Class Room Traning

Intruduction

With great experience and Technical Knowledge, our security consulting team provides the specialized service, which covers entire Information Security. While, the main Service we offer is the VAPT – a Vulnerability Assessment and Penetration Testing & Forensics.

We also have a dedicated expert team specialised in various SIEM products with System and Network Administration Background.

EC Council

The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various information security and e-business skills. EC-Council has been certified by American National Standards Institute to meet its ANSI 17024 standard. It is the owner and creator of the world famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI) and EC-Council Certified Security Analyst (ECSA)/License Penetration Tester (LPT) programs, and as well as many others programs, that are offered in over 92 countries through a training network of more than 500 training partners globally.

Individuals who have achieved EC-Council certifications include those from some of the finest organizations around the world such as the US Army, the FBI, Microsoft, IBM and the United Nations.

EC-Council is the owner of the Hacker Halted conference and workshop series, which had been organized in international cities such as Miami, Myrtle Beach, Dubai, Singapore, Kuala Lumpur, Mexico City, among others.

Hacker Halted features renowned international speakers who are experts in the field of information security. The objective of Hacker Halted conference series is to raise international awareness towards increased education and ethics in information security.

Download EC-Council Cyber Handbook for CERTIFICATION TRACKS Download

Certified Ethical Hacker Training

Triad Square Infosec Private Limited is basically an Information Security company specialized in Information Security training, which was started by Mr.Manikanth Dornadula, who is an experienced and certified network security professional himself, about four years ago in Bangalore. We at Triad Square offer a comprehensive course on ethical hacking covering all important ethical hacking concepts. This course is suitable for all graduates, IT professionals, other working-class graduates, and budding hackers who are looking at lucrative job prospects in Information security field. Our experienced, CERTIFIED and well-equipped trainers will train you efficiently in hands-on experience in ethical hacking. After completing this course, you can write the EC Council’s Ethical Hacker Examination.

  • About the Course

    Ethical Hacking Course teaches you about writing virus codes, exploit writing, reverse engineering, and many other important concepts. The course will be guiding you on hacking SQL and Oracle database, advanced network packet analysis, the application of PowerShell in Windows system administration, securing IIS and Apache web servers and on many more related subjects. The course gives a hands-on training helping the students to learn to scan, test, hack and secure systems and applications. The pupils learn to protect cloud computing technologies from hacker attacks.

  • Why should you take up the course?

    CEH training is a basic foundation course and certification for entering the Information Security domain. Many IT companies have made CEH certification mandatory for their network security professionals. Fresh IT Graduates who want to switch to Information Security field can take up this course. In the new age of automation and artificial intelligence, information security is the need of the day and will open new avenues of job opportunities for the course aspirants.

  • Key Features

    • 40 Hours of excellent learning.
    • Customized Batch Timings.
    • We are EC-Council’s Accredited Training Partner (ATP).
    • Complete guidance on clearing CEH certification.
    • e-kit or study material from EC council.
    • Certified Trainers.
    • Up to date syllabus.
  • Course Outline

    • Introduction to ethical hacking
    • Foot printing and reconnaissance
    • Scanning networks
    • Enumeration
    • Sniffing
    • System hacking
    • Malware threats
    • Social engineering
    • Denial of service
    • Session hijacking
    • Hacking web applications
    • SQL injection
    • Hacking wireless networks
    • Hacking web servers
    • Hacking mobile platforms
    • Evading IDS, Firewalls, and Honeypot
    • Cloud computing
    • Cryptography

FAQ’S

Sure. You can have customized batch timings.
Yes. You will get complete guidance for exam preparation

EC-Council Certified Security Analyst

Triad Square Infosec Private Limited is basically an Information Security company specialized in Information Security training, which was started by Mr.Manikanth Dornadula, who is an experienced and certified network security professional himself, about four years ago in Bangalore. We at Triad Square offer a comprehensive course on EC-Council Certified Security Analyst (ECSA) which will make you a well-equipped security analyst. This course is suitable for all graduates, IT professionals, other working-class graduates, and budding hackers who are looking at lucrative job prospects in Information security field. Our experienced, CERTIFIED and well-equipped trainers will train you efficiently in hands-on experience in becoming a trained security analyst. After completing this course, you can write the EC Council’s ECSA Examination.

  • About the Course

    EC-Council Certified Security Analyst (ECSA) complements the Certified Ethical Hacker (CEH) certification by exploring the analytical phase of ethical hacking. While CEH exposes the learner to hacking tools and technologies, ECSA takes it a step further by exploring how to analyse the outcome from these tools and technologies. Through ground-breaking penetration testing methods and techniques, ECSA class helps students perform the intensive assessments required to effectively identify and mitigate risks to the security of the infrastructure.

  • Why should you take up the course?

    • ECSA is for experienced hands in the industry and is backed by a curriculum designed by the best in the field.
    • Greater industry acceptance as seasoned security professional.
    • Learn to analyze the outcomes from using security tools and security testing techniques.
    • Requirement for the LPT certification.
  • Key Features

    • 40 Hours of excellent learning.
    • Customized Batch Timings.
    • We are EC-Council’s Accredited Training Partner (ATP).
    • Complete guidance on clearing ECSA certification.
    • E-kit or study material from EC council,
    • Certified Trainers.
    • Up to date syllabus.
  • Course Outline

    • Security Analysis and Penetration Testing Methodologies
    • TCP IP Packet Analysis
    • Pre-penetration Testing Steps
    • Information Gathering Methodology
    • Vulnerability Analysis
    • External Network Penetration Testing Methodology
    • Internal Network Penetration Testing Methodology
    • Firewall Penetration Testing Methodology
    • IDS Penetration Testing Methodology
    • Web Application Penetration Testing Methodology
    • SQL Penetration Testing Methodology
    • Database Penetration Testing Methodology
    • Wireless Network Penetration Testing Methodology
    • Mobile Devices Penetration Testing Methodology
    • Cloud Penetration Testing Methodology
    • Report Writing and Post Test Actions

FAQ’s

Sure. You can have customized batch timings.
Yes. You will get complete guidance for exam preparation.

Application Security

About Us

Triad Square Infosec Private Limited is basically an Information Security company specialized in Information Security training, which was started by Mr.Manikanth Dornadula, who is an experienced and certified network security professional himself, about four years ago in Bangalore. We at Triad Square offer a comprehensive course on Application Security covering all important web security concepts. This course is suitable for all graduates, IT professionals, other working-class graduates, and budding hackers who are looking at lucrative job prospects in Information security field. Our expert, CERTIFIED and well-equipped trainers will train you efficiently in hands-on experience in Application Security. After completing this course, you can write the OWASP (Application Security) Examination.

  • About the Course

    You will learn the best practices for designing, implementing, and deploying secure web applications. You will cover current, real examples that illustrate the potential consequences of not following these best practices. You will leave this course armed with an understanding of software vulnerabilities, defences for those vulnerabilities, and testing those defences for sufficiency. You will be introduced to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined through a process of describing the threat and attack mechanisms, the associated vulnerabilities, and designing, implementing, and testing effective defences.

  • Why should you take up the course?

    This course is essential application security training for technical leads, project managers, testing/QA personnel, and other stakeholders who need to understand the issues and concepts associated with secure web applications. We create virtual hack environment and give hack demos, which will give you real feel of security testing.

  • Key Features

    • 24 Hours of excellent learning.
    • Customized Batch Timings.
    • We are EC-Council’s Accredited Training Partner (ATP).
    • Complete guidance on clearing OWASP (Application Security) certification.
    • E-kit or study material.
    • Certified and Expert Trainers.
    • Up to date syllabus.
  • Course Outline

    • Introduction to web application security
    • Introduction to OWASP top 10
    • Authentication vulnerabilities
    • Session & browser manipulation attacks
    • Different Attack Types – SQLI
    • Cross Site Scripting
    • Case Study
    • Piwi go 2.0
    • WordPress

FAQ's

Sure. You can have customized batch timings.
Yes. You will get complete guidance for exam preparation.

Mobile Penetration Testing

About Us

Triad Square Infosec Private Limited is basically an Information Security company specialized in Information Security training, which was started by Mr.Manikanth Dornadula, who is an experienced and certified network security professional himself, about four years ago in Bangalore. We at Triad Square offer a comprehensive course on Mobile Security covering all important mobile security concepts. This course is suitable for all graduates, IT professionals, other working-class graduates, and budding hackers who are looking at lucrative job prospects in Information security field. Our expert, CERTIFIED and well-equipped trainers will train you efficiently in hands-on experience in Mobile Security. After completing this course, you can write the Mobile Security Examination.

  • About the Course

    The course is designed with methods of analyzing mobile application and conducting penetration testing which involves ethical hacking or attacks mimicking real time for finding out the vulnerabilities of mobile applications. You will get the knowledge of mobile operating systems, mobile administration and other related domains. This course includes the study of security flow in web applications and aims for combating security threats to mobile applications. Simulations of hacker attacks on mobile applications are employed to teach the students to find the weaknesses in mobile applications and to create a detailed report of the vulnerabilities identified during a penetration test.

  • Why should you take up the course?

    • You can learn the possible mobile application vulnerabilities and be prepared to defend your organization’s reputation.
    • You will learn to create a mobile testing environment with penetration testing tools.
    • You will learn to check the device from a mobile forensics perspective and to know about built-in OS mechanisms so that you can stop or mitigate them.
  • Key Features

    • 32 Hours of excellent learning.
    • Customized Batch Timings.
    • We are EC-Council’s Accredited Training Partner (ATP).
    • Complete guidance on clearing Mobile Testing certification.
    • E-kit or study material.
    • Certified and Expert Trainers.
    • Up to date syllabus.
  • Course Outline

    • Introduction to Android.
    • Android Security Architecture.
    • Android Permissions.
    • Android Application Internals.
    • Android Application Components.
    • Introduction to Android Debug Bridge.
    • Reversing Android Applications.
    • Analyzing Android Malware.
    • Analyzing Android Traffic.
    • Bypassing SSL Pinning.
    • Backup-Based Vulnerability.
    • Exploiting Webview with Metasploit.
    • Introduction to iOS.
    • iOS Application Basics.
    • MVC and Event Driven Architecture.
    • ARM Processor.
    • iOS Security Mechanisms.
    • Creating a Pentest Platform.
    • Runtime Analysis with Cycript.
    • Mobile Substrate.
    • iOS Forensics Basics.
    • iOS Malware.
    • Decrypting Applications and Class Dumping on iOS.

FAQ’s

Sure. You can have customized batch timings.
Yes. You will get complete guidance for exam preparation.

Wireshark Training

About Us

Triad Square Infosec Private Limited is basically an Information Security company specialized in Information Security training, which was started by Mr.Manikanth Dornadula, who is an experienced and certified network security professional himself, about four years ago in Bangalore. We at Triad Square offer a comprehensive course on Wireshark which will make you a well-equipped network protocol analyzer. This course is suitable for all graduates, IT professionals, other working-class graduates, and budding hackers who are looking at lucrative job prospects in Information security field. Our expert, CERTIFIED and well-equipped trainers will train you efficiently in hands-on experience in becoming a trained network analyst. After completing this course, you can write the Wireshark Examination.

  • About the Course

    Wireshark is a very important and widely used network protocol analyzer. It converts packet data on the network into human readable format. This tool uses filters, color coding and helps to dig deep into the network traffic and analyze individual packets. Wireshark helps in detecting problems on your network at the microscopic level and is the defacto standard of analyzing networks in commercial and non-profit organizations, government agencies and educational institutions.

  • Why should you take up the course?

    • Many Information Security problems require packet level network analysis and hence for becoming a network security expert you should do this course.
    • You can work as a network protocol analyzer in commercial establishments, government agencies, non-profit organizations and educational institutions after finishing this course.
    • Wireshark is an opensource software and you can use it for free for analyzing your network once you finish this course.
  • Key Features

    • 35 Hours of excellent learning.
    • Customized Batch Timings.
    • We are EC-Council’s Accredited Training Partner (ATP).
    • Complete guidance on clearing Wireshark certification.
    • E-kit or study material.
    • Certified and Expert Trainers.
    • Up to date syllabus.
  • Course Outline

    • Network Analysis Overview.
    • Introduction to Wireshark.
    • Capture Traffic.
    • Create and Apply Capture Filters.
    • Define Global and Personal Preferences.
    • Colorize Traffic.
    • Define Time Values and Interpret Summaries.
    • Interpret Basic Trace File Statistics.
    • Create and Apply Display Filters.
    • Follow Streams and Reassemble Data.
    • Customize Wireshark Profiles.
    • Annotate, Save, Export and Print Packets.
    • Use Wireshark’s Expert System.
    • TCP/IP Analysis Overview.
    • Analyze Domain Name System (DNS) Traffic.
    • Analyze Address Resolution Protocol (ARP) Traffic.
    • Analyze Internet Protocol (IPv4/IPv6) Traffic.
    • Analyze Internet Control Message Protocol (ICMPv4/ICMPv6) Traffic.
    • Analyze User Datagram Protocol (UDP) Traffic.
    • Analyze Transmission Control Protocol (TCP) Traffic.
    • Analyze Hypertext Transfer Protocol (HTTP) Traffic.
    • Analyze File Transfer Protocol (FTP) Traffic.
    • Analyze Email Traffic.

FAQ's

Sure. You can have customized batch timings.
Yes. You will get complete guidance for exam preparation.

Premium Training

Learning Objectives

Information Security technologies, Hacking Techniques and security. 100% Job Oriented Program. Learn Practical Application of Skills gained.

Duration

5 Months

Who can Attend

It is designed for both Freshers and Experienced Engineering degree holders

Pre requisites

None. Some basic computer knowledge recommended but not required.

Deliverables

  • Training
  • EC-Council Certificate
  • Triad Certificate
  • Placement Opportunity

Enquiry

Call: +91 8088931862 or help us to contact you by filling up the contact form.

Request more information