icon
+91-8800955639, +91-9871700866, +91-8368840052
IAF
iso
ec-council certification
ec-council certification
ec-council certification
+918800955639, +919871700866, +918368840052

Need Help? call us free

IAF
iso

Cyber Security Course in Kolkata

Cyber Security Course in Kolkata

Rating on Cyber Security Course in Kolkata 4.9 out of 5 based on 4132 Students ratings.
Course Summary

Do you aspire to become a Cyber Security professional? Cyber security has never been straightforward and since attacks evolve each day as attackers become a lot of creative, it's vital to properly outline cyber security and determine what constitutes sensible cyber security. Cyber-security is that the apply of defensive computers, servers, mobile devices, electronic analytic thinking, networks, and knowledge from malicious attacks. it is also referred to as data technology security or electronic data security. The term applies during a form of contexts, from business to mobile computing, and may be divided into some common classes.

Cyber Security

• Network security : is that the apply of securing a electronic network from intruders, whether or not targeted attackers or opportunist malware.

• Application security : focuses on keeping computer code and devices freed from threats. A compromised application might offer access to the info its designed to safeguard. in security begins within the style stage, well before a program or device is deployed.

• Information security : protects the integrity and privacy of information, each in storage and in transit.

• Operational security : includes the processes and selections for handling and protective knowledge assets. The permissions users have once accessing a network and therefore the procedures that confirm however and wherever knowledge is also keep or shared all represent this umbrella.

• Disaster recovery and business : continuity outline however a corporation responds to a cyber-security incident or the other event that causes the loss of operations or knowledge. Disaster recovery policies dictate however the organization restores its operations and knowledge to come to constant in operation capability as before the event. Business continuity is that the set up the organization falls back on whereas making an attempt to control while not sure resources.

• End-user education : addresses the foremost unpredictable cyber-security factor: individuals. Anyone will accidentally introduce a plague to associate degree otherwise bond certificate system by failing to follow smart security practices. Teaching users to delete suspicious email attachments, not infix unidentified USB drives, and numerous different necessary lessons is significant for the safety of any organization.

Your search for Best Cyber Security Course in Kolkata ends with GICSEH.GICSEH is among the leading Cyber Security training Institute in Kolkata where you can excel on Cyber Security concepts with live training module.

Eligibility Criteria for Cyber Security Training in Kolkata
There are no such eligibility criteria for to join Cyber Security training but it is recommended to have good computer knowledge in order to excel the Cyber Security concepts.


ECSA (Syllabus or Outline)
Module 1 (Core Modules)

Segment 1 (Security Analysis and Penetration Testing & Implementation Methodologies)
Segment 2 (TCP IP Packet Analysis)
Segment 3 (Pre-penetration Testing & Implementation Steps)
Segment 4 (Information Gathering Methodology)
Segment 5 (Vulnerability Analysis)
Segment 6 (External Network Penetration Testing & Implementation Methodology)
Segment 7 ( Internal Network Penetration Testing & Implementation Methodology)
Segment 8 (Firewall Penetration Testing & Implementation Methodology)
Segment 9 ( IDS Penetration Testing & Implementation Methodology)
Segment 10 ( Web Application Penetration Testing & Implementation Methodology)
Segment 11 (SQL Penetration Testing & Implementation Methodology)
Segment 12 (Database Penetration Testing & Implementation Methodology)
Segment 13 (Wireless Network Penetration Testing & Implementation Methodology)
Segment 14 (Mobile Devices Penetration Testing & Implementation Methodology)
Segment 15 (Cloud Penetration Testing & Implementation Methodology)
Segment 16 (Report Writing and Post Test Actions)

Segment 1 (Password Cracking Penetration Testing)
Segment 2 (Router and Switches Penetration Testing)
Segment 3 (Denial-of-Service Penetration Testing)
Segment 4 (Stolen Laptop, PDAs and Cell Phones Penetration Testing)
Segment 5 (Source Code Penetration Testing)
Segment 6 (Physical Security Penetration Testing)
Segment 7 (Surveillance Camera Penetration Testing)
Segment 8 (VoIP Penetration Testing)
Segment 9 (VPN Penetration Testing)
Segment 10 (Virtual Machine Penetration Testing)
Segment 11 (War Dialing)
Segment 12 (Virus and Trojan Detection)
Segment 13 (Log Management Penetration Testing
Segment 14 (File Integrity Checking)
Segment 15 (Telecommunication and Broadband Communication Penetration Testing)
Segment 16 (Email Security Penetration Testing)
Segment 17 (Security Patches Penetration Testing)
Segment 18 (Data Leakage Penetration Testing)
Segment 19 (SAP Penetration Testing)
Segment 20 (Standards and Compliance)
Segment 21 (Information System Security Principles)
Segment 22 (Information System Incident Handling and Response)
Segment 23 (Information System Auditing and Certification)



Syllabus for CHFI


Segment 1 (Forensics and Investigation Science)
Segment 2 (Computer Forensics)
Assignment1 (Security Incident Report)
Assignment2 (Aspects of Organizational Security)
Assignment3 (Evolution of Computer Forensics)
Assignment4 (Objective of Computer Forensics)
Assignment5 (Need for Compute Forensics)

Segment 3 (Forensics and Investigation Readiness)
Assignment1 (Benefits of Forensics and Investigation Readiness)
Assignment 2 (Goals of Forensics and Investigation Readiness)
Assignment 3 (Forensics and Investigation Readiness Planning)

Segment 4 (Cyber Crime)
Assignment4 (Computer Facilitated Crimes)
Assignment5 (Modes of Attacks)
Assignment6 (Examples of Cyber Crime)
Assignment7 (Types of Computer Crimes)
Assignment8 (Cyber Criminals)
Assignment9 (Organized Cyber Crime: Organizational Chart)
Assignment9 (How Serious are Different Types of Incidents?)
Assignment10 (Disruptive Incidents to the Business)
Assignment11 (Cost Expenditure Responding to the Security Incident)

Segment 5 (Cyber Crime Investigation)
Assignment1 (Key Steps in Forensics and Investigation Investigation)
Assignment2 (Rules of Forensics and Investigation Investigation)
Assignment3 (Need for Forensics and Investigation Investigator)
Assignment4 (Role of Forensics and Investigation Investigator)
Assignment5 (Accessing Computer Forensics and Investigation Resources)
Assignment6 (Role of Digital Evidence)

Segment 6 (Corporate Investigations)
Assignment1 (Understanding Corporate Investigations)
Assignment2 (Approach to Forensics and Investigation Investigation: A Case Study)
Assignment3 (Instructions for the Forensic Investigator to Approach the Crime Scene)
Assignment4 (Why and When Do You Use Computer Forensics?)
Assignment5 (Enterprise Theory of Investigation (ETI))
Assignment6 (Legal Issues)
Assignment7 (Reporting the Results)

Segment 7 (Reporting a Cyber Crime)
Assignment1 (Why you Should Report Cybercrime?)
Assignment2 (Reporting Computer-Related Crimes)
Assignment3 (Person Assigned to Report the Crime)
Assignment4 (When and How to Report an Incident?)
Assignment5 (Who to Contact at the Law Enforcement?
Assignment6 (Federal Local Agents Contact)
Assignment7 (More Contacts)
Assignment8 (CIO Cyberthreat Report Form)

Segment 1 (Investigating Computer Crime)
Assignment1 (Before the Investigation)
Assignment2 (Build a Forensics and Investigation Workstation)
Assignment3 (Building the Investigation Team)
Assignment4 (People Involved in Computer Forensics)
Assignment5 (Review Policies and Laws)
Assignment6 (Forensics and Investigation Laws)
Assignment7 (Notify Decision Makers and Acquire Authorization)
Assignment8 (Risk Assessment)
Assignment9 (Build a Computer Investigation Toolkit)

Segment 2 (Steps to Prepare for a Computer Forensics and Investigation Investigation)
Segment 3 (Computer Forensics and Investigation Investigation Methodology)

Segment 4 (Obtain Search Warrant)
Assignment1 (Example of Search Warrant)
Assignment2 (Searches Without a Warrant)

Segment 5 (Evaluate and Secure the Scene
Assignment3 (Forensics and Investigation Photography)
Assignment4 (Gather the Preliminary Information at the Scene)
Assignment5 (First Responder)

Segment 6 (Collect the Evidence)
Assignment1 (Collect Physical Evidence)
Assignment2 (Evidence Collection Form)
Assignment3 (Collect Electronic Evidence)
Assignment4 (Guidelines for Acquiring Evidence)
Assignment5 (Secure the Evidence)
Assignment6 (Evidence Management)
Assignment7 (Chain of Custody)
Assignment8 (Chain of Custody Form)
Assignment9 (Acquire the Data)
Assignment10 (Duplicate the Data (Imaging))
Assignment11 (Verify Image Integrity)
Assignment12 (MD5 Hash Calculators: HashCalc, MD5 Calculator and HashMyFiles)
Assignment13 (Recover Lost or Deleted Data)
Assignment14 (Data Recovery Software)
Assignment15 (Analyze the Data)
Assignment16 (Data Analysis)
Assignment17 (Data Analysis Tools)
Assignment18 (Assess Evidence and Case)
Assignment19 (Evidence Assessment)
Assignment20 (Case Assessment)
Assignment21 (Processing Location Assessment)
Assignment22 (Best Practices to Assess the Evidence)
Assignment23 (Prepare the Final Report)
Assignment24 (Documentation in Each Phase)
Assignment25 (Gather and Organize Information)
Assignment26 (Writing the Investigation Report)
Assignment27 (Sample Report)
Assignment28 (Testifying as an Expert Witness)
Assignment29 (Expert Witness)
Assignment30 (Testifying in the Court Room)
Assignment31 (Closing the Case)
Assignment32 (Maintaining Professional Conduct)
Assignment33 (Investigating a Company Policy Violation)
Assignment34 (Computer Forensics and Investigation Service Providers)

Segment 1 (Searching and Seizing Computers without a Warrant)
Segment 2 (A: Fourth Amendment's "Reasonable Expectation of Privacy" in Cases Involving Computers: General Principles)
Segment 3 (Reasonable Expectation of Privacy in Computers as Storage Devices)
Segment 4 (Reasonable Expectation of Privacy and Third-Party Possession)
Segment 5 (Private Searches)
Segment 6 (Use of Technology to Obtain Information)
Segment 7 (Exceptions to the Warrant Requirement in Cases Involving Computers)
Segment 8 (Consent)
Segment 9 (Scope of Consent)
Segment 10 (Third-Party Consent)
Segment 11 (Implied Consent)
Segment 12 (Exigent Circumstances)
Segment 13 (Plain View)
Segment 14 (Search Incident to a Lawful Arrest)
Segment 15 (Inventory Searches)
Segment 16 (Border Searches)
Segment 17 (International Issues)
Segment 18 (Special Case: Workplace Searches)
Segment 19 (Private Sector Workplace Searches)
Segment 20 (Public-Sector Workplace Searches)
Segment 21 (Searching and Seizing Computers with a Warrant)
Segment 22 (Successful Search with a Warrant)
Segment 23 (Basic Strategies for Executing Computer Searches)
Segment 24 (When Hardware is itself Contraband, Evidence, or an Instrumentality or Fruit of Crime)
Segment 25 (When Hardware is Merely a Storage Device for Evidence of Crime)
Segment 26 (The Privacy Protection Act)
Segment 27 (The Terms of the Privacy Protection Act)
Segment 28 (Application of the PPA to Computer Searches and Seizures)
Segment 29 (Civil Liability Under the Electronic Communications Privacy Act (ECPA)
Segment 30 (Considering the Need for Multiple Warrants in Network Searches)
Segment 31 (No-Knock Warrants)
Segment 32 (Sneak-and-Peek Warrants)
Segment 33 (Privileged Documents)
Segment 34 (Drafting the Warrant and Affidavit)
Segment 35 (Accurately and Particularly Describe the Property to be Seized in the Warrant and/or Attachments to the Warrant)
Segment 36 (Defending Computer Search Warrants Against Challenges Based on the Description of the "Things to Be Seized")
Segment 37 ( Establish Probable Cause in the Affidavit)
Segment 38 (In the Affidavit Supporting the Warrant, include an Explanation of the Search Strategy as Well as the Practical & Legal Considerations that Will Govern the Execution of the Search)
Segment 39 (Post-Seizure Issues)
Segment 40 (Searching Computers Already in Law Enforcement Custody)
Segment 41 (The Permissible Time Period for Examining Seized Computers)
Segment 42 ( Rule 41(e) Motions for Return of Property)
Segment 43 (The Electronic Communications Privacy Act)
Segment 44 (Providers of Electronic Communication Service vs. Remote Computing Service)
Segment 45 (Classifying Types of Information Held by Service Providers)
Segment 46 (Compelled Disclosure Under ECPA)
Segment 47 (Voluntary Disclosure)
Segment 48 (Working with Network Providers)
Segment 49 (Electronic Surveillance in Communications Networks)
Segment 50 (Content vs. Addressing Information)
Segment 51 (The Pen/Trap Statute, 18 U.S.C. §§ 3121-3127)
Segment 52 (The Wiretap Statute ("Title III"), 18 U.S.C. §§ 2510-2522)
Segment 53 (Exceptions to Title III)
Segment 54 (Remedies For Violations of Title III and the Pen/Trap Statute)
Segment 55 (Evidence)
Segment 56 (Authentication)
Segment 57 (Hearsay)
Segment 58 (Other Issues)

Segment 1 (Digital Data)
Assignment1 - Definition of Digital Evidence
Assignment2 - Increasing Awareness of Digital Evidence
Assignment2 - Challenging Aspects of Digital Evidence
Assignment3 (The Role of Digital Evidence)
Assignment4 ( Characteristics of Digital Evidence)
Assignment5 (Fragility of Digital Evidence)
Assignment6 (Anti-Digital Forensics and Investigation (ADF))

Segment 2 (Types of Digital Data)
Assignment1 (Types of Digital Data)

Segment 3 (Rules of Evidence)
Assignment1 (Rules of Evidence)
Assignment2 (Best Evidence Rule)
Assignment3 (Federal Rules of Evidence)
Assignment4 (International Organization on Computer Evidence (IOCE))
Assignment5 (IOCE International Principles for Digital Evidence)
Assignment6 (Scientific Working Group on Digital Evidence (SWGDE))
Assignment7 (SWGDE Standards for the Exchange of Digital Evidence)

Segment 4 (Electronic Devices: Types and Collecting Potential Evidence)
Assignment1 (Electronic Devices: Types and Collecting Potential Evidence)
Assignment2 (Digital Evidence Examination Process)

Segment 1 (Evidence Assessment)
Assignment1 (Prepare for Evidence Acquisition)

Segment 2 (Evidence Acquisition)
Assignment2 (Preparation for Searches)
Assignment3 (Seizing the Evidence)
Assignment4 (Imaging)
Assignment5 (Bit-Stream Copies)
Assignment6 (Write Protection)
Assignment7 (Evidence Acquisition)
Assignment8 (Evidence Acquisition from Crime Location)
Assignment9 (Acquiring Evidence from Storage Devices)
Assignment10 (Collecting Evidence)
Assignment11 (Collecting Evidence from RAM)
Assignment12 (Collecting Evidence from a Standalone Network Computer)
Assignment13 (Chain of Custody)
Assignment14 (Chain of Evidence Form)

Segment 3 (Evidence Preservation)
Assignment1 (Preserving Digital Evidence: Checklist)
Assignment2 (Preserving??Removable Media)
Assignment3 (Handling Digital Evidence)
Assignment4 (Store and Archive)
Assignment5 (Digital Evidence Findings)

Segment 4 (Evidence Examination and Analysis)
Assignment1 (Evidence Examination)
Assignment2 (Physical Extraction)
Assignment3 (Logical Extraction)
Assignment4 (Analyze Host Data)
Assignment5 (Analyze Storage Media)
Assignment6 (Analyze Network Data)
Assignment7 (Analysis of Extracted Data)
Assignment8 (Timeframe Analysis)
Assignment9 (Data Hiding Analysis)
Assignment10 (Application and File Analysis)
Assignment11 (Ownership and Possession)

Segment 5 (Evidence Documentation and Reporting)
Assignment1 (Documenting the Evidence)
Assignment2 (Evidence Examiner Report)
Assignment3 (Final Report of Findings)
Assignment4 (Computer Evidence Worksheet)
Assignment5 (Hard Drive Evidence Worksheet)
Assignment6 (Removable Media Worksheet)

Segment 6 (Electronic Crime and Digital Evidence Consideration by Crime Category)
Assignment7 (Electronic Crime and Digital Evidence Consideration by Crime Category)

Segment 1 (Electronic Evidence)
Segment 2 (First Responder)
Segment 3 (Roles of First Responder)
Segment 4 (Electronic Devices: Types and Collecting Potential Evidence)

Segment 5 (First Responder Toolkit)
Assignment1 (First Responder Toolkit)
Assignment2 (Creating a First Responder Toolkit)
Assignment3 (Evidence Collecting Tools and Equipment)

Segment 6 (First Response Basics)
Assignment1 (First Response Rule)
Assignment2 (Incident Response: Different Situations)
Assignment3 (First Response for System Administrators)
Assignment4 (First Response by Non-Laboratory Staff)
Assignment5 (First Response by Laboratory Forensics and Investigation Staff)

Segment 7 (Securing and Evaluating Electronic Crime Scene)
Assignment1 (Securing and Evaluating Electronic Crime Scene: A Checklist)
Assignment2 (Securing the Crime Scene)
Assignment3 (Warrant for Search and Seizure)
Assignment4 (Planning the Search and Seizure)
Assignment5 (Initial Search of the Scene)
Assignment6 (Health and Safety Issues)

Segment 8 (Conducting Preliminary Interviews)
Assignment1 (Questions to Ask When Client Calls the Forensic Investigator)
Assignment2 (Consent)
Assignment3 (Sample of Consent Search Form)
Assignment4 (Witness Signatures)
Assignment5 (Conducting Preliminary Interviews)
Assignment6 (Conducting Initial Interviews)
Assignment7 (Witness Statement Checklist)

Segment 9 (Documenting Electronic Crime Scene)
Assignment1 (Documenting Electronic Crime Scene)
Assignment2 (Photographing the Scene)
Assignment3 (Sketching the Scene)
Assignment4 (Video Shooting the Crime Scene)

Segment 10 (Collecting and Preserving Electronic Evidence)
Assignment1 (Collecting and Preserving Electronic Evidence)
Assignment2 (Order of Volatility)
Assignment3 (Dealing with Powered On Computers)
Assignment4 (Dealing with Powered Off Computers)
Assignment5 (Dealing with Networked Computer)
Assignment6 (Dealing with Open Files and Startup Files)
Assignment7 (Operating System Shutdown Procedure)
Assignment8 (Computers and Servers)
Assignment9 (Preserving Electronic Evidence)
Assignment10 (Seizing Portable Computers)
Assignment11 (Switched On Portables)
Assignment12 (Collecting and Preserving Electronic Evidence)

Segment 11 (Packaging and Transporting Electronic Evidence)
Assignment1 (Evidence Bag Contents List)
Assignment2 (Packaging Electronic Evidence)
Assignment3 (Exhibit Numbering)
Assignment4 (Transporting Electronic Evidence)
Assignment5 (Handling and Transportation to the Forensics and Investigation Laboratory)
Assignment6 (Storing Electronic Evidence)

Course Features

  • Duration : 40 Hours
  • Lectures : 20
  • Quiz : 10
  • Students : 15

You may like

The Cyber Security Importance


With such a lot of our daily lives conducted on-line of late, it’s astounding that the problem of cyber security isn't additional mentioned. solely often will the problem come back up in national consciousness, sometimes throughout a celeb photograph leak or a breach of political security. However, common cyber-crime is far additional current than these occasional headlines recommend. Every day, cyber criminals victimize those that look, bank and send or receive cash on-line. And the unhappy truth is that few of those criminals are often represented as specialists or masterminds. the dearth of awareness regarding cyber security makes the majority a straightforward target for anyone attempting to hack into their personal information.

Cyber Security Jobs in India
Cyber Security is a vast field with numerous career opportunities and continuous growth. A Cyber Security certified candidate can seek a good career as a:
• Security Analyst.
• Security Engineer.
• Security Architect.
• Security Administrator.
• Security Software Developer.
• Cryptographer.
• Cryptanalyst.
• Security Consultant.

Why GICSEH to Become Certified Cyber Security Professional?

Learning Cyber Security Concepts with GICSEH is incredibly advantageous as compared to inscribe with the other regular institute due to below factors:

• We have well-defined business customary learning course module
• We have a team of extremely old Cyber Security and security professionals having over ten years of expertise in relevant area
• At GICSEH, you may get comprehensive coaching with live sessions
• We assure you complete help in placement when the certification
• We have good network labs with all premium Cyber Security tools
• Our friendly work culture and learning setting
• We have tailored schedule of coaching sessions as per the requirement of the scholars

Make Your Career as a Cyber Security Professional
Cyber security professionals, or info security analysts, have a good vary of responsibilities, however the crux of their job is to guard on-line knowledge type being compromised. As a lot of our personal info is hold on on-line, a lot of necessary it becomes to accelerate security. Cyber security careers are complicated and lots of roles are often found with banks, retailers and government organizations. On the job, you can do expect to safeguard associate degree organization's files and network, install firewalls, produce security plans and monitor activity. If a breach happens, you will be to blame for distinctive the matter and finding an answer quickly.

If you wish to learn real Cyber Security Course in Kolkata and enroll yourself in Cyber Security Training then, contact Cyber Security experts at GICSEH and take a step ahead towards a brighter future.