and PHP-specific language problems and issues stemming from the runtime environment are introduced grouped into the standard vulnerability types of missing or improper input validation, improper use of security features, incorrect error and exception handling, time- and state-related problems, code quality issues and mobile code-related vulnerabilities.

Participants can try out the discussed APIs, tools and the effects of configurations for themselves, while the introduction of vulnerabilities are all supported by a number of hands-on exercises demonstrating the consequences of successful attacks, showing how to correct the bugs and apply mitigation techniques, and introducing the use of various extensions and tools.

Participants attending this course will

- Understand basic concepts of security, IT security and secure coding
- Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
- Learn client-side vulnerabilities and secure coding practices
- Learn to use various security features of the Java development environment
- Have a practical understanding of cryptography
- Learn to use various security features of PHP
- Understand security concepts of Web services
- Get practical knowledge in using security testing tools
- Learn about typical coding mistakes and how to avoid them
- Be informed about recent vulnerabilities in Java and PHP frameworks and libraries
- Get sources and further readings on secure coding practices

Audience

Developers
cl-behBeyond Ethical Hacking - Advanced Software Security35 hoursBeyond solid knowledge in using security solutions of the applied technologies, even for experienced programmers it is essential to have a deep understanding of the typical attack techniques that are possible due the various vulnerabilities, i.e. security-relevant programming mistakes. This course approaches secure coding from the stand point of the attack techniques, but with the same purpose as any other course of SCADEMY Secure Coding Academy: to learn software security best practices.

General web-based vulnerabilities are demonstrated through presenting the relevant attacks, while the recommended coding techniques and mitigation methods are explained with the most important aim to avoid the associated problems. Besides server side issues (basically following the OWASP Top Ten), a special focus is given to client-side security tackling security issues of JavaScript, Ajax and HTML5, which is followed by discussing web services and XML security. A brief introduction to the foundations of cryptography provides a common practical baseline for understanding the purpose and the operation of various algorithms.

Specifically for C and C++, we go into more details regarding the exploitation of buffer overflows on the stack and on the heap. After showing the attack techniques, we give an overview of practical protection methods that can be applied at different levels (hardware components, the operating system, programming languages, the compiler, the source code or in production) to prevent the occurrence of the various bugs, to detect them during development and before market launch, or to prevent their exploitation during system operation. Finally, we discuss counter attacks, and then counter-protection measures, highlighting the cat-and-mouse nature of hacking and protection.

Finally, the course explains the most frequent and severe programming flaws in general, by bringing examples in Java, .NET, C and C++ languages and platforms. Besides the typical bugs committed by the programmers, the introduced security vulnerabilities cover both language-specific issues and problems stemming from the runtime environment or the used libraries. All vulnerabilities and the relevant attacks are demonstrated through easy-to-understand exercises, followed by the recommended coding guidelines and the possible mitigation techniques.

Finally, we present security testing techniques and tools that can be applied to reveal the discussed vulnerabilities, along with the various techniques for reconnaissance, configuration and hardening of the environment.

Participants attending this course will

- Understand basic concepts of security, IT security and secure coding
- Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
- Learn client-side vulnerabilities and secure coding practices
- Understand security concepts of Web services
- Have a practical understanding of cryptography
- Realize the severe consequences of unsecure buffer handling
- Understand the architectural protection techniques and their weaknesses
- Learn about typical coding mistakes and how to exploit them
- Be informed about recent vulnerabilities in various platforms, frameworks and libraries
- Learn essential vulnerability analysis and testing techniques and tools
- Get sources and further readings on secure coding practices

Audience

Developers
cl-andAndroid Security14 hoursAndroid is an open platform for mobile devices such as handsets and tablets. It has a large variety of security features to make developing secure software easier; however, it is also missing certain security aspects that are present in other hand-held platforms. The course gives a comprehensive overview of these features, and points out the most critical shortcomings to be aware of related to the underlying Linux, the file system and the environment in general, as well as regarding using permissions and other Android software development components.

Typical security pitfalls and vulnerabilities are described both for native code and Java applications, along with recommendations and best practices to avoid and mitigate them. In many cases discussed issues are supported with real-life examples and case studies. Finally, we give a brief overview on how to use security testing tools to reveal any security relevant programming bugs.

Participants attending this course will

- Understand basic concepts of security, IT security and secure coding
- Learn the security solutions on Android
- Learn to use various security features of the Android platform
- Get information about some recent vulnerabilities in Java on Android
- Learn about typical coding mistakes and how to avoid them
- Get understanding on native code vulnerabilities on Android
- Realize the severe consequences of unsecure buffer handling in native code
- Understand the architectural protection techniques and their weaknesses
- Get sources and further readings on secure coding practices

Audience

Professionals
cl-clsApplication Security in the Cloud21 hoursMigrating to the cloud introduces immense benefits for companies and individuals in terms of efficiency and costs. With respect to security, the effects are quite diverse, but it is a common perception that using cloud services impacts security in a positive manner. Opinions, however, diverge many times even on defining who is responsible for ensuring the security of cloud resources.

Covering IaaS, PaaS and SaaS, first the security of the infrastructure is discussed: hardening and configuration issues as well as various solutions for authentication and authorization alongside identity management that should be at the core of all security architecture. This is followed by some basics regarding legal and contractual issues, namely how trust is established and governed in the cloud.

The journey through cloud security continues with understanding cloud-specific threats and the attackers’ goals and motivations as well as typical attack steps taken against cloud solutions. Special focus is also given to auditing the cloud and providing security evaluation of cloud solutions on all levels, including penetration testing and vulnerability analysis.

The focus of the course is on application security issues, dealing both with data security and the security of the applications themselves. From the standpoint of application security, cloud computing security is not substantially different from general software security, and therefore basically all OWASP-enlisted vulnerabilities are relevant in this domain as well. It is the set of threats and risks that makes the difference, and thus the training is concluded with the enumeration of various cloud-specific attack vectors connected to the weaknesses discussed beforehand.

Participants attending this course will

- Understand basic concepts of security, IT security and secure coding
- Understand major threats and risks in the cloud domain
- Learn about elementary cloud security solutions
- Get information about the trust and the governance regarding the cloud
- Have a practical understanding of cryptography
- Get extensive knowledge in application security in the cloud
- Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
- Understand the challenges of auditing and evaluating cloud systems for security
- Learn how to secure the cloud environment and infrastructure
- Get sources and further readings on secure coding practices

Audience

Developers, Managers, Professionals
cl-nwsNetwork Security14 hoursSince all applications today heavily rely on communication and networks, there is no application security without network security.

This course focuses on network security with a software security viewpoint, and discusses common network attacks and defenses on different OSI layers, with an emphasis on application layer issues, tackling topics like session management or denial of service.

As cryptography is a critical aspect of network security, the most important cryptographic algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement are also discussed. Instead of presenting an in-depth mathematical and theoretical background, these elements are discussed from a merely practical, engineering perspective, showing typical use-case examples and practical considerations related to the use of crypto, such as public key infrastructures. Security protocols in many areas of secure communication are introduced, with an in-depth discussion on the most widely-used protocol families such as IPSEC and SSL/TLS.

Finally, typical crypto vulnerabilities are discussed – both related to certain crypto algorithms and cryptographic protocols, such as BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE and similar, as well as the RSA timing attack. In each case, the practical considerations and potential consequences are described for each problem, again, without going into deep mathematical details.

Participants attending this course will

- Understand basic concepts of security, IT security and secure coding
- Learn about network attacks and defenses at different OSI layers
- Have a practical understanding of cryptography
- Understand essential security protocols
- Understand some recent attacks against cryptosystems
- Get information about some recent related vulnerabilities
- Get sources and further readings on secure coding practices

Audience

Developers, Professionals
cl-anwNetwork Security and Secure Communication21 hoursImplementing a secure networked application can be difficult, even for developers who may have used various cryptographic building blocks (such as encryption and digital signatures) beforehand. In order to make the participants understand the role and usage of these cryptographic primitives, first a solid foundation on the main requirements of secure communication – secure acknowledgement, integrity, confidentiality, remote identification and anonymity – is given, while also presenting the typical problems that may damage these requirements along with real-world solutions.

As a critical aspect of network security is cryptography, the most important cryptographic algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement are also discussed. Instead of presenting an in-depth mathematical background, these elements are discussed from a developer's perspective, showing typical use-case examples and practical considerations related to the use of crypto, such as public key infrastructures. Security protocols in many areas of secure communication are introduced, with an in-depth discussion on the most widely-used protocol families such as IPSEC and SSL/TLS.

Typical crypto vulnerabilities are discussed both related to certain crypto algorithms and cryptographic protocols, such as BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE and similar, as well as the RSA timing attack. In each case, the practical considerations and potential consequences are described for each problem, again, without going into deep mathematical details.

Finally, as XML technology is central for data exchange by networked applications, the security aspects of XML are described. This includes the usage of XML within web services and SOAP messages alongside protection measures such as XML signature and XML encryption – as well as weaknesses in those protection measures and XML-specific security issues such as XML injection, XML external entity (XXE) attacks, XML bombs, and XPath injection.

Participants attending this course will

- Understand basic concepts of security, IT security and secure coding
- Understand the requirements of secure communication
- Learn about network attacks and defenses at different OSI layers
- Have a practical understanding of cryptography
- Understand essential security protocols
- Understand some recent attacks against cryptosystems
- Get information about some recent related vulnerabilities
- Understand security concepts of Web services
- Get sources and further readings on secure coding practices

Audience

Developers, Professionals
cl-oscThe Secure Coding Landscape14 hoursThe course introduces some common security concepts, gives an overview about the nature of the vulnerabilities regardless of the used programming languages and platforms, and explains how to handle the risks that apply regarding software security in the various phases of the software development lifecycle. Without going deeply into technical details, it highlights some of the most interesting and most aching vulnerabilities in various software development technologies, and presents the challenges of security testing, along with some techniques and tools that one can apply to find any existing problems in their code.

Participants attending this course will

- Understand basic concepts of security, IT security and secure coding
- Understand Web vulnerabilities both on server and client side
- Realize the severe consequences of unsecure buffer handling
- Be informated about some recent vulnerabilities in development environments and frameworks
- Learn about typical coding mistakes and how to avoid them
- Understand security testing approaches and methodologies

Audience

Managers
cyberwarfareFundamentals of Corporate Cyber Warfare14 hoursAudience

- Cyber security specialists
- System administrators
- Cyber security managers
- Cyber security auditors
- CIOs

Format of the course

- Heavy emphasis on hands-on practice. Most of the concepts are learned through samples, exercises and hands-on development.
cl-njsNode.JS and Web Application Security21 hoursAs a developer, your duty is to write bulletproof code.

What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed? What if they could steal away your database and sell it on the black market?

This Web application security course will change the way you look at code. A hands-on training during which we will teach you all the attackers’ tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.

It is your choice to be ahead of the pack, and be seen as a game changer in the fight against cybercrime.

Delegates attending will:

- Understand basic concepts of security, IT security and secure coding
- Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
- Learn client-side vulnerabilities and secure coding practices
- Learn about Node.js security
- Learn about MongoDB security
- Have a practical understanding of cryptography
- Understand essential security protocols
- Understand security concepts of Web services
- Learn about JSON security
- Get practical knowledge in using security testing techniques and tools
- Learn how to handle vulnerabilities in the used platforms, frameworks and libraries
- Get sources and further readings on secure coding practices
ethhackEthical Hacker35 hoursThis class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

The purpose of the Ethical Hacking Training is to:

- Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
- Inform the public that credentialed individuals meet or exceed the minimum standards.
- Reinforce ethical hacking as a unique and self-regulating profession.

Audience:

The Course is ideal for those working in positions such as, but not limited to:

- Security Engineers
- Security Consultants
- Security Managers
- IT Director/Managers
- Security Auditors
- IT Systems Administrators
- IT Network Administrators
- Network Architects
- Developers
casCAS: Setting Up a Single-Sign-On Authentication Server7 hoursCAS, or Central Authentication Service, is an open-source, enterprise-level, single-sign-on protocol for the web. CAS gives users access to multiple applications using a single sign-on and allows web applications to authenticate users without giving them access to user passwords. CAS has a Java server component and various client libraries written in PHP, PL/SQL, Java, and more.

In this course, we discuss CAS's architecture and features and practice installing and configuring a CAS server. By the end of the course, participants will have an understanding of CAS's implementation of SSO (Single-Sign-On Authentication) as well as the necessary practice to deploy and manage their own authentication server.

Audience

- System administrators

Format of the course

- Part lecture, part discussion, heavy hands-on practice
seccodeHow to Write Secure Code35 hoursAfter the major attacks against national infrastructures, Security Professionals found that the majority of the vulnerabilities that caused the attacks came from poor and vulnerable code that the developers write.

Developers now need to master the techniques of how to write Secure Code, because we are in a situation where anyone can use availble tools to write a script that can effectivly disable a large organization's systems because the developers have written poor code.

This Course aims to help in the following:

- Help Developers to master the techniques of writing Secure Code
- Help Software Testers to test the security of the application before publishing to the production environment
- Help Software Architects to understand the risks surrounding the applications
- Help Team Leaders to set the security base lines for the developers
- Help Web Masters to configure the Servers to avoid miss-configurations

In this course you will also see details of the latest cyber attacks that have been used and the countermeasures used to stop and prevent these attacks.

You will see for yourself how developers mistakes led to catastrophic attacks, and by participatig in the labs during the course you will be able to put into practise the security controls and gain the experience and knowledge to produce secure coding.

Who should Attend this Course?

This Secure Code Training is ideal for those working in positions such as, but not limited to:

- Web Developers
- Mobile Developers
- Java Developers
- Dot Net Developers
- Software Architects
- Software Tester
- Security Professionals
- Web Masters
devopssecurityDevOps Security: Creating a DevOps Security Strategy7 hoursDevOps is a software development approach that aligns application development with IT operations. Some of the tools that have emerged to support DevOps include: automation tools, containerization and orchestration platforms. Security has not kept up with these developments.

In this course, participants will learn how to formulate the proper security strategy to face the DevOps security challenge.

Audience

- Devops engineers
- Security engineers

Format of the course

- Part lecture, part discussion, some hands-on practice
embeddedsecurityEmbedded Systems Security21 hoursThis training introduces the system architectures, operating systems, networking, storage, and cryptographic issues that should be considered when designing secure embedded systems.

By the end of this course, participants will have a solid understanding of security principles, concerns, and technologies. More importantly, participants will be equipped with the techniques needed for developing safe and secure embedded software.

Audience

- Embedded systems professionals
- Security professionals

Format of the course

- Part lecture, part discussion, hands-on practice
shadowsocksShadowsocks: Set Up a Proxy Server7 hoursShadowsocks is an open-source, secure socks5 proxy.

In this instructor-led, live training, participants will learn how to secure an internet connection through a Shadowsocks proxy.

By the end of this training, participants will be able to:

- Install and configure Shadowsocks on any of a number of supported platforms, including Windows, Linux, Mac, Android, iOS, and OpenWrt.
- Deploy Shadosocks with package manager systems, such as pip, aur, freshports and others.
- Run Shadowsocks on mobile devices and wireless networks.
- Understand how Shadowsocks encrypts messages and ensures integrity and authenticity.
- Optimize a Shadowsocks server

Audience

- Network engineers
- System Administrators
- Computer technicians

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice
cl-cjwCombined C/C++, JAVA and Web Application Security28 hoursTo serve in the best way heterogeneous development groups that are using various platforms simultaneously during their everyday work, we have merged various topics into a combined course that presents diverse secure coding subjects in didactic manner on a single training event. This course combines C/C++ and Java platform security to provide an extensive, cross-platform secure coding expertise.

Concerning C/C++, common security vulnerabilities are discussed, backed by practical exercises about the attacking methods that exploit these vulnerabilities, with the focus on the mitigation techniques that can be applied to prevent the occurrences of these dangerous bugs, detect them before market launch or prevent their exploitation.

Security components and service of Java are discussed by presenting the different APIs and tools through a number of practical exercises where participants can gain hands-on experience in using them. The course also covers security issues of web services and the related Java services that can be applied to prevent the most aching threats of the Internet based services. Finally, web- and Java-related security vulnerabilities are demonstrated by easy-to-understand exercises, which not only show the root cause of the problems, but also demonstrate the attack methods along with the recommended mitigation and coding techniques in order to avoid the associated security problems.

Participants attending this course will

- Understand basic concepts of security, IT security and secure coding
- Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
- Learn client-side vulnerabilities and secure coding practices
- Learn to use various security features of the Java development environment
- Have a practical understanding of cryptography
- Realize the severe consequences of unsecure buffer handling
- Understand the architectural protection techniques and their weaknesses
- Learn about typical coding mistakes and how to avoid them
- Be informed about recent vulnerabilities in various platforms, frameworks and libraries
- Get sources and further readings on secure coding practices

Audience

Developers
NPenNetwork Penetration Testing35 hoursThis class will help the attendees to scan, test, hack and secure their own systems. To gain an in-depth knowledge and practical experience with the current essential security systems. The attendees will get to know how perimeter defences work and then be led into scanning and attacking their own networks, no real network is harmed. The attendees then will learn how intruders escalate privileges and what steps can be taken to secure a system, Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.
bcpracBusiness Continuity Practitioner14 hoursThis course is designed to help the attendee to build organizational resilience against a range of threats so that organizations can respond effectively to incidents, maintain the availability of business operations and safeguard its interests.
computerroomComputer Room Security and Maintenance 14 hoursNetwork security begins at the physical level. In this instructor-led, live training, participants will learn the security risks related to computer server rooms and how to tighten security through smart practices, planning and technology implementation.

By the end of this training, participants will be able to:

- Assess their organization's security risk, as it relates to computer server rooms
- Set up control and monitoring systems to restrict physical access to infrastructure
- Design access policies for different members
- Effectively communicate security policies with team members

Audience

- Security professionals
- Network and hardware engineers
- Technicians
- Facilities managers
- System Administrators

Format of the Course

- Part lecture, part discussion, exercises and hands-on practice.

Note

- To request a customized training for this course, please contact us to arrange.
beyondcorpBeyondCorp: Implementing Zero Trust Security14 hoursBeyondCorp is an open source Zero Trust security framework that allows employees to work securely from any location without the need for a traditional VPN.

In this instructor-led, live training, participants will learn hands-on how to set up a Zero Security system as they set up and deploy BeyondCorop in a live-lab environment.

By the end of this training, participants will be able to:

- Assess their organization's existing security model.
- Shift access controls from the perimeter to individual devices and users.
- Deploy applications using a user and device-centric authentication and authorization workflow.
- Understand, plan and implement a Zero Trust network within their organization.

Audience

- Network engineers
- Cyber security professionals
- System architects
- IT managers

Format of the Course

- Part lecture, part discussion, exercises and heavy hands-on practice

Note

- To request a customized training for this course, please contact us to arrange.
unmdtechUnderstanding Modern Information Communication Technology7 hoursThis course covers the basic concepts of security and IT Security, with an emphasis on defending against network attacks. Participants will gain an understanding of essential security protocols and security concepts of web services. Recent attacks against cryptosystems and some recent related vulnerabilities will be referrenced
hipaafordevHIPAA Compliance for Developers7 hoursHIPAA (Health Insurance Portability and Accountability Act of 1996) is a legislation in the United States that provides provisions for data privacy and security for handling and storing medical information. These guidelines are a good standard to follow in developing health applications, regardless of territory. HIPAA compliant applications are recognized and more trusted globally.

In this instructor-led, live training (remote), participants will learn the fundamentals of HIPAA as they step through a series of hands-on live-lab exercises.

By the end of this training, participants will be able to:

- Understand the basics of HIPAA
- Develop health applications that are compliant with HIPAA
- Use developer tools for HIPAA compliance

Audience

- Developers
- Product Managers
- Data Privacy Officers

Format of the Course

- Part lecture, part discussion, exercises and heavy hands-on practice.

Note

- To request a customized training for this course, please contact us to arrange.
iotsecurityIoT Security Architecture14 hoursInternet of Things (IoT) is a network infrastructure that connects physical objects and software applications wirelessly, allowing them to communicate with each other and exchange data via network communications, cloud computing, and data capture. One of the major hurdles in deployment of IoT solutions is security. Since IoT technologies involves a broad range of devices, designing IoT security is critical to a successful IoT deployment.

In this instructor-led, live training, participants will understand IoT architectures and learn the different IoT security solutions applicable to their organization.

By the end of this training, participants will be able to:

- Understand IoT architectures
- Understand emerging IoT security threats and solutions
- Implement technologies for IoT security in their organization

Audience

- IT Professionals
- Developers
- Engineers
- Managers

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice

Note

- To request a customized training for this course, please contact us to arrange
netnoradNetNORAD7 hoursNetNORAD is a system built by Facebook to troubleshoot network problems via end-to-end probing, independent of device polling.

In this instructor-led, live training, participants will learn how NetNORAD and active path testing can help them improve their network troubleshooting methods.

By the end of this training, participants will be able to:

- Understand how NetNORAD works
- Learn the design principles behind NetNORAD
- Use open-source NetNORAD tools with their own code to implement a fault detection system

Audience

- Network engineers
- Developers
- System engineers

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice
shiroApache Shiro: Securing Your Java Application7 hoursApache Shiro is a powerful Java security framework that performs authentication, authorization, cryptography, and session management.

In this instructor-led, live training, participants will learn how to secure a web application with Apache Shiro.

By the end of this training, participants will be able to:

- Use Shiro's API to secure various types of applications, including mobile, web and enterprise
- Enable logins from various data sources, including LDAP, JDBC, Active Directory, etc.

Audience

- Developers
- Security engineers

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice
nbiotfordevNB-IoT for Developers7 hoursMost of today's IoT connections are industrial. Industrial IoT (IIoT) connections require Low Power Wide Area (LPWA) technologies to provide connectivity, coverage and subscription capabilities for low bandwidth applications. Although these requirements could be served by existing cellular networks, such networks may not be ideal. NB-IoT (Narrow Band IoT) technology offers a promising solution.

NB-IoT (also known as LTE Cat NB1) allows IoT devices to operate over carrier networks such as GSM and “guard bands” between LTE channels. NB-IoT needs only 200kHz of bandwidth and can efficiently connect large numbers of endpoint devices (up to 50,000 per NB-IoT network cell). Its low power requirements makes it ideal for use in small, uncomplicated IoT gadgets such as smart parking, utilities and wearables.

In this instructor-led, live training, participants will learn about the various aspects of NB-IoT as they develop and deploy a sample NB-IoT based application.

By the end of this training, participants will be able to:

- Identify the different components of NB-IoT and how to fit together to form an ecosystem
- Understand and explain the security features built into NB-IoT devices
- Develop a simple application to track NB-IoT devices

Audience

- Developers
- Technical Managers

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice
ehcmEthical Hacking and Countermeasures35 hoursDescription:

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how Intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

Target Audience:

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
secanaSecurity Analyst35 hours

Target Audience would be - Network server administrators, firewall administrators, information security analysts, system administrators, and risk assessment professionals

Upcoming Cyber Security Courses

CourseCourse DateCourse Price [Remote / Classroom]
Application Security in the Cloud - Pune, Koregaon Park - T1Wed, 2019-01-09 09:30152,191INR / 178,191INR
Application Security in the Cloud - Delhi, Connaught Place - ClassroomTue, 2019-02-12 09:30152,191INR / 178,191INR
Application Security in the Cloud - Bangalore, UB City - ClassroomMon, 2019-02-25 09:30152,191INR / 208,191INR
Application Security in the Cloud - Pune, Koregaon Park - T1Tue, 2019-03-26 09:30152,191INR / 178,191INR
Application Security in the Cloud - Delhi, Connaught Place - ClassroomTue, 2019-04-09 09:30152,191INR / 178,191INR
Weekend Cyber Security courses, Evening Cybersecurity training, Cybersecurity boot camp, Cyber Security instructor-led, Weekend Cybersecurity training, Evening Cyber Security courses, Cybersecurity coaching, Cyber Security instructor, Cyber Security trainer, Cyber Security training courses, Cyber Security classes, Cybersecurity on-site, Cybersecurity private courses, Cyber Security one on one training

Course Discounts

CourseVenueCourse DateCourse Price [Remote / Classroom]
Statistics Level 1Agra, Cantt AgraTue, 2019-01-15 09:3091,315INR / 112,315INR
Deep Reinforcement Learning with PythonMeerut, Pallav Puram - ClassroomMon, 2019-02-11 09:30136,972INR / 162,972INR
MATLAB ProgrammingMumbai, Bandra Kurla Complex - ClassroomWed, 2019-03-13 09:3091,315INR / 109,715INR
Codius: Setting Up a Host SystemIndore, A.B. Road - ClassroomFri, 2019-04-26 09:3045,657INR / 63,657INR
Matlab for Prescriptive AnalyticsKerela, Kochi - ClassroomWed, 2019-05-22 09:3091,315INR / 116,315INR

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Some of our clients

is growing fast!

We are looking to expand our presence in India!

As a Business Development Manager you will:

  • expand business in India
  • recruit local talent (sales, agents, trainers, consultants)
  • recruit local trainers and consultants

We offer:

  • Artificial Intelligence and Big Data systems to support your local operation
  • high-tech automation
  • continuously upgraded course catalogue and content
  • good fun in international team

If you are interested in running a high-tech, high-quality training and consulting business.

Apply now!