Cybersecurity Internship Program

soc
networksecurity
cyber security
ceh
chfi
previous arrow
next arrow

We are the leading cybersecurity company providing Internship program. After completion of internship we help place our interns to top cybersecurity companies.

Our training focus on:

1. Cyber Security Analyst
2. Network Security Analyst
3.Vulnerability Assessment Analyst
4. Penetration Testing Analyst
5. Security Audit & Compliance Analyst
6. Data Security Analyst
7. Identity & Access Management Analyst
8. Malware Analyst
9. Digital Forensic Analyst
cybershieldtechnologies.in
cybershieldtechnologies.in
cybershieldtechnologies.in
cybershieldtechnologies.in

Course Details

SOC Analyst Program

cybershieldtechnologies.in

Course Fee - 10000 Duration - 30 days

A cybersecurity analyst course is designed to equip individuals with the skills and knowledge needed to effectively monitor, detect, analyze, and respond to cyber threats and security incidents within an organization’s network and systems.

Introduction to Cybersecurity: An overview of cybersecurity principles, concepts, and terminology.

  1. Cyber Threat Landscape: Understanding the current threat landscape, including common attack vectors, threat actors, and motivations.

  2. Security Operations Center (SOC) Functions: An overview of the roles and responsibilities of a Security Operations Center (SOC) and the various tools and technologies used in SOC environments.

  3. Security Monitoring and Intrusion Detection: Techniques for monitoring network traffic, logs, and other security data to identify potential security incidents and intrusions.

  4. Security Information and Event Management (SIEM): Introduction to SIEM systems and their role in aggregating, correlating, and analyzing security event data from various sources.

  5. Incident Response: Procedures and best practices for responding to security incidents, including incident triage, containment, eradication, and recovery.

  6. Vulnerability Management: Techniques for identifying, prioritizing, and mitigating vulnerabilities in systems and applications.

  7. Threat Intelligence: Understanding threat intelligence sources, feeds, and platforms, and how to leverage threat intelligence to enhance security operations.

  8. Malware Analysis: Introduction to malware analysis techniques for identifying and analyzing malicious software.

  9. Network Security: Understanding network security principles and technologies, including firewalls, intrusion detection/prevention systems, and secure network architectures.

  10. Endpoint Security: Techniques for securing endpoints (e.g., desktops, laptops, servers) and detecting and responding to endpoint security threats.

  11. Security Incident Handling and Reporting: Procedures for documenting and reporting security incidents, including incident reports and post-incident reviews.

  12. Compliance and Regulatory Requirements: Overview of relevant cybersecurity laws, regulations, and industry standards (e.g., GDPR, PCI DSS, HIPAA).

  13. Ethical and Legal Considerations: Understanding the ethical and legal implications of cybersecurity practices, including privacy, data protection, and intellectual property rights.

Network Security Analyst

cybershieldtechnologies.in

Course Fee - 10000 Duration - 30 days

Network Security analyst course is designed to focuses on providing the knowledge and skills necessary to protect and secure computer networks from various cyber threats

Introduction to Network Security

  1. Fundamentals of Networking: Understanding the basics of computer networks, including networking protocols, devices (routers, switches, firewalls), and network architectures (LANs, WANs, VPNs).

  2. Network Security Principles: Introduction to network security concepts, such as confidentiality, integrity, availability (CIA triad), and the principles of defense-in-depth and least privilege.

  3. Common Network Attacks: Overview of common network-based attacks, including malware, phishing, denial-of-service (DoS), distributed denial-of-service (DDoS), man-in-the-middle (MitM), and SQL injection.

  4. Security Protocols and Technologies: Understanding security protocols and technologies used to secure network communications, such as IPsec, SSL/TLS, VPNs, and SSH.

  5. Firewalls and Intrusion Detection/Prevention Systems (IDS/IPS): Introduction to firewall technologies and intrusion detection/prevention systems, including their role in network security and common configuration techniques.

  6. Network Access Control (NAC): Understanding NAC solutions and their role in controlling access to network resources based on user identity and compliance with security policies.

  7. Virtualization and Cloud Security: Overview of security considerations and best practices for securing virtualized environments and cloud-based services.

  8. Wireless Network Security: Techniques for securing wireless networks, including Wi-Fi encryption, authentication methods, and the use of wireless intrusion detection/prevention systems (WIDS/WIPS).

  9. Network Traffic Analysis: Introduction to network traffic analysis tools and techniques for monitoring and analyzing network traffic to detect anomalies and potential security incidents.

  10. Network Forensics: Understanding network forensics principles and techniques for investigating security incidents and gathering evidence from network traffic.

  11. Security Information and Event Management (SIEM): Overview of SIEM systems and their role in collecting, analyzing, and correlating security event data from various sources.

  12. Security Policies and Procedures: Understanding the importance of security policies, procedures, and standards in ensuring the effective implementation of network security controls.

  13. Incident Response and Disaster Recovery: Procedures and best practices for responding to security incidents and recovering from network disruptions or data breaches.

  14. Ethical and Legal Considerations: Understanding the ethical and legal implications of network security practices, including privacy laws, data protection regulations, and intellectual property rights

Certified Ethical Hacker Course

cybershieldtechnologies.in

Course Fee - 10000 Duration - 30 days

The Certified Ethical Hacker (CEH) certification is a popular credential for professionals in the field of cybersecurity. It’s aimed at individuals who want to demonstrate their skills in identifying vulnerabilities and weaknesses in computer systems and networks, with the goal of improving overall security.

CEH course:

  1. Introduction to Ethical Hacking: An overview of ethical hacking principles, methodologies, and best practices.
  2. Footprinting and Reconnaissance: Techniques for gathering information about a target system or network.
  3. Scanning Networks: Using tools and methods to identify active hosts, ports, and services on a network.
  4. Enumeration: Techniques for discovering and gathering information about users, shares, and other resources on a network.
  5. System Hacking: Methods for gaining unauthorized access to computer systems, including password cracking and privilege escalation.
  6. Malware Threats: Understanding different types of malware and how they can be used in attacks.
  7. Sniffing: Techniques for intercepting and analyzing network traffic.
  8. Social Engineering: Exploiting human psychology to gain unauthorized access to systems or information.
  9. Denial of Service (DoS) Attacks: Methods for disrupting or disabling network services.
  10. Session Hijacking: Taking control of an established session between a client and server.
  11. Web Server Hacking: Exploiting vulnerabilities in web servers and web applications.
  12. Wireless Network Security: Securing wireless networks and identifying common vulnerabilities.
  13. Cryptography: Understanding encryption algorithms, digital signatures, and other cryptographic techniques.

Certfied Forensic Analyst

cybershieldtechnologies.in

Course Fee - 10000 Duration - 30 days

The Computer Hacking Forensic Investigator (CHFI) certification is geared towards professionals involved in investigating cybercrimes, including law enforcement personnel, system administrators, security officers, and anyone interested in the field of digital forensics. The CHFI course equips individuals with the necessary skills and knowledge to effectively respond to cyber incidents and conduct forensic investigations.

  1. Introduction to Forensic Investigation: An overview of digital forensics, including its role in cybercrime investigations and the legal aspects of digital evidence.
  2. Computer Forensics Investigation Process: The systematic approach to conducting a computer forensic investigation, including evidence identification, preservation, collection, examination, analysis, and documentation.
  3. Digital Evidence: Understanding different types of digital evidence, such as files, emails, logs, and network traffic, and techniques for recovering and preserving evidence.
  4. Operating System Forensics: Forensic analysis techniques specific to different operating systems, including Windows, Linux, and macOS.
  5. Network Forensics: Investigating network traffic, logs, and devices to identify and trace the source of cyber attacks and unauthorized activities.
  6. Database Forensics: Techniques for investigating and analyzing data stored in databases, including data recovery and analysis of database logs.
  7. Malware Forensics: Identifying, analyzing, and documenting malware found during forensic investigations.
  8. Mobile Forensics: Forensic analysis of mobile devices, including smartphones and tablets, to recover digital evidence such as call logs, messages, and application data.
  9. Forensic Tools: Introduction to forensic tools and software used in investigations, including both commercial and open-source solutions.
  10. Incident Response: Procedures for responding to cyber incidents, including evidence handling, chain of custody, and reporting.
  11. Legal and Ethical Issues: Understanding the legal and ethical considerations involved in digital forensics investigations, including privacy laws, search and seizure procedures, and expert witness testimony.

© 2022 All Rights Reserved.