SlideShare a Scribd company logo
1 of 17
Download to read offline
CRAW Security
Diploma in Information
Security
CRAW Security
Course Description
We live in a world driven by technology. Every industry is becoming more and more
reliant on technology. There is a huge demand for people who are skilled in various
technology. This training pack covers 5 most in demand and trending courses.
You will learn in Diploma and Information Security
1. Certified Ethical Hacker (CEH V9)- Basics of Ethical Hacking, Foot-printing, Network
Scanning, Web Session, Cryptography Cloud Security and many more.
2. Computer Hacking Forensic Investigator (CHFI)- Computer Forensics, CF
Investigation Process, Files System Analytics, Data Acquisition, FTK, Mobile
Forensics, Network Forensics.
3. EC-Council Certified Security Analyst (ECSA)- Penetration Testing, network and web
application, web application penetration testing.
4. Web Application security- SQL Injection Flaws, Sore Code Disclosure Flaw, Remote
File Inclusion, Missing Authorization, invalid URL redirection.
5. CCNA- Operations of Protocols, OSI Layers, IPV4 and IPV6, WAN, DHCP, SNMP, SSH,
Secret Password
Call Us- +91-9650202445 | +91-9650677445 CRAW Security
Target to Audience
Individuals
School Students
College Students
IT Professionals
IT Officers
IT and LAW Officers
Corporates
IT Training Firms
IT Consultants
IT Experts
IT Officers
IT Institutions & Colleges
IT Graduated
Computer Science Students
Call Us- +91-9650202445 | +91-9650677445 CRAW Security
Duration of Program
 6 Months (Total 300 Hours)
 2 Hours (Per Day)
 4 Hours (Per Day)
 8 Hours (Per Day)
Call Us- +91-9650202445 | +91-9650677445 CRAW Security
Online Training Classroom Training
Exam Details
Call Us- +91-9650202445 | +91-9650677445 CRAW Security
CEH Exam Details
 Number of Questions: 125
 Test Duration: 4 Hours
 Test Format: Multiple Choice
 Test Delivery: ECC EXAM, VUE
 Exam Prefix: 312-50 (ECC EXAM),
312-50 (VUE)
 CHFI Exam Details
 Number of Questions: 150
 Passing Score: 70%
 Test Duration: 4 hours
 Test Format: Multiple choice
 Test Delivery: ECC exam
portal
ECSA v9 Exam Details
 Credit Towards
Certification: ECSA v9
 Number of Questions:
150
 Passing Score: 70%
 Test Duration: 4 Hours
CCNA Security Exam Details
 Required Exam(s)- 210-
260IINS
 Recommending Training-
Implementing CISCO
Network Security (IINS)
Web Application Security Exam
 1 proctored exam
 75 questions
 Time limit of 3 hours
 Minimum Passing Score of
68%
What we try to Give
We try to give you real industry standards with best possible quality to all our
customers and clients. We focus on Various sections of Society and running a national
level campaign to literate Students from all parts of company who can’t Afford “Basic
IT Computer Training”. We wish we could teach as many students from all over the
world and make it a beautiful place to work. We work on minimum gross margins to
strength the Indian It infrastructure.
Online Training Classroom Training Virtual Lab
Call Us- +91-9650202445 | +91-9650677445 CRAW Security
Classroom Training
Instructor-led training provides a comfortable teaching environment with instructors
that are familiar with the certification process and can help you master your
certification exam. Find your instructor now. There’s a wealth of training materials
available that match your learning needs and learning style. Whether you are studying
on your own, or in a classroom environment, we recommend EC-Council and CISCO
Authorized Quality Curriculum training materials that will help you get ready for your
certification exam and pass the test.
Call Us- +91-9650202445 | +91-9650677445 CRAW Security
Course Outline of CEH V9
 Introduction to Ethical Hacking
 Foot printing and reconnaissance
 Scanning Networks
 Enumeration
 System Networks
 Malware Threats(Virus,Trojan,Worms)
 Sniffing
 Social Engineering
 Denial-of-Service
 Session Hacking
 Hacking Web server
Call Us- +91-9650202445 | +91-9650677445 CRAW Security
 Hacking Web Applications
 SQL Injection
 Hacking Wireless Networks
 Hacking Mobile Platforms
 Evading IDS, Firewalls, and Honeypots
 Cloud Computing
 Cryptography
 Kali-Linux Hands-On Training
 Penetration Testing
 Computer Forensics in Today’s World
 Computer Forensics Investigation Process
 Searching and Seizing Computers
 Digital Evidence
 First Responder Procedures
 Computer Forensics Lab
 Understanding Hard Disks and File Systems
 Windows Forensics
 Data Acquisition and Duplication
 Recovering Deleted Files and Deleted Partitions
 Forensics Investigation using Access Data FTK
 Forensics Investigation Using EnCase
 Steganography and Image File Forensics
 Application Password Crackers
Course Outline of CHFI
 Log Capturing and Event Correlation
 Network Forensics, Investigating Logs
and Investigating Network Traffic
 Investigating Wireless Attacks
 Investigating Web Attacks
 Tracking Emails and Investigating Email
Crimes
 Mobile Forensics
 Investigative Reports
 Becoming an Expert Witness
Call Us- +91-9650202445 | +91-9650677445 CRAW Security
Course Outline of ECSA
 Need for Security Analysis
 TCP IP Packet Analysis
 Penetration Testing Methodologies
 Customers and Legal Agreements
 Rules of Engagement
 Penetration Testing Planning and Scheduling
 Pre-Penetration Testing Steps
 Information Gathering
 Vulnerability Analysis
 External Penetration Testing
 Internal Network Penetration Testing
 Firewall Penetration Testing
 IDS Penetration Testing
 Password Cracking Penetration
Testing
 Social Engineering Penetration
Testing
 Web Application Penetration Testing
 SQL Penetration Testing
 Penetration Testing Reports and Post
Testing Actions
Call Us- +91-9650202445 | +91-9650677445 CRAW Security
Course Outline of Web
Application Security
 Introduction to Web Application Security
 Web Application Vulnerabilities
 Web Application Security Scanner and Testing
 Protecting, Improving and Some Guidelines for WAS
 Tips Securing Web Applications
 Flaws, Myths and Best Practices for WAS
 Course Resources
 Web Application Security Certification
Call Us- +91-9650202445 | +91-9650677445 CRAW Security
Course Outline of CCNA
Security
 Network Fundamentals
 LAN Switching Technologies
 Routing Technologies
 WAN Technologies
 Infrastructure Service
 Infrastructure Security
 Infrastructure Management
Call Us- +91-9650202445 | +91-9650677445 CRAW Security
Our International Partners
Call Us- +91-9650202445 | +91-9650677445 CRAW Security
Our Partners
Call Us- +91-9650202445 | +91-9650677445 CRAW Security
Our Partners
Call Us- +91-9650202445 | +91-9650677445 CRAW Security
Contact Us
CRAW Security
1st Floor, Plot no. 4, Lane no. 2,Kehar Singh Estate,Westend
Marg, Behind Saket Metro Station, New Delhi – 110030
Call Us
011-40394315 | +91-9650202445 | +91-9650677445
Mails Us
training@craw.in
Visit Us
www.crawsecurity.com | www.craw.in
THANK YOU
IT HAS BEEN A PLEASURE!

More Related Content

What's hot

Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Decisions
 
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
Cisco ThreatGrid:  Malware Analysis and Threat IntelligenceCisco ThreatGrid:  Malware Analysis and Threat Intelligence
Cisco ThreatGrid: Malware Analysis and Threat IntelligenceCisco Canada
 
Red teaming in the cloud
Red teaming in the cloudRed teaming in the cloud
Red teaming in the cloudPeter Wood
 
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...Edureka!
 
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...Edureka!
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation SecurityBGA Cyber Security
 
Networking and penetration testing
Networking and penetration testingNetworking and penetration testing
Networking and penetration testingMohit Belwal
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA Cyber Security
 
[OPD 2019] Top 10 Security Facts of 2020
[OPD 2019] Top 10 Security Facts of 2020[OPD 2019] Top 10 Security Facts of 2020
[OPD 2019] Top 10 Security Facts of 2020OWASP
 
Cisco Security Architecture
Cisco Security ArchitectureCisco Security Architecture
Cisco Security ArchitectureCisco Canada
 
Certied Ethical Hacker
Certied Ethical HackerCertied Ethical Hacker
Certied Ethical HackerKnowledgehut
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldCisco Canada
 
Presentation cisco cloud security strategy
Presentation   cisco cloud security strategyPresentation   cisco cloud security strategy
Presentation cisco cloud security strategyxKinAnx
 
Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6FRSecure
 
OWASP Day - OWASP Day - Lets secure!
OWASP Day - OWASP Day - Lets secure! OWASP Day - OWASP Day - Lets secure!
OWASP Day - OWASP Day - Lets secure! Prathan Phongthiproek
 
Palo alto networks pcnse6 study guide feb 2015
Palo alto networks pcnse6 study guide feb 2015Palo alto networks pcnse6 study guide feb 2015
Palo alto networks pcnse6 study guide feb 2015Silva_2
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)mmubashirkhan
 

What's hot (19)

Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto Presentation
 
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
Cisco ThreatGrid:  Malware Analysis and Threat IntelligenceCisco ThreatGrid:  Malware Analysis and Threat Intelligence
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
 
Red teaming in the cloud
Red teaming in the cloudRed teaming in the cloud
Red teaming in the cloud
 
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
 
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
 
Networking and penetration testing
Networking and penetration testingNetworking and penetration testing
Networking and penetration testing
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
 
[OPD 2019] Top 10 Security Facts of 2020
[OPD 2019] Top 10 Security Facts of 2020[OPD 2019] Top 10 Security Facts of 2020
[OPD 2019] Top 10 Security Facts of 2020
 
Cisco Security Architecture
Cisco Security ArchitectureCisco Security Architecture
Cisco Security Architecture
 
Certied Ethical Hacker
Certied Ethical HackerCertied Ethical Hacker
Certied Ethical Hacker
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 
Presentation cisco cloud security strategy
Presentation   cisco cloud security strategyPresentation   cisco cloud security strategy
Presentation cisco cloud security strategy
 
Security
SecuritySecurity
Security
 
Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6
 
OWASP Day - OWASP Day - Lets secure!
OWASP Day - OWASP Day - Lets secure! OWASP Day - OWASP Day - Lets secure!
OWASP Day - OWASP Day - Lets secure!
 
Palo alto networks pcnse6 study guide feb 2015
Palo alto networks pcnse6 study guide feb 2015Palo alto networks pcnse6 study guide feb 2015
Palo alto networks pcnse6 study guide feb 2015
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)
 

Similar to Diploma In Information Security Training and Certification Details In Delhi

CompTIA Security+ Training and Certification in deltails
CompTIA Security+ Training and Certification in deltailsCompTIA Security+ Training and Certification in deltails
CompTIA Security+ Training and Certification in deltailsCRAW CYBER SECURITY PVT LTD
 
EC-Council Certified Security Analyst Program
EC-Council Certified Security Analyst ProgramEC-Council Certified Security Analyst Program
EC-Council Certified Security Analyst ProgramITpreneurs
 
The Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookThe Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookCalvin Sam
 
cyber_security_syllabus .pdf | scode network institute
cyber_security_syllabus .pdf | scode network institutecyber_security_syllabus .pdf | scode network institute
cyber_security_syllabus .pdf | scode network instituteScode Network Institute
 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Tech
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen? Claranet UK
 
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...CRAW CYBER SECURITY PVT LTD
 
ECSA Exam Centre in Adyar
ECSA Exam Centre in Adyar    ECSA Exam Centre in Adyar
ECSA Exam Centre in Adyar sasikalaD3
 
EC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course CatalogEC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course CatalogNetCom Learning
 
ethical hacking
ethical hackingethical hacking
ethical hackingarnoldog1
 
Certified_Ethical_Hacker_Training ppt.pdf
Certified_Ethical_Hacker_Training ppt.pdfCertified_Ethical_Hacker_Training ppt.pdf
Certified_Ethical_Hacker_Training ppt.pdfScode Network Institute
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Edureka!
 
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”Moshiul Islam, CISSP, CISA, CFE
 
Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.cnetworks
 

Similar to Diploma In Information Security Training and Certification Details In Delhi (20)

CompTIA Security+ Training and Certification in deltails
CompTIA Security+ Training and Certification in deltailsCompTIA Security+ Training and Certification in deltails
CompTIA Security+ Training and Certification in deltails
 
Brochure of ICSS
Brochure of ICSS Brochure of ICSS
Brochure of ICSS
 
EC-Council Certified Security Analyst Program
EC-Council Certified Security Analyst ProgramEC-Council Certified Security Analyst Program
EC-Council Certified Security Analyst Program
 
The Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookThe Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification Handbook
 
cyber_security_syllabus .pdf | scode network institute
cyber_security_syllabus .pdf | scode network institutecyber_security_syllabus .pdf | scode network institute
cyber_security_syllabus .pdf | scode network institute
 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst
 
CompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and TricksCompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and Tricks
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen?
 
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
 
Ecsa
EcsaEcsa
Ecsa
 
ECSA Exam Centre in Adyar
ECSA Exam Centre in Adyar    ECSA Exam Centre in Adyar
ECSA Exam Centre in Adyar
 
EC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course CatalogEC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course Catalog
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Certified_Ethical_Hacker_Training ppt.pdf
Certified_Ethical_Hacker_Training ppt.pdfCertified_Ethical_Hacker_Training ppt.pdf
Certified_Ethical_Hacker_Training ppt.pdf
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
 
Ecsa Course
Ecsa CourseEcsa Course
Ecsa Course
 
CompTIA CASP Course and Training details
CompTIA CASP Course and Training detailsCompTIA CASP Course and Training details
CompTIA CASP Course and Training details
 
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
 
ceh pdf work.pdf
ceh pdf work.pdfceh pdf work.pdf
ceh pdf work.pdf
 
Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.
 

Recently uploaded

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 

Recently uploaded (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

Diploma In Information Security Training and Certification Details In Delhi

  • 1. CRAW Security Diploma in Information Security CRAW Security
  • 2. Course Description We live in a world driven by technology. Every industry is becoming more and more reliant on technology. There is a huge demand for people who are skilled in various technology. This training pack covers 5 most in demand and trending courses. You will learn in Diploma and Information Security 1. Certified Ethical Hacker (CEH V9)- Basics of Ethical Hacking, Foot-printing, Network Scanning, Web Session, Cryptography Cloud Security and many more. 2. Computer Hacking Forensic Investigator (CHFI)- Computer Forensics, CF Investigation Process, Files System Analytics, Data Acquisition, FTK, Mobile Forensics, Network Forensics. 3. EC-Council Certified Security Analyst (ECSA)- Penetration Testing, network and web application, web application penetration testing. 4. Web Application security- SQL Injection Flaws, Sore Code Disclosure Flaw, Remote File Inclusion, Missing Authorization, invalid URL redirection. 5. CCNA- Operations of Protocols, OSI Layers, IPV4 and IPV6, WAN, DHCP, SNMP, SSH, Secret Password Call Us- +91-9650202445 | +91-9650677445 CRAW Security
  • 3. Target to Audience Individuals School Students College Students IT Professionals IT Officers IT and LAW Officers Corporates IT Training Firms IT Consultants IT Experts IT Officers IT Institutions & Colleges IT Graduated Computer Science Students Call Us- +91-9650202445 | +91-9650677445 CRAW Security
  • 4. Duration of Program  6 Months (Total 300 Hours)  2 Hours (Per Day)  4 Hours (Per Day)  8 Hours (Per Day) Call Us- +91-9650202445 | +91-9650677445 CRAW Security Online Training Classroom Training
  • 5. Exam Details Call Us- +91-9650202445 | +91-9650677445 CRAW Security CEH Exam Details  Number of Questions: 125  Test Duration: 4 Hours  Test Format: Multiple Choice  Test Delivery: ECC EXAM, VUE  Exam Prefix: 312-50 (ECC EXAM), 312-50 (VUE)  CHFI Exam Details  Number of Questions: 150  Passing Score: 70%  Test Duration: 4 hours  Test Format: Multiple choice  Test Delivery: ECC exam portal ECSA v9 Exam Details  Credit Towards Certification: ECSA v9  Number of Questions: 150  Passing Score: 70%  Test Duration: 4 Hours CCNA Security Exam Details  Required Exam(s)- 210- 260IINS  Recommending Training- Implementing CISCO Network Security (IINS) Web Application Security Exam  1 proctored exam  75 questions  Time limit of 3 hours  Minimum Passing Score of 68%
  • 6. What we try to Give We try to give you real industry standards with best possible quality to all our customers and clients. We focus on Various sections of Society and running a national level campaign to literate Students from all parts of company who can’t Afford “Basic IT Computer Training”. We wish we could teach as many students from all over the world and make it a beautiful place to work. We work on minimum gross margins to strength the Indian It infrastructure. Online Training Classroom Training Virtual Lab Call Us- +91-9650202445 | +91-9650677445 CRAW Security
  • 7. Classroom Training Instructor-led training provides a comfortable teaching environment with instructors that are familiar with the certification process and can help you master your certification exam. Find your instructor now. There’s a wealth of training materials available that match your learning needs and learning style. Whether you are studying on your own, or in a classroom environment, we recommend EC-Council and CISCO Authorized Quality Curriculum training materials that will help you get ready for your certification exam and pass the test. Call Us- +91-9650202445 | +91-9650677445 CRAW Security
  • 8. Course Outline of CEH V9  Introduction to Ethical Hacking  Foot printing and reconnaissance  Scanning Networks  Enumeration  System Networks  Malware Threats(Virus,Trojan,Worms)  Sniffing  Social Engineering  Denial-of-Service  Session Hacking  Hacking Web server Call Us- +91-9650202445 | +91-9650677445 CRAW Security  Hacking Web Applications  SQL Injection  Hacking Wireless Networks  Hacking Mobile Platforms  Evading IDS, Firewalls, and Honeypots  Cloud Computing  Cryptography  Kali-Linux Hands-On Training  Penetration Testing
  • 9.  Computer Forensics in Today’s World  Computer Forensics Investigation Process  Searching and Seizing Computers  Digital Evidence  First Responder Procedures  Computer Forensics Lab  Understanding Hard Disks and File Systems  Windows Forensics  Data Acquisition and Duplication  Recovering Deleted Files and Deleted Partitions  Forensics Investigation using Access Data FTK  Forensics Investigation Using EnCase  Steganography and Image File Forensics  Application Password Crackers Course Outline of CHFI  Log Capturing and Event Correlation  Network Forensics, Investigating Logs and Investigating Network Traffic  Investigating Wireless Attacks  Investigating Web Attacks  Tracking Emails and Investigating Email Crimes  Mobile Forensics  Investigative Reports  Becoming an Expert Witness Call Us- +91-9650202445 | +91-9650677445 CRAW Security
  • 10. Course Outline of ECSA  Need for Security Analysis  TCP IP Packet Analysis  Penetration Testing Methodologies  Customers and Legal Agreements  Rules of Engagement  Penetration Testing Planning and Scheduling  Pre-Penetration Testing Steps  Information Gathering  Vulnerability Analysis  External Penetration Testing  Internal Network Penetration Testing  Firewall Penetration Testing  IDS Penetration Testing  Password Cracking Penetration Testing  Social Engineering Penetration Testing  Web Application Penetration Testing  SQL Penetration Testing  Penetration Testing Reports and Post Testing Actions Call Us- +91-9650202445 | +91-9650677445 CRAW Security
  • 11. Course Outline of Web Application Security  Introduction to Web Application Security  Web Application Vulnerabilities  Web Application Security Scanner and Testing  Protecting, Improving and Some Guidelines for WAS  Tips Securing Web Applications  Flaws, Myths and Best Practices for WAS  Course Resources  Web Application Security Certification Call Us- +91-9650202445 | +91-9650677445 CRAW Security
  • 12. Course Outline of CCNA Security  Network Fundamentals  LAN Switching Technologies  Routing Technologies  WAN Technologies  Infrastructure Service  Infrastructure Security  Infrastructure Management Call Us- +91-9650202445 | +91-9650677445 CRAW Security
  • 13. Our International Partners Call Us- +91-9650202445 | +91-9650677445 CRAW Security
  • 14. Our Partners Call Us- +91-9650202445 | +91-9650677445 CRAW Security
  • 15. Our Partners Call Us- +91-9650202445 | +91-9650677445 CRAW Security
  • 16. Contact Us CRAW Security 1st Floor, Plot no. 4, Lane no. 2,Kehar Singh Estate,Westend Marg, Behind Saket Metro Station, New Delhi – 110030 Call Us 011-40394315 | +91-9650202445 | +91-9650677445 Mails Us training@craw.in Visit Us www.crawsecurity.com | www.craw.in
  • 17. THANK YOU IT HAS BEEN A PLEASURE!