• Introduction to CISSP
  • Eligibility Criteria
  • Exam Overview
  • Approach to CISSP
  • Syllabus Dissection
  • Security Concepts
  • What is AI
  • Importance of AI & its Current state
  • Role of AI & ML in cyber security
  • Application Areas of AI
  • Can AI Prevent Cyber Attacks ?
  • Firewalls don’t stop hackers, AI Might
  • AI in Hardware and IOT Devices
  • An understanding of Ethical Hacking
  • Different Types of Hackers
  • Hackers contribution to the society
  • Good Guys Vs Bad Guys
  • Industries Demand for Security Professionals
  • An introduction to SQL Injection – Demo
  • Quiz followed by Q&A
  • Introduction
  • Difference between Penetration testing and Bug Bounty
  • What and how of Bug Bounty?
  • OWASP
  • 3 Live Demos
  • What is Cyber Security?
  • Why should we care about it?
  • Media reports only the tip of Iceberg
  • Privacy & Digital Freedom
  • Your Security Plan
  • Protecting yourself on social networks
  • Demo: OSINT Challenge – Demonstration
  • Demo: Social Engineering Attack – Phishing
  • Introduction to Mobile App Pentest

  • What and how of Mobile Application Penetration Testing

  • OWASP

  • 3 Demos

  • What is IOT ?
  • IOT Application Areas and Devices
  • IOT Communication Models
  • Challenges of IOT
  • IOT Attacks
  • IOT Hacking countermeasures
  • Hacking Android Debug Bridge – Demo
  • What is IOT ?
  • IOT Application Areas and Devices
  • IOT Communication Models
  • Challenges of IOT
  • IOT Attacks
  • IOT Hacking countermeasures
  • Hacking Android Debug Bridge – Demo
  • What is Digital Forensics?
  • Role of Digital Forensics in the Industry
  • Cyber Crimes
  • Some of Worst Effects of Cyber Attacks
  • Need for Forensics Investigator
  • Average Salary for Forensic Investigators
  • What is steganography?
  • A practical Demo
  • What is HIPAA?
  • Why is HIPAA Important?
  • HIPAA Definitions
  • Various Entities in Health Care Organization
  • HIPAA Privacy Rules
  • HIPAA Security Rules
  • HIPAA Breach
  • Introduction
  • Difference between Penetration testing and Bug Bounty
  • What and how of Bug Bounty?
  • OWASP
  • 3 Live Demos
  • Introduction
  • What and how of Mobile Application Penetration Testing
  • OWASP
  • 3 Demos
  • Intro & Overview on Certified Information Systems Auditor Certification Program
  • CISA exam overview with eligibility criteria
  • CISA exam preparation
  • Quiz followed by Q&A
  • What is Cyber Security?
  • Why should we care about it?
  • Media reports only the tip of Iceberg
  • Privacy & Digital Freedom
  • Your Security Plan
  • Protecting yourself on social networks
  • Demo: OSINT Challenge – Demonstration
  • Demo: Social Engineering Attack – Phishing
  • Introduction
  • Difference between Penetration testing and Bug Bounty
  • What and how of Bug Bounty?
  • OWASP
  • 3 Live Demos

 

  • Intro & Overview on Certified Information Security Manager Certification Program.
  • Insight into Information Security Governance
  • CISM exam overview with eligibility criteria
  • Quiz followed by Q&A
  • CISM exam preparation

 

  • What is Information Security Management Systems (ISMS)?
  • Why ISMS is important to an organization?
  • What are the benefits of ISMS?
  • The Background of ISMS
  • The Key concepts and principles of ISO/IEC 27001:2013
  • The Main requirements of ISO/IEC 27001:2013
  • High level walk-through on the ISO/IEC 27001 controls

TRAINER PROFILE

Learn and Earn an Industry Leading Certification