Tr ^ ining

Curriculum
designed to
get
you hired

We asked hundreds of top tech companies what specific skills they look for in candidates and then designed our live, remote programs to include learning activities that help you master each key skill.

Cybersecurity Professional

This course is mapped to the popular Cybersecurity Professional Certification Exam from US-Council.

The cybersecurity professional course provides comprehensive training in all aspects of cyber defense methodologies. This course covers the proactive defense mechanisms required of a cybersecurity professional including ethical hacking, firewalls, IPS, vulnerability assessment and cryptography. Vital cybersecurity reactive techniques are also discussed including SIEM, mobile and digital forensics, log analysis and patch management. This course consists of three modules viz

Security Risk Assessment (Ethical Hacking)
Proactive Defense and Countermeasures
Incident Response and Management

A thorough understanding of the underlying principles of networking and operating systems is a prerequisite to pursuing this advanced course. The student is expected to be knowledgeable in IP networks, TCP / IP stack, protocols like http, https, ICMP, ARP, services like DNS, DHCP, LDAP, telnet, ssh as well as routing protocols like RIP, EIGRP, BGP, etc. Expertise in Linux and Windows servers and related technologies is a must.

Key Topics:

Security Risk Assessment
Dos and DDos Attacks
Attack Mitigation Techniques
Firewalls, IDS, IPS
Cryptography
Incident Response and Management
Log Analysis
Forensics

The course will cover:

Module 1: Security Risk Assessment (Ethical Hacking)

Introduction to Ethical Hacking
Footprinting
Scanning
Proxy
Hacking Web Servers & Web Applications
Session Hijacking
Denial of Service
System Hacking
Sniffers
Phishing
Malware
Wireless Hacking
Kali Linux

Module 2: Proactive Defence and Countermeasures

Introduction to Security
Firewalls
Virtual Private Networks
Intrusion Prevention Systems
High Availability
Virtual / Cloud Devices Security
Host Security

Module 3: Incident Response and Management

SIEM
Incident Response
Mobile Forensics

Ethical Hacking and Prevention

This course is mapped to the popular Ethical Hacking and Prevention Certification Exam from US-Council.

In a span of 2 weeks, we take you from novice to expert in ethical hacking. This is the only course which teaches both hacking and counter measure techniques. This course is entirely hands on and real time oriented. And need we say the instructors are network security and intrusion specialists with several years of experience.

The Ethical Hacking and Prevention course is the ultimate word in ethical hacking training. It is periodically updated to meet the demands of the industry. To become certified, an ethical hacker needs to demonstrate his mastery over a range of security technologies and hacking techniques.

This course is meant for those professionals who are looking for comprehensive and total knowledge in the network security domain. Many courses have cropped up offering training in so-called “ethical hacking”. But these courses deal with only one half of the security equation. To build highly secure networks, professionals need to be aware of different methods of hacking and at the same time know how to make networks secure from these intrusions using firewalls, UTMs, antivirus, etc. This is the only course which teaches both hacking and countermeasure techniques.

The course will cover:

Introduction to Ethical Hacking
FootPrinting
Scanning
Hacking Web Servers & Web Applications
Session Hijacking
SQL Injection
Evading Firewalls, IDS & Honeypots
Buffer Overflow
Denial of Service
Cryptography
System Hacking
Sniffers
Malware
Wireless Hacking
Kali Linux
Penetration Testing
Counter Measure Techniques for Network level attacks
Counter Measure Techniques for Local Systems
Counter Measure Techniques for Malware Attacks

Penetration Testing Expert

This course is mapped to Network Penetration Testing Expert Certification Exam from US-Council.

The course is specifically designed for security professionals who want to become experts in network penetration testing. This course teaches the tools and techniques to test a network’s defense mechanisms and uncover any loopholes before they are breached by hackers. It covers penetration testing of routers, switches, firewalls, IDS / IPS as well as hosts and servers running on Windows and Linux.

The course will cover:

Introduction To Penetration Testing
Information Gathering
Pentesting Network Devices
Pentesting Windows Networks
Pentesting Linux Networks
Pentesting Mobile Application
Attacking Via The DMZ
Post Exploitation Techniques
Privilege Escalation
Keeping Access
Scenario Based Pentesting
Social Engineering Attacks
Anti-virus Evasion Techniques
Firewall and IDS Evasion

Salesforce

Salesforce Course Content

Admin Part:

Introduction to Salesforce Admin

Salesforce Classic vs Lightning Experience.

Organization Setup ( Company Profile , Salesforce User Interface, Salesforce Editions)

Salesforce Account Creation (User Setup)

Security Control Mechanism ( OWD, Role Hierarchy , Sharing Rule Mechanism)

User Access Control ( User Management, Profiles, Roles, Permission Sets, Apps)

Opportunities, Campaigns , Leads

Standard and Custom Objects ,Field Dependency , Controlling Field, Field Level Security

Email Templates,Workflow Process and Approval Process

Validation Rules .PageLayouts and RecordTypes

Import Data Wizard and Data Loader

Domain Management ,Formula Fields

Reports and Dashboards

Data Models and Data Management

Development Part:

Introduction to APEX Programming

Developer Console

Datatypes used in APEX Programming

Classes, Objects

Access Modifiers

Collections ( Lists,Sets, Maps)

Sobjects

Workbench

SOQL,SOSL

APEX Triggers

DML Operations

Email Programming

BatchAPEX Jobs

Visualforce Pages

APEX Components and APEX Input Components

Testing Methods

Arrays

Governor Limits in Salesforce

Database Class, Database.Query Locator

Software QA

Manual Content

Fundamentals
Introduction to Testing
Importance of software Testing
Principles of Software Testing
Psychology of Testing
SDLC models
Verification &Validation

Testing Techniques
Static Testing Techniques
Dynamic Testing Techniques

Levels of Testing
Unit Testing
Integration Testing
System Testing
Acceptance Testing

Initial Level Testing
Sanity Testing
Smoke Testing

Manual Testing Process
Test Initiation
Test Plan
Test Design (Test data preparation, Test case design)
Test Metrics
Test Execution
Defect Tracking Life Cycle(DTLC)
Bug Report
Test Closer
Manual Testing vs. Automation Testing

Selenium Content

Introduction
What is automation testing?
What is the use of automation testing?
What we need to Automate?
What is Selenium?
Advantages of Selenium

Different flavors’ in Selenium
IDE
Selenium RC
Selenium Web Driver/Selenium 3.0
Selenium-Grid

Java Introduction
Features of Java
Installing Eclipse
Project creation in eclipse
Packages
First java program
Data types & Variable
Operators
Control Statements
->IF Statement
->Switch Statement
->While Loop
->Do While Loop
->For Loop
->For each Loop
Arrays
Strings
Methods

Object Oriented Programming
Introduction
Class
Object
Inheritance
Polymorphism
Encapsulation
Abstraction
Interfaces
Packages

Selenium Web Driver
Architecture of selenium web driver
Downloading web driver Jars configuring in eclipse
Drivers for Firefox, IE and Chrome
First Program in Web driver
Execution and Debugging
Locators
Web Element Commands
Working with Textbox
Working with Radio buttons
Working with check box
Working with dropdowns
Browser Commands
Navigation Commands
Working with Alerts – windows and web
Working with Wait & Implicit Wait
Reading data from Property files
Working with Excel
Implementing Assertions
Working with multiple browsers
Capturing Screenshots
Handling Frames
Keyboard and mouse operations using Actions class
Writing X-path dynamically
Automation Frameworks (Modular, Data Driven, Keyword Driven)
Developing WebDriver scripts using Junit &Test NG Frameworks
Page Object Model (POM)
Maven & Jenkins Integration with Selenium

Selenium Grid
Introduction to Grid 2

AWS

Introduction to Cloud Computing
. A Short history
. Client Server Computing Concepts
. Challenges with Distributed Computing
. Introduction to Cloud Computing
. Why Cloud Computing?
. Benefits of Cloud Computing

Cloud Computing Deployment Models
. Private Cloud
. Public Cloud
. Hybrid Cloud

Cloud Delivery Models
. Software as a Service (SaaS)
. Platform as a Service(PaaS)
. Infrastructure as a Service (IaaS)

Introduction to AWS:
. Subscription to AWS
. AWS Free tier – Limits and usage
. Introduction to the AWS Management Console

Elastic Compute Cloud (EC2) Essentials
. Regions and Availability Zones – How to choose the right one
. Amazon Machine Images (AMI)
. Working with AMIs
. Choosing the right AMI
. Deciding what goes into an AMI
. Finding the right AMI
. Pricing model in EC2 instances
. Deciding between On-demand instances, Spot instances, Reserved instances, Scheduled Instances,

Dedicated Hosts
. EC2 Reserved Instance
. AWS Marketplace

EC2 Instances
. Building an EC2 Windows instance & Linux Instance
. Setting up security
. Security via Key Pairs
. Working with the Security Group
. Different IPs assigned to an EC2 instance
. Assigning Elastic IPs
. Logging into the instance
. Creating your own AMI/Registering your own AMI
. What is a placement group and advantages of placement groups
. EC2 instance protection
. User Data Management
. AWS Simple System Manager (SSM)

Elastic Block Store (EBS)
. Creating and deleting volumes
. Attaching and detaching volumes
. Mounting and Unmounting the attached volume
. Creating snapshots
. Increasing the volume size

Elastic Load Balancer (ELB)
. Creating a load balancer
. Internal Load balancer
. External Load balancer
. Load balancing protocols
. Security groups for the load balancer
. Configure health check for the load balancer
. Adding multiple instances to the load balancer
. Cross-zone load balancing
. Connection Draining

Auto Scaling:
. What is auto scaling?
. Autoscaling components
. Benefits of autoscaling
. Creation of launch configuration
. Configuration of autoscaling policies based on the Load on EC2 instances.
. Advantages of using Auto scaling with Elastic Load balancer (ELB).

Simple Storage Service (S3)
. Creating and deleting buckets
. Adding objects to buckets
. Getting objects
. Deleting objects
. Creation of a static website using S3 storage
. Uses of S3 storage
. Working with Permissions of S3.
. Life cycle management in S3
. Accessing S3 storage via Tools

Glacier Storage:
. Creating Vaults
. Accessing the Glacier vault using tools
. Using Glacier for backups
. Retrieval period

Identity and Access management (IAM)
. Creation of user accounts in AWS
. Setting up multi factor Authentication (MFA)
. Roles in IAM
. Groups in IAM
. Delegation of permissions for users
. Creation of custom policies for delegation
. Account settings
. Credential Report

Virtual Private Cloud (VPC)
. Different types of networks that can be setup in AWS
. Creating a new VPC
. ACL & Security Groups
. Creation of Internet Gateway
. Connecting to instances in the gateway

Cloudwatch
. Debugging cloud related issues
. Monitoring the AWS Service Health Dashboard
. Monitoring with Cloud watch
. Getting statistics for a specific EC2 instance
. Getting aggregated statistics
. Metrics for other AWS Services and related namespaces
. Setting up notifications

Simple Notification Services (SNS)
. Creation of a topic
. Subscribing to topic via Email
. Setting notification for EC2 instance changes

Simple Queue Service (SQS)
. Creation of a queue
. Sending messages to the queue
. Setting SNS to SQS
. Retrieving messages from SQS

Route 53:
. Route 53 Overview
. Setup internal DNS Namespace

. Creating different records in Route 53

Directory Services:
. Setup Active directory
. Adding EC2 instances to domain
. Overview of different directory services

Elastic Beanstalk
. Creation of Web apps using Elastic Beanstalk
. Environment overview
. Migrating content in different environments.
. Modifying the properties of the deployment.

Relational Database Service (RDS)
. Selecting the Engine
. Configuring the Database Engine
. Creating your Database
. Setting up automatic backups
. Authorizing access to the DB via DB Security Groups

Cloud Formation:
. Building AWS infrastructure as a code
. Utilization of Sample templates
. Introduction to JSON

Devops

INTRODUCTION TO DEVOPS
What is DevOps?
History of DevOps
What is Dev and Ops
DevOps definition
DevOps and Software Development Life Cycle
Build and release workflow
DevOps main objectives

GIT (SCM)
What is GIT ?
Installing Git for Windows
Basic Commands Overview
Diff b/w Git and Svn
Git stages
Creating Branches
Git merge and rebase
Backing Out Changes
Renaming and Moving Files & Deleting Files
Git Repository Setup
Git push, pull and fetch
Git Stash
Git Conflicts
Git fetch
How to use Github

MAVEN
Over view of Maven
Diff b/w Maven and Ant
How to install Maven in Windows and Linux
Maven Phases
Maven repositories
How to create .Jar, .war and .ear files
How to add dependency files
How to Deploy Executable files in Application Servers

JENKINS (CI/CD)
What is CI/CD
Introduction to Jenkins
History of Jenkins/Hudson
How to install Jenkins in Windows and Linux
How to create Jobs
Diff types of jobs
Working with Github
Working with Build tools
Build from Github Project
Managing Remote Systems with Jenkins
Parameterised Builds
Securing Jenkins
Scheduling Builds
How to install plugins in Jenkins
Setting up Different Types of Automated Builds
How to configure one job to another job
Configure Global Security Jenkins Administration
How to create maven type job
How to create ant type job
Scheduling build jobs
How to deploy code in servers
Authentication and Authorization
How to create Nodes in diff Servers
Most useful 20 plugins

TOMCAT
How to install Tomcat in windows
How to install Tomcat in Linux
How to deploy code in Tomcat
Deploying code by using Jenkins
SonarQube
What is SonarQube
How to Install SonarQube
Analyzing with Sonarqube scanner for Maven
Integrate Sonaqube with Jenkins

CHEF
Workflow of Chef
How to install Chef in Linux and Windows
What is Work-station, Chef-Server, Nodes
Servers and Nodes concept
Chef Configuration Concepts
Workstation Setup
Creating Cookbooks and uploading into server
How to use Ruby in Chef
About Bootstrap
How to manage Chef-Servers
Create roles
Add Roles to organization
How to Add Run list to Node
Check node Details
How to create Databags
Add Databags to organization
Create a server and add to organization
Check node details using knife
Create organization
Add yourself and node to organization
Adding nodes to Chef-Server
What is Puppet
What is diff b/w Puppet and chef

AWS

Introduction of cloud
Benfits of AWS
EC2
EBS
VPC
ELB
Auto scaling Group
IAM
AMI
Snapshots
Elastic ip

Virtulization
Docker

Learning the Basics of Docker
Introduction to Docker
Containers vs Virtual Machines
Docker Architecture
Docker Hub
Docker Installation
Creating Our First Image
Working with Multiple Images
Packaging a Customised Container
Running Container Commands with Docker
Managing and Removing Base Images
Pushing to Docker Hub
Creating Shared volume groups
Creat own images

LINUX and Shell Scripting

All basics of linux
How to create files, dir, and groups
How to change permisionsof files, dir, and groups How to create users
SSh
scp
Cron

Shell scripting
SonarQube

What is SonarQube
How to Install SonarQube
Analyzing with Sonarqube scanner for Maven
Integrate Sonaqube with Jenkins