SlideShare a Scribd company logo
www.kryptora.com 1
1.1 Time Duration 4Hrs. Demonstrations to students
2.1 Authorized Certificate for each participant of seminar.
2.2 Goodies will be distributed during seminar.
3.1 T-shirts or Hoddie will we given to coordinating team with our company logo and your institute logo.
3.2 Certificate of Coordination will be given after successful conduction of the seminar to coordinators.
4.1 We search for shining techno minds. May be they are sitting in your college, i.e. Such minds with strong skills set will be
considered for our internship program, under the impact of our expert’s team.
4.2 We are Team Worker; we work in collaboration. Interns can also expect a funded research project, depending upon the quality
and market reputation for output of that project.
www.kryptora.com 2
5.1 Posters/or Banners/or Pamphlets will be provided or college can design for promotional purpose. This can be
done on the basis of Communication between both Parties. Therefore, Payment will be made accordingly.
6.1 Sponsorship will be given to college, for conducting the seminar as a part of acknowledgement of using college
Infrastructural facilities.
6.2 College name will be published on our website as a part of marketing on Social Media.
7.1 Learn/practice about Information Security latest techniques and countermeasures directly from experienced
certified professionals from EC Council, USA and Cyber Law certified.
7.2 Learn & Interact with Information Security Expert.
7.3 Receive unparalleled hands-on education training on the art of Information security with personal one-on-one
attention during hands-on session each day of seminar.
7.4 10% Theory and 90% total live demonstrations by our trainers on latest Information Security Techniques &
Tools.
7.5 Discussing cybercrime case studies.
7.6 Future assistance to every student regarding any query of seminar demonstrations or any other technical
assistance.
www.kryptora.com 3
7.7 Special Discount to every participant for
a. Class room training (25 days)
b. Advanced level workshops and boot camp conducted by us.
We want following assistance from college to conduct seminar in smooth flow:-
8.1 Technical Infrastructure Facilities
a. A Seminar hall/or Auditorium /or Lab having an enough capacity to accommodate all participants comfortably and voice
should not echo there.
b. A Projector setup with stereo jack cord and audio public address system; with proper visibility for every student who all are
accommodated. If student’s no. is more and projector view is demised than there is requirement of another projector
accordingly so, as to give proper visibility to rest students.
c. An Internet Connection (min. 1MPBS speed) for the resource person (Without proxy if possible).
d. Two Wireless Microphones (Collar Mic. Preferred for speaker).
e. Internet Connection for every student during Practice session.
f. Laptops are recommended for students for practice, Charging point in Hall for every student’s laptop and if it’s a
Computer Lab, students should be allotted systems to practice on them (Managed accordingly to the situation)
g. P roper Electricity, during the seminar.
www.kryptora.com 4
8.2.1 Accommodation to our visiting team members in your college guest house or any other good place. (Min. 1 or
2 member and rest acc. to the conversation b/w both parties and no. of students)
8.2.2 Pick and drop facility from nearest railway station/ bus-stand/ or airport.
8.3 Publicity & Logistics Support
8.3.1 Soft copy of student’s database with name, contact no., email, branch/stream and year should be given to us.
8.3.2 Min. strength of 80 students required to conduct seminar successfully.
8.3.3 Specially designed seminar posters (provided by us) to be dispatched to engineering colleges across the region of
your institute along with the festival posters and to be put up in the campus. As per seminar, marketing point.
8.3.4 Three to four specially appointed coordinators (Student and Faculty) having the knowledge of the subject, to
promote, publicize, handle local student queries etc. for our seminar to be conducted at the college.
8.3.5 Support to our team to interact with college students to provide them proper awareness regarding the seminar
program and to increase the participation.
www.kryptora.com 5
Introduction to Information SecurityModule 1:
Module 3:
Module 2:
Module 4:
Module 5:
Module 6:
Module 7:
Module 8:Call Masking Social Engineering (FB hacking etc)
Hacking Humans Mind
SQL Injection (Basic)System Security Bypass
Google Dorking Brute
Introduction Python
www.kryptora.com 6
Rs. 200/participant (inclusive of all taxes)
- Software / Tutorial toolkit per participant (as mentioned in Clause 2)
- Goodies worth 1500+ will be distributed during seminar
- Special Discount to every participant for Class room training or any other advanced level workshops /
bootcamp conducted by us and offer for internship program accordingly.
The amount shall be paid as under:-
- Appropriate Amount to be handed over to team on the first day of the seminar
a. Mode of Payment can be Cheque /Demand Draft/Cash
b. Proper Invoice will be provided.
c. Appropriate Sponsorship Amount to be handed over to the College on the first day of the seminar
www.kryptora.com 7
We ensure that you will find our seminar program extremely beneficial for your students. Such type of 3 days program not only give
exposure to student regarding Information Security but It will make them learn, creating awareness for daily life and add-on in their
Curriculum Vitae.
If students want to make career in Information Security, our seminar and training are very helpful for such international certification
like C|EHTM , E|CSATM, CISSP, OSCP etc.. As such types of topics are not part of our standard study curriculum, so it is a high
booster for every participant.
As per the report, “The number of trained Information Security Professionals in India only accounts to 556 compared to 1.25 lakh
in China and 91,080 in the U.S “ *(Link is provided at the bottom of this page, for the reference check).If you are looking as career
perspective so, Information security is having very good opportunities for people who choose this domain.
If you have any queries kindly get back to us. We are looking forward to a quick and positive response from you and a long term
association with your esteemed organization.
This is a general Proposal; rest all other specific details with name/seal/sign. will be mentioned in Memorandum of Understanding
(MOU) which will be signed b/w parties.
www.kryptora.com 8
Thanks & Regards,
Kryptora InfoTech Pvt. Ltd.
If you have any queries, kindly contact us on: +91-8210109116
Or directly contact us: +91 -7503897545, +91-9149104872
Contact Person: Mr. Rakesh Sharma
Email: info@krypsec.com, Contact@kryptora.com
www.kryptora.com 9
Information Cyber Security, awareness and knowledge is very important for every computer user. Information Cyber Security
career is very bright. The number of trained Information Security Professionals in India only accounts to 556 compared to 1.25 lakh
in China and 91,080 in the U.S. India require no. of cyber security professionals.
Students will have an add-on into their resume/cv; they have more than introductory knowledge of Networking, Database, website
etc. no matter from which branch they belong or what profession they go for. If they use computer, definitely it will be a great
exposure.
Not only as a career, students can safeguard themselves from being trapped in to hands of offensive minds. eg. Martial Arts are a
science of Self Defense not attacking others.
Our trainers, who are coming for seminar program, are certified professionals and highly experienced for Bootcamp
training delivery (Rest read in Clause 10).
No prerequisites required from student side except interest. Student of any branch can go for this Seminar. Students are highly
benefited by training quality and advantages as… (Refer to clause 2 and 7). Because of our quality training and quality business with
every institute, we recommend ourselves. (Infra etc... support required from Coll. Side: ref. clause 8)
www.kryptora.com 10
Contact Us
Corporate Office:
E-48, Ground Floor, Sector 3
Noida, UP
Pin Code: 201301
Contact Details: +91-7503897545,
+91- 9149104872
www.kryptora.comwww.kryptora.com 12

More Related Content

Similar to Ethical Hacking Seminar

Curriculum Vitae_Aye Aye Maung Final
Curriculum Vitae_Aye Aye Maung FinalCurriculum Vitae_Aye Aye Maung Final
Curriculum Vitae_Aye Aye Maung Final
Aye Maung
 
142.8 Digital and Tech solutions PRF3
142.8 Digital and Tech solutions PRF3142.8 Digital and Tech solutions PRF3
142.8 Digital and Tech solutions PRF3
Jordan Cooper
 
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).docCyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
ThowfeekFayees
 
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
Running Header  1APPLICATION DEVELOPMENT METHODS2.docxRunning Header  1APPLICATION DEVELOPMENT METHODS2.docx
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
rtodd599
 
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
Running Header  1SYSTEM ARCHITECTURE2Unit .docxRunning Header  1SYSTEM ARCHITECTURE2Unit .docx
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
rtodd599
 

Similar to Ethical Hacking Seminar (20)

Addressing the digital skills crisis
Addressing the digital skills crisisAddressing the digital skills crisis
Addressing the digital skills crisis
 
Acadgild learning proposal
Acadgild learning proposalAcadgild learning proposal
Acadgild learning proposal
 
Proposal for IT Security Team
Proposal for IT Security TeamProposal for IT Security Team
Proposal for IT Security Team
 
Introduction-to-Cybersecurity-Apponix.pptx
Introduction-to-Cybersecurity-Apponix.pptxIntroduction-to-Cybersecurity-Apponix.pptx
Introduction-to-Cybersecurity-Apponix.pptx
 
Curriculum Vitae_Aye Aye Maung Final
Curriculum Vitae_Aye Aye Maung FinalCurriculum Vitae_Aye Aye Maung Final
Curriculum Vitae_Aye Aye Maung Final
 
Internship in-chennai-for-eie-in-ethical-hacking
Internship in-chennai-for-eie-in-ethical-hackingInternship in-chennai-for-eie-in-ethical-hacking
Internship in-chennai-for-eie-in-ethical-hacking
 
142.8 Digital and Tech solutions PRF3
142.8 Digital and Tech solutions PRF3142.8 Digital and Tech solutions PRF3
142.8 Digital and Tech solutions PRF3
 
Information Technology Program: JCU Singapore
Information Technology Program: JCU SingaporeInformation Technology Program: JCU Singapore
Information Technology Program: JCU Singapore
 
Internship in-chennai-for-eie-in-ccna
Internship in-chennai-for-eie-in-ccnaInternship in-chennai-for-eie-in-ccna
Internship in-chennai-for-eie-in-ccna
 
Cybersecurity Courses, Tools and Tactics.pdf
Cybersecurity Courses, Tools and Tactics.pdfCybersecurity Courses, Tools and Tactics.pdf
Cybersecurity Courses, Tools and Tactics.pdf
 
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).docCyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
 
Internship in-chennai-for-mca-windows-application
Internship in-chennai-for-mca-windows-applicationInternship in-chennai-for-mca-windows-application
Internship in-chennai-for-mca-windows-application
 
NUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information SessionNUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information Session
 
Internship in-chennai-for-eee-in-website-designing
Internship in-chennai-for-eee-in-website-designingInternship in-chennai-for-eee-in-website-designing
Internship in-chennai-for-eee-in-website-designing
 
Internship in-chennai-for-eee-in-ccna
Internship in-chennai-for-eee-in-ccnaInternship in-chennai-for-eee-in-ccna
Internship in-chennai-for-eee-in-ccna
 
Dice live training program
Dice live training programDice live training program
Dice live training program
 
Pinkle makhijani supermarket billing system vb project
Pinkle makhijani supermarket billing system vb projectPinkle makhijani supermarket billing system vb project
Pinkle makhijani supermarket billing system vb project
 
Self Paced Computer Based Training Media and Methods
Self Paced Computer Based Training Media and MethodsSelf Paced Computer Based Training Media and Methods
Self Paced Computer Based Training Media and Methods
 
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
Running Header  1APPLICATION DEVELOPMENT METHODS2.docxRunning Header  1APPLICATION DEVELOPMENT METHODS2.docx
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
 
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
Running Header  1SYSTEM ARCHITECTURE2Unit .docxRunning Header  1SYSTEM ARCHITECTURE2Unit .docx
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 

Ethical Hacking Seminar

  • 2. 1.1 Time Duration 4Hrs. Demonstrations to students 2.1 Authorized Certificate for each participant of seminar. 2.2 Goodies will be distributed during seminar. 3.1 T-shirts or Hoddie will we given to coordinating team with our company logo and your institute logo. 3.2 Certificate of Coordination will be given after successful conduction of the seminar to coordinators. 4.1 We search for shining techno minds. May be they are sitting in your college, i.e. Such minds with strong skills set will be considered for our internship program, under the impact of our expert’s team. 4.2 We are Team Worker; we work in collaboration. Interns can also expect a funded research project, depending upon the quality and market reputation for output of that project. www.kryptora.com 2
  • 3. 5.1 Posters/or Banners/or Pamphlets will be provided or college can design for promotional purpose. This can be done on the basis of Communication between both Parties. Therefore, Payment will be made accordingly. 6.1 Sponsorship will be given to college, for conducting the seminar as a part of acknowledgement of using college Infrastructural facilities. 6.2 College name will be published on our website as a part of marketing on Social Media. 7.1 Learn/practice about Information Security latest techniques and countermeasures directly from experienced certified professionals from EC Council, USA and Cyber Law certified. 7.2 Learn & Interact with Information Security Expert. 7.3 Receive unparalleled hands-on education training on the art of Information security with personal one-on-one attention during hands-on session each day of seminar. 7.4 10% Theory and 90% total live demonstrations by our trainers on latest Information Security Techniques & Tools. 7.5 Discussing cybercrime case studies. 7.6 Future assistance to every student regarding any query of seminar demonstrations or any other technical assistance. www.kryptora.com 3
  • 4. 7.7 Special Discount to every participant for a. Class room training (25 days) b. Advanced level workshops and boot camp conducted by us. We want following assistance from college to conduct seminar in smooth flow:- 8.1 Technical Infrastructure Facilities a. A Seminar hall/or Auditorium /or Lab having an enough capacity to accommodate all participants comfortably and voice should not echo there. b. A Projector setup with stereo jack cord and audio public address system; with proper visibility for every student who all are accommodated. If student’s no. is more and projector view is demised than there is requirement of another projector accordingly so, as to give proper visibility to rest students. c. An Internet Connection (min. 1MPBS speed) for the resource person (Without proxy if possible). d. Two Wireless Microphones (Collar Mic. Preferred for speaker). e. Internet Connection for every student during Practice session. f. Laptops are recommended for students for practice, Charging point in Hall for every student’s laptop and if it’s a Computer Lab, students should be allotted systems to practice on them (Managed accordingly to the situation) g. P roper Electricity, during the seminar. www.kryptora.com 4
  • 5. 8.2.1 Accommodation to our visiting team members in your college guest house or any other good place. (Min. 1 or 2 member and rest acc. to the conversation b/w both parties and no. of students) 8.2.2 Pick and drop facility from nearest railway station/ bus-stand/ or airport. 8.3 Publicity & Logistics Support 8.3.1 Soft copy of student’s database with name, contact no., email, branch/stream and year should be given to us. 8.3.2 Min. strength of 80 students required to conduct seminar successfully. 8.3.3 Specially designed seminar posters (provided by us) to be dispatched to engineering colleges across the region of your institute along with the festival posters and to be put up in the campus. As per seminar, marketing point. 8.3.4 Three to four specially appointed coordinators (Student and Faculty) having the knowledge of the subject, to promote, publicize, handle local student queries etc. for our seminar to be conducted at the college. 8.3.5 Support to our team to interact with college students to provide them proper awareness regarding the seminar program and to increase the participation. www.kryptora.com 5
  • 6. Introduction to Information SecurityModule 1: Module 3: Module 2: Module 4: Module 5: Module 6: Module 7: Module 8:Call Masking Social Engineering (FB hacking etc) Hacking Humans Mind SQL Injection (Basic)System Security Bypass Google Dorking Brute Introduction Python www.kryptora.com 6
  • 7. Rs. 200/participant (inclusive of all taxes) - Software / Tutorial toolkit per participant (as mentioned in Clause 2) - Goodies worth 1500+ will be distributed during seminar - Special Discount to every participant for Class room training or any other advanced level workshops / bootcamp conducted by us and offer for internship program accordingly. The amount shall be paid as under:- - Appropriate Amount to be handed over to team on the first day of the seminar a. Mode of Payment can be Cheque /Demand Draft/Cash b. Proper Invoice will be provided. c. Appropriate Sponsorship Amount to be handed over to the College on the first day of the seminar www.kryptora.com 7
  • 8. We ensure that you will find our seminar program extremely beneficial for your students. Such type of 3 days program not only give exposure to student regarding Information Security but It will make them learn, creating awareness for daily life and add-on in their Curriculum Vitae. If students want to make career in Information Security, our seminar and training are very helpful for such international certification like C|EHTM , E|CSATM, CISSP, OSCP etc.. As such types of topics are not part of our standard study curriculum, so it is a high booster for every participant. As per the report, “The number of trained Information Security Professionals in India only accounts to 556 compared to 1.25 lakh in China and 91,080 in the U.S “ *(Link is provided at the bottom of this page, for the reference check).If you are looking as career perspective so, Information security is having very good opportunities for people who choose this domain. If you have any queries kindly get back to us. We are looking forward to a quick and positive response from you and a long term association with your esteemed organization. This is a general Proposal; rest all other specific details with name/seal/sign. will be mentioned in Memorandum of Understanding (MOU) which will be signed b/w parties. www.kryptora.com 8
  • 9. Thanks & Regards, Kryptora InfoTech Pvt. Ltd. If you have any queries, kindly contact us on: +91-8210109116 Or directly contact us: +91 -7503897545, +91-9149104872 Contact Person: Mr. Rakesh Sharma Email: info@krypsec.com, Contact@kryptora.com www.kryptora.com 9
  • 10. Information Cyber Security, awareness and knowledge is very important for every computer user. Information Cyber Security career is very bright. The number of trained Information Security Professionals in India only accounts to 556 compared to 1.25 lakh in China and 91,080 in the U.S. India require no. of cyber security professionals. Students will have an add-on into their resume/cv; they have more than introductory knowledge of Networking, Database, website etc. no matter from which branch they belong or what profession they go for. If they use computer, definitely it will be a great exposure. Not only as a career, students can safeguard themselves from being trapped in to hands of offensive minds. eg. Martial Arts are a science of Self Defense not attacking others. Our trainers, who are coming for seminar program, are certified professionals and highly experienced for Bootcamp training delivery (Rest read in Clause 10). No prerequisites required from student side except interest. Student of any branch can go for this Seminar. Students are highly benefited by training quality and advantages as… (Refer to clause 2 and 7). Because of our quality training and quality business with every institute, we recommend ourselves. (Infra etc... support required from Coll. Side: ref. clause 8) www.kryptora.com 10
  • 11. Contact Us Corporate Office: E-48, Ground Floor, Sector 3 Noida, UP Pin Code: 201301 Contact Details: +91-7503897545, +91- 9149104872