SlideShare a Scribd company logo
Cyber Defence Intelligence
About Cyber Defence Intelligence
(CDI)
Cyber Defence Intelligence (CDI) follows a broad vision of defending information from
unauthorized access, use, disclosure, disruption, modification, perusal, inspection,
recording or destruction. The aim at CDI is to provide information security solutions to
clients with wide line-up of platforms: networks, web application, servers and
databases. CDI provides practical and interactive training on Ethical Hacking covering
various subjects in information security and has structured customized courses
covering needs of newbie’s, students and corporate world- CDI aims to cater to the
needs of all.
CDI has a larger aim of expanding the IT security which is not more than 10 years old
in India. India has not more than 1000 cyber security experts which are quite less
compared to the requirement of more than 4 lakh experts. Increase in worldwide
awareness in cyber security demands a growth in India too.
L.S Chhabra
Founder and Director
Cyber Defence Intelligence Those neurons behind the very idea of CDI
belong to him. He has an experience of 4 years in the domain of
information security with specializations in Information Security
Management Systems (ISO 27000 series). Various IT companies
acknowledged him for finding security flaws in their applications including
some prominent companies e.g Facebook , linkedIn , adobe and 50 other
.He is well-versed with the OWASP, OSSTMM like methodologies Besides
that he has close upto 10+ IT certifications. A source of motivation to the
team, the founder and director of CDI is here never to look back.
Trainings Programs of CDI
• Beginners Trainings
 CISE- 6 Months
 CSN- 6 Weeks
 CEHE- 3 Months
• Advanced Trainings
 Certified Web Application Pentester - 30 Days
 Certified Malware Analyst - 60 Days
• Featured Trainings
 Certified Secure Web Developer – 30 Days
 Certified Forensic Analyst – 30 Days
Beginners Trainings
Certified Information Security Expert: Information Security
Training (CISE)
Time duration : 6 months
Certified Information Security expert is the 6 months training course provided by
Cyber Defence Intelligence. In this course, a complete detailed study of each and
every topic in the information security and ethical hacking course are taught by
expert professionals, working regularly on cyber security and information security
projects and having wide experience in this field.
Beginners Trainings
Certified security Ninja – (CSN)
Time Duration : 6 Weeks
Certified Security Ninja is a 6 weeks ethical hacking training and
information security course which has been started in our Chandigarh
branch . Ethical hacking is a expert in technology, who is employed by an
IT firm or an organization to penetrate into the security of the firm or
organization and check the vulnerabilities in the security of the
organization. The main difference between the ethical hacker and the
black hat hacker is that ethical hacker may also use the same procedure as
of black hat hackers but to provide security to the company and not
providing any harm to it.
Beginners Trainings
Certified Ethical Hacking Expert – (CEHE)
Time Duration: 3 Months
Certified Ethical Hacking Expert (CDI-CEHE ) is a 3 months ethical hacking training
course provided by Cyber Defence Intelligence (CDI) in Punjab, Mohali ,Chandigarh,
Haryana . This Ethical Hacking Course is provided by the professionals of CDI. It is
framed by the expert professionals of CDI having hands-on experience in Cyber
Security. We will introduce you with the topics such as Full-fledged course designed by
CDI covering all domains of hacking, Framed in a manner such that it covers all aspects
of Ethical Hacking, Complete Ethical Hacking toolkit will be provided, Along with the
toolkit complete study material and guidance will be provided, Live Hacking
demonstrations will be provided, Complete Industry exposure with hands-on
experience on penetration testing projects , Tests will be scheduled at regular intervals
and many more.
Advanced Trainings
Certified Web Application Pentester
Time Duration: 30 Days
Course Content- This Course on Web Application Security Training covers all OWASP
TOP 10 web attacks and there prevention techniques.
• SQL injection attack and countermeasures
• XSS attack ( Cross site scripting ) and countermeasures
• CSRF attack ( Cross site request forgery ) and countermeasures
• RFI & LFI ( Remote file inclusion and local file inclusion) and protection techniques
• Security mis-configuration
• Malicious file inclusion
• Broken authentication and session hijacking
These is the overview of the courses that are covered in these 30 days training session
at Cyber Defence Intelligence Consulting.
Advanced Trainings
Certified Malware Analyst
Time Duration- 60 Days
Reverse engineering training - Malware Analysis training is a popular course which is
specially designed for malware analysis in-depth with complete study of the
techniques and different tools used for analysis. CDI-CMA (Certified Malware Analyst)
training has helped lots of security engineers, forensic investigators, IT administrators
for acquiring the practical skills for complete Malware analysis and examining the
Windows for any kind of malware infections . It's very essential to go into depth of
each and every topic of the malware analysis techniques. For an organization
understanding the capabilities of malware is critical for deriving threat intelligence and
fortify defences respond to information security incidents. For reverse-engineering
this course builds a strong foundation malicious software using a variety of system.
Featured Training
Certified Secure Web Developer
Time Duration – 30 Days
Setting up a new website is not a big deal, but knowing if it is secure from
attackers is much difficult task. So, Certified Secure Web Developer course is the
course which is specially designed for participants who are interested in learning
Secure web development. This course will present considerations and the
guidelines in the secure web development applications. The few topics covered in
this course will be basic threats for a website, profiling the threats, models on
threats to web, application security, black box testing technique and source code
review of the applications.
Featured Training
Certified Forensic Analyst – (CFA)
Time Duration – 30 Days
Certified Forensic analyst is course designed by Cyber Defence Intelligence to make
you an expert in security and also in forensic analyst. This course is a complete
package for becoming a professional and certified Forensic analyst. This course starts
with the study from basics of Database security, network security, operating system
security and then this goes on to the advance study of network forensics and
professionals ethical hacking. This is a short term course of 30 days that will provide
you a detailed study of Forensic analysing in a short span of time. This course is
specially designed for advance learners who want to go into the deep of the network
security studies.
Cyber Defence Intelligence
Contact Us
www.cyberintelligence.in
CDI HQ , F - 135 , ZEE Tower , Sector 74 , Mohali, Punjab, India
+91-9888-555-182 , +91-9888-555-082
info@cyberintelligence.in

More Related Content

What's hot

Comptia security-sy0-601-exam-objectives-(2-0)
Comptia security-sy0-601-exam-objectives-(2-0)Comptia security-sy0-601-exam-objectives-(2-0)
Comptia security-sy0-601-exam-objectives-(2-0)
Rogerio Ferraz
 
Skills that make network security training easy
Skills that make network security training easySkills that make network security training easy
Skills that make network security training easy
EC-Council
 
Understanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for OrganizationUnderstanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for Organization
PECB
 
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat Intelligence
Andreas Sfakianakis
 
A Career in Cybersecurity
A Career in CybersecurityA Career in Cybersecurity
A Career in Cybersecurity
lfh663
 
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Priyanka Aash
 
SOC Analyst Course
SOC Analyst CourseSOC Analyst Course
SOC Analyst Course
redteamacademypromo
 
CyberSecurity Portfolio Management
CyberSecurity Portfolio ManagementCyberSecurity Portfolio Management
CyberSecurity Portfolio Management
Priyanka Aash
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
Kumar Gaurav
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
ZaiffiEhsan
 
A Brief Introduction to Penetration Testing
A Brief Introduction to Penetration TestingA Brief Introduction to Penetration Testing
A Brief Introduction to Penetration Testing
EC-Council
 
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | EdurekaLearn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Edureka!
 
Deception Technology: Use Cases & Implementation Approaches
 Deception Technology: Use Cases & Implementation Approaches Deception Technology: Use Cases & Implementation Approaches
Deception Technology: Use Cases & Implementation Approaches
Priyanka Aash
 
Science of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyScience of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis Methodology
Shawn Riley
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
backdoor
 
Ecsa LPT V8 brochure
Ecsa LPT V8 brochureEcsa LPT V8 brochure
Ecsa LPT V8 brochure
ADEPT TECHNOLOGY
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk Management
Priyanka Aash
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
David Sweigert
 
CEH Ver.7 and ECSA LPT
CEH Ver.7 and ECSA LPTCEH Ver.7 and ECSA LPT
CEH Ver.7 and ECSA LPT
filiani
 
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
Puneet Kukreja
 

What's hot (20)

Comptia security-sy0-601-exam-objectives-(2-0)
Comptia security-sy0-601-exam-objectives-(2-0)Comptia security-sy0-601-exam-objectives-(2-0)
Comptia security-sy0-601-exam-objectives-(2-0)
 
Skills that make network security training easy
Skills that make network security training easySkills that make network security training easy
Skills that make network security training easy
 
Understanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for OrganizationUnderstanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for Organization
 
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat Intelligence
 
A Career in Cybersecurity
A Career in CybersecurityA Career in Cybersecurity
A Career in Cybersecurity
 
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
 
SOC Analyst Course
SOC Analyst CourseSOC Analyst Course
SOC Analyst Course
 
CyberSecurity Portfolio Management
CyberSecurity Portfolio ManagementCyberSecurity Portfolio Management
CyberSecurity Portfolio Management
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
A Brief Introduction to Penetration Testing
A Brief Introduction to Penetration TestingA Brief Introduction to Penetration Testing
A Brief Introduction to Penetration Testing
 
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | EdurekaLearn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
 
Deception Technology: Use Cases & Implementation Approaches
 Deception Technology: Use Cases & Implementation Approaches Deception Technology: Use Cases & Implementation Approaches
Deception Technology: Use Cases & Implementation Approaches
 
Science of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyScience of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis Methodology
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
 
Ecsa LPT V8 brochure
Ecsa LPT V8 brochureEcsa LPT V8 brochure
Ecsa LPT V8 brochure
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk Management
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
CEH Ver.7 and ECSA LPT
CEH Ver.7 and ECSA LPTCEH Ver.7 and ECSA LPT
CEH Ver.7 and ECSA LPT
 
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
 

Similar to Cyber Defence Intelligence (CDI)

Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst
Lucideus Tech
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec train
InfosecTrain
 
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-CouncilCertified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
CRAW CYBER SECURITY PVT LTD
 
Skillogic Cyber Security Course in Chennai
Skillogic Cyber Security Course in ChennaiSkillogic Cyber Security Course in Chennai
Skillogic Cyber Security Course in Chennai
Skillogic Solutions
 
Skillogic Cyber security Course in Pune
Skillogic Cyber security Course in  PuneSkillogic Cyber security Course in  Pune
Skillogic Cyber security Course in Pune
Skillogic Solutions
 
Skillogic Cyber security Certification Course in Chennai
Skillogic Cyber security Certification Course in ChennaiSkillogic Cyber security Certification Course in Chennai
Skillogic Cyber security Certification Course in Chennai
Skillogic Solutions
 
Security, Compliance and Identity Partner Enablement Resource Guide.pdf
Security, Compliance and Identity Partner Enablement Resource Guide.pdfSecurity, Compliance and Identity Partner Enablement Resource Guide.pdf
Security, Compliance and Identity Partner Enablement Resource Guide.pdf
ssuser0a78bf
 
Skillogic Ethical Hacking course Chennai
Skillogic Ethical Hacking course ChennaiSkillogic Ethical Hacking course Chennai
Skillogic Ethical Hacking course Chennai
Skillogic Solutions
 
Cyber Security Course in Hyderabad January 2024
Cyber Security Course in Hyderabad January 2024Cyber Security Course in Hyderabad January 2024
Cyber Security Course in Hyderabad January 2024
Skillogic Solutions
 
Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024
Skillogic Solutions
 
Cyber security course in Hyderabad January
Cyber security course in Hyderabad JanuaryCyber security course in Hyderabad January
Cyber security course in Hyderabad January
Skillogic Solutions
 
Cyber Security Course in Hyderabad February 2024.pptx
Cyber Security Course in Hyderabad February 2024.pptxCyber Security Course in Hyderabad February 2024.pptx
Cyber Security Course in Hyderabad February 2024.pptx
Skillogic Solutions
 
Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024
Skillogic Solutions
 
Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024
Skillogic Solutions
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSO
SagarNegi10
 
How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?
Robert Smith
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptx
Skillogic Solutions
 
Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024
Skillogic Solutions
 
Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024
Skillogic Solutions
 
Cyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptxCyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptx
Skillogic Solutions
 

Similar to Cyber Defence Intelligence (CDI) (20)

Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec train
 
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-CouncilCertified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
 
Skillogic Cyber Security Course in Chennai
Skillogic Cyber Security Course in ChennaiSkillogic Cyber Security Course in Chennai
Skillogic Cyber Security Course in Chennai
 
Skillogic Cyber security Course in Pune
Skillogic Cyber security Course in  PuneSkillogic Cyber security Course in  Pune
Skillogic Cyber security Course in Pune
 
Skillogic Cyber security Certification Course in Chennai
Skillogic Cyber security Certification Course in ChennaiSkillogic Cyber security Certification Course in Chennai
Skillogic Cyber security Certification Course in Chennai
 
Security, Compliance and Identity Partner Enablement Resource Guide.pdf
Security, Compliance and Identity Partner Enablement Resource Guide.pdfSecurity, Compliance and Identity Partner Enablement Resource Guide.pdf
Security, Compliance and Identity Partner Enablement Resource Guide.pdf
 
Skillogic Ethical Hacking course Chennai
Skillogic Ethical Hacking course ChennaiSkillogic Ethical Hacking course Chennai
Skillogic Ethical Hacking course Chennai
 
Cyber Security Course in Hyderabad January 2024
Cyber Security Course in Hyderabad January 2024Cyber Security Course in Hyderabad January 2024
Cyber Security Course in Hyderabad January 2024
 
Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024
 
Cyber security course in Hyderabad January
Cyber security course in Hyderabad JanuaryCyber security course in Hyderabad January
Cyber security course in Hyderabad January
 
Cyber Security Course in Hyderabad February 2024.pptx
Cyber Security Course in Hyderabad February 2024.pptxCyber Security Course in Hyderabad February 2024.pptx
Cyber Security Course in Hyderabad February 2024.pptx
 
Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024
 
Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSO
 
How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptx
 
Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024
 
Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024
 
Cyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptxCyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptx
 

Recently uploaded

Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
AanSulistiyo
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 

Recently uploaded (20)

Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 

Cyber Defence Intelligence (CDI)

  • 2. About Cyber Defence Intelligence (CDI) Cyber Defence Intelligence (CDI) follows a broad vision of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. The aim at CDI is to provide information security solutions to clients with wide line-up of platforms: networks, web application, servers and databases. CDI provides practical and interactive training on Ethical Hacking covering various subjects in information security and has structured customized courses covering needs of newbie’s, students and corporate world- CDI aims to cater to the needs of all. CDI has a larger aim of expanding the IT security which is not more than 10 years old in India. India has not more than 1000 cyber security experts which are quite less compared to the requirement of more than 4 lakh experts. Increase in worldwide awareness in cyber security demands a growth in India too.
  • 3. L.S Chhabra Founder and Director Cyber Defence Intelligence Those neurons behind the very idea of CDI belong to him. He has an experience of 4 years in the domain of information security with specializations in Information Security Management Systems (ISO 27000 series). Various IT companies acknowledged him for finding security flaws in their applications including some prominent companies e.g Facebook , linkedIn , adobe and 50 other .He is well-versed with the OWASP, OSSTMM like methodologies Besides that he has close upto 10+ IT certifications. A source of motivation to the team, the founder and director of CDI is here never to look back.
  • 4. Trainings Programs of CDI • Beginners Trainings  CISE- 6 Months  CSN- 6 Weeks  CEHE- 3 Months • Advanced Trainings  Certified Web Application Pentester - 30 Days  Certified Malware Analyst - 60 Days • Featured Trainings  Certified Secure Web Developer – 30 Days  Certified Forensic Analyst – 30 Days
  • 5. Beginners Trainings Certified Information Security Expert: Information Security Training (CISE) Time duration : 6 months Certified Information Security expert is the 6 months training course provided by Cyber Defence Intelligence. In this course, a complete detailed study of each and every topic in the information security and ethical hacking course are taught by expert professionals, working regularly on cyber security and information security projects and having wide experience in this field.
  • 6. Beginners Trainings Certified security Ninja – (CSN) Time Duration : 6 Weeks Certified Security Ninja is a 6 weeks ethical hacking training and information security course which has been started in our Chandigarh branch . Ethical hacking is a expert in technology, who is employed by an IT firm or an organization to penetrate into the security of the firm or organization and check the vulnerabilities in the security of the organization. The main difference between the ethical hacker and the black hat hacker is that ethical hacker may also use the same procedure as of black hat hackers but to provide security to the company and not providing any harm to it.
  • 7. Beginners Trainings Certified Ethical Hacking Expert – (CEHE) Time Duration: 3 Months Certified Ethical Hacking Expert (CDI-CEHE ) is a 3 months ethical hacking training course provided by Cyber Defence Intelligence (CDI) in Punjab, Mohali ,Chandigarh, Haryana . This Ethical Hacking Course is provided by the professionals of CDI. It is framed by the expert professionals of CDI having hands-on experience in Cyber Security. We will introduce you with the topics such as Full-fledged course designed by CDI covering all domains of hacking, Framed in a manner such that it covers all aspects of Ethical Hacking, Complete Ethical Hacking toolkit will be provided, Along with the toolkit complete study material and guidance will be provided, Live Hacking demonstrations will be provided, Complete Industry exposure with hands-on experience on penetration testing projects , Tests will be scheduled at regular intervals and many more.
  • 8. Advanced Trainings Certified Web Application Pentester Time Duration: 30 Days Course Content- This Course on Web Application Security Training covers all OWASP TOP 10 web attacks and there prevention techniques. • SQL injection attack and countermeasures • XSS attack ( Cross site scripting ) and countermeasures • CSRF attack ( Cross site request forgery ) and countermeasures • RFI & LFI ( Remote file inclusion and local file inclusion) and protection techniques • Security mis-configuration • Malicious file inclusion • Broken authentication and session hijacking These is the overview of the courses that are covered in these 30 days training session at Cyber Defence Intelligence Consulting.
  • 9. Advanced Trainings Certified Malware Analyst Time Duration- 60 Days Reverse engineering training - Malware Analysis training is a popular course which is specially designed for malware analysis in-depth with complete study of the techniques and different tools used for analysis. CDI-CMA (Certified Malware Analyst) training has helped lots of security engineers, forensic investigators, IT administrators for acquiring the practical skills for complete Malware analysis and examining the Windows for any kind of malware infections . It's very essential to go into depth of each and every topic of the malware analysis techniques. For an organization understanding the capabilities of malware is critical for deriving threat intelligence and fortify defences respond to information security incidents. For reverse-engineering this course builds a strong foundation malicious software using a variety of system.
  • 10. Featured Training Certified Secure Web Developer Time Duration – 30 Days Setting up a new website is not a big deal, but knowing if it is secure from attackers is much difficult task. So, Certified Secure Web Developer course is the course which is specially designed for participants who are interested in learning Secure web development. This course will present considerations and the guidelines in the secure web development applications. The few topics covered in this course will be basic threats for a website, profiling the threats, models on threats to web, application security, black box testing technique and source code review of the applications.
  • 11. Featured Training Certified Forensic Analyst – (CFA) Time Duration – 30 Days Certified Forensic analyst is course designed by Cyber Defence Intelligence to make you an expert in security and also in forensic analyst. This course is a complete package for becoming a professional and certified Forensic analyst. This course starts with the study from basics of Database security, network security, operating system security and then this goes on to the advance study of network forensics and professionals ethical hacking. This is a short term course of 30 days that will provide you a detailed study of Forensic analysing in a short span of time. This course is specially designed for advance learners who want to go into the deep of the network security studies.
  • 12. Cyber Defence Intelligence Contact Us www.cyberintelligence.in CDI HQ , F - 135 , ZEE Tower , Sector 74 , Mohali, Punjab, India +91-9888-555-182 , +91-9888-555-082 info@cyberintelligence.in