Logo

Office Address

2nd Floor, 198, Chinmay Mission Hospital Road, Opp to HDFC Bank, Indiranagar, Bangalore, Karnataka - 560038

Phone Number

+91 6398047380

Email Address

info@shekssuvarnalanka.com

Trainings We Offer


Certified Ethical Hacking

The industry-leading certification to train professionals to succeed at the highest executive levels of the security industry.

Certified Penetration Testing Professional​

Master pen testing skills in our live cyber ranges by learning how to conduct effective penetration tests.

Certified Information Systems Security Professional

A global certification validating expertise in securing information systems and managing risks.

Certified Information Security Manager

A certification for professionals managing and overseeing enterprise information security programs.

Advanced Penetration Testing

Uncover vulnerabilities in advanced systems and tackle complex cybersecurity challenges.

Certified Security Analyst

A certification focusing on advanced security analysis skills for identifying and mitigating threats.

Certified Threat Intelligence Analyst

A certification for professionals focusing on gathering, analyzing, and responding to cyber threats.

Website Development

Master web design and development, covering front-end, back-end, and responsive websites.

Linux

Learn Linux fundamentals, administration, and advanced system management techniques.

Java Full Stack Development

Build dynamic applications with Java, covering front-end, back-end, and database integration.

1. CEH V.13

Online Attend our Instructor Led Live Online Training from anywhere across the globe Real Time Trainers with 10+ years of Exp.

Course modules:

Module 01

Introduction to Ethical Hacking


Module 02

Footprinting and Reconnaissance


Module 03

Scanning Networks


Module 04

Enumeration


Module 05

Vulnerability Analysis


Module 06

System Hacking


Module 07

Malware Threats


Module 08

Sniffing


Module 09

Social Engineering


Module 10

Denial-of-Service


Module 11

Session Hijacking


Module 12

Evading IDS, Firewalls,and Honeypots


Module 13

Hacking Web Servers


Module 14

Hacking Web Applications


Module 15

SQL Injection


Module 16

Hacking Wireless Networks


Module 17

Hacking Mobile Platforms


Module 18

IoT Hacking


Module 19

Cloud Computing


Module 20

Cryptography


2. CPENT

Module 01

Introduction to Penetration Testing and Methodologies

Cover the fundamentals of penetration testing, including penetration testing approaches, strategies, methodologies, techniques, and various guidelines and recommendations for penetration testing.


Module 02

Penetration Testing Scoping and Engagement

Learn the different stages and elements of scoping and engagement in penetration testing.


Module 03

Open-Source Intelligence (OSINT)

Learn how to use techniques and tools to gather intelligence about the target from publicly available sources such as the World Wide Web (WWW), through website analysis, by using tools/frameworks/scripts, and so on.


Module 04

Social Engineering Penetration Testing

Learn different social engineering techniques and perform social-engineering penetration testing on a target organization.


Module 05

Network Penetration Testing – External

Learn how to implement a comprehensive penetration testing methodology for assessing networks from outsiders’ perspectives. Learn the process attackers follow to exploit the assets using vulnerabilities from the outside of the network perimeter


Module 06

Network Penetration Testing – Internal

Learn how to implement a comprehensive penetration testing methodology for assessing networks from insider’s perspectives


Module 07

Network Penetration Testing - Perimeter Devices

Learn how to implement a comprehensive penetration testing methodology for assessing the security of network perimeter devices, such as Firewalls, IDS, Routers, and Switches


Module 08

Web Application Penetration Testing

Learn how to analyze web applications for various vulnerabilities, including the Open Web Application Security Project (OWASP) Top 10, and determine the risk of exploitation.


Module 09

Wireless Penetration Testing

Learn how to test various components of wireless networks, such as WLAN, RFID devices, and NFC technology devices.


Module 10

IoT Penetration Testing

Understand various threats to Internet of things (IoT) networks and learn how to audit security controls for various inherent IoT risks.


Module 11

OT and SCADA Penetration Testing

Understand OT and SCADA concepts and learn the process of testing various components of OT and SCADA networks.


Module 12

Cloud Penetration Testing

Understand various security threats and concerns in cloud computing and learn how to perform cloud penetration testing to determine the probability of exploitation.


Module 13

Binary Analysis and Exploitation

Understand the binary analysis methodology and reverse engineer applications to identify vulnerable applications that may lead to the exploitation of an information system.


Module 14

Report Writing and Post Testing Actions

Learn how to document and analyze the results of a penetration test and recommend post-penetration test actions.

3. CISSP

Online Real Time Trainers with 10+ years of Exp. 99% passing Guarantee Complete Practical Training

  • Security and Risk Management (Security, Risk, Compliance, Law, Regulations, and Business Continuity)
  • Asset Security (Protecting Security of Assets)
  • Security Engineering (Engineering and Management of Security)
  • Communication and Network Security (Designing and Protecting Network Security)
  • Identity and Access Management (Controlling Access and Managing Identity)
  • Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)
  • Security Operations (Foundational Concepts, Investigations, Incident Management, and Disaster Recovery)
  • Software Development Security (Understanding, Applying, and Enforcing Software Security)

Prequisites:

CISSP® candidates are required to have a minimum of five years of full time work experience in at least two of the eight CISSP® domains. One year of experience is waived with a four year college degree or a credential from the (ISC)²® approved credential list.

The CISSP certification is the most globally recognized professional requirement in the IT Security domain. This certification is best suited for:


  • Security Consultants/Managers
  • IT Directors/Managers
  • Security Auditors/Architects
  • Security Systems Engineers
  • Chief Information Security Officers
  • Network Architects

4. CISM

The uniquely management-focused CISM certification promotes international security practices and recognizes the individual who manages, designs, and oversees and assesses an enterprise’s information security.Certified Information Security Manager (CISM) course is a great fit for IT professionals looking to move up in their organization and advance their careers and/or current CISMs looking to learn about the latest trends in the IT industry.

Course Content:

Introduction

Lecture1.1

Certified Information Security Manager (CISM) Course Intro

Lecture1.2

Certified Information Security Manager (CISM) Exam Module


Module 01 - Information Security Governance

Lecture2.1

An Introduction to Information Security Governance

Lecture2.2

The Role of Information Security within an Organization


Module 02 - Risk Management

Lecture3.1

An Overview of Risk Management


Module 03 – Security Architecture

Lecture4.1

An Overview of Information Security Program Management

Lecture4.2

Security Models


Module 04 - Information Security Management

Lecture5.1

An Overview of Information Security Management

Lecture5.2

Service Level Agreements


Module 05 - Incident Response and Business Continuity

Lecture6.1

An Overview of Incident Response and Business Continuity

Lecture6.2

Intrusion Detection Systems


Prequisites:

To become a CISM certified professional, you need to fulfill the following criteria:

A completed application must be submitted within 5 years from the date of initially passing the examination.

All experience must be verified independently with employers.

This experience must have been gained within the 10-year period preceding the application date for certification or within five years of passing the examination.

Three (3) years of the five (5) years of work experience must be gained performing the role of an information security manager

In addition, this work experience must be broad and gained in three (3) of the four (4) CISM® domains


Who should take this course:

The CISSP certification is the most globally recognized professional requirement in the IT Security domain. This certification is best suited for:


  • Security Consultants/Managers
  • IT Directors/Managers
  • Security Auditors/Architects
  • Security Systems Engineers
  • Chief Information Security Officers
  • Network Architects

5. Advanced Pentesting

1. Information Gathering

  • Passive Information Gathering
  • Active Information Gathering

2. Vulnerability Scanning

  • Vulnerability Scanning Theory
  • Vulnerability Scanning with Nessus
  • Vulnerability Scanning with Nmap

3. Introduction to Web Applications

  • Web Application Assessment Methodolog
  • Web Application Assessment Tools
  • Web Application Enumeration
  • Cross-Site Scripting XSS

4. Common Web Application Attacks

  • Directory Traversal
  • File Inclusion Vulnerabilities
  • File Upload Vulnerabilities
  • Command Injection

5. SQL Injection Attacks

  • SQL Theory and Database Types
  • Manual SQL Exploitation
  • Manual and Automated Code Execution

6. Client-Side Attacks

  • Target Reconnaissance
  • Exploiting Microsoft Office
  • Abusing Windows Library Files

7. Locating Public Exploits

  • Getting Started
  • Online Exploit Resources
  • Offline Exploit Resources
  • Exploiting a Target

8. Fixing Exploits

  • Fixing Memory Corruption Exploits
  • Fixing Web Exploits

9. Antivirus Evasion

  • Antivirus Evasion Software Key Components and Operations
  • AV Evasion in Practice

10. Password Attacks

  • Attacking Network Services Logins
  • Password Cracking Fundamentals
  • Working with Password Hashes

11. Windows Privilege Escalation

  • Enumerating Windows
  • Leveraging Windows Services
  • Abusing other Windows Components

12. Linux Privilege Escalation

  • Enumerating Linux
  • Exposed Confidential Information
  • Insecure File Permissions
  • Insecure System Components

13. Port Redirection and SSH Tunneling

  • Port Forwarding with *NIX Tools
  • SSH Tunneling
  • Port Forwarding with Windows Tools

14. Advanced Tunneling

  • Tunneling Through Deep Packet Inspection

15. The Metasploit Framework

  • Getting Familiar with Metasploit
  • Using Metasploit Payloads
  • Performing Post-Exploitation with Metasploit
  • Automating Metasploit

16. Active Directory Introduction and Enumeration

  • Active Directory Manual Enumeration
  • Manual Enumeration Expanding our Repertoire
  • Active Directory Automated Enumeration

17. Attacking Active Directory Authentication

  • Understanding Active Directory Authentication
  • Performing Attacks on Active Directory Authentication

18. Lateral Movement in Active Directory

  • Active Directory LAteral Movement Techniques
  • Active Directory Persistence

6. CSA

Module 01

Security Operations and Management


Module 02

Understanding Cyber Threats, IoCs, and Attack Methodology


Module 03

Incidents, Events, and Logging


Module 04

Incidents, Events, and Logging


Module 05

Enhanced Incident Detection with Threat Intelligence


Module 06

Incident Response

7. CTIA

Organizations need cybersecurity professionals with appropriate threat intelligence skills to remediate attacks!

Module 01

Introduction to Threat Intelligence


Module 02

Cyber Threats and Attack Frameworks


Module 03

Cyber Threats and Attack Frameworks


Module 04

Data Collection and Processing


Module 05

Data Analysis


Module 06

Intelligence Reporting and Dissemination


Module 07

Threat Hunting and Detection


Module 08

Threat Intelligence in SOC Operations, Incident Response, and Risk Management

8. WEBSITE DEVELOPMENT

Basic Project from scratch to Advance level. Courses offered in web designing

  • Html – Base design
  • JavaScript with jQuery
  • CSS
  • Ajax – Backend connection
  • Database - MySQL, PostgreSQL
  • Backend – php with CodeIgniter framework

9. LINUX

Manage data, execute commands and administer your Linux & UNIX environments with Linux & UNIX training courses. Learn to take full advantage of a Linux or UNIX operating system with Learning Tree’s Linux and UNIX training courses. From the basics of installation and configuration to controlling access, manipulating files and writing reusable, robust shell Scripts, you can gain the skills you need to build, manage and optimize your preferred platform.

  • Introducing Linux
  • Accessing the System
  • Managing Files and Directories
  • Controlling Access to Linux Resources
  • Leveraging Bash Shell Features
  • Automating Tasks with Shell Scripts
  • Executing Jobs and Processes.

10. JAVA FULL STACK

Core Java

  • Introduction to Java
  • Data Types and Variables
  • Classes and Objects
  • Object Oriented Programming
  • Constructors
  • Control Statements
  • Abstract Classes
  • Interfaces
  • Packages
  • Exception Handling
  • Multi-threading
  • Collection Framework
  • Generics
  • Input Output Streams
  • Java 8 Features Executing Jobs and Processes.

JDBC

  • Introduction to SQL
  • Introduction to JDBC
  • Architecture of JDBC
  • Types of Drivers
    • JDBC-ODBC Bridge Driver
    • Native-API Driver
    • Network Protocol Driver
    • Thin Driver
  • CRUD Operations using JDBC in Java
  • Batch Processing
  • Transaction Management

Servlets

  • Introduction to Web Technologies
  • Ways to create a Servlet
    • Implementing Servlet Interface
    • Extending GenericServlet
    • Extending HttpServlet
  • Html with Servlet Communication
  • Html with Servlet and Database Communication
  • Servlet with Servlet Communication
  • ServletConfig & ServletContext
  • Session Tracking

JSP

  • Introduction to JSP
  • Architecture of JSP
  • JSP Scripting Elements
    • Scriplet Tag
    • Expression Tag
    • Declaration Tag
  • JSP Directive Elements
    • page Directive
    • include Directive
    • taglib Directive
  • JSP Action Elements
    • forward
    • include
    • bean
    • setProperty
    • getProperty
  • JSP Implicit objects
    • request
    • response
    • config
    • application
    • session
    • pageContext
    • page
    • exception
  • JSP and JDBC

Hibernate

  • Introduction to Hibernate
  • Architecture of Hibernate
  • Database CRUD Operations
  • Inheritance
    • Table per Hierarchy
    • Table per Sub Class
    • Table per Concrete Class
  • Hibernate Relationships
    • One-to-one
    • One-to-many
    • Many-to-one
    • Many-to-many
  • HQL and Restrictions
  • Criteria in Hibernate

Spring

  • Introduction to Spring
  • Spring Core (Basic Concepts)
  • Spring Core (Advanced Concepts)
  • Spring Core (3.0 Annotations)
  • Spring MVC
  • Spring AOP
  • Spring ORM
  • Spring Transaction
  • Spring JDBC
  • Creating Views in Spring MVC

Spring Boot & REST API

  • Spring Boot Introduction
  • Spring Boot + Maven – Hello World Example
  • Creating a RESTful Web Service Example
  • Common Application Properties
  • How to Change Default Tomcat Server Port
  • How to Change Default Context Path
  • How to Reload Changes Without Restarting the Server
  • How to Create/Configure a Data Source
  • How to Configure Multiple Data Source
  • Spring Boot + Spring Security – RESTful Web Service with basic Authentication
  • Spring Boot + Spring Security – RESTful Web Service with Database Authentication
  • Spring Boot + Spring MVC + JSP Hello World Example
  • Spring Boot - RESTful Web Service with POST Request in JSON Example

Micro Services

  • Introduction to Microservices Architecture
  • Fundamentals of RESTful Services
  • Java Microservices with Spring Boot
  • Building and Deploying Microservices
  • Communication Between Microservices
  • Microservices Data Management
  • API Gateway and Service Discovery
  • Security in Microservices
  • Monitoring and Logging
  • Testing Microservices
  • Scaling Microservices
  • DevOps and CI/CD for Microservices

Agile Methodology

  • Agile Methodology Introduction
  • Advantages & Disadvantages of Agile
  • Agile Manifesto
  • Agile Characteristics
  • Agile SDLC
  • Agile Scrum
  • Agile Daily stand-up
  • Product Management

Tools

  • Maven
  • JUnit
  • Log4J
  • GitHub
  • Jira

Databases

  • MongoDB
  • MySQL

UI Technologies

  • Html
  • JavaScript
  • TypeScript
  • React JS

Softwares required

  • JDK 1.8
  • Eclipse
  • Apache tomcat
  • MySQL database

React JS

  • Introduction to React JS
  • JSX
  • Components
  • State and Props
  • React Hooks
  • Forms in React
  • React Router
  • Redux for State Management
  • API Integration
  • Performance Optimisation
  • Testing React Apps

AI for Java

  • Introduction to AI
  • Why use Java for AI?
  • Machine Learning Basics
  • Data Handling and Preprocessing
  • Building Machine Learning Models in Java
  • Neural Networks in Java
  • Natural Language Processing (NLP) with Java
  • AI in Real-Time Applications
  • AI and Java for Image Recognition

AWS Cloud Fundamentals

  • AWS Cloud Practitioner Essentials
  • Introduction to Amazon web services
  • Compute in the Cloud
  • Global Infrastructure and Reliability
  • Networking
  • Storage and Databases
  • Security

DevOps Fundamentals

  • Introduction to DevOps
  • DevOps Architecture
  • DevOps Lifecycle
  • Pipeline and Methodology
  • Jenkins