9 INTERNATIONAL INDUSTRY ORIENTED COURSES IN ONE COMBO PACK

CEH + CHFI + ECSA + CCNA Security + CompTIA Security+ + A+ + N+

We have more than 57 trainings that will equip you with most in-demand skills of today and future with the most affordable price You can learn anywhere, anytime with our wide variety of trainings packed in a single combo. Get skilled in Ethical Hacking, Security Analysis, Networking, Forensics Investigation, Web Application Security and many more. Start learning this industry Oriented Course from today!

1.2 year diploma courses combo

 Exam Details(Per Exam)

  • Number of Questions: 150
  • Passing Score: 70%
  • Test Duration: 4 hours
  • Test Format: Multiple choice
  • Test Delivery: ECC exam portal

Official (CEH) Training and Certification Course

Certified Ethical Hacker (CEH) Training v9/v10  is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s).

About the Exam

  • Exam Title: Certified Ethical Hacker (Practical)
  • Number of Practical Challenges: 20
  • Duration: 6 hours
  • Availability: Aspen – iLabs
  • Test Format: iLabs Cyber Range
  • Passing Score: 70%

CEH Eligibility Criteria:
In order to be eligible to attempt EC-Council CEH, certification examination, candidate may opt to:

Attend Official CEH Training:
If a candidate attends an official instructor-led training (ILT), computer-based training (CBT), online live training, or academic learning, candidate is eligible to attempt the relevant EC-Council exam

Eligibility for CHFI Certification Training : Computer Hacking and Forensics Investigator v9

Computer Hacking Forensic Investigator (CHFI) Training will provides Understand the concept of forensic science, cyber crime, and steps in forensic investigation Learn the laws involved and work accordingly to search and seize the computers with a warrant List roles of first Responder, evaluate electronic crime scene, conduct preliminary interviews; collect, preserve and transport electronic evidence along with complete documentation Define different types of digital evidence, rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category Setting computer forensics lab Retrieve existing and deleted files from different operation systems using different processes such as Access Data FTK, Encase, Stenography and other techniques Crack system and application passwords Perform log capturing to establish event correlation Investigate network traffic, emails, and attacks Practice forensic process on mobile devices with different operating systems.

Contents for Computer Hacking and Forensics Training and Certification

  • Computer Forensics in Today’s World
  • Computer Forensics Investigation Process
  • Searching and Seizing Computers
  • Digital Evidence
  • First Responder Procedures
  • Computer Forensics Lab
  • Understanding Hard Disks and File Systems
  • Windows Forensics
  • Data Acquisition and Duplication
  • Recovering Deleted Files and Deleted Partitions
  • Forensics Investigation using Access Data FTK
  • Forensics Investigation Using EnCase
  • Steganography and Image File Forensics
  • Application Password Crackers
  • Log Capturing and Event Correlation
  • Network Forensics, Investigating Logs and Investigating Network Traffic
  • Investigating Wireless Attacks
  • Investigating Web Attacks
  • Tracking Emails and Investigating Email Crimes
  • Mobile Forensics
  • Investigative Reports
  • Becoming an Expert Witness

ECSA v9 EC-Council Certified Security Analyst Training and Certification

ECSAv9 Training will help you to understand various things like Password Cracking,Web Application Penetration Testing,SQL Penetration Testing, Internal Network Testing and various other important things Related to ECSA Certification.

Contents

  • Need for Security Analysis
  • TCP IP Packet Analysis
  • Penetration Testing Methodologies
  • Customers and Legal Agreements
  • Rules of Engagement
  • Penetration Testing Planning and Scheduling
  • Pre-Penetration Testing Steps
  • Information Gathering
  • Vulnerability Analysis
  • External Penetration Testing
  • Internal Network Penetration Testing
  • Firewall Penetration Testing
  • IDS Penetration Testing
  • Password Cracking Penetration Testing
  • Social Engineering Penetration Testing
  • Web Application Penetration Testing
  • SQL Penetration Testing
  • Penetration Testing Reports and Post Testing Actions

Benefits of Becoming ECSA – Penetration Testing Certification

  • ECSA v9- Eccouncil Certified Security Analyst v9 is for experienced hands in the industry and is backed by a curriculum designed by the best in the field.
  • Greater industry acceptance as seasoned security professional.
  • Learn to analyze the outcomes from using security tools and security testing techniques.
  • Requirement for the LPT– Licensed Penetration Testingcertification.

The ECSA v9- Eccouncil Certified Security Analyst program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEHv9) and elevates your ability into full exploitation by teaching you how to apply the skills learned in the CEHv9 by utilizing EC-Council’s published penetration testing methodology. Focuses on pentesting methodology with an emphasis on hands-on learning The exam will now have a prerequisite of submitting a pentesting report. The goal of these changes is to make passing ECSAv9 more difficult; therefore making it a more respected certification.

CompTIA A+ Course Training and Certification

CompTIA A+ Course will help you to understand various things like BIOS, Motherboard, CPU, RAM, Storage, power and various other important things related to Computer System and Hardware.

Content-

  • Configure and apply BIOS Settings
  • Differentiate Between Motherboards
  • Compare and Contrast RAM
  • Install and Configure Expansion Cards
  • Install and Configure Storage Devices
  • Differentiate CPU Types
  • Compare Connection Interfaces
  • Install Appropriate Power Supply
  • Custom Configurations
  • Evaluate Display Devicesl
  • Identify Connectors & Cables
  • Install Peripheral Devices
  • Network Cables and Connectors
  • Characteristics or Connectors / Cables
  • TCP/IP
  • Common TCP and UDP
  • Wireless Standards / Encryption
  • Install and Configure a SOHO Router
  • Internet Connection Types / Features
  • Identify Network Types
  • Compare Network Devices
  • Use Appropriate Networking Tools
  • Laptop Hardware and Components
  • Compare Laptop Display Types
  • Compare Laptop Features
  • Printer Imaging Processes
  • Install / Configure Printers
  • Printer Maintenance
  • Appropriate Safety Procedures
  • Environmental Impacts / Controls
  • Communication & Professionalism
  • Dealing with Prohibited Content

1.  Network architecture

  •  Explain the functions and applications of various network devices
  • Compare and contrast the use of networking services and applications
    1.3 Install and configure the following networking services/applications
  • Explain the characteristics and benefits of various WAN technologies
    1.5 Install and properly terminate various cable types and connectors using appropriate tools
  • Differentiate between common network topologies
  • Differentiate between network infrastructure implementations
  • Given a scenario, implement and configure the appropriate addressing schema
  • Explain the basics of routing concepts and protocols
  • Identify the basics elements of unified communication technologies
  • Compare and contrast technologies that support cloud and virtualization
  • Given a set of requirements, implement a basic network

2.  Network operations

  • Given a scenario, use appropriate monitoring tools
  • Given a scenario, analyze metrics and reports from monitoring and tracking performance tools
  • Given a scenario, use appropriate resources to support configuration management
  • Explain the importance of implementing network segmentation
  • Given a scenario, install and apply patches and updates
  • Given a scenario, configure a switch using proper features
  • Install and configure wireless LAN infrastructure and implement the appropriate technologies in support of wireless capable devices

3.  Network security

  • Compare and contrast risk related concepts
  • Compare and contrast common network vulnerabilities and threats
  • Given a scenario, implement network hardening techniques
  • Compare and contrast physical security controls
  • Given a scenario, install and configure a basic firewall
  • Explain the purpose of various network access control models
  • Summarize basic forensic concepts

4. Troubleshooting

  • Given a scenario, implement the following network troubleshooting methodology
  • Given a scenario, analyze and interpret the output of troubleshooting tools
  • Given a scenario, troubleshoot and resolve common wireless issues
  • Given a scenario, troubleshoot and resolve common copper cable issues
  • Given a scenario, troubleshoot and resolve common fiber cable issues
  • Given a scenario, troubleshoot and resolve common network issues
  • Given a scenario, troubleshoot and resolve common security issues
  • Given a scenario, troubleshoot and resolve common WAN issues

5. Industry standards, practices, and network theory

  • Analyze a scenario and determine the corresponding OSI layer
  • Explain the basics of network theory and concepts
  • Given a scenario, deploy the appropriate wireless standard
  • Given a scenario, deploy the appropriate wired connectivity standard
  • Given a scenario, implement the appropriate policies or procedures
  • Summarize safety practices
  • Given a scenario, install and configure equipment in the appropriate location using best practices
  • Explain the basics of change management procedures
  • Compare and contrast the following ports and protocols
  • Given a scenario, configure and apply the appropriate ports and protocols
  • Given a scenario, configure and apply the appropriate ports and protocols

CompTIA Security Plus Certification

CompTIA Security plus not only ensures that candidates will apply knowledge of security concepts, tools, and procedures to react to security incidents, it ensures that security personnel are anticipating security risks and guarding against them. Comptia Security Plus certification helps to attain credibility in Security Domain.

Content

  •    Module 01: Network security
  •  Module 02: Compliance and operational security
  •    Module 03: Threats and vulnerabilities
  •  Module 04: Application, data and host security
  •    Module 05: Access control and identity management
  •  Module 06: Cryptography

Expert Instructor-Led Training

CCNA Security course is Cisco security course training which is completely based on security Cisco networks and infrastructure. This training and certification requires Cisco routers,switches and firewalls. This is a entry level training in Cisco security track which further takes you to CCNP security and goes till Cisco security.

Contents

  • Network Fundamentals
  • LAN Switching Technologies
  • Routing Technologies
  • WAN Technologies
  • Infrastructure Service
  • Infrastructure Security
  • Infrastructure Management

Who should do a CCNA Security Training certification?

CCNA Security training and certification is beneficial for the following professionals:

  • Network Security Specialist
  • Network Engineers
  • Network Security Administrator
  • Network Security Support Engineer

Devices used while CCNA Security Training are as follows:

  • Routers: 1841, 2801, 2811, 2911, 3825 series
  • Switches: 2960, 3560, 3750 series
  • ASA Firewalls: 5510, 5512x, 5515x

CCNA Security course is Cisco security course training which is completely based on security Cisco networks and infrastructure. This training and certification requires Cisco routers,switches and firewalls. This is a entry level training in Cisco security track which further takes you to CCNP security and goes till Cisco security.

Content:

  • Describe the security threats facing modern network infrastructures
  • Secure Cisco routers
  • Implement AAA on Cisco routers using local router database and external ACS
  • Mitigate threats to Cisco routers and networks using ACLs
  • Implement secure network management and reporting
  • Mitigate common Layer 2 attacks
  • Implement the Cisco IOS firewall feature set using SDM
  • Implement the Cisco IOS IPS feature set using SDM
  • Implement site-to-site VPNs on Cisco Routers

What will be Covered in the Web Application Security Training

  • Sql Injections Flaws : Login Authentication Bypass,Blind Sql Injection Manual and Automated using Havij, SQLMAP, Html Injection.
  • Cross Site Scripting Flaw : Reflected and Stored XSS using Manual and Tool Based : Using Burp Suite
  • Source Code Disclosure Flaw : Manual Process and File Inclusion
  • OS Command Injection Flaw: On DVWA (Damn Vulnerable Web Application) and Metasploitable
  • Broken Authentication and Session Management : DVWA -Damn Vulnerable Web Application, Samurai OS
  • File Upload Vulnerability (Dangerous File Upload) Live Practical Based Example
  • CSRF – Cross Site Request Forgery
  • Sensitive Data Exposure : Live Web Site
  • Insecure Direct Object Reference: Instructor Special
  • Local file Inclusion and Remote File Inclusion(LFI and RFI attack): BURP SUITE
  • Directory Traversal Attack Traversing Directories on a Web Site
  • Insecure Transport Level Communication: Weak SSL Version Detection
  • Information Exposure Through an Error Message
  • Invalid URL Redirection Flaw
  • Hard-coded Credentials in Static Code
  • Security Mis-Configuration
  • Missing Authorization and Authentication for Critical Functions
  • Session Fixation
  • Weak Data Encryption
  • Information Leakage

Payment Options

                                                                                          Installments                              Oneshot

Knowledge Based(Only Training )                            1,40,000/-                                    1,20,000/-

                                                                                                      Installments                                    Oneshot

Career Based(Training & Certification Both)                   2,40,000/-                                       1,80,000/-

our workshop partners

our partners

TESTIMONIAL

aayat

Aayat

“I would recommend ECSA to anyone specializing in information security domain and the course will give you fundamental knowledge about Security”

Security Analyst

shivam

Shivam

“The LPT  Training adds more credibility to my technical experience, especially since a lot of hiring managers prefer EC-Council certifications.”

Penetration Tester

t4

Manjit Kaur

“I am proud and thankful to sir beyond my words, when I think of the transformation in my self-confidence, because of the experiences he shared with us.”

Ethical hacker

Summary
Review Date
Reviewed Item
LPT
Author Rating
51star1star1star1star1star
t1

Shivam Singh

“Greatly enjoy this course as it brought me up-to-date with some of the emerging exploits that I had not been exposed to over the course of my work.”

Forensics Investigator

t2

Mohit

I have done my CEH training in the year of 2018 and that was the time I have entered Security field and after doing CEH training, it gives lot of value in my career.

Ethical Hacker

t3

Sandeep Jangir

“ I feel extremely fortunate and humbled to have been taught by such an expert instructor in CRAW Security! I liked the expert knowledge of the instructor. ”

Ethical Hacker

Summary
Review Date
Reviewed Item
CEH
Author Rating
51star1star1star1star1star
vikash

Vikas Shingh

“I have attended Ethical Hacking and Penetration Testing combo training from Craw Security. I was happy with the way they delivered the Classes.”

Penetration Tester

Summary
Review Date
Reviewed Item
LPT
Author Rating
51star1star1star1star1star

DROP A LINE FOR US

Summary
Review Date
Reviewed Item
The Training and Certification Labs at craw Security are very good which has kali linux installed on all systems with all tools installed. Craw security also have various kinds of Ethical hacking hardware devices for wifi hacking. System Hacking allso. Which you will never get anywhere on other institutes. Just Visit Craw Security before taking admission anywhere in Delhi
Author Rating
51star1star1star1star1star