Information Security Training

Hands-On Training with real world simulations

Learn from the industry’s most experienced team of information security experts, they have done numerous penetration tests, published some great exploits, disclosed several vulnerabilities. All our training programs are practical and hands-on training, it’s less theory and more practice. At the end of the training, you can be sure to have acquired skills needed by the industry to secure the IT perimeter.

Sign Up

Regular training for individuals will start every first and last Monday of every month. It is recommended for students to reserve the slot at-least 2 weeks in advance. Its a complete hands-on training. Less theory more practice!

Practice Labs

Along with the training, you will receive an exercises book with 100+ exercises and downloadable offline labs which are highly recommended to be completed before appearing for the certification program.

Certifications

The certification exams are completely practical and are very challenging. Companies like to hire candidates who have proven skills on the ground. Our certifications are no less than a real scenarios which makes the industry trust us to deliver highly skill full candidates.

Our Courses

Penetration Testing – 101

The penetration testing program is like the “jack of all” skills but master of none! A good hacker must learn to experiment with everything – from trying new operating systems or applications to playing with electronics! In this program, you will learn how to overcome your fear with new technologies and explore them from the mindset of a hacker.

Penetration testing program intensely covers network and web application pentesting both of which are primary entry points of a cyber attack from small to large enterprises. It also allows you to audit and understand how vulnerable a network is. 

Sign Up Now
Target Auidence
  • Network Administrators
  • System Administrators
  • Security professionals
  • Geeks 🙂
Course Highlights
  • Offline Labs
  • 100+ Exercises
  • Offline Material 
  • 90 Day Support
Pre-Requisites
  • Networking concepts
  • Linux OS Usage
  • Basic Scripting Skills
  • OS and Web Concepts
Topics In Focus
  • Network Scanning
  • Vulnerability Hunting
  • Attacking Network Services
  • OWASP TOP 10 Vulns
  • System hacking
Web Application Penetration Testing

With increased information sharing through social networking and increasing business adoption of the Web as a means of doing business and delivering service, websites are often attacked directly. Hackers either seek to compromise the corporate network or the end-users accessing the website. As a result, industry is paying increased attention to the security of the web applications themselves in addition to the security of the underlying computer network and operating systems. The majority of web application attacks occur through cross-site scripting (XSS) and SQL injection attacks which typically result from flawed coding, and failure to sanitise input and output from the web application.

The goal of this specialty domain is to identify professionals with excellent skills in hacking, auditing and securing web applications.

While Penetration testing program covers basic web exploitation techniques, Web application penetration testing deals with in-depth analysis and testing of Vulnerabilities. It includes source code analysis, discovering of vulnerabilities and advanced application testing techniques.

Sign Up Now
Target Auidence
  • Web Application Developers
  • Security professionals
  • Geeks 🙂
Course Highlights
  • Offline Labs
  • 100+ Exercises
  • Offline Material 
  • 90 Day Support
Pre-Requisites
  • Web Application Languages
  • Linux OS Usage
  • Basic Scripting Skills (Js, Html, PHP)
Topics In Focus
  • XSS Attacks
  • SOAP Injections
  • Blind SQLi
  • Web Shells
Critical Information Infrastructure Penetration Testing

There is a difference in design & implementations of Commercial Enterprise deployments and Critical Infrastructure deployments. Critical Infrastructure like telecom, banking, Transport, Healthcare etc. are equally being attacked. Any major attack on CII not only causes financial and reputation loss but also creates havoc among citizens of the country.  This course specifically deals with technologies and differences in regular and special deployments like these and also talks about the best approaches to be taken while conducting penetration tests or audits.

The goal of this specialty domain is to identify professionals with excellent skills in hacking, auditing and securing critical infrastructure .

This is an advance program which requires the student to have prior experience in penetration testing and has knowledge of the critical infrastructure deployments. All hands-on labs exercises are performed on a simulated environment of real life CII deployments. 

Learn-More
Target Auidence
  • Security Professionals
  • Penetration testers
  • Geeks 🙂
Course Highlights
  • Offline Labs
  • 40+ Exercises
  • Offline Material 
  • 90 Day Support
Pre-Requisites
  • Certified Penetration Tester
  • Solid Programming Knowledge
  • Basic Understanding of CII deployments.
Topics In Focus
  • Social Engineering 
  • RFID Attacks
  • Impersonation Attacks
  • Browser Exploitation
Get Started

Browse through the following free resources on basics of computers and networking, for those who are absolutely new to this domain. While you may not be ready for this journey yet, you should be able to comeback  here a few weeks from now. Cheers 🙂

Intro To NetworksLinux Intro (Debian)Learn Programming ( python )