Sharpen Your Skills

Trainings>>Cyber Security

Why cyber security has become the backbone of the industries and enterprises now? Thirty years back, no one had even heard of cyber security, but then, no one had heard of hackers and hacks either. This is because of the Internet. It did not come into being with a Big Bang like the Universe, but it sure is expanding like Universe in all directions and now has become all-pervasive. Internet has changed everything. Quick adoption of the technology by businesses and enterprises has made mobile-banking, on-line shopping, on-line trading and social networking possible. Its many benefits help the business growth by creating new opportunities..

Technologies - The following are the various technologies related to Cyber Security

  • Ethical Hacking
  • Mobile Security
  • Digital Forensics
  • Web Application Security
  • VAPT
  • Malware Analysis
  • Network security with Firewalls

Job Roles

  • Security Analyst
  • Security Engineer
  • Security Architect
  • Security Administrator
  • Security Software Developer
  • Cryptographer / Cryptologist
  • Cryptanalyst
  • Chief Information Security Officer
  • Security Consultant/Specialist
  • Intrusion Detection Specialist
  • Computer Security Incident Responder
  • Source Code Auditor
  • Virus Technician
  • Penetration Tester

Module 1 - Fundamentals

  • Network Fundamentals
  • OS Fundamentals

Module 2 – Coding

  • Shell scripting
  • Python Scripting

Module 3 - Network security

  • Reconnaissance
  • Packet Crafting
  • Manual Test Cases
  • Vulnerability Discovery
  • Exploitation
  • Wireless Security
  • Network Security Audit
  • Report Writing

Module 4 - Server Security

  • Database Security
  • Operating System Security

Module 5 - Application Security

  • Risk Based Security Testing (Business Logic Testing)
  • ESAPI Security
  • Threat Modeling
  • Source Code Analysis
  • Report Writing Working with Proxy – Burp suite
  • OWASP Top 10 2013
  • Risk Based Security Testing (Business Logic Testing)
  • ESAPI Security
  • Threat Modeling
  • Source Code Analysis
  • Report Writing Working with Proxy – Burp suite
  • OWASP Top 10 2013

Module 6 – Digital Forensics

  • Introduction & Case studies
  • Principle of CIA
  • IT Act overview
  • Introduction to Forensics
  • Understanding Incident Response Methodologies
  • Thump rules of investigation
  • Type of forensics investigation
  • Network based log analysis
  • Web Server log analysis
  • Network based log analysis
  • Web Server log analysis

Module 7 – Compliances

  • Auditing Principle
  • Information Security Management System (ISO 27001:2013)
  • Risk Assessment
  • Business Continuity (ISO 22301:2012)
  • PCI DSS v3
  • Overview – ITIL & COBIT
« Back  
OSCAR offers a unique style of learning
Maximum Instructor to Student Ratio 1:6

One computer : One student

Sessions : Each session will be of 2 hours

The days and timing can be fixed based on our mutual convenience between 9.00 a.m. to 10.00 p.m.
Fees is for one course and it includes instructions, practical, project, preparation for exam (if any)
We offer Crash courses of 4 to 8 hours per day to complete the courses earlier; which is subject to availability.