English Courses

We found 29 courses available for you
See
-80%

Best Online Internet of Things Course in Delhi

60 hours
Intermediate

Craw Cyber Security offers a complete security assessment and Best …

What you'll learn
Scope of the penetration testing engagement.
What are your biggest fears regarding security of your solution.
Your organization’s current security posture.
Expected time duration and financials.
Explaining about our penetration testing methodology for your product.
-80%

Learn Online Linux Essentials Course in Delhi

58 Lessons
60 hours
Intermediate

Linux Essentials Our Course Advisor Why join Craw Security for …

What you'll learn
Understand open source software, licensing and Linux’s place in the open-source world
Choosing hardware to suit operating systems
Use of command line to list, create, move, delete and archive files
Identifying basic security principles and managing user types
Managing file permissions and ownership
Networking with Linux
-29%

CISM Certification Training Course in Delhi

40 hours
Intermediate

CISM Certification Training Course | Certified Information Security Manager Bestseller …

What you'll learn
Information Security Governance
Incident Management in information Security
Designing security architecture
Knowledge of ISACA domains
How Information security programs function
Types of Enterprise IT frameworks
-80%

Online AWS Training in Delhi | Amazon Web Service Security Training

60 hours
Intermediate

The Security Engineering on AWS Training In Delhi …

What you'll learn
How to build AWS application infrastructures to protect against security threats
<strong>AWS Training In Delhi </strong> shared security responsibility model
How to protect data at rest and in transit using encryption techniques
Applying security checks to conduct an automated and reproducible infrastructure
How to identify and mitigate threats for Apps and Data
How to configure the authentication process for resources and applications in the AWS Cloud
How to perform security assessment tests for making sure that simple vulnerabilities are resolved
Learn All about <strong>AWS Training In Delhi </strong>
-19%

Forensic Toolkit FTK Training Certification

40 hours
Intermediate

Forensic Toolkit Our Course Advisor Computer Forensics: FTK Forensic Toolkit …

What you'll learn
Defining digital evidence and their types
Different processes for different devices
How to set up Computer forensics laboratory

Red Hat Open Stack Certified Architect in Delhi

40 hours
Intermediate

Red Hat Certified Architect | Red Hat Open Stack Bestseller …

What you'll learn
Red Hat OpenStack (EX210 and EX310)
Red Hat Certified Specialist in Virtualization (RHCVA, EX318)
Red Hat Certified Specialist in High Availability Clustering (RH436)
Red Hat Certified Specialist in OpenShift Administration (EX280)
Red Hat Certified Specialist in Containers and Kubernetes (EX180)
-24%

EC-Council Certified Incident Handler (ECIH) V2 Course

40 hours
Intermediate

EC-Council Certified Incident Handler (ECIH) V2 Course Bestseller 4.6  …

What you'll learn
To enable individuals and organizations with the ability to handle and respond to different types of cybersecurity incidents in a systematic way.
To ensure that organization can identify, contain, and recover from an attack.
To reinstate regular operations of the organization as early as possible and mitigate the negative impact on the business operations.
To be able to draft security policies with efficacy and ensure that the quality of services is maintained at the agreed levels.
To minimize the loss and after-effects breach of the incident.
For individuals: To enhance skills on incident handling and boost their employability.
-17%

HP ArcSight ESM Training Certification

60 hours
Intermediate

HP ArcSight ESM Our Course Advisor Requirements Basic IT Skills …

What you'll learn
Common security devices, such as IDS & firewalls
Common network device functions, such as routers, switches, hubs, etc.
TCP/IP functions, such as CIDR blocks, subnets, addressing, communications, etc.
Basic Windows operating system tasks & functions
Possible attack activities, such as scans, a man in the middle, sniffing, DoS, etc., and possible abnormal activities, such as worms, Trojans, viruses, etc.
SIEM terminology, such as threat, vulnerability, risk, asset, exposure, safeguards, etc.
6 months experience administering HP ArcSight ESM
Completed HP ArcSight ESM Administrator
Enroll Now!













Craw Cyber Security Private Limited