100% Job Guarantee Course

Craw Security also provide 100 % job …We specialise in placing students from all educational backgrounds such as after completing there diploma in information security or B.Tech, B.Com, BCA, MBA, MCA or M. Com. NG Networks trains their students and places them in various MNC’s irrespective of their educational backgrounds. Many people believe that the Networking domain deals in technology, people only from a science background are eligible. However, this is completely untrue.

Craw Security provides 6- months diploma course which constitute our  6 main courses.Get our 6 months diploma course and get a chance to take an opportunity for job placement from craw security.

ETHICAL HACKING CERTIFICATION :- level 1

ETHICAL HACKING SECURITY PROGRAM covering the fundamental concepts of information security, computer forensics, and network security. It enables students to identify information security threats which reflect on the security posture of the organization and implement general security controls.

This program will give a holistic overview of the key components of information security, computer forensics, and network security. This program provides a solid fundamental knowledge required for a career in information security.

PROGRAM DETAILS:-

In or ethical hacking certification course we have 28 modules and these are listed below-

  • MODULE 1:- INTRODUCTION TO BASICS OF ETHICAL HACKING
  • MODULE 2:- FOOT-PRINTING ACTIVE(TOOL BASED PRACTICAL)
  • MODULE 3:- FOOT-PRINTING PASSIVE(PASSIVE APPROACH)
  • MODULE 4:- IN-DEPTH NETWORK SCANNING
  • MODULE 5:- ENUMERATION  USER IDENTIFICATION
  • MODULE 6:- SYSTEM HACKING PASSWORD
  • MODULE 7:- VIRUSES AND WORMS
  • MODULE 8:- TROJANS AND BACKDOOR
  • MODULE 9:- SNIFFERS MITM WITH WINDOW
  • MODULE 10:- BOT AND BOTNETS
  • MODULE 11:- SNIFFERS MITM WITH WINDOW
  • MODULE 12:- SOCIAL ENGINEERING TECHNIQUES
  • MODULE 13:- SOCIAL ENGINEERING TOOLKIT PRACTICAL BASED
  • MODULE 14:- DENIAL O SERVICES DOS DDOS ATTACKS
  • MODULE 15:- WEB SESSION HIJECKING
  • MODULE 16:- SQL INJECTION MANUAL TESTING
  • MODULE 17:- SQL INJECTION AUTOMATED TOOL BASED TESTING
  • MODULE 18:- BASICS OF WEB APP SECURITY
  • MODULE 19:- HACKING WEB SERVERS SERVERS ROOTING
  • MODULE 20:- HACKING WIRELESS NETWORK MANUAL CLI BASED
  • MODULE 21:- HACKING WIRELESS NETWORK : AUTOMATED TOOL BASED
  • MODULE 22:- EVADING IDS,FIRWALLS
  • MODULE 23:- HONEY POTS
  • MODULE 24:- BUFFER OVERFLOW
  • MODULE 25:- CRYPTOGRAPHY
  • MODULE 26:- PENETRATION TESTING : BASICS
  • MODULE 27:- MOBILE HACKING
  • MODULE 28:- CLOUD SECURITY AND MANY MORE,…….

course duration:- 60 hours course

learn More on this course

WEB APPLICATION SECURITY  :- level-2

 

THIS COURSE WILL BRIEF YOU ABOUT THE SECURITY CHALLENGES IN WEB APPLICATION  SECURITY AND THE SECURITY NEEDED IN WEB APPLICATION.THIS COURSE WILL MAKE YOU UNDERSTAND ON FINDING VULNERABILITIES  IN WEB APPLICATION AND ALSO ABOUT REMOVING THESE VULNERABILITIES FROM WEB APPLICATIONS.

PROGRAM DETAILS:-

THIS PROGRAM CONSISTS OF 21 MODULES AND ARE LISTED BELOW:-

  • MODULE 1 :- SQL INJECTION FLAWS
  • MODULE 2 :-CROSS SITE SCRIPTING FLAW
  • MODULE  3:-SOURCE CODE DISCLOSURE FLOW
  • MODULE  4:-OS COMMAND INJECTION FLOW
  • MODULE  5:-BROKEN AUTHENTICATION
  • MODULE 6 :-FILE UPLOAD VULNERABILITY
  • MODULE 7  :-CROSS SITE REQUEST FORGERY
  • MODULE 8 :-SENSITIVE DATA EXPLOSURE
  • MODULE  9:-REMOTE FILE INCLUSION
  • MODULE 10 :-DIRECTORY TRAVERSAL ATTACKS
  • MODULE 11 :-INVALID TRAVERSAL  FLOW
  • MODULE 12 :-SECURITY MIS–CONFIGURATION
  • MODULE 13 :-MISSING AUTHENTICATION
  • MODULE 14  :-SESSION FIXATION
  • MODULE 15  :-WEEK DATA ENCRYPTION
  • MODULE 16  :-INFORMATION LEAKAGE
  • MODULE 17 :-DANGEROUS FILE  UPLOAD
  • MODULE 18 :-TRANSPORT LEVEL COMMUNICATION
  • MODULE 19 :-INVALID URL REDIRECTION FLAW
  • MODULE 20 :-SECURITY MIS-CONFIGURATION
  • MODULE 21 :-INSECURE DIRECT OBJECT REFERENCE

 

COURSE DURATION :-60 HOURS

READ MORE ABOUT THIS COURSE

IN-DEPTH ADVANCE NETWORKING

LEVEL-3

Craw security provides course in advanced networking. This Course helps you to understand more about Advanced networking Technologies used in the Industry .This  course deal with complete study on networking

PROGRAM DETAILS:-

This program consist of  18 modules:-

  • MODLES 1 :- OPERATION OF PROTOCOLS
  • MODLES 2 :-OSI LAYERS
  • MODLES 3:-TCP/IP  MODELS
  • MODLES 4 :-INSTALLING
  • MODLES 5:-CONFIGURING
  • MODLES 6 :-CONCEPTS OF LAYERS
  • MODLES 7:-TSP,VLAN,CAM
  • MODLES 8 :-IPV4 AND IPV6
  • MODLES 9:-OSPF (SINGLE AND MULTI-AREA)
  • MODLES 10:-LOAD BALANCING
  • MODLES 11 :-EIGRP
  • MODLES 12 :-INTRODUCTION TO WAN
  • MODLES 1 3:-WAN PROTOCOL
  • MODLES 14:-HDLC,PPP,NAT
  • MODLES 15 :-INTRODUCTION TO MPLS
  • MODLES 16:-DHCP,SNMP,NETFLOW
  • MODLES 17 :-SSH
  • MODLES 18 :-SECRET PASSWORD

 

COURSE DURATION:-60 HOURS

READ MORE ABOUT THIS COURSE

CYBER FORENSICS INVESTIGATION

LEVEL 4

 

Whenever there is a crime in digital form. We need experts who can find the evidences to catch those malicious attacker. Person who extracts those evidences and trace the real person who was behind the crime is called a forensics investigator. Students can attend the above mentioned training and Certification to make there career in Cyber Forensics and Investigation. This is major training which comes under Information Security and Management Courses.

PROGRAM DETAILS

THIS PROGRAM CONSIST OF 26 MODULES AND ARE LISTED BELOW:-

  • MODULE  1  :- WHAT IS COMPUTER FORENSICS
  • MODULE   2:- METHODS BY WHICH COMPUTER GETS HACKED
  • MODULE   3 :- COMPUTER FORENSICS INVESTIGATION PROCESS
  • MODULE   4:- DIGITAL EVIDENCE GATHERING
  • MODULE  5 :- COMPUTER FORENSICS LAB
  • MODULE  6 :- SETTING UP FORENSICS LAB
  • MODULE  7 :- UNDERSTANDING   HARD DISKS
  • MODULE  8  :- FILE SYSTEMS ANALYSIS : LINUX/WINDOWS/MAC
  • MODULE 9  :- WINDOWS FILE SYSTEM FORENSICS
  • MODULE 10  :- DATA ACQUISITION TOOLS AND TECHNIQES
  • MODULE  11 :- DATA IMAGING TECHNIQUES AND TOOLS
  • MODULE 12  :- RECOVERY DELETED FILES AND FOLDERS
  • MODULE   13 :- DELETED PARTITIONS RECOVERY TECHNIQUE
  • MODULE  14  :- FORENSICS INVESTIGATIONS USING FORENSICS TOOLKIT (FTK)
  • MODULE 15   :- FORENSICS INVESTIGATIONS USING FORENSICS TOOLKIT (OXYGEN)
  • MODULE 16  :- FORENSICS INVESTIGATIONS USING ENCASE TOOL
  • MODULE  17 :- STENOGRAPHY AND IMAGE FILE FORENSICS
  • MODULE  18 :- APPLICATION PASSWORD CRACKERS
  • MODULE  19 :- LOG COMPUTING AND EVENT CORRELATION
  • MODULE  20 :- NETWORK FORENSICS TOOLS: CELLEBRITE TOOLS
  • MODULE  21 :- INVESTIGATING TOOLS
  • MODULE  22 :- INVESTIGATING NETWORK TRAFFIC : WIRESHARK
  • MODULE  23 :- INVESTIGATING WIRELESS ATTACKS
  • MODULE  24 :- INVESTIGATING WEB APPLICATION ATTACKS VIA LOGS
  • MODULE  25 :- TRACKING AND INVESTIGATING VARIOUS EMAIL CRIMES
  • MODULE  26 :- DETAILED INVESTIGATIVE REPORTING

course duration :-60 hours

LEARN MORE ON THIS COURSE

ADVANCED PENETRATION TESTING

LEVEL 5

 

Advanced Penetration testing

Advanced Penetration Testing  will help ethical hackers to understand the process needed to be carried by top It companies. This will help them to give more in-depth in their security audit process. Penetration Testing course is purely real hardcore Practical based Penetration testing Process to test the Network, web application, thick client, mobile application, IoT devices and much more.

It is an advanced course which comes straight after Ethical hacking level one and it will goes deeply till exploitation. In this process, you will use your all skills you learned in ethical hacking to complete hands-on Pen-testing and exploitation.

PROGRAM DETAILS:-

THIS PROGRAM CONSIST OF 7 MODULES AND THESE ARE:-

  • MODULE  1 :-HOW TO PLAN YOUR PENETRATION TESTING
  • MODULE  2 :-SCOPING YOUR PENETRATION TESTING
  • MODULE  3 :-NETWORK AND WEB-APPLICATION
  • MODULE  4 :-POST EXPLOITATION PHASE
  • MODULE  5:-IN DEPTH PASSWORD ATTACKS
  • MODULE  6 :-WEB APPLICATION PENETRATION TESTING
  • MODULE  7:-PENETRATION TEST REPORTING

 

COURSE DURATION :- 60 HOURS

READ MORE ABOUT THIS COURSE

MOBILE APPLICATION SECURITY

LEVEL-6

 

 

CRAW SECURITY also provides course for  MOBILE APPLICATION SECURITY . OUR course of MOBILE APPLICATION SECURITY   goal is to identify all vulnerabilities in MOBILE APPLICATION and assists to remove these vulnerabilities from mobile application.Mobile application has  become an essential part of our lives as our dependence on our smartphones has grown and to secure them are crucial requirement .Penetration testing can provide us with a certain level of confidence, but hacking into mobile applications demands a different approach and setup than with web applications.

GET TRAINING FROM BEST OF FACULTY AT CRAW SECURITY AND BECOME AN PROFESSIONAL SECURITY ANALYST IN MOBILE APPLICATION  SECURITY.

OUR COURSE MODULE CONSIST OF   NUMBER OF TOPICS DEALING WITH MOBILE SECURITY AND HOW TACKLE FROM THESE   VULNERABILITIES TO WHICH AN HACKER CAN TAKE ADVANTAGE OF.

 

SPECIFICATIONS FOR THIS COURSE:-

  • WEEKENDS AND WEEKDAYS TRAINING
  • CLASSROOM AND ONLINE TRAINING
  • 80%PRACTICAL AND 20%THEORETICAL
  • INTERNSHIP OPPORTUNITY
  • GNS/PACKET TRACER
  • VIDEO NUGGETS
  • AUDIO TUTORIALS
  • EBOOKS
  • CERTIFICATION AVAILABLE

COURSE DURATION :-60 HOURS

READ MORE ABOUT THIS COURSE

course features

Certified and experienced Trainers.

Training Lab

80% Practicals

Backup classes

Regular Mock Test and Examination

Dedicated Placement team

Regular Mock Test and Examination

24*7 Lab Access, You have to invest most of your time in the labs