CERTIFIED CYBER SECURITY SPECIALIST
Certcube certified cyber security specialist is a complete cyber security diploma program for those who want to learn each and every field of cybersecurity as per corporate demand . The training also help individuals to work in multiple area of cyber security . Its a power-packed training program which includes networking & Programming concepts in beginning phase .
This training covers all major cyber security domains including Network Security, Active directory Pentesting , Web Application Security, Mobile Application Security, IoT Exploitation & Security, SIEM Implementation & SOC operations, Cyber Forensics & Incident response and GRC in depth .
CYBER SECURITY PRE-REQUISITE
Before Getting into cyber security space its important to understand the Network Fundamentals and a structured approach to start into learn IT Security .
In Certified cyber security specialist training candidates will learn Cyber Laws , Global IT Security Standards and Frameworks , Essential Pentesting Methodologies and Procedures.
The module heavily focused on Deep Packet Level Understanding of network with Layered approach , TCP/IP protocol stack , Common Protocols, VPN & VLAN , Detailed Subnetting & Supernetting .
Candidate will learn the Deep inspection of packets with Wireshark , Windows Server Administration & Implementation .also we will deep dive into understanding the windows & Linux Architecture with Core command Fundamentals.
Basic cloud operations . Configuring instances and building networks over AWS and azure cloud .
WEB APPLICATION PENETRATION TESTING
Application Security Maintains the overall reputation of businesses . Certified information security professional training includes global WASC , CWE , OWASP Standard and related frameworks to perform the application security assessment.
Automation plays a key role in the modern application security . During this module we will explore the multiple corporate application security scanners and their robustness . It helps the enterprises to choose the best application security scanner for automated solution.
In The Web Application Security module students will learn various methods to conduct threat modelling , business logic testing , Black box and grey box approach to conduct a Security assessment of Various web technologies like ASP , PHP, web frameworks , API’s & Web Services .
At the end of this module candidate will learn product security with effective threat modelling and DevSecOps automation .
NETWORK PEnTESTING AND AUDITS
Network Security Module is focused with a systematic process to conduct an network assessment of Internal & External Infrastructure . From scope analysis to Post exploitation of Windows and Linux Servers , and Report Writing the candidate will understand the each and every segment in depth.
The Module also coverup the active directory pentesting with c2 – frameworks like metasploit and cobaltstrike .
Next , candidate will understand the WLAN 802.11 Family , Architecture level concepts of frames and beyond wireless assessment of WPA , WEP ,WPA2 , WPA3 ,Evil Twin ,Rouge Access Points.
Configuration Review & Baseline security also plays an importent role to defend an organization. Student will learn how to perform config reviews and audit of Wireless Networks , Web Server ,Database , Operating Systems , Servers , Switches , Firewalls & VPNs
SHELL SCRIPTING AND PYTHON PROGRAMMING
Programming Knowledge will add more benefits to understand the Working flow of applications and tools . In our certified cyber security specialist training candidates will learn module students will learn Shell Scripting and Python programming to make their own scripts and tools to automate the various tasks .
Candidate will learn enumeration of IoT Devices , Mapping attack surface , Radio Communication analysis , Analysing BLE packets and Sniffing into the BLE packets , SPI flash , UART & Serial Interfaces, Firmware analysis & reverse engineering , JTAG Essentials & Exploitation, COAP with Wireshark , IoT Web , Cloud and Mobile Application Insecurities
ISO 27001 - INTERNAL AUDIT AND POLICY DESIGN
ISMS is all about to protect the people , process , product and technology of an organisation via applying the correct controls and rules.Student will learn ISO 27001 foundation, business continuity management essentials and RISK assessment methodologies with checklist preparation and Documentation.
ANDROID AND IOS PENTESTING
In Certified cyber security specialist training candidates will learn Andriod Security module focuses on static and dynamic approach to perform assessment of android applications . Students will also learn business logic testing , Secure mobile application guideliness and report writing of Android applications.
IOS Security professional Module focuses on Static and Dynamic application security testing along with various test cases . Students will learn Vulnerable lab Setup , detailed approach to map the scope and decrypt the application data , analysis the vulnerabilities & finding the loopholes in the IOS applications.
DIGIAL FORENSIC INVESTIGATIONS
Cyber forensics Team work all together with incident response team to solve the root causes of the breach . We will start exploring a detailed approach to investigate a cybercrime & preparing a case . Multiple documentation and case preparation study will be focused in this domain .
In this module we will explore the legal issues in the forensics, chain of custody , Disk Imaging , hard drive forensics , live & dead forensics, Memory analysis to hunt the malwares .
Further we will explore browser , Network , Email, external devices forensics to solve the insider breach of an organisation .
SECURITY OPERATIONS AND INCIDENT RESPONSE
SOC module includes the SIEM operations and Incident response .In the begning of the module candidate will learn SOC principals & requirements in corporate industry ,we will learn most effective SIEM tool SPLUNK . The training covers SPLUNK fundamentals with Log base lining , SPLUNK console practices & monitoring . we will also focus on open source technologies like ELK and OSSIMM deployment for SIEM operations .
Next Part of this training focues on incident response and malware analysis approach to capture the APT adversary in the infrastructure .
who should attend this training?
- Freshers and students
- System Administrators
- Network Administrators
- Security Professionals
why should i take this training?
CCSS training is heavily focused on covering the most demanding areas of an dynamic pentester. The enterpises increasing businesses growing rapidly due to the modern IT culture . The demand of cyber security is also equally increasing at the same time .
The certified cyber security specialist training starts with focusing on building the offensive mindset to leran the overall infrastructure security at its best level.
Learn Network security , Active directory pentesting , web application security, mobile application security and IoT pentesting all together to build the solid base in the offensive operations .
We will equally explore Defensive security into this training including Cyber forensics & incident response and SOC operations .
At the end to become an expert into cyber security space we will explore GRC part to build the effective polices to reduce the overall attack surface . The offensive operations and Defensive security plays a key role in building the effective security policies with understanding the security compliances .
prerequisite of the training ?
The candidate should be familiar with basic computer operations
What is duration of the training ?
The total duration of the training is 8 months.
How the Sessions will be conducted ?
The training is in offline mode .The Candiate need to join the offline classroom sessions .
Finally a place to learn the real thing by the faculty that actually has real experience.
Knowledge with solid fundamental base and practical real-life experience and not YouTube tricks.
It doesn’t get better than this.
CCSS a course with real career-building content no BS just the real thing straight to the point.
This is a nice place to gain knowledge about hacking and defense. I have taken CCSS and CCEH courses and Gained a real-world experience. literally it was great..
We're Here To Help!
3500 , 1st Floor , Raja Park , New Delhi -110034 , India
WORKING Hours - isT
M-S : 10 AM - 7 PM