Certificate course on PCB designing using OrCAD
Certificate Course in VLSI Design Using Cadence Tool!
Information Gathering & Countermeasure
Sniffing, ARP Cache poisoning &MITM Attack with Countermeasure
Brute Force Attack & Countermeasure
Course in DSP using MATLAB
Denial of Service Attack & Countermeasures
Trojan, Backdoor, Virus and Countermeasure
Steganography using image file & ICMP Payload
E-Mail Spoofing & Phishing
Email Security
Web Application Vulnerabilities & Countermeasures
Network Traffic Encryption
Installing and Configuring Intrusion Detection System
Preventing CAM Flooding Attacks by using Switch Port Security_I
Certificate Course in VLSI Design Using Cadence Tool(2)
Preventing unauthorized access to DHCP Server by using DHCP Snooping & Preventing MAC Spoofing by using IP Source Binding
Penetration Testing
Embedded System Design
Cloud Computing using Amazon AWS
Mobile Application Development using Android Programming
Certificate Course in VLSI Design Using Cadence Tool
Digital Forensic 01 Acquiring an Image of Evidence Media
Digital Forensic 02 Data Carving Using Foremost
Digital Forensic 03 Basic File Header Analysis Using Win HEX
Digital Forensic 04 Recovering Deleted Photographs
Digital Forensic 05 Live Memory Acquisition and Analysis
Digital Forensic 06 Steganography using image file and ICMP Payload_ver_22
Digital Forensic 07 Sniffing,ARP Cache Poisioningdocx
Digital Forensic 08 Investigating Network Scans
Digital Forensic 09 Creating Cases in Sleuthkit and Autopsy
Digital Forensic 10 Exploring Wireshark Network Protocol Analyzer
Digital Forensic 11 Log analysis in Linux
Information Gathering & Countermeasure
Sniffing, ARP Cache poisoning &MITM Attack with Countermeasure
Brute Force Attack & Countermeasure
Denial of Service Attack & Countermeasures
Steganography using image file & ICMP Payload
E-Mail Spoofing & Phishing
Trojan, Backdoor, Virus and Countermeasure
Email Security
Web Application Vulnerabilities & Countermeasures
Network Traffic Encryption
Installing and Configuring Intrusion Detection System
Penetration Testing
Preventing CAM Flooding Attacks by using Switch Port Security_I
Preventing unauthorized access to DHCP Server by using DHCP Snooping & Preventing MAC Spoofing by using IP Source Binding
Sniffing, ARP Cache poisoning &MITM Attack with Countermeasure
Port Forwarding
Network Security 01- Preventing CAM Flooding Attacks by using Switch Port Security
Network Security 02- Preventing unauthorized access to DHCP Server by using DHCP Snooping
Network Security 03- Preventing MAC Spoofing by using IP Source Binding
Network Security 04- Configuring Secure Remote Access to Router using SSH
Network Security 05- Password Cracking Attacks and Countermeasures
Network Security 06- Configuring traffic Access Control using Standard ACL
Network Security 07- Control Access to Remote Administration Services using Cisco _ACL_s
Network Security 08- Configuring Traffic Access Control using Extended ACL
Network Security 09- VPN IPSec Remote Access VPN
Network Security 10- Configuring Lock down of LAN, WAN and DMZ Zone using pfSense
Penetration Testing using Metasploit Framework 01- Metasploit – Basic Commands
Penetration Testing using Metasploit Framework 02- Metasploit GUIs
Penetration Testing using Metasploit Framework 03- Information Gathering with Metasploit
Penetration Testing using Metasploit Framework 04- Vulnerability Scanning with Metasploit
Penetration Testing using Metasploit Framework 05- Client Side Attack
Penetration Testing using Metasploit Framework 06- MSF Post Exploitation
Penetration Testing
IDS using Snort