Certificate Course on Network Security, Penetration Testing & Cyber Risk Management

Email This Page

*Denotes are mandatory fields.

Your Name : *
 
Your Email : *
 
Friend's Email : *
 
Friend's Name : *
 
Page URL : *
 
Message : *
 
Enter Captcha : *
 
 
Captcha

Try another one

 

Sending Mail Please Wait ...

Event Details

Certificate Course on Network Security, Penetration Testing & Cyber Risk Management - Dec 06, 2017

Introduction :

The rapid and dramatic advances in information technology (IT) in recent years have without question generated tremendous benefits. However, they have created significant and unprecedented risks to operations. Computer security has, in turn, become much more important as all levels of an organization to utilize information systems security measures to avoid data tampering, fraud, disruptions in critical operations, and inappropriate disclosure of sensitive information.

 

Course Highlights & Benefits :

Hands on Practice Sessions with Live Demonstration of Latest Hacking Techniques & tools, Live Investigation & Demonstration of various cases solved by Mr. Avez & Mr. Dedhia.

 

Who Ahould Attend ? 

Web Developers, Network Engineers, System Administrators, Law Professionals, Banking & finance Sector Professionals, Digital Forensics Investigators, Information Security Managers, Incident Responders, I.T Professionals, Cyber Crime Attorneys, Private investigators, Compliance Officers & Auditors

Modules Covered:

DAY-I
 
Basics of Enterprise Risk Management
  • Operational Risk Management

  • Building a Cyber Risk Management Framework

  • Building Cyber Crisis Management Framework

  • Cyber Insurance

  • Best practices of Operational Risk Management, Key Elements of Information

    & Cyber Security Framework, Working of a Cyber Crisis Management Program,
  • Cyber Insurance coverages.


WHY I.T SECURITY
  • Types of cyber crime (Nigerian Scams, credit cards, Net banking frauds)

  • Recent Internet Banking frauds & their modus-operandi

  • Cyber Crime Cases (Past, present, & what can we expect in future)


Understanding IP & MAC addresses Proxy Servers   
  • How to use proxy severs

  • How  to detect proxy severs

  • Mobile Hacking & Security

    ( Live Demos of mobile hacking & how tosecure your mobiles)
  • Call Recording

  • Call Spoofing    

  • Hacking the entire mobile, etc


OWASP  Top 10 : Website Hacking &Security
  • Vulnerability Scanning in Websites

  • SQL Injection

  • Cross Site Scripting

  • DOS

  • Defacing a website

  • XSS

  • Uploading a shell on the web server


Understanding Data leakage solutions or data security.
  • Penetration testing tools

  • Understanding    Kali Linux

  • NMAP

  • Metasploit framework

  • Meterpreter shell

  • Router Pentesting

  • Pen Testing WPA/WPA2 Encrypted WLAN


Understanding the ISO 27001 standards 
DAY –II
 
CYBER CRIME INVESTIGATIONS & DIGITAL FORENSICS
  • Investigating Emails

  • Analyzing Email Headers

  • Windows File Analysis tools

  • MAC FORENSICS

  • LINUX FORENSICS


Network Forensics :
  • Understanding Wireshark

  • Windows server forensics

  • Data Acquisition Software Tools

  • Creating Images of pen drive/hdd

  • Investigating Website & web application 

  • Mobile Forensics

  • Complete laptop / desktop forensics

  • ( incase an employee leaves the company to trace the activity done on his computer)

  • How to file cyber complains

 



Tools :

Backtrack: Kali Linux, Nmap, NetScan Tools Pro, Nessus, SAINT, GFI LANGuard, TOR, OmniPeek Network Analyzer, Sandcat, Wikto, Acunetix, Havij, TrueCrypt & lot more over 5 GB of materials would be provided in the form of: PowerPoint slides (step by Step Instructions on operating the tools), open source software, Video tutorials.For each & every module & concept which will be taught, we will be giving minimum 2 tools for each module which can be use later on.

 

(Members have to bring their own Laptops & Pen drive) 

Mr Avez (Sr. Associated Vice President Risk Management & Chief Information Security Officer) Avez holds a Masters degree in Risk Management from City University, London (with Merit) and is been working with a leading insurer for more than 12 years. He has done his MBA from Pune University and is also a certified for ISO 31000: Risk management practices. He is also a Lead Auditor for ISO 27001: 2013 Information Security & Management Systems. He is a passionate speaker and talks on diversified subjects related to risk & cyber security management on various national and international platforms.


Mr Dedhia is an independent Cyber Crime Investigator & also a Certified Ethical Hacker (EC-Council, USA). Since many years he is working as a Cyber Crime Investigator and also as a security expert for IT companies, Government department Corporate’s and even individuals. He has also provided trainings to Navi Mumbai cyber cell department & also assists the Cyber Cell Departments of Mumbai Police with respect to their queries.

Bombay Chamber, Mackinnon Mackenzie Bldg, 3rd Floor, Ballard Estate Fort, Mumbai-1

Revati Khare || Manager - Information & Communication Technology Committee
Tel: 22 6120 0231 (M): 91 9892029473
Participation Fee :   
Members  Rs. 8000 + 18% GST
Non-Members  Rs. 9000 + 18% GST

Discount : 3 participant 10% or 5 participant 15%

 

Bank Details for NEFT

Beneficiary Account No.

10996680930

IFSC CODE

SBIN0000300

Bank Name

State Bank of India

Branch Address

Mumbai Main Branch, Mumbai Samachar Marg, Mumbai- 400 001

MICR Code   

40000 2010

Cheque /Demand Draft should be drawn in favor of “BOMBAY CHAMBER OF COMMERCE AND INDUSTRY”.

EVENTS

POLL
No Poll Created
Close

Name : *
Email : *
Comment : *

(Max characters allowed 522.)
File Upload :
 
Captcha

Try another one

Enter Captcha Code*