bar
bar
bar
Check your Order Status

Training

We offer best training that will create a thorough practical knowledge which will enhance your skills and improve your employability prospects.

Here are the courses we offer...

Click on each title to see details

Duration: 60 Days

► Basic Electronics ► Power Units (SMPS) ► Desktop Mother Board ► Laptop A to Z

Basic Electronics

Explanation of Characteristics, Function, Physical Appearance, Circuit Symbol and Testing with Multi meter of below components.

AC, DC Current • Conductors • Insulators • Semiconductors • Resistors • Capacitors • Diodes • IC’s • Amplifiers • Transistors (BJTs, MOSFETs) • Oscillators Concept • Electro Static Induction • Electro Magnetic Induction • Coils/Transformers

Power Units (SMPS)

SMPS block Diagram • Working principle • All O/P voltages • Circuit board tracing • Identifying different sections & components • Trouble shooting

Desktop Mother Board

Identifying different sections & components on Motherboard • Motherboard BLOCK Diagram • Power Sequence • Voltage to memory module • VRM section diagram • Core Voltage to CPU • Supply to clock generator & clock pulse distribution • Supply to Audio and LAN chips • Bios function • Chip Set Explanation • Key voltage points • Step by Step Troubleshooting guide'

Laptop A to Z

De-assembling and assembling of laptop • Replacing screen & Hinges • Checking Battery • Adaptor Ratings, voltage checking, working, Trouble shooting • Laptop Block Diagram • Identifying Different sections • Identifying Different components • Data sheet Reading • Circuit Diagram Reading • Power on sequence • Volt in Section • SIO Section • Battery Charging Section • Trouble shooting dead laptop • BGA Chip Re-floating • Trouble shooting battery not charging problem • Voltage to clock, Bios, audio, LAN chips • Voltage to Memory Section, Types of Rams and their voltages • Fixing Restarting problem • Trouble shooting powers OK no Display issue • Fixing Over Heating Problem • Inverter section troubleshooting • Drive not detecting • USB port not detecting • Keyboard not detecting • CAM not working • BIOS Programming • Usage of function keys • Partition & formatting the Hard drive • Installation Configuring of Peripherals and all device drivers

Duration: 15 Days

Basics of Electricity and Electronics

Current • Voltage • Resistance • Power • Energy • Ohm’s Law • Series and Parallel circuit • AC and DC current • Semi conductor’s • Diodes • Transistors • Capacitors • Coils • Transformers

Solar Power

Introduction to Solar Energy • Basic of solar photo-voltaic power systems For residential and commercial use • BLOCK Diagram • Components in Solar system • Solar panel and its parameters • How PV cell works • Battery Voltage & Current ratings • Load and Back-up time calculations • Connecting Batteries in Series and Parallel • Battery charging controller circuit (Explanation & Trouble shoot) • Types of Inverters • Inverter circuit explanation • Installation and Troubleshooting • Estimation and project report

Duration: 15 Days

CCTV System Introduction, BLOCK diagram • Analog and Digital Technologies • Concept of current, voltage, power • Types of cameras (Dome, Bullet, P-T-Z • Types of camera technologies (Analog, AHD,IP) • Explanation of Lens, sensor, DSP • DVR and NVR concepts • Types of cables and connectors used in CCTV system • Video Recording (Scheduling and planning) • CCTV footage view • Video backup • Audio record • 264 Compression technology • CCTV footage live local view through PC • Router configuration • Port forwarding • CCTV footage Remote View through PC and mobile

Module 1: Information Security Governance
  1. Establish and maintain an information security strategy, and align the strategy with corporate governance
  2. Establish and maintain an information security governance framework
  3. Establish and maintain information security policies
  4. Develop a business case
  5. Identify internal and external influences to the organization
  6. Obtain management commitment
  7. Define roles and responsibilities
  8. Establish, monitor, evaluate, and report metrics
Module 2: Information Risk Management and Compliance
  1. Establish a process for information asset classification and ownership
  2. Identify legal, regulatory, organizational, and other applicable requirements
  3. Ensure that risk assessments, vulnerability assessments, and threat analyses are conducted periodically
  4. Determine appropriate risk treatment options
  5. Evaluate information security controls
  6. Identify the gap between current and desired risk levels
  7. Integrate information risk management into business and IT processes
  8. Monitor existing risk
  9. Report noncompliance and other changes in information risk
Module 3: Information Security Program Development and Management
  1. Establish and maintain the information security program
  2. Ensure alignment between the information security program and other business functions
  3. Identify, acquire, manage, and define requirements for internal and external resources
  4. Establish and maintain information security architectures
  5. Establish, communicate, and maintain organizational information security standards, procedures, and guidelines
  6. Establish and maintain a program for information security awareness and training
  7. Integrate information security requirements into organizational processes
  8. Integrate information security requirements into contracts and activities of third parties
  9. Establish, monitor, and periodically report program management and operational metrics
Module 4: Information Security Incident Management
  1. Establish and maintain an organizational definition of, and severity hierarchy for, information security incidents
  2. Establish and maintain an incident response plan
  3. Develop and implement processes to ensure the timely identification of information security incidents
  4. Establish and maintain processes to investigate and document information security incidents
  5. Establish and maintain incident escalation and notification processes
  6. Organize, train, and equip teams to effectively respond to information security incidents
  7. Test and review the incident response plan periodically
  8. Establish and maintain communication plans and processes
  9. Conduct post-incident reviews
  10. Establish and maintain integration among the incident response plan, disaster recovery plan, and business continuity plan
Module 1: Cybersecurity Introduction and Overview
  • Topic 1: Introduction to Cybersecurity
    • Definition and Importance
    • Historical Context
  • Topic 2: Difference between Information Security and Cybersecurity
    • Key Differences
    • Overlaps and Interconnections
  • Topic 3: Cybersecurity Objectives
    • Confidentiality, Integrity, Availability (CIA Triad)
    • Other Key Objectives
  • Topic 4: Cybersecurity Roles
    • Key Roles and Responsibilities
    • Career Pathways
  • Topic 5: Cybersecurity Domains
    • Overview of Domains
    • Importance of Each Domain
Module 2: Cybersecurity Concepts
  • Topic 1: Risk
    • Understanding Risk in Cybersecurity
    • Risk Assessment Methodologies
  • Topic 2: Common Attack Types and Vectors
    • Overview of Attack Types (e.g., Phishing, Malware)
    • Common Vectors (e.g., Email, Networks)
  • Topic 3: Policies and Procedures
    • Importance of Documentation
    • Key Policies to Implement
  • Topic 4: Cybersecurity Controls
    • Types of Controls (Preventive, Detective, Corrective)
    • Examples and Best Practices
Module 3: Security Architecture Principles
  • Topic 1: Overview of Security Architecture
    • Definition and Importance
  • Topic 2: The OSI Model
    • Layers of the OSI Model
    • Security Considerations at Each Layer
  • Topic 3: Defense in Depth
    • Concept and Strategy
    • Layered Security Approaches
  • Topic 4: Firewalls
    • Types of Firewalls
    • Configuration Best Practices
  • Topic 5: Isolation and Segmentation
    • Network Segmentation Strategies
    • Benefits and Implementation
  • Topic 6: Monitoring, Detection and Logging
    • Importance of Monitoring
    • Tools and Techniques
  • Topic 7A: Encryption Fundamentals
    • Basics of Encryption
    • Key Concepts
  • Topic 7B: Encryption Techniques
    • Symmetric vs. Asymmetric Encryption
    • Common Algorithms
  • Topic 7C: Encryption Applications
    • Use Cases in Cybersecurity
    • Best Practices for Implementation
Module 4: Security Networks, Systems, Applications, and Data
  • Topic 1: Process Controls - Risk Assessments
    • Conducting Risk Assessments
    • Tools and Techniques
  • Topic 2: Process Controls - Vulnerability Management
    • Identifying and Managing Vulnerabilities
  • Topic 3: Process Controls - Penetration Testing
    • Overview of Penetration Testing
    • Methodologies and Tools
  • Topic 4: Network Security
    • Key Concepts and Best Practices
  • Topic 5: Operating System Security
    • Securing Operating Systems
    • Common Vulnerabilities
  • Topic 6: Application Security
    • Secure Development Practices
    • Application Testing Techniques
  • Topic 7: Data Security
    • Data Protection Strategies
    • Compliance and Regulations
Module 5: Incident Response
  • Topic 1: Event vs. Incident
    • Definitions and Differences
  • Topic 2: Security Incident Response
    • Incident Response Planning
    • Steps in the Incident Response Process
  • Topic 3: Investigations, Legal Holds, and Preservation
    • Importance of Forensic Investigations
    • Legal Considerations
  • Topic 4: Forensics
    • Overview of Digital Forensics
    • Tools and Techniques
  • Topic 5: Disaster Recovery and Business Continuity Plans
    • Developing Effective Plans
    • Testing and Maintenance
Module 6: Security Implications and Adoption of Evolving Technology
  • Topic 1: Current Threat Landscape
    • Overview of Current Threats
    • Trends and Predictions
  • Topic 2: Advanced Persistent Threats
    • Definition and Characteristics
    • Mitigation Strategies
  • Topic 3: Mobile Technology - Vulnerabilities, Threats, and Risk
    • Understanding Mobile Threats
    • Security Best Practices
  • Topic 4: Consumerization of IT and Mobile Devices
    • Implications for Security
    • Strategies for Management
  • Topic 5: Cloud and Digital Collaboration
    • Security in Cloud Environments
    • Best Practices for Collaboration Tool
  1. Network Fundamentals
  2. What is Network
  3. Essential components of Networks
  4. Communication Modes
  5. OSI Reference Model
  6. TCP/IP model
  7. Logical ports and protocols.
  8. TCP and UDP differences
  9. Transport layer communication basics
  10. Network Types, LAN, MAN, WAN
  11. Guided and Un guided Media
  12. Network interface card types
  13. NIC, function and Application.
  14. Physical Media and interfaces.
  15. Introduction to Network devices.
  16. Layer 2 and Layer 3 Devices.
  17. Basic CLI tools for Network diagnostics.
  18. IP Address, Classes and use cases.
  19. Network Topologies
  20. Overview on different media, types, limitations
  21. Detailed discussion on IPV4 and intro to IPV6.
  22. Wireless communication,
  23. SSID.
  24. WIFI channels. MAC address tables Switching types.
  25. MAC address learning.
  26. VLAN and advantages. 2.0 NETWORK ACCESS
  27. Inter VLAN communication • Spanning tree
  28. Trunks ports.
  29. Native VLANS.
  30. Inter switch connections and communication.
  31. Verify Layer 2 connectivity and troubleshoot.
  32. Ether channel
  33. Spanning tree protocols 3. IP CONNECTIVITY
  34. Routing • Layer 3 communication basics, and devices.
  35. Prefix, Gateways
  36. Metrics. • Administrative distance.
  37. Criteria for routing decisions • Static Routing
  38. Default Routing • Floating static routing.
  39. Distance vector and Link state Routing protocols
  40. RIP • OSPF • NAT advantages. 4. IP SERVICES.
  41. NAT operation and use cases. • DHCP and operation
  42. Troubleshooting DHCP issues.
  43. Secure communication access.
  44. 5.0 SECURITY FUNDAMENTS
  45. Virus, worms, Trojans.
  46. Vulnerabilities, Threats, Risk.
  47. Access controls and types.
  48. Policies, procedures, standard and baselines.
  49. Wireless security protocols
  50. Access control lists and Network security.
  1. Domain 1 Security and Risk Management 16%
    1. Understand, adhere to, and promote professional ethics
    2. Understand and apply security concepts
    3. Evaluate, apply, and sustain security governance principles
    4. Understand legal, regulatory, and compliance issues that pertain to information security in a holistic context
    5. Understand requirements for investigation types (i.e., administrative, criminal, civil, regulatory, industry standards)
    6. Develop, document, and implement security policy, standards, procedures, and guidelines
    7. Identify, analyze, assess, prioritize, and implement Business Continuity (BC) requirements
    8. Contribute to and enforce personnel security policies and procedures
    9. Understand and apply risk management concepts
    10. Understand and apply threat modeling concepts and methodologies
    11. Apply supply chain risk management (SCRM) concepts
    12. Establish and maintain a security awareness, education, and training program
  2. Domain 2 Asset Security
    1. Identify and classify information and assets
    2. Establish information and asset handling requirements
    3. Provision information and assets securely
    4. Manage data lifecycle
    5. Ensure appropriate asset retention (e.g., End of Life (EOL), End of Support)
    6. Determine data security controls and compliance requirements
  3. Domain 3 Security Architecture and Engineering
    1. Research, implement, and manage engineering processes using secure design principles
    2. Understand the fundamental concepts of security models (e.g., Biba, Star Model, Bell-LaPadula)
    3. Select controls based upon systems security requirements
    4. Understand security capabilities of Information Systems (e.g., memory protection, Trusted Platform Module (TPM), encryption/decryption)
    5. Assess and mitigate the vulnerabilities of security architectures, designs, and solution element
    6. Select and determine cryptographic solutions
    7. Understand methods of cryptanalytic attacks
    8. Apply security principles to site and facility design
    9. Design site and facility security controls
    10. Manage the information system lifecycle
  4. Domain 4 Communication and Network Security 13%
    1. Apply secure design principles in network architectures
    2. Secure network components
    3. Implement secure communication channels according to design
  5. Domain 5 Identity and Access Management (IAM)
    1. Control physical and logical access to assets
    2. Design identification and authentication strategy (e.g., people, devices, and services)
    3. Federated identity with a third-party service
    4. Implement and manage authorization mechanisms
    5. Manage the identity and access provisioning lifecycle
    6. Implement authentication systems
  6. Domain 6 Security Assessment and Testing
    1. Design and validate assessment, test, and audit strategies
    2. Conduct security controls testing
    3. Collect security process data (e.g., technical, and administrative)
    4. Analyze test output and generate report
    5. Conduct or facilitate security audits
  7. Domain 7 Security Operations
    1. Understand and comply with investigations
    2. Conduct logging and monitoring activities
    3. Perform configuration management (CM) (e.g., provisioning, baselining, automation)
    4. Apply foundational security operations concepts
    5. Apply resource protection
    6. Conduct incident management
    7. Operate and maintain detection and preventative measures
    8. Implement and support patch and vulnerability management
    9. Understand and participate in change management processes
    10. Implement recovery strategies
    11. Implement disaster recovery (DR) processes
    12. Test disaster recovery plan (DRP)
    13. Participate in Business Continuity (BC) planning and exercises
    14. Implement and manage physical security
    15. Address personnel safety and security concerns
  8. Domain 8 Software Development Security
    1. Understand and integrate security in the Software Development Life Cycle (SDLC)
    2. Identify and apply security controls in software development ecosystems
    3. Assess the effectiveness of software security
    4. Assess security impact of acquired software