Networking basics, Application development life-cycle, Security basics, Mobility and Internet of Things, Cloud, Virtualization, Exploits development, Vulnerability/Malware Samples, Reverse Engineering, Threats modeling, Advance Persistent Threats.
CORE LABS & HANDS-ON
Reverse Engineering, Malware Analysis, Malware Protection Signature, Secure Code Assessment, Binary Code Analysis, Static Analysis, Dynamic and Forensics Analysis, OS (Windows, Unix, Android, iOS) and Database Hardening, Network firewall and Application controls.
Enterprise IT Security, Mobility Security, Internet of Things (IoT) Security, Government Complaince & Audit Security, Telecom Security, Financial & Banking security, Security Standards OWASP, SANS. Information Security Management System (ISMS) 27001:2013
Speaker Series & Guest Lectures
The opportunity to interact with professionals drawn from both academia and the worlds of government, business and industry. Students can solidify their understanding of IT Security and also network with potential employers.
Advance Skilling & Training
Cybersecurity has emerged as one of the critical domain of global policies, products, services and competitions, with significant impacts on economic, political and military areas. The Internet of things, mobility and its related technologies integrate into nearly every aspect of society, business, and government, presenting opportunities for bad guys and adversaries to advance and to disrupt society and to gain un-ethical financial gains. As a result, governments and organizations continuously develop and evolve new operational doctrines, advanced cyberwarfare capabilities, security and risks assessment, risks detection and protection techniques and criminal tactics that threaten our information resources. This has generated the huge demand of skilled Security Analysts and Professionals for developing overall IT security roadmap of the organizations.
TO RESEARCH, ASSESS AND RESPOND ADVANCE RISKS & THREATS
ENABLES TO WORK ON SELF-INTEREST PROJECTS & CAREER OPPORTUNITIES
90 SESSIONS, 270 LIVE HRS, 20 PPTS, 20 DOCUMENTS, 10 TESTS & 10 ASSIGNMENTS
TO ACT AND MATURE AS A SPECIALISTS, LEADERS, CISSP & CCISO PROFESSIONALS
Watch Videos on Cybersecurity
Investment Return Calculation
Latest Vulnerability and Malware News
Researchers from anti-virus firm Dr.Web have discovered new malware designed to infect point-of-sale (PoS) terminals and capable of intercepting GET and POST requests sent from Web browsers on infected machines. Dubbed Trojan.MWZLesson, the Trojan can modify the registry branch in charge with autorun on the infected PoS terminals, while also being able to check the Read more about PoS Trojan steals card data and intercepts browser requests[…]
The Internet of Things Security Foundation (IoTSF), a collaborative initiative aimed at addressing concerns regarding the security of IoT, launched publicly in London this week. The foundation’s executive board includes security experts and several technology organizations, including BT, Vodafone, Imagination Technologies, Royal Holloway University of London, Copper Horse Solutions, Secure Thingz, NMI and PenTest Partners. Read more about IoT Security Foundation Launches[…]
Researchers have discovered a new piece of malware designed to target ATMs and allow malicious actors to quickly empty a machine’s cash vault. Stealing payment cards or card data can be lucrative for cybercriminals, but walking up to an ATM and commanding it to hand over all the money in its cash vault is much Read more about “GreenDispenser” ATM Malware Allows Attackers to Steal Cash[…]
ICS-CERT published advisories this week for a series of vulnerabilities affecting SCADA products from Resource Data Management, IBC Solar and EasyIO. The flaws detailed in ICS-CERT’s advisories were discovered and reported by security researcher Maxim Rupp. The expert has identified a couple of vulnerabilities in Data Manager, a web-based SCADA monitoring system made by energy Read more about Vulnerabilities Found in Several SCADA Products[…]
Russian Speaking “Turla” Cyber-espionage Group Exploits Satellites to Reach the Ultimate Level of Anonymity: Kaspersky Lab A group of Russian-speaking threat actors that have been active for more than 10 years have been hijacking satellite-based Internet links as a tactic to hide their whereabouts, Kaspersky Lab said Wednesday. Known as the Turla cyber-espionage group (also Read more about Russian-Speaking Turla Attackers Hijacking Satellite Internet Links[…]