Arich Infotech
Facebook
Instagram
Pinterest
X-twitter
Linkedin
Youtube
Home
About Us
Services
Courses
Java
Dot Net Full Stack
Mainframe
Infra
Data Science
Cloud
AI – Artificial Intelligence
Data Base
Devops
Cyber Security
Java Basics
Java Full Stack
C#.NET
ASP.NET
ASP.NET WITH MVC
DOT NET CORE
ASP.NET CORE
ASP.NET CORE MVC n API
SQL SERVER
TSO/ISPF, JCL and VSAM
PL/1 Programming
COBOL Programming
IMS DB Programming
DB2 Programming
CICS Programming
ASSEMBLER Programming Basic
ASSEMBLER Programming Advanced
REXX Programming
z/OS Architecture, JES ..more
IPL, CATALOG,JES Basics
PARMLIB, SMF AND RMF
RACF, Console and Spool Monitoring
DB2 Administration
CICS Administration
Storage Administration
Network Administration
MQ Administration
IMS DB Administration
CA7
Messaging & Collaboration AND Networking Essentials
Windows 10 and Windows Server 2016
Automation and Analytics Tools
Core Database, Storage & Backup Concepts
LINUX with Power Shell Scripting
VM Ware, Hyper V with Middle Ware Concepts
DevOps Fundamentals
Cloud Fundamentals
DevOps Advanced Module
Ethical Hacking Concepts
Oracle Database Admin - Advanced
MS SQL Database Admin -
Advanced
Machine Learning Python
Statistical Method
Tableau
Machine Learning related to AI
Deep Learning related to AI
NLP with AI
R Programming
Microsoft Azure Solution Architect
Microsoft Azure Administrator
AZ-104
Microsoft Azure Devops
Microsoft Azure Developer AZ-204
Microsoft Azure Fundamentals
AZ-900
AWS Architect
AWS Development
AWS Data Engineer
AWS Machine Learning Engineer
AWS Certified Devops
Chat-GPT AI
Microsoft Azure - AI Fundamentals - AZ-900
AWS AI Practitioner
Microsoft SQL Server
MySQL DBA
MongoDB
Devops Basics & Advanced Concepts
GIT
Anisible
Docker
Puppet
Jenkins
Nagios
Kubernetes
Cyber Security
Careers
Blog
Events
Contact Us
Home
About Us
Services
Courses
Java
Dot Net Full Stack
Mainframe
Infra
Data Science
Cloud
AI – Artificial Intelligence
Data Base
Devops
Cyber Security
Java Basics
Java Full Stack
C#.NET
ASP.NET
ASP.NET WITH MVC
DOT NET CORE
ASP.NET CORE
ASP.NET CORE MVC n API
SQL SERVER
TSO/ISPF, JCL and VSAM
PL/1 Programming
COBOL Programming
IMS DB Programming
DB2 Programming
CICS Programming
ASSEMBLER Programming Basic
ASSEMBLER Programming Advanced
REXX Programming
z/OS Architecture, JES ..more
IPL, CATALOG,JES Basics
PARMLIB, SMF AND RMF
RACF, Console and Spool Monitoring
DB2 Administration
CICS Administration
Storage Administration
Network Administration
MQ Administration
IMS DB Administration
CA7
Messaging & Collaboration AND Networking Essentials
Windows 10 and Windows Server 2016
Automation and Analytics Tools
Core Database, Storage & Backup Concepts
LINUX with Power Shell Scripting
VM Ware, Hyper V with Middle Ware Concepts
DevOps Fundamentals
Cloud Fundamentals
DevOps Advanced Module
Ethical Hacking Concepts
Oracle Database Admin - Advanced
MS SQL Database Admin -
Advanced
Machine Learning Python
Statistical Method
Tableau
Machine Learning related to AI
Deep Learning related to AI
NLP with AI
R Programming
Microsoft Azure Solution Architect
Microsoft Azure Administrator
AZ-104
Microsoft Azure Devops
Microsoft Azure Developer AZ-204
Microsoft Azure Fundamentals
AZ-900
AWS Architect
AWS Development
AWS Data Engineer
AWS Machine Learning Engineer
AWS Certified Devops
Chat-GPT AI
Microsoft Azure - AI Fundamentals - AZ-900
AWS AI Practitioner
Microsoft SQL Server
MySQL DBA
MongoDB
Devops Basics & Advanced Concepts
GIT
Anisible
Docker
Puppet
Jenkins
Nagios
Kubernetes
Cyber Security
Careers
Blog
Events
Contact Us
Menu
Home
About Us
Services
Courses
Java
Dot Net Full Stack
Mainframe
Infra
Data Science
Cloud
AI – Artificial Intelligence
Data Base
Devops
Cyber Security
Careers
Blog
Events
Contact Us
Menu
Home
About Us
Services
Courses
Java
Dot Net Full Stack
Mainframe
Infra
Data Science
Cloud
AI – Artificial Intelligence
Data Base
Devops
Cyber Security
Careers
Blog
Events
Contact Us
Cyber Security
Home
Courses
Cyber Security
Cyber Security
Cyber Security
Duration in Hours : 30
Duration in Days: 15
Cyber Security
Course Code: CYBSS20CS
20 Hours of Theory
10 Hours Lab
Introduction to Cyber security & Ethical Hacking
Need of Cybersecurity
CIA Triad
Security Architecture
Security Governance
Security Auditing
Regulations & Frameworks
Ethical Hacking
Types of Hackers
Phases of Ethical Hacking
Penetration Testing
Types of Penetration Testing
Footprinting
Objectives of Footprinting
Types of Footprinting
Footprinting Techniques
Cryptography
Types of cryptography
Symmetric cryptography
Asymmetric cryptography
Hash functions
Digital signatures
Public Key Infrastructure (PKI)
Attacks on cryptosystems
Computer Networks & Security
Introduction to Computer Network
Computer Networks – Architecture
Layered architecture
Open Systems Interconnect (OSI) Model
Transmission Control Protocol/Internet Protocol (TCP/IP)
Network Scanning
Enumeration
Common Network Threats/Attacks
Application and Web Security
Web server architecture
Web server attacks
Countermeasures and patch management
Web application architecture
Web application attacks
IdAM (Identity and Access Management)
Authentication and authorization
Authentication and authorization principles
Regulation of access
Access administration
IdAM
Password protection
Identity theft
Need Help? Call Here
+91 88699 88399
COURSE ENQUIRY |
WhatsApp us