Cyber Security Studies and Research Laboratory (CSSRL)
Cyber Security Studies and Research Laboratory (CSSRL)
C-339 Opposite Master School of Management, Near Buddha Enclave, Lohianagar Hapur Road , Meerut, India 250002
9219666821
CSSI or Certification in Secured Server Implementation is a highly comprehensive professional certification dedicated to secured implementation of Windows based Server across variegated industry. PROGRAM ...
CDFA or Certified Digital Forensic Analyst is a highly comprehensive professional certification dedicated to the Forensic study of Under-Analysis System to quickly and easily collect, preserve and reveal ...
CCSE serves as State-of-Art International Certification in Cyber Security for amateurs and professionals to make you an expert in the field of Information System Security. CCSE is designed for individuals ...
CWPT or Certified Web Penetration Tester is a highly comprehensive professional certification dedicated to the study of Web Application Security Evaluation and Hardening. PROGRAM DETAILS: A thorough ...
CNPT or Certified Network Penetration Tester is a highly comprehensive International Certification dedicated to Network Security studies. CNPT covers wide range of techniques, tools and frameworks for ...
WiFi Security
ENDED
WiFi Architecture Setting up WiFi Network WiFi Traffic Analysis WiFi HoneyPots Attack Client Deauthentication Attack WiFi Cracking Attack Evil Twin Attack Caffe Latte Attack WiFi Security Standards WiFi ...
Malware Security
ENDED
Introduction to Malwares (Virus/ Worms/ Trojans/ Backdoor)Malware Life CycleMalware Infection TechniquesMalwares ClassificationPractical Malware AnalysisProcess AnaysisMalware DebuggingMalware Creation ...
Social Security
ENDED
Introduction to Social EngineeringSocial Engineering TargetsHuman Based Deceptive AttacksComputer Based Deceptive AttacksIdentity TheftPractical Attacker TacticsSocial Network EngineeringCountermeasures ...
Facebook Security
ENDED
Introduction to Social NetworkFacebook Scale and StatsFacebook TargetsDeceptive AttacksCyber BullyingFacebook PrivacySocial Media EthicsCriminal Case StudiesSocial Media Security Guidelines
Email Security
ENDED
Secured and Safe usage of Email, Social Media (Facebook, Twitter, G+), Public Wifi Hotspots, Internet Browsing, protection against Viruses-malwares, Prevention against social engineering are various ...