SlideShare a Scribd company logo
1 of 11
Download to read offline
JC Shield( A C y b e r S e c u r i t y d i v i s i o n o f J C V e n t u r e s )
Cyber Security Academy
About JC ShieldA C y b e r S e c u r i t y d i v i s i o n o f J C V e n t u r e s
2
We are JC Ventures, an ISO 9001–2015 certified company, having
national and international presence. Our clients are spread across the
country. We are registered under MSME, providing technology-based
solutions. We have always been driven by science and its application to
create superior technology. And with this superior technology, we
provide services far and wide.
These technology-based services are availed by our clients of diverse
domains. They range from banking, financial services and insurance
(BFSI) to cyber security services and training, security and surveillance
solutions, anti-drone technology and digital learning solutions.
Currently, we have a presence in 400 districts, with a growing network
of more than 3500 touch points, and serving 1 million customers across
the nation.
With an experienced professional team, the company is taking the
initiative in enhancing the GDP. At JC Ventures, we are all committed to
serve our clients in the best possible way through our expertise, reach
and resources which includes the latest in technology.
A member of DSCI (NASCOM), FICCI, CII.
OS Concepts & Commands
• Architecture and Processes
• Memory & Storage Management
• Basic Linux Commands
Network Security Concepts
• Networking Concepts & Devices
• Network Ports & Protocols - TCP, IP, UDP, DNS
• Network Packet Crafting
• Network Protocol Analysis
Cloud & Virtualization 101
• Cloud Computing Concepts
• Virtualization Concepts
Web Security Concepts
• Web Concepts - Request/Response/Headers
• Common Security Flaws - Injections, XSS, XSRF
3
Cyber Security Concepts
• Security Terminology
• Data Confidentiality - Encryption, PKI, SSL/TLS
• Data Integrity - Hashing, Digital Signature
• Data Availability
• Authentication - Password Security, SAML, OAuth, LDAP
• Authorization - Access Controls
• Accountability - Log Management
• Secure Design Principles
Penetration Testing 101
• Reconnaissance, Enumeration
• Scanning, Vulnerability Assessment
• Exploitation, Covering Tracks
JC Shield Certified Cyber Security - Associate
Information Gathering
• Web - Reconnaissance, Finger Printing, Enumeration,
Spidering
Web Application Services
• Web Server 101 - Apache
• Web Database 101 – MySQL
Bypass Authentication
• Bypassing Password Security
• Bypass Access Controls/Privileges
• Bypass Session Management Controlsion, Authorization &
Session Management
Bypass Input Validation
• Injection Attacks, LFI/RFI, XXEi
• XSS
• Buffer Overflow
4
Client Side Attacks
• DOM XSS, HTML Injection
• CORS, URL Redirection
Cloud Security Concepts
• Secure Cloud - Network
• Secure Cloud - Storage
• Secure Cloud - User Management
• Securing Cloud Instances
• Securing Cloud Servers
JC Shield Certified Application Security – Professional
DevSecOps: Introduction
• DevOps: Introduction [CI-CD]
• Traditional Secure SDLC
• DevSecOps Introduction
• Automating Security Testing: SAST, DAST, SCA
Securing Dockers
• Key Container Components, Commands, Features
• Securing Workloads, Daemon, Trusted Images, Profiles
Securing Kubernetes Cluster
• Key Cluster Components, Commands and Concepts
• Securing cluster Infrastructure and Components
Securing Microservices
• Benefits, Architecture, Communication
• Securing Parameter and Communication
Securing SaaS Application
• Best Practices, Threat Model
5
JC Shield Certified DevOps Security - Expert
Cyber Security Technology
• JCS Certified PEN Test Professional (5 days)
• JCS Certified PEN Test Expert (5 days)
• JCS Certified Licensed PEN Tester (5 days)
• JCS Certified Application Security Professional (5 days)
• JCS Certified Application Security Expert (5 days)
• JCS Certified Database Security Professional (5 days)
• JCS Certified Database Security Expert (5 days)
• JCS Certified Web Application Professional (5 days)
• JCS Certified Web Application Expert (5 days)
• JCS Certified SOC Analyst (5 days)
• JCS Certified SOC Expert (3 days)
• JCS Certified Forensic Professional (5 days)
• JCS Certified Forensic Expert (5 days)
• JCS Certified Secure Coding Professional (3 days)
• JCS Certified Dev Ops Security Professional (3 days)
6
Certification Path
Cyber Security Management
• JCS Certified Cyber Incident Response Management Expert
(2 days)
• JC Shield PCI_DSS QSA certification approach (2 days)
• JC Certified Cyber Risk Expert (5 days)
• JC Certified Cyber Systems Security Officer Expert (3 days)
• JC Certified Cyber Security Management Systems--Cyber
Auditor (5 days)
• JC Certified Cyber Systems Security Auditor (5 days)
• JC Certified Information Security Management Systems—
Lead Implementer (5 days)
• JC Certified Anti Money Laundering Expert [AML] (3 days)
7
Certification Path
Cyber Security Analytics
• AI: Cyber Security (15 days)
• Machine Learning: Cyber Security (30 days)
• Data Science: Cyber Security (30 days)
8
Certification Path
JCS Certified Computer
Forensics Specialist (40 Hrs)
• What is digital forensics?
• What is digital forensic science?
• The role of digital forensics
• The role of the forensic scientist in law
• Essentials of digital acquisition & duplication
• Digital forensics evidence methodology
• Digital forensics analysis and research
• Digital Forensics protocols
• Digital Incident response, reporting and presenting in court
• OS Forensics fundamentals (Windows & Linux)
9
JCS Certified Windows Forensics
Professional(40 Hrs)
• Windows Operating Systems Focus
• Windows File Systems (NTFS, FAT, exFAT)
• Advanced Evidence Acquisition Tools and Techniques
• Registry Forensics
• Shell Item Forensics
• Windows Artifacts Analysis
• File and Metadata examination
• Email Forensics (Host, Server, Web)
• Event Log File Analysis
• Firefox, Chrome, Edge, and Internet Explorer Browser Forensics
• Deleted Registry Key and File Recovery
• Recovering Missing Data From Registry and ESE Database .Log Files
• String Searching and File Carving
• Media Analysis and Exploitation
• Recovery deleted files and partitions
• Tools and case study
• Expert witness
10
THANK YOU
w w w . j c s h i e l d . n e t
l e a r n @ j c s h i e l d . n e t
vp@jcventures.in

More Related Content

What's hot

Identifying and Collecting Digital Evidence Webinar
Identifying and Collecting Digital Evidence WebinarIdentifying and Collecting Digital Evidence Webinar
Identifying and Collecting Digital Evidence WebinarCase IQ
 
Defensa Centralizada contra amenazas multi-vector - Configuración de un centr...
Defensa Centralizada contra amenazas multi-vector - Configuración de un centr...Defensa Centralizada contra amenazas multi-vector - Configuración de un centr...
Defensa Centralizada contra amenazas multi-vector - Configuración de un centr...Eventos Creativos
 
Cyber intelligence for corporate security
Cyber intelligence for corporate securityCyber intelligence for corporate security
Cyber intelligence for corporate securityG3 intelligence Ltd
 
Using SurfWatch Labs' Threat Intelligence to Monitor Your Digital Risk
Using SurfWatch Labs' Threat Intelligence to Monitor Your Digital RiskUsing SurfWatch Labs' Threat Intelligence to Monitor Your Digital Risk
Using SurfWatch Labs' Threat Intelligence to Monitor Your Digital RiskSurfWatch Labs
 
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ..."Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...PROIDEA
 
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...NCCOMMS
 
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNet
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNetTecnologías para el Cumplimiento. Alexandre Bento. SafeNet
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNetInternet Security Auditors
 

What's hot (10)

Identifying and Collecting Digital Evidence Webinar
Identifying and Collecting Digital Evidence WebinarIdentifying and Collecting Digital Evidence Webinar
Identifying and Collecting Digital Evidence Webinar
 
Defensa Centralizada contra amenazas multi-vector - Configuración de un centr...
Defensa Centralizada contra amenazas multi-vector - Configuración de un centr...Defensa Centralizada contra amenazas multi-vector - Configuración de un centr...
Defensa Centralizada contra amenazas multi-vector - Configuración de un centr...
 
Cyber intelligence for corporate security
Cyber intelligence for corporate securityCyber intelligence for corporate security
Cyber intelligence for corporate security
 
It security
It securityIt security
It security
 
Using SurfWatch Labs' Threat Intelligence to Monitor Your Digital Risk
Using SurfWatch Labs' Threat Intelligence to Monitor Your Digital RiskUsing SurfWatch Labs' Threat Intelligence to Monitor Your Digital Risk
Using SurfWatch Labs' Threat Intelligence to Monitor Your Digital Risk
 
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ..."Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
 
Security Patterns for Software Development
Security Patterns for Software DevelopmentSecurity Patterns for Software Development
Security Patterns for Software Development
 
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
 
Security coding
Security codingSecurity coding
Security coding
 
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNet
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNetTecnologías para el Cumplimiento. Alexandre Bento. SafeNet
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNet
 

Similar to JC Shield Cyber Security Academy

Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3ShivamSharma909
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course contentShivamSharma909
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsCprime
 
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...Ruby Meditation
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
Technical Challenges in Cyber Forensics
Technical Challenges in Cyber ForensicsTechnical Challenges in Cyber Forensics
Technical Challenges in Cyber ForensicsOllie Whitehouse
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessJoAnna Cheshire
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsTechcello
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applicationskanimozhin
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfNaveenKumar470500
 
Aos Overview Presentation
Aos Overview PresentationAos Overview Presentation
Aos Overview Presentationbradchopkins
 
Cissp exam-outline
Cissp exam-outlineCissp exam-outline
Cissp exam-outlineAhmet E
 
Fishnet Security Overview
Fishnet Security   OverviewFishnet Security   Overview
Fishnet Security Overviewtbeckwith
 
Cissp exam outline 121417- final (2)
Cissp exam outline 121417- final (2)Cissp exam outline 121417- final (2)
Cissp exam outline 121417- final (2)Joshua Fonseca
 
CompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdfCompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdfInfosec train
 
CompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdfCompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdfpriyanshamadhwal2
 
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦Infosec train
 

Similar to JC Shield Cyber Security Academy (20)

Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
 
Cybersecurity Roadmap for Beginners
Cybersecurity Roadmap for BeginnersCybersecurity Roadmap for Beginners
Cybersecurity Roadmap for Beginners
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOps
 
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Technical Challenges in Cyber Forensics
Technical Challenges in Cyber ForensicsTechnical Challenges in Cyber Forensics
Technical Challenges in Cyber Forensics
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your Business
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdf
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdf
 
Aos Overview Presentation
Aos Overview PresentationAos Overview Presentation
Aos Overview Presentation
 
Cissp exam-outline
Cissp exam-outlineCissp exam-outline
Cissp exam-outline
 
Fishnet Security Overview
Fishnet Security   OverviewFishnet Security   Overview
Fishnet Security Overview
 
Cissp exam outline 121417- final (2)
Cissp exam outline 121417- final (2)Cissp exam outline 121417- final (2)
Cissp exam outline 121417- final (2)
 
Careers in Cyber Security
Careers in Cyber SecurityCareers in Cyber Security
Careers in Cyber Security
 
CompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdfCompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdf
 
CompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdfCompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdf
 
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
 

More from Vasanti Dutta

More from Vasanti Dutta (6)

MCA-5 unit1
MCA-5 unit1MCA-5 unit1
MCA-5 unit1
 
Networking lec1 4
Networking lec1 4Networking lec1 4
Networking lec1 4
 
Networking lectures unit 2, MCA VII
Networking lectures unit 2, MCA VIINetworking lectures unit 2, MCA VII
Networking lectures unit 2, MCA VII
 
Networking lecture1
Networking lecture1Networking lecture1
Networking lecture1
 
Lecture notesmap
Lecture notesmapLecture notesmap
Lecture notesmap
 
Servlet classnotes
Servlet classnotesServlet classnotes
Servlet classnotes
 

Recently uploaded

Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 

Recently uploaded (20)

Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 

JC Shield Cyber Security Academy

  • 1. JC Shield( A C y b e r S e c u r i t y d i v i s i o n o f J C V e n t u r e s ) Cyber Security Academy
  • 2. About JC ShieldA C y b e r S e c u r i t y d i v i s i o n o f J C V e n t u r e s 2 We are JC Ventures, an ISO 9001–2015 certified company, having national and international presence. Our clients are spread across the country. We are registered under MSME, providing technology-based solutions. We have always been driven by science and its application to create superior technology. And with this superior technology, we provide services far and wide. These technology-based services are availed by our clients of diverse domains. They range from banking, financial services and insurance (BFSI) to cyber security services and training, security and surveillance solutions, anti-drone technology and digital learning solutions. Currently, we have a presence in 400 districts, with a growing network of more than 3500 touch points, and serving 1 million customers across the nation. With an experienced professional team, the company is taking the initiative in enhancing the GDP. At JC Ventures, we are all committed to serve our clients in the best possible way through our expertise, reach and resources which includes the latest in technology. A member of DSCI (NASCOM), FICCI, CII.
  • 3. OS Concepts & Commands • Architecture and Processes • Memory & Storage Management • Basic Linux Commands Network Security Concepts • Networking Concepts & Devices • Network Ports & Protocols - TCP, IP, UDP, DNS • Network Packet Crafting • Network Protocol Analysis Cloud & Virtualization 101 • Cloud Computing Concepts • Virtualization Concepts Web Security Concepts • Web Concepts - Request/Response/Headers • Common Security Flaws - Injections, XSS, XSRF 3 Cyber Security Concepts • Security Terminology • Data Confidentiality - Encryption, PKI, SSL/TLS • Data Integrity - Hashing, Digital Signature • Data Availability • Authentication - Password Security, SAML, OAuth, LDAP • Authorization - Access Controls • Accountability - Log Management • Secure Design Principles Penetration Testing 101 • Reconnaissance, Enumeration • Scanning, Vulnerability Assessment • Exploitation, Covering Tracks JC Shield Certified Cyber Security - Associate
  • 4. Information Gathering • Web - Reconnaissance, Finger Printing, Enumeration, Spidering Web Application Services • Web Server 101 - Apache • Web Database 101 – MySQL Bypass Authentication • Bypassing Password Security • Bypass Access Controls/Privileges • Bypass Session Management Controlsion, Authorization & Session Management Bypass Input Validation • Injection Attacks, LFI/RFI, XXEi • XSS • Buffer Overflow 4 Client Side Attacks • DOM XSS, HTML Injection • CORS, URL Redirection Cloud Security Concepts • Secure Cloud - Network • Secure Cloud - Storage • Secure Cloud - User Management • Securing Cloud Instances • Securing Cloud Servers JC Shield Certified Application Security – Professional
  • 5. DevSecOps: Introduction • DevOps: Introduction [CI-CD] • Traditional Secure SDLC • DevSecOps Introduction • Automating Security Testing: SAST, DAST, SCA Securing Dockers • Key Container Components, Commands, Features • Securing Workloads, Daemon, Trusted Images, Profiles Securing Kubernetes Cluster • Key Cluster Components, Commands and Concepts • Securing cluster Infrastructure and Components Securing Microservices • Benefits, Architecture, Communication • Securing Parameter and Communication Securing SaaS Application • Best Practices, Threat Model 5 JC Shield Certified DevOps Security - Expert
  • 6. Cyber Security Technology • JCS Certified PEN Test Professional (5 days) • JCS Certified PEN Test Expert (5 days) • JCS Certified Licensed PEN Tester (5 days) • JCS Certified Application Security Professional (5 days) • JCS Certified Application Security Expert (5 days) • JCS Certified Database Security Professional (5 days) • JCS Certified Database Security Expert (5 days) • JCS Certified Web Application Professional (5 days) • JCS Certified Web Application Expert (5 days) • JCS Certified SOC Analyst (5 days) • JCS Certified SOC Expert (3 days) • JCS Certified Forensic Professional (5 days) • JCS Certified Forensic Expert (5 days) • JCS Certified Secure Coding Professional (3 days) • JCS Certified Dev Ops Security Professional (3 days) 6 Certification Path
  • 7. Cyber Security Management • JCS Certified Cyber Incident Response Management Expert (2 days) • JC Shield PCI_DSS QSA certification approach (2 days) • JC Certified Cyber Risk Expert (5 days) • JC Certified Cyber Systems Security Officer Expert (3 days) • JC Certified Cyber Security Management Systems--Cyber Auditor (5 days) • JC Certified Cyber Systems Security Auditor (5 days) • JC Certified Information Security Management Systems— Lead Implementer (5 days) • JC Certified Anti Money Laundering Expert [AML] (3 days) 7 Certification Path
  • 8. Cyber Security Analytics • AI: Cyber Security (15 days) • Machine Learning: Cyber Security (30 days) • Data Science: Cyber Security (30 days) 8 Certification Path
  • 9. JCS Certified Computer Forensics Specialist (40 Hrs) • What is digital forensics? • What is digital forensic science? • The role of digital forensics • The role of the forensic scientist in law • Essentials of digital acquisition & duplication • Digital forensics evidence methodology • Digital forensics analysis and research • Digital Forensics protocols • Digital Incident response, reporting and presenting in court • OS Forensics fundamentals (Windows & Linux) 9
  • 10. JCS Certified Windows Forensics Professional(40 Hrs) • Windows Operating Systems Focus • Windows File Systems (NTFS, FAT, exFAT) • Advanced Evidence Acquisition Tools and Techniques • Registry Forensics • Shell Item Forensics • Windows Artifacts Analysis • File and Metadata examination • Email Forensics (Host, Server, Web) • Event Log File Analysis • Firefox, Chrome, Edge, and Internet Explorer Browser Forensics • Deleted Registry Key and File Recovery • Recovering Missing Data From Registry and ESE Database .Log Files • String Searching and File Carving • Media Analysis and Exploitation • Recovery deleted files and partitions • Tools and case study • Expert witness 10
  • 11. THANK YOU w w w . j c s h i e l d . n e t l e a r n @ j c s h i e l d . n e t vp@jcventures.in