Вы находитесь на странице: 1из 3

Copyright Reserved: Copying or reproducing any part or whole of this document is illegal Page | 1

Cyber Hacking & IT Security (CHIS)


Importance of IT / Cyber Security Courses
Today its indeed not required to mention specifically about the importance of the IT in our life
and the dependency of business on IT infrastructure and the data it carries. When it comes to IT,
Computers and data, Security is a hot topic and it's easy to see why. Today people from all walks of
life the Internet and computers for all sorts of tasks: Communication, including e-mail, SMS and
MMS, cell phones and more; online business like shopping, banking and bill payment; management
of medical records and information; entertainment, including downloading music, movies and
books; research and so much more. All of these transactions involve sharing some kind of personal
information, and it's scary to think about the consequences of a security breech in any case.
Our Vision of Empowering Nation with Quality Education supports our Mission of inspiring a
safe and secure cyber world, demonstrates our commitment to supporting and providing our
students and candidates with credentials, resources, and leadership to secure information and
deliver value to society.
Why Triad Square
We at Triad Square Infosec Pvt Ltd. place this IT / Cyber Security education as a powerful tool in
today's technology-driven and fast-paced world. We believe in creating a world where everyone
should have access to quality knowledge and learning. In this regard, we want to provide
opportunities which every graduate or our students can gain the true knowledge of IT/Cyber
Security through proper education. Since we are the group of experts in Information Security, we
understand and appreciate that the education system of India (AICTE & UGC) recognizes the
importance and requirement of these courses and has taken strong steps towards promoting and
mandating such courses in the University & College level.
We are the industry experienced subject matters experts who have spent considerable of time in
the industry to gain the knowledge and experience to understand the Information Security subject
and the gaps between the education industry and the corporate sector. We strongly feel that today
in the name of IT Security students are not fed well and adequately. Moreover they are given a
small part of the complete knowledge of the Information Security (Technology), mislead by the
term Ethical Hackers and are deprived of the larger part of the knowledge. We understood the
gaps and designed our curriculum to mitigate these gaps. We are truly making Industry ready
students and empowering them to achieve jobs/career/profession by their own.
Moreover we are;
Reasonably priced Highly competitive in the current market
Industry experienced People and trainers are hands on experienced
Focussed on practical We provide more practical hands on knowledge than theory
Specialized syllabus our syllabus is aligned with industry and do not dump students with
theories and tools
Supported by global governing bodies in the domain of Information Security

Copyright Reserved: Copying or reproducing any part or whole of this document is illegal Page | 2


Course outline
Day Subject Heading Subject Details Duration
1 General Concepts 1. Operating system
2. OSI, TCP/IP and other protocol concept
3. Networking and data communication concepts
4. Software development life cycle
5. Database concept
4 hrs
Lunch Break
1 Introduction to IT
Security and Hacking
1. What is IT Security
2. Why IT Security
3. What is Ethical hacking
4. Phases of Hacking
5. Types of attacks
6. What is VA & PT
4 hrs
2 Systems Security 1. Desktop, Server, Network device security
2. Windows security implementation & configuration
3. Linux security implementation & configuration
4. Database security implementation & configuration
5. Application security
6. What is Ethical Hacking VA/PT
4 hrs
Lunch Break
2 Phases & Steps of
Hacking
1. Phase 1: Footprinting & Recconaissance
2. Phase 2 Scanning Network
3. Phase 3 Gaining Access / Enumeration
4. Phase 4 Maintaining Access
5. Phase 5 Covering Tracks
6. Hacking Techniques
4 hrs
3 Systems Hacking 1. Virus, Trojans, Worms,
2. SQL Injection,
3. Buffer Overflow
4. Cryptography
5. Sniffing
6. DoS & DDoS
7. Session Hijacking
8. Web server & application hacking

Lunch Break
3 Network
Components &
Security
1. Switches
2. Routers
3. Firewalls
4 hrs

Copyright Reserved: Copying or reproducing any part or whole of this document is illegal Page | 3

4. IDS / IPS
5. Hardening of network devices
6. Virtual Private Network
7. Proxy
4 1. Voice over IP
2. Wireless Security
3. Mobile Security
4. Mail Security Spam filtering
5. Secure network architecture
4 hrs
Lunch Break
4 Introduction to
VA/PT
1. Introduction to VA/PT
2. Vulnerability Assessment
3. Penetration Testing
4. Tools
4 hrs
5 Case Studies and
Practical
Complete Hands on practical session 4 hrs
Lunch Break
5 Security
Management &
Standards
1. Information Security Management System
2. Risk Management
3. Business Impact Analysis
4. Business Continuity Management
5. Personal Information Management system
4 hrs
Half day Complete Practical along with question and Answer session and provision of certificates

Course duration: 05 days each day 09:00 AM to 06:00 PM + 06
th
day 09 AM to 12 PM
Course Fee: INR 6000/- + S. Tax
Please carry your laptop for this training & workshop

Вам также может понравиться