- Courses & Classes
- Institutes, Tutors & Colleges
View 38 courses from 9 providers |
Location
:- Mumbai
|
Active Filters : Category : IT Security and Ethical Hacking | Price (Fees) : Unknown | Delivery : Classroom | Mode : Regular | Provider Location : Mumbai
Course Content: Certified Information Security and Ethical Hacking(CISEH) certification is one of the most demanded certification by corporates worldwide. Designed by ethical hackers and security experts, the program covers all aspects of Ethical Hacking and Information Security which makes you an expert in the field of Information Security thereby bridging the gap between you and the market demands. With increas... Category: IT Security and Ethical Hacking | IT Certification | Pristine InfoSolutionsMumbai (Bhandup West) Pristine InfoSolutions is one of the leading IT services and Ethical Hacking training provider headquartered in Mumbai, India. Over the years we have ... |
Course Content: Certified Penetration Testing is the advanced level of Ethical Hacking in which the personnel evaluates security of IT network or corporate websites by simulating an attack from external threats and internal threats. This analysis is carried out from the position of a potential attacker and can involve active exploitation of security vulnerabilities. Security issues uncovered through the penetrati... Category: IT Security and Ethical Hacking | IT Certification | Pristine InfoSolutionsMumbai (Bhandup West) Pristine InfoSolutions is one of the leading IT services and Ethical Hacking training provider headquartered in Mumbai, India. Over the years we have ... |
Course Content: M Sc. IT-St. Angelo’s & SMU- FAQ’s 1) What is the tie-up between SMU and St. Angelo’s ? Ans. SMU is an open university offering various programs in Computer science, commerce, management, etc. and they appoint Learning Centers to execute their degree programs. St. Angelo’s Goregaon-E center has been approved as Learning Centers by SMU for offering degree programs in BCA... Category: IT Security and Ethical Hacking | MSc in Information Technology (IT) | Computer & Mobile Hardware | Database | + | St Angelo's Computer EducationMumbai (Kandivali West, Andheri West ...) St. Angelo's Professional Education (SAPE) is one of the leading Computer Education organisation in India. (SAPE) was established in the year 1993 and... |
Course Content: Secure a successful career in network security and ethical hacking. With the world becoming one big interconnected entity, network security has become one of the critical issues today. Ensuring that the enterprise network is secure from external as well as internal attacks and threats is a full-time job. In this course you will learn : Concepts of network security • Identifying threats and p... Category: IT Security and Ethical Hacking | JetkingMumbai (Khar West, Borivali West ...) Enjoying a leadership position in the IT and IMS training sector, we have trained more than 6,00,000 students who are constantly driving growth in the... |
Course Content: First Year Semester I Sr. No. Course Code Course Name 1 BT0062 Fundamentals of IT 2 BT0063 Mathematics for IT 3 BT0064 Logic Design 4 BT0065 C Programming and Data Structures – Theory 5 BT0066 Database Management System 6 BT0067 C Programming and Data Structures – Practical Semester II Sr. No. Course Code Course Name 1 BT0068 Computer Organization and Architecture 2 BT0069 Discrete Mat... Category: IT Security and Ethical Hacking | BSc in Information Technology (IT) | Programming | Database | Operating Systems | Networking | + | St Angelo's Computer EducationMumbai (Kandivali West, Andheri West ...) St. Angelo's Professional Education (SAPE) is one of the leading Computer Education organisation in India. (SAPE) was established in the year 1993 and... |
Course Content: Handle Network Security or become an Ethical Hacker The world has gone digital. All information is managed digitally across different platforms & networks. This not only provides ease of operation & allows you to operate and exchange information easily but it also brings along a big threat to your network's security. Network security is a grey area for lot of companies. In order to overcom... Category: IT Security and Ethical Hacking | Aptech Hardware & Networking AcademyMumbai (Andheri East, Andheri West ...) Aptech Hardware & Networking Academy is one of the training wings of Aptech Limited. Aptech, a global leader in IT education, has trained professi... |
Course Content: Develop Internet WiFi or other wireless networks. Handle Network Security The world is going digital and sharing information & operating across different platforms and networks has become easy. But it brings along a big threat to your network's security. Aptech's Smart Professional in Wireless Networking Program will advance your career & ensure that you have the required skills to success... Category: IT Security and Ethical Hacking | Networking | Aptech Hardware & Networking AcademyMumbai (Andheri East, Andheri West ...) Aptech Hardware & Networking Academy is one of the training wings of Aptech Limited. Aptech, a global leader in IT education, has trained professi... |
Course Content: Checkpoint Security Administrator R75 Course Overview Check Point Security Administrator provides an understanding of the basic concepts and skills necessary to configure Check Point Security Gateway and Management Software During this course you will configure a Security Policy and learn about managing and monitoring a secure network. In addition, you will upgrade and configure a Security Gateway... Category: IT Security and Ethical Hacking | NetworxxMumbai (Andheri West, Matunga East) Networxx aims to infuse brand new energy in the IT training & certifications domain by introducing world class and industry proven courses for pro... |
Course Content: Computer Hardware Maintenance: PC Architecture Motherboard, CPUs, RAM and SMPS Different Kind of Storage Display Cards, Add-on-Cards Memory System in computer Printers BIOS (settings) Building a CPU / Computer Assembling Upgrading PC components Network cable crimping Optimizing PC performance, preventive maintenance and safety Hardware Troubleshooting Operating Systems: Introduction to Operating S... Category: IT Security and Ethical Hacking | Computer & Mobile Hardware | Networking | Systems Administration | Operating Systems | VissicompMumbai (Andheri West) Visicomp Technology Pvt. Ltd From last 11 years has been imparting training from low end to high on software and hardware course with the highest Qual... |
Course Content: The growth in the software industry has automatically created a demand for skilled hardware and networking professionals. SAIG aims to fulfill this demand by equipping the students in skills, mapped to international certification standards. SAIG's practical based syllabus gives students that extra edge for becoming the 1st choice of recruiters. Module 1 : Computer (Desktop & Laptop) Assembling... Category: IT Security and Ethical Hacking | Computer & Mobile Hardware | Basic Computer Training | Networking | St Angelo's Computer EducationMumbai (Kandivali West, Andheri West ...) St. Angelo's Professional Education (SAPE) is one of the leading Computer Education organisation in India. (SAPE) was established in the year 1993 and... |
Course Content: This is an advanced level course on Cyber Security.. Category: IT Security and Ethical Hacking | Asian School of Cyber LawsMumbai (Churchgate) Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: This workshop is designed for business persons who use computers, the Internet, eCommerce, online banking and online share trading etc for commercial purposes. Topics include: • Cyber threats to your business • Hack-proofing your laptop and smartphone • Securing your website • Online Reputation Management • Cyber Law Availabil... Category: IT Security and Ethical Hacking | Computer & Technology Law | Asian School of Cyber LawsMumbai (Churchgate) Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: The primary law for data privacy in India is the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 issued by the Central Government in exercise of the powers conferred by clause (ob) of subsection (2) of section 87 read with section 43A of the Information Technology Act, 2000. The data privacy rules define sensitive persona... Category: IT Security and Ethical Hacking | Computer & Technology Law | Asian School of Cyber LawsMumbai (Churchgate) Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: Computer security incident response has become an important component of information technology (IT) programs. Security-related threats have become not only more numerous and diverse but also more damaging and disruptive. New types of security-related incidents emerge frequently. Preventative activities based on the results of risk assessments can lower the number of incidents, but not all inciden... Category: IT Security and Ethical Hacking | Asian School of Cyber LawsMumbai (Churchgate) Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: The Information Technology Act and its allied rules, regulations, orders etc impose several obligations on corporates. Failure to comply with these obligations may be penalized with fines, compensation and even imprisonment. The primary law for data privacy in India is the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 i... Category: IT Security and Ethical Hacking | Computer & Technology Law | Asian School of Cyber LawsMumbai (Churchgate) Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: Windows forensics relates to legal evidence found in computers and digital devices running the Windows operating system. The goal of Windows Forensics is to examine these digital devices in a forensically sound manner and identify, preserve, recover, analyze and present relevant evidence. Topics include: • Windows Disks, Files and Partitions • Windows Boot Sequence... Category: IT Security and Ethical Hacking | Asian School of Cyber LawsMumbai (Churchgate) Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: Linux forensics relates to legal evidence found in computers and digital devices running the Linux operating system. The goal of Linux Forensics is to examine these digital devices in a forensically sound manner and identify, preserve, recover, analyze and present relevant evidence. Topics include: • Linux Disks, Files and Partitions • Linux Boot Sequence • &... Category: IT Security and Ethical Hacking | Asian School of Cyber LawsMumbai (Churchgate) Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: Mac forensics relates to legal evidence found in computers and digital devices running the Macintosh operating system. The goal of Macintosh Forensics is to examine these digital devices in a forensically sound manner and identify, preserve, recover, analyze and present relevant evidence. Topics include: • Macintosh File Systems • Macintosh Operating Systems •... Category: IT Security and Ethical Hacking | Asian School of Cyber LawsMumbai (Churchgate) Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: In many cyber crime cases, the use of the Facebook platform and Facebook App for mobiles needs to be investigated. Facebook Forensics involves forensic analysis and investigation of various activities like instant chats, wall comments, group events etc. Topics include: • Facebook Protocol Format • Forensics on Common Facebook Activities • Facebook Fore... Category: IT Security and Ethical Hacking | Asian School of Cyber LawsMumbai (Churchgate) Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: Malware (malicious software) is designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to a computer system. In many cyber crime cases, the forensic analysis of malware is essential. Topics include: • Malware categories, Incident Prevention & Response • Volatile Data Collection & Examination on a Live Windows Syste... Category: IT Security and Ethical Hacking | Asian School of Cyber LawsMumbai (Churchgate) Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |