Contact No :
Enter the code here :
Can't read the image? click here to refresh
"It takes a hacker to catch the hacker"
CEHv9 is a comprensive ethical hacking and information security auditing program focusing on latest security threats, advanced attack vectors and practical real time demonstration of latest hacking techniques, methodology, tools, tricks and security measures.
Why to do your CEH at Varutra?
Email: ecouncil[at]varutra[dot]com, training[at]varutra[dot]com, ceh[at]varutra[dot]com
Phone No: +91 8408 891 911, +91 8554 811 911
Certified Ethical Hacker v9 (EC-CEHv9)
Who should attend?
This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure & applications.
Course Duration: [6 Days, 8 Hours/Day]
This training focuses on the latest hacking attacks targeted to mobile platform like iOS and Android and covers countermeasures to secure mobile infrastructure. Participants will learn how attackers break into mobile applications to obtain sensitive data information and how to secure them against variety of security threats.
In this course, the participants will learn about:
We provide onsite trainings on demand. Mail us for our onsite mobile security and hacking training proposal.
Following modules will be covered in the course
# Mobile Device Security
Mobile devices and their infrastructure
Mobile phone and tablet security models
Mobile device policy considerations and development
# Mobile Device Architecture Security
Mobile platform default security implementations
Analysis of security flaws in mobile platforms
Analysis of network and system infrastructure
Setting up and configuring security-testing environment (SDK, XCode etc.)
# Mobile Application and Code Analysis
Analyze mobile applications and associated threats
Rooting, Unlocking and Jailbreaking mobile devices
Mobile phone data storage and file system analysis
Network activity monitoring
Mobile code and application analysis
# Penetration Testing of Mobile Networks
Pentesting mobile networks
WiFi based attacks
Bluetooth based attacks
Network level exploits study
Penetration testing Mobile Devices and Applications
# Pentesting mobile devices and applications
Mobile device exploits
Email: training[at]varutra[dot]com, contactus[at]varutra[dot]com, contact[at]varutra[dot]com
This training covers hacking and security concepts for web applications. Participants will learn how attackers break into web application to obtain sensitive data and information and how to secure web applications against such and many other security threats.
Web Application basics
Web 1.0 & 2.0 Detailing
Analyzing the Application
Hacking Case Studies
Importance of Secure Web Application Development
Web application security pentest exercise/ctf/challenge
Web Service Identification
Web Server Versioning
Application Crawling Vs. Site-Mirroring
Understanding Business Importance of the Application
Web Application Assessment
OWASP Top 10 Vulnerabilities
SANS Top 25 Programming Errors
Detailed OWASP Vulnerability Coverage
Business Logic Testing
Threat Modeling Principle
Web Services Assessment
Web Service Testing
Crafting a Service Application/Request
OWASP Web Service Specific Testing
Executive Summary Composition
Importance of Graphical Representation
VSecure Ethical Hacking Workshop (VEHW)
Ethical Hacking Workshop Contents
Understanding the growing trends of technologies, need for Information Security and awareness among the young generation for Information Security arena, Varutra has come up with an initiative to spread this among all the youths in the form of workshop i.e VSecure Workshops.
The primary objective of this VSecure Workshop is to provide a platform to young engineers who can mould their imagination of IT Security field into reality and feel the excitement first hand in terms of having challenging and successful career.
VSecure Ethical Hacking workshop is based on Information Security & Ethical Hacking, teaching how to fight against Cyber Criminals & how to protect you from being Hacked, & which is conceptualized by Industry Experts dealing with Law enforcement agencies, domestic as well as international organizations. VSecure workshops give you the understanding and knowledge on the core domains of IT Security i.e. Mobile, Networks and Application Hacking starting from the basics to advance level.
Network And Operating System Hacking
Hacking Web Applications
Mobile Applications Hacking
Social Engineering And Phishing
Course Duration: [2/3 Days, 8 Hours/Day]
Email: vsecure[at]varutra[dot]com, training[at]varutra[dot]com, contactus[at]varutra[dot]com
VSecure Android Development Workshop (VADW)
Android Development Workshop Contents
Considering the growing trends of smartphones users are more near about 1244.89 million in 2014, dependency on the mobile applications from banking to surfing and doing day-to-day activities, the need for developing secure application is essential. VSecure Android App Development Workshop has initiated for spreading awareness and making youths understand the importance of developing secure applications.
Also it will give learners a different interest oriented career field to make a successful career life ahead.
Highlights of VSecure Workshops:
Course Duration: [3/4 Days, 8 Hours/Day]
Certified Application Source Code Reviewer (VCACR)
Training Course Contents
Secure Source Code Review activity helps to identify security flaws in the web and mobile applications before they go live. Security code review the process of auditing the source code of an application, verify the implementation of adequate security controls and eliminate serious software flaws that may affect the confidentiality, integrity and availability of data.
Source Code Review is an important part of best practice software security and also compliance regulations, such as PCI DSS and PA DSS.
Introduction to Application Security Concepts
OWASP Top Ten vulnerabilities for Web App and Mobile App
Source Code Review Approach
Automated Tool based Code Review
Manual Code Review
Report Creation with Recommendations
Hands on Practical
Platforms: Java, .Net, PHP, C/C++ and Objective C
Learning Objectives and Benefits
Understand application security vulnerabilities.
Learn how to identify security flaws in the source code of the application.
Review source code review methodologies and approaches.
Difference between platform specific code level issues.
How to provide secure code snippets as recommendations.
Testing business logic related vulnerabilities.
Secure programming best practices.