Trainings We Offer
1. CEH V.13
Online Attend our Instructor Led Live Online Training from anywhere across the globe Real Time Trainers with 10+ years of Exp.
Course modules:
Module 01
Introduction to Ethical Hacking
Module 02
Footprinting and Reconnaissance
Module 03
Scanning Networks
Module 04
Enumeration
Module 05
Vulnerability Analysis
Module 06
System Hacking
Module 07
Malware Threats
Module 08
Sniffing
Module 09
Social Engineering
Module 10
Denial-of-Service
Module 11
Session Hijacking
Module 12
Evading IDS, Firewalls,and Honeypots
Module 13
Hacking Web Servers
Module 14
Hacking Web Applications
Module 15
SQL Injection
Module 16
Hacking Wireless Networks
Module 17
Hacking Mobile Platforms
Module 18
IoT Hacking
Module 19
Cloud Computing
Module 20
Cryptography
2. CPENT
Module 01
Introduction to Penetration Testing and Methodologies
Cover the fundamentals of penetration testing, including penetration testing approaches, strategies, methodologies, techniques, and various guidelines and recommendations for penetration testing.
Module 02
Penetration Testing Scoping and Engagement
Learn the different stages and elements of scoping and engagement in penetration testing.
Module 03
Open-Source Intelligence (OSINT)
Learn how to use techniques and tools to gather intelligence about the target from publicly available sources such as the World Wide Web (WWW), through website analysis, by using tools/frameworks/scripts, and so on.
Module 04
Social Engineering Penetration Testing
Learn different social engineering techniques and perform social-engineering penetration testing on a target organization.
Module 05
Network Penetration Testing – External
Learn how to implement a comprehensive penetration testing methodology for assessing networks from outsiders’ perspectives. Learn the process attackers follow to exploit the assets using vulnerabilities from the outside of the network perimeter
Module 06
Network Penetration Testing – Internal
Learn how to implement a comprehensive penetration testing methodology for assessing networks from insider’s perspectives
Module 07
Network Penetration Testing - Perimeter Devices
Learn how to implement a comprehensive penetration testing methodology for assessing the security of network perimeter devices, such as Firewalls, IDS, Routers, and Switches
Module 08
Web Application Penetration Testing
Learn how to analyze web applications for various vulnerabilities, including the Open Web Application Security Project (OWASP) Top 10, and determine the risk of exploitation.
Module 09
Wireless Penetration Testing
Learn how to test various components of wireless networks, such as WLAN, RFID devices, and NFC technology devices.
Module 10
IoT Penetration Testing
Understand various threats to Internet of things (IoT) networks and learn how to audit security controls for various inherent IoT risks.
Module 11
OT and SCADA Penetration Testing
Understand OT and SCADA concepts and learn the process of testing various components of OT and SCADA networks.
Module 12
Cloud Penetration Testing
Understand various security threats and concerns in cloud computing and learn how to perform cloud penetration testing to determine the probability of exploitation.
Module 13
Binary Analysis and Exploitation
Understand the binary analysis methodology and reverse engineer applications to identify vulnerable applications that may lead to the exploitation of an information system.
Module 14
Report Writing and Post Testing Actions
Learn how to document and analyze the results of a penetration test and recommend post-penetration test actions.
3. CISSP
Online Real Time Trainers with 10+ years of Exp. 99% passing Guarantee Complete Practical Training
- Security and Risk Management (Security, Risk, Compliance, Law, Regulations, and Business Continuity)
- Asset Security (Protecting Security of Assets)
- Security Engineering (Engineering and Management of Security)
- Communication and Network Security (Designing and Protecting Network Security)
- Identity and Access Management (Controlling Access and Managing Identity)
- Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)
- Security Operations (Foundational Concepts, Investigations, Incident Management, and Disaster Recovery)
- Software Development Security (Understanding, Applying, and Enforcing Software Security)
Prequisites:
CISSP® candidates are required to have a minimum of five years of full time work experience in at least two of the eight CISSP® domains. One year of experience is waived with a four year college degree or a credential from the (ISC)²® approved credential list.
The CISSP certification is the most globally recognized professional requirement in the IT Security domain. This certification is best suited for:
- Security Consultants/Managers
- IT Directors/Managers
- Security Auditors/Architects
- Security Systems Engineers
- Chief Information Security Officers
- Network Architects
4. CISM
The uniquely management-focused CISM certification promotes international security practices and recognizes the individual who manages, designs, and oversees and assesses an enterprise’s information security.Certified Information Security Manager (CISM) course is a great fit for IT professionals looking to move up in their organization and advance their careers and/or current CISMs looking to learn about the latest trends in the IT industry.
Course Content:
Introduction
Lecture1.1
Certified Information Security Manager (CISM) Course Intro
Lecture1.2
Certified Information Security Manager (CISM) Exam Module
Module 01 - Information Security Governance
Lecture2.1
An Introduction to Information Security Governance
Lecture2.2
The Role of Information Security within an Organization
Module 02 - Risk Management
Lecture3.1
An Overview of Risk Management
Module 03 – Security Architecture
Lecture4.1
An Overview of Information Security Program Management
Lecture4.2
Security Models
Module 04 - Information Security Management
Lecture5.1
An Overview of Information Security Management
Lecture5.2
Service Level Agreements
Module 05 - Incident Response and Business Continuity
Lecture6.1
An Overview of Incident Response and Business Continuity
Lecture6.2
Intrusion Detection Systems
Prequisites:
To become a CISM certified professional, you need to fulfill the following criteria:
A completed application must be submitted within 5 years from the date of initially passing the examination.
All experience must be verified independently with employers.
This experience must have been gained within the 10-year period preceding the application date for certification or within five years of passing the examination.
Three (3) years of the five (5) years of work experience must be gained performing the role of an information security manager
In addition, this work experience must be broad and gained in three (3) of the four (4) CISM® domains
Who should take this course:
The CISSP certification is the most globally recognized professional requirement in the IT Security domain. This certification is best suited for:
- Security Consultants/Managers
- IT Directors/Managers
- Security Auditors/Architects
- Security Systems Engineers
- Chief Information Security Officers
- Network Architects
5. Advanced Pentesting
1. Information Gathering
- Passive Information Gathering
- Active Information Gathering
2. Vulnerability Scanning
- Vulnerability Scanning Theory
- Vulnerability Scanning with Nessus
- Vulnerability Scanning with Nmap
3. Introduction to Web Applications
- Web Application Assessment Methodolog
- Web Application Assessment Tools
- Web Application Enumeration
- Cross-Site Scripting XSS
4. Common Web Application Attacks
- Directory Traversal
- File Inclusion Vulnerabilities
- File Upload Vulnerabilities
- Command Injection
5. SQL Injection Attacks
- SQL Theory and Database Types
- Manual SQL Exploitation
- Manual and Automated Code Execution
6. Client-Side Attacks
- Target Reconnaissance
- Exploiting Microsoft Office
- Abusing Windows Library Files
7. Locating Public Exploits
- Getting Started
- Online Exploit Resources
- Offline Exploit Resources
- Exploiting a Target
8. Fixing Exploits
- Fixing Memory Corruption Exploits
- Fixing Web Exploits
9. Antivirus Evasion
- Antivirus Evasion Software Key Components and Operations
- AV Evasion in Practice
10. Password Attacks
- Attacking Network Services Logins
- Password Cracking Fundamentals
- Working with Password Hashes
11. Windows Privilege Escalation
- Enumerating Windows
- Leveraging Windows Services
- Abusing other Windows Components
12. Linux Privilege Escalation
- Enumerating Linux
- Exposed Confidential Information
- Insecure File Permissions
- Insecure System Components
13. Port Redirection and SSH Tunneling
- Port Forwarding with *NIX Tools
- SSH Tunneling
- Port Forwarding with Windows Tools
14. Advanced Tunneling
- Tunneling Through Deep Packet Inspection
15. The Metasploit Framework
- Getting Familiar with Metasploit
- Using Metasploit Payloads
- Performing Post-Exploitation with Metasploit
- Automating Metasploit
16. Active Directory Introduction and Enumeration
- Active Directory Manual Enumeration
- Manual Enumeration Expanding our Repertoire
- Active Directory Automated Enumeration
17. Attacking Active Directory Authentication
- Understanding Active Directory Authentication
- Performing Attacks on Active Directory Authentication
18. Lateral Movement in Active Directory
- Active Directory LAteral Movement Techniques
- Active Directory Persistence
6. CSA
Module 01
Security Operations and Management
Module 02
Understanding Cyber Threats, IoCs, and Attack Methodology
Module 03
Incidents, Events, and Logging
Module 04
Incidents, Events, and Logging
Module 05
Enhanced Incident Detection with Threat Intelligence
Module 06
Incident Response
7. CTIA
Organizations need cybersecurity professionals with appropriate threat intelligence skills to remediate attacks!
Module 01
Introduction to Threat Intelligence
Module 02
Cyber Threats and Attack Frameworks
Module 03
Cyber Threats and Attack Frameworks
Module 04
Data Collection and Processing
Module 05
Data Analysis
Module 06
Intelligence Reporting and Dissemination
Module 07
Threat Hunting and Detection
Module 08
Threat Intelligence in SOC Operations, Incident Response, and Risk Management
8. WEBSITE DEVELOPMENT
Basic Project from scratch to Advance level. Courses offered in web designing
- Html – Base design
- JavaScript with jQuery
- CSS
- Ajax – Backend connection
- Database - MySQL, PostgreSQL
- Backend – php with CodeIgniter framework
9. LINUX
Manage data, execute commands and administer your Linux & UNIX environments with Linux & UNIX training courses. Learn to take full advantage of a Linux or UNIX operating system with Learning Tree’s Linux and UNIX training courses. From the basics of installation and configuration to controlling access, manipulating files and writing reusable, robust shell Scripts, you can gain the skills you need to build, manage and optimize your preferred platform.
- Introducing Linux
- Accessing the System
- Managing Files and Directories
- Controlling Access to Linux Resources
- Leveraging Bash Shell Features
- Automating Tasks with Shell Scripts
- Executing Jobs and Processes.
10. JAVA FULL STACK
Core Java
- Introduction to Java
- Data Types and Variables
- Classes and Objects
- Object Oriented Programming
- Constructors
- Control Statements
- Abstract Classes
- Interfaces
- Packages
- Exception Handling
- Multi-threading
- Collection Framework
- Generics
- Input Output Streams
- Java 8 Features Executing Jobs and Processes.
JDBC
- Introduction to SQL
- Introduction to JDBC
- Architecture of JDBC
- Types of Drivers
- JDBC-ODBC Bridge Driver
- Native-API Driver
- Network Protocol Driver
- Thin Driver
- CRUD Operations using JDBC in Java
- Batch Processing
- Transaction Management
Servlets
- Introduction to Web Technologies
- Ways to create a Servlet
- Implementing Servlet Interface
- Extending GenericServlet
- Extending HttpServlet
- Html with Servlet Communication
- Html with Servlet and Database Communication
- Servlet with Servlet Communication
- ServletConfig & ServletContext
- Session Tracking
JSP
- Introduction to JSP
- Architecture of JSP
- JSP Scripting Elements
- Scriplet Tag
- Expression Tag
- Declaration Tag
- JSP Directive Elements
- page Directive
- include Directive
- taglib Directive
- JSP Action Elements
- forward
- include
- bean
- setProperty
- getProperty
- JSP Implicit objects
- request
- response
- config
- application
- session
- pageContext
- page
- exception
- JSP and JDBC
Hibernate
- Introduction to Hibernate
- Architecture of Hibernate
- Database CRUD Operations
- Inheritance
- Table per Hierarchy
- Table per Sub Class
- Table per Concrete Class
- Hibernate Relationships
- One-to-one
- One-to-many
- Many-to-one
- Many-to-many
- HQL and Restrictions
- Criteria in Hibernate
Spring
- Introduction to Spring
- Spring Core (Basic Concepts)
- Spring Core (Advanced Concepts)
- Spring Core (3.0 Annotations)
- Spring MVC
- Spring AOP
- Spring ORM
- Spring Transaction
- Spring JDBC
- Creating Views in Spring MVC
Spring Boot & REST API
- Spring Boot Introduction
- Spring Boot + Maven – Hello World Example
- Creating a RESTful Web Service Example
- Common Application Properties
- How to Change Default Tomcat Server Port
- How to Change Default Context Path
- How to Reload Changes Without Restarting the Server
- How to Create/Configure a Data Source
- How to Configure Multiple Data Source
- Spring Boot + Spring Security – RESTful Web Service with basic Authentication
- Spring Boot + Spring Security – RESTful Web Service with Database Authentication
- Spring Boot + Spring MVC + JSP Hello World Example
- Spring Boot - RESTful Web Service with POST Request in JSON Example
Micro Services
- Introduction to Microservices Architecture
- Fundamentals of RESTful Services
- Java Microservices with Spring Boot
- Building and Deploying Microservices
- Communication Between Microservices
- Microservices Data Management
- API Gateway and Service Discovery
- Security in Microservices
- Monitoring and Logging
- Testing Microservices
- Scaling Microservices
- DevOps and CI/CD for Microservices
Agile Methodology
- Agile Methodology Introduction
- Advantages & Disadvantages of Agile
- Agile Manifesto
- Agile Characteristics
- Agile SDLC
- Agile Scrum
- Agile Daily stand-up
- Product Management
Tools
- Maven
- JUnit
- Log4J
- GitHub
- Jira
Databases
- MongoDB
- MySQL
UI Technologies
- Html
- JavaScript
- TypeScript
- React JS
Softwares required
- JDK 1.8
- Eclipse
- Apache tomcat
- MySQL database
React JS
- Introduction to React JS
- JSX
- Components
- State and Props
- React Hooks
- Forms in React
- React Router
- Redux for State Management
- API Integration
- Performance Optimisation
- Testing React Apps
AI for Java
- Introduction to AI
- Why use Java for AI?
- Machine Learning Basics
- Data Handling and Preprocessing
- Building Machine Learning Models in Java
- Neural Networks in Java
- Natural Language Processing (NLP) with Java
- AI in Real-Time Applications
- AI and Java for Image Recognition
AWS Cloud Fundamentals
- AWS Cloud Practitioner Essentials
- Introduction to Amazon web services
- Compute in the Cloud
- Global Infrastructure and Reliability
- Networking
- Storage and Databases
- Security
DevOps Fundamentals
- Introduction to DevOps
- DevOps Architecture
- DevOps Lifecycle
- Pipeline and Methodology
- Jenkins