Best Cyber Security Training Institute for IT Software,Hardware,Networking Courses in Dwarkacyber security Training | 3/4/6 month cyber security Training | Winter Training Industrial Training | South-west Delhi |Ethical hacking in Dwarka
TRAINING OF TRAINERS FIELD TRAINER PROGRAM (Course ID-FT 50)       ❘       TRAIN THE TRAINER PROGRAM (T3) COURSE ID- CT 115 A 70       ❘      Weekend batch for Course of Security Officer starting from 3rd December 2016.      Registration Form    Cyber Security Training in Delhi    Webmail
ICSS (INTERNATIONAL COLLEGE FOR SECURITY STUDIES)
Post Graduate Diploma in Cyber Security  
PROGRAMME OVERVIEW
Post Graduate Diploma in Cyber Security Management (PGDCS) is 8 months training and certification programme conducted both as a full time regular programme and also a part time contact program, based on eligibility of the student,leading to employment opportunities in the information technology (IT)/cyber security function of various industries.

The programme would lead to employment opportunities in the cyber security function of various industries & sectors. It would also help the students attain additional qualification to gain employment opportunities across various job roles and functions in national & international organizations. The programme has been developed through inputs from the industry and experts in the field. The faculty comprises of experienced trainers available permanently at the centre and also subject matter experts as visiting faculty. The teaching pedagogy includes theory, practical, case studies, visits, study material, projects, internship etc to keep the learning experiential and collaborative.

The students of this course get the opportunity to network with leaders in the industry and to join the alumni network of CATS.

The PG Diploma in Cyber Security is a job-oriented course and is most suitable for those interested in working in the field of cyber security. There exists a great demand for cyber security professionals. CATS offers job placement assistance through its network of leading organizations.

PROGRAMME OBJECTIVES

The underlying objective of PGDCS is to develop relevant knowledge, skills and attitude for job seekers and for professionals looking for career progression. The programme aims to:

  • Foster employable abilities, proficiencies and competences required to gain a successful career in cyber industry.
  • Provide a national & internationally recognized certification.
  • Enable career advancement of existing cyber security professionals.
  • Enable Individual to be a trained Network/Web Security System
  • Administrator/Manager/ Network Security System Engineer/Security • Auditor/Chief Information Security Officer/Computer Forensics Investigator, IT Security Administrator/Consultant/Manager/certified Ethical Hacker etc
The emphasis of the programme is on learning:
  1. Basic concepts of Computer and Information Security
  2. Data Security
  3. Network Security
  4. Desktop and Server Security
  5. Protection from Cyber Hacking Attacks
  6. Legal aspects of Cyber Security
  7. Information Security Management
  8. Mobile Forensics
  9. Cyber Forensics
  10. Vulnerability analysis in websites and operating systems
  11. Cryptography
  12. Intrusion detection system in networks
  13. Network Installation
  14. Management of cyber security operations
  15. Personal professional skills


Module 1: OVERVIEW

In this module, we will teach you about the basic of hacking concepts including what is hacking, Black Hats, White Hats, Crackers and Phreakers and how hacking can be fruitful to you if you use it ethically.It will give you complete knowledge enhancement about the basic concepts that is being used in ethical hacking.



Module 2: NETWORKING

In the 2nd Module of Networking, Delhi Institute of Computer Courses (DICC) is covering about the basics of networking that are essential from the point of view of doing hacking course. It will include the knowledge of LAN & WAN, IP Address, TCP, UTP, Ports etc.

 


Module 3: VIRTUALIZATION

In this module of Virtualization, we will train you about overview of virtualization, installation of virtual machine, advantages and disadvantages of virtual machine, understanding Virtual CPU, Virtual memory, Installing Virtual box, Vm Ware Workstation etc. This module will enhance your practical knowledge.



Module 4: FOOTPRINTING

FootPrinting is actually the first and foremost method that Hackers and Crackers are using to gather the information about different computer systems. In this module we will teach you as how to use different techniques for footprinting including using google hacking methods, extracting email details etc.

 


Module 5: SCANNING

Scanning Ports is another method that is most common among the hackers in order to find out the open ports or vulnerabilities listing on a port.In this module, you will learn about the Ping sweep, TCP Scan, firewalls, perimeter devices, routing, topology etc. We will also provide you the scanning tools such as Nmap, Unicornscan, Netscan Tools, or Angry IP Scanner etc.



Module 6: System Hacking

This module is covering both as how to protect your windows from being hacked and how to hack other windows.The module will include password cracking methods for windows, Apple MAC OS, remote exploitation with Metasploit, etc. Get complete Hands-on Training on Latest Software.

 


Module 7: LINUX HACKING

Linux is Just like UNIX operating system and it is an open source. It is therefore hackers are looking to hack Linux operating systems. It is easy to modify or customize. Most often hackers are using password crackers tools, network detector tools and also wireless packet sniffing tools to enter into Linux operating system. So, in this module we are covering all those techniques



Module 8: Virus and Worms

Malwares are created by hackers and they can make some malicious programs which could be injected in any operating system.The course will include malware analysis fundamentals, malicious code analysis, In-depth Malware analysis, Self-defending Malwares, malicious documents, memory forensics etc.

 


Module 9: TROJANS & RATS

As we know that RAT stands for Remote Access Trojan and in fact it is one of the most dangerous and malicious viruses available on the internet.Using Trojans, RATS Hackers can completely control your computers and can infecting files, installing keyloggers, remotely starts web cams, movies or songs, using your computer to attack other’s website etc. In this module, we will cover up all these things.



Module 10: STAGNOGRAPHY

Stegnography is the technique of sending or receiving messages in a way that no one else apart from you can understand. As there is a tremendous use of internet, the use of Stegnography is also increasing day by day. There are various tools available such as MP3Stego, Steganos Suite, .Dmagic etc. Learn in this module as how you too can use Stegnography languages to communicate.

 


Module 11: SNIFFING

So, if you would like to monitor or read all the network traffic that is passing through Telnet, FTP, NNTP, SMTP, HTTP or IMAP, Sniffing will provide you the solution. All these sources send data in the clear text format and sniffing can be helpful in both ways as to monitor traffic or even for stealing passwords from the network. Tools like Wireshark,Dsniff, Ettercap can be quite useful for Sniffing.



Module 12: PHISHING

Learn in this module as how to use a fake page which looks like the original one and thus how you can get username and passwords. When a victim enters the username and passwords the password will be automatically retrieve using the PHP script in the database. Learn as how to create professional phishing pages to hack other’s information.

 


Module 13: EMAIL TRACKING & BOMBING

In this module we will teach you as how you can track the Email as who sends you an e-mail, the location of email sender and how you too can send multiple fake emails to users to get their confidential information.



Module 14: DOS / DDOS ATTACK

Denial of Service or Distributed Denial of Service are the methods used by Hackers to completely control the internet system by flooding the incoming traffic to the website from different resources.As the traffic is coming from multiple resources,

 


Module 15: XSS ATTACKS

XSS or Cross site scripting is another way used by hackers to inject malicious scripts to different web application also many times in the browsers as well. In this module we will teach you both as how to do the XSS attacks and also how to identify it and prevent from it if somebody is trying to inject your computer, browsers or web applications.



Module 16: IFRAME ATTACKS

IFrame Attacks are also quite popular among hackers. In this way, hackers or attackers often embed a malicious file from another site normally in the form of PHP file. In this module we will let you know as how to perform an Iframe attack and also at the same time how you can prevent from it.

 


Module 17: WIFI HACKING

In this module we are offering wifi hacking training whereby you can easily be able to learn as how to crack WEP/WPA/WPA2 encryptions using different methods, ARP Spoofing/ARP Poisonning, how to Launch Various Man In The Middle attacks etc.



Module 18: SQL INJETIONS

SQL Injections is another way of injecting malicious code to web applications. A SQL injection can completely destroy the database. It is injected in the entry field for execution.So, in this module we are preparing you for the SQL Injections techniques that you too can use as a professional hacker.

 


Module 19: REVERSE ENGINEERING

Reverse Engineering is often termed as the process for finding out the technological principles of a device, object or system by analyzing its structure, function and operation. So, in this module we will let you know about the different approaches to reverse engineering, legality of reversing, and different tools of reverse engineering and so on.



Module 20: MOBILE HACKING

Mobile Hacking is another module that we will be teaching you in this hacking module. The course will include Call forging techniques, Call Tracking Techniques, SMS Tracking Techinques and so on. Get Complete and Practical Mobile Hacking Training at DICC.

 


Module 21: PENETRATION TESTING

In this module, we will be teaching you about the Penetration Testing with Kali Linux. This module is an advance module wherein you will learn about the offensive security that can lead you to an Offensive Certified Penetration Tester (OSCP).



Module 22: FIREWALL / HONEYPOTS

Firewall now a day is the standard equipment for the network protection. In this module, we will be covering firewall security updates, antispam configuration, antiviruses for firewall, configuration of firewall antivirus etc.

 


Module 23: IDS/IPS

This is another Practical module and is covering the concepts such as methods of detection, circumventing and tunnelling, SSL encryption, Teredo IPv6, TCP cheksum forgery and so on.



Module 24: CYBAR LAWS

Last Module is about Cyber Laws. It is too an important module as it covers that what we should kept in mind while implementing ethical hacking. This module will be covering the pros and cons of ethical hacking.


In addition the programme would also focus on developing leadership skills & how to project self as a professional

MEDIUM OF INSTRUCTION

The medium of instructions is English. The course material is also in English. However, students may be supported individually, if required, in local language by the trainers so as not hamper the learning of the student.

ASSESSMENT & EVALUATION

Any assessment conducted at CATS is not with the intention of detaining any student. Following assessments & evaluations may be conducted during the programme:
  1. Pre-assessment of knowledge & skills
  2. Continuous evaluations at regular intervals.
  3. Mid-programme evaluation
  4. Evaluation of industry visit report
  5. Final evaluation
The evaluations are based on online & oral assessments. Final evaluation may be conducted by Security Sector Skill Council. Attendance during evaluations will be mandatory for all students.

INSTRUCTIONAL SYSTEM

The programme is interactive with emphasis on gaining knowledge & developing skills. Following are an integrated part of the programme delivery:

  • Audio visual training delivery aid
  • Practicals
  • Case studies
  • Real world vulnerability analysis
  • Assimilation and Mock Tests
  • Guest Lectures & Industrial Visits
  • Project work with Police Cyber Security Dome


About Us Our Work Porgrammes Speak to an Expert Now
» About ICSS » Education & Training » Security Officer Programme
» Team ICSS » Testing & Certification » Training of Trainer’s
» ICSS Training Centres » Technology & Content » DGR Sponsored Programme
» Recognitions & Affiliations » Research & Consulting » Security Supervisor Programme
    » Security Guard Programme
    » Customized Training & Certification
Terms and Conditions | Privacy Policy
Copyright © 2012, ICSS India. All rights reserved., Website by I-Greens Softech (P) Ltd