Beginners

These courses are the foundation of Information Security. Information Security Courses are getting the most up-to-date information, complete hands-on labs, industry-leading instructors.

Compliance

Auditing is crucial to the success of any management system. As a result, it carries with it heavy responsibilities, tough challenges and complex problems. These intensive courses prepare the participants for the qualification process for industry standards.

Advance Trainings

These courses are the for the professionals engaged in information security. These courses offer professionals to make their career in the area of information security.

 
 

Beginners

  • Ethical Hacking

  • An Ethical Hacker is a technology expert; typically employed by an organization to assess the security system of the organization in order to discover vulnerabilities that can be exploited. Ethical hackers may use the same methods as the black hat hackers, but report the problems instead of taking advantage of them.

    This course on Ethical Hacking goes deep down into the depths of networking, systems, web applications and actual exploitation and helps beginners to take their first step towards information security field. This 5 days course is designed to give the participants the real world exposure in information security by hands on experience in tools and techniques.


  • Network Security

  • With the explosion of internet and e-world, computer networks, if adequately not secured, are getting targeted for a large amount of threats, and exploited further which can cause huge damages to the enterprise. The primary goal of this course is to give a good idea on various network security issues, how to identify them, and what are the proper controls that need to be implemented to prevent these issues.


  • Web Application Security

  • The course is focused on a comprehensive coverage of web application security. It will present security guidelines and considerations in web applications development. The participants will learn the basics of application security, how to enforce security on a web application, Basics of Threat Modeling, Threat Profiling, OWASP Top Ten Testing and Black Box Testing.


     

 
 

Compliance Trainings

  • IRCA Approved ISO 27001 Lead Auditor Training

  • This five-day intensive course enables the participants to develop the expertise needed to audit an Information Security Management System (ISMS) and to manage a team of auditors by applying widely recognized audit principles, procedures and techniques. During this training, the participants will acquire the knowledge and skills needed to proficiently plan and perform internal and external audits in compliance with ISO 19001 and certification audits according to ISO 17021. Based on practical exercises, the participants will develop the skills (mastering audit techniques) and competencies (managing audit teams and audit program, communicating with customers, conflict resolution, etc.) necessary to conduct an audit efficiently


  • ISO 27001 Lead Implementor Training

  • This five-day intensive course enables the participants to develop the expertise necessary to support an organization in implementing and managing an Information Security Management System (ISMS) based on ISO/IEC 27001. Participants will also be given a thorough grounding in best practices used to implement Information Security controls from all areas of ISO 27002. This training is consistent with the project management practices established in ISO 10006 (Quality Management Systems - Guidelines for Quality Management in Projects). This training is also fully compatible with ISO 27003 (Guidelines for the Implementation of an ISMS), ISO 27004 (Measurement of Information Security) and ISO 27005 (Risk Management in Information Security).


  • ISO 22301 Lead Implementor Training

  • This five-day intensive course enables the participants to develop the necessary expertise to support an organization in implementing and managing a Business Continuity Management System (BCMS) based on ISO 22301. The participants will also gain a thorough understanding of best practices used to implement Business Continuity processes from the ISO 22399. This training is fully compatible with BS 25999 (Business Continuity Management Specification) and ISO 27031 (Guidelines for information and communication technology readiness for Business Continuity).


 

Advanced Trainings

  • Digital Forensics Training

  • The term cyber-crime no longer refers only to hackers and other external attackers. Almost all every case of financial fraud or employee misuse involves a very strong element of computer-based evidence. SecureNet Technology brings together its consolidated expertise into a four-day hands-on training on Digital Forensic Analyst. The entire workshop is driven by hands-on exercises and case studies to ensure that all aspects have a real-life scenario-based approach.


  • Secure Coding Practices

  • The course will present security guidelines and considerations in Web Applications Development. Participants will learn how to enforce security on a application in the code level, and security best practices to be followed in each phases of software development life cycle. The course revolves around testing and fixing of issues filed under OWASP TOP 10.


  • Secure Java Developer

  • The course will present security guidelines and considerations in Java Web Applications Development. The participants will learn how to enforce security on a J2EE application, enabling standard J2EE security mechanisms and more importantly why to implement security. The course revolves around testing and fixing of issues filed under OWASP TOP 10.


  • Secure Dot Net Developer

  • The course will present security guidelines and considerations in .NET applications development. The participants will learn how to enforce security on a .NET application, using .NET crypto API and other security related issues. In addition, the course presents an overview of .NET's Security Framework, including authentication and authorization implementation.