Diploma Programs

1. Advance Diploma In Information Security (ADIS):


Course Duration: 300 Hrs. / 12 Months (Weekdays /Weekends)

Course Contents: Mentioned Below

Course Certificates: Total 5 (CISEL1, Web App, Network Security, Exploit Writing & ADIS)

Course Kit: Books & CD will be provided for each Training Modules.

Others: Project ,Personality Development with Interview Preparation Classes & Placement Assistance

Training Module -CISE L1:-

Chapter 1 – Introduction • Chapter 2 – Networking • Chapter 3 – Footprinting/Reconnaissance • Chapter 4: Google Hacking • Chapter 5: Scanning • Chapter 6: System Hacking: Win7 and Linux • Chapter 7: Android & iPhone Hacking • Chapter 8: Malwares • Chapter 9: SQL Injection • Chapter 10: Cross Site Scripting • Chapter 11: Sniffing • Chapter 12: Social Engineering • Chapter 13: Identity Theft Fraud • Chapter 14: Denial of Service • Chapter 15: Session Hijacking • Chapter 16: Penetration Testing • Chapter 17: Exploit Writing & Buffer Overflow • Chapter 18: Cryptography & Steganography • Chapter 19: Firewalls & Honeypots • Chapter 20: IDS & IPS • Chapter 21: Hacking Web Server • Chapter 22: Wireless Hacking • Chapter 23: Physical Security • Chapter 24: Reverse Engineering • Chapter 25: Email Hacking • Chapter 26: Security Compliance and Auditing • Chapter 27:Incident Handling & Computer forensics

Training Module – CISE L2: WEB APP SECURITY:-

• Chapter 1 – Web Architectures • Chapter 2 – Web Application Introduction • Chapter 3 – PHP-Basics • Chapter 4 – Sessions & Cookies • Chapter 5 – XSS Attacks • Chapter 6 – Advanced SQLI • Chapter 7 – Cross Site Request Forgery • Chapter 8 – Session Hijacking • Chapter 9 – Web based DDOS Attacks • Chapter 10 – Cookie Poisoning • Chapter 11 – PHP Injection • Chapter 12 – Web Based Worms • Chapter 13 – Flash based Web Attacks • Chapter 14 – I-Frame based Web Attacks • Chapter 15 – Clickjacking • Chapter 16 – Attack frameworks: AttackAPI & BeEF • Chapter 17 – Penetration testing on DVWA • Chapter 18 – Honeytokens • Chapter 19 – OWASP Top 10 • Chapter 20 – Metasploit and Web Application • Chapter 21 – PHP Curl • Chapter 22 – Automated Bots • Chapter 23 – Phishing 2.0 • Chapter 24 – Brute forcing Web Applications • Chapter 25 – Compliance Methodologies and Legalities • Chapter 26 – Capture the Flag Exercise • Chapter 27 – Summary

Training Module -CISE L2: NETWORK SECURITY :-

Chapter 1 – Network Topology • Chapter 2 – Open Systems Interconnectivity Model • Chapter 3 – TCP/IP In-depth • Chapter 4 – WAP, NAT, DNS and ICMP • Chapter 5 – Internet Routing • Chapter 6 – Advanced Port Scanning • Chapter 7 – Sniffing Attacks • Chapter 8 – Masquerading Attacks • Chapter 9 – Advanced DOS and DDOS • Chapter 10 – Session Hijacking Attacks • Chapter 11 – Network Operations Center – Security • Chapter 12 – Network Traffic Analysis • Chapter 13 – Network Vulnerability Assessment • Chapter 14 – Network Penetration Testing • Chapter 15 – Intrusion Detection System • Chapter 16 – Snort 101 • Chapter 17 – OSSEC 102 • Chapter 18 – Intrusion Prevention System • Chapter 19 – Firewalls (Installation, Configuration and Usage) • Chapter 20 – OS Hardening for Networks – Linux and Windows • Chapter 21 – Cryptography – Introduction • Chapter 22 – Symmetric Key Encryption • Chapter 23 – Asymmetric Key Encryption • Chapter 24 – Hash functions • Chapter 25 – Trust models • Chapter 26 – VLAN – Security • Chapter 27 – VPN – Security • Chapter 28 – Wireless Networks – Introduction • Chapter 29 – Radio Frequency Essentials • Chapter 30 – Wireless Security – Basics • Chapter 31 – Wireless Threats • Chapter 32 – Attacking Wireless Hotspot and Security • Chapter 33 – WEP Security • Chapter 34 – WPA/WPA2 Security • Chapter 35 – Secure Wireless Infrastructure Deployment • Chapter 36 – DNS Tunneling • Chapter 37 – Network Forensic Methodology • Chapter 38 – Network Evidence Acquisition • Chapter 39 – OS Logs and Splunk • Chapter 40 – Summary

Training Module – CISE L2: EXPLOIT WRITING :-

Chapter 1 – Introduction to Exploit Writing • Chapter 2 – Programming & Basics • Chapter 3 – Assembly language • Chapter 4 – Debugging • Chapter 5 – Stack Based Buffer Overflow • Chapter 6 – Understanding Windows Shellcode • Chapter 7 – Fuzzers • Chapter 8 – Heap Based Overflow • Chapter 9 – Exploiting /GS Canary Protected Programs • Chapter 10 – Exploiting SafeSEH Protected Programs • Chapter 11 – Denial of Service • Chapter 12 – Bypassing DEP & ASLR • Chapter 13 – Advanced Shellcoding (Win32 Egghunting, Connect-back, Staged, Alphanumeric) • Chapter 14 – Encoders & Writing Custom Encoders • Chapter 15 – DLL Hijacking • Chapter 16 – Client Side Exploits • Chapter 17 – From Vulnerability to Exploit • Chapter 18 – Metasploit Framework • Chapter 19 – Binary payloads & Antivirus Evasion • Chapter 20 – Exploit to Metasploit • Chapter 21 – Capture The Flag Exercise

2. Diploma In Information Security & Network Security:

Duration: 120 hours

Contents: CISE L1 + Network Security

Schedule: Weekdays/Weekends

Training Certificates: Would be provided by Alfa Metis & Innobuzz

 Course Contents:

 Training Module -CISE L1:-

Chapter 1 – Introduction • Chapter 2 – Networking • Chapter 3 – Foot printing/Reconnaissance • Chapter 4: Google Hacking • Chapter 5: Scanning • Chapter 6: System Hacking: Win7 and Linux • Chapter 7: Android & iPhone Hacking • Chapter 8: Malwares • Chapter 9: SQL Injection • Chapter 10: Cross Site Scripting • Chapter 11: Sniffing • Chapter 12: Social Engineering • Chapter 13: Identity Theft Fraud • Chapter 14: Denial of Service • Chapter 15: Session Hijacking • Chapter 16: Penetration Testing • Chapter 17: Exploit Writing & Buffer Overflow • Chapter 18: Cryptography  &  Steganography • Chapter 19: Firewalls & Honeypots • Chapter 20: IDS & IPS • Chapter 21: Hacking Web Server • Chapter 22: Wireless Hacking • Chapter 23: Physical Security • Chapter 24: Reverse Engineering • Chapter 25: Email Hacking • Chapter 26: Security Compliance and Auditing • Chapter 27:Incident Handling & Computer forensics

Training Module -CISE L2: NETWORK SECURITY :- 

Chapter 1 – Network Topology • Chapter 2 – Open Systems Interconnectivity Model • Chapter 3 – TCP/IP In-depth • Chapter 4 – WAP, NAT, DNS and ICMP • Chapter 5 – Internet Routing • Chapter 6 – Advanced Port Scanning • Chapter 7 – Sniffing Attacks • Chapter 8 – Masquerading Attacks • Chapter 9 – Advanced DOS and DDOS • Chapter 10 – Session Hijacking Attacks • Chapter 11 – Network Operations Center – Security • Chapter 12 – Network Traffic Analysis • Chapter 13 – Network Vulnerability Assessment • Chapter 14 – Network Penetration Testing • Chapter 15 – Intrusion Detection System • Chapter 16 – Snort 101 • Chapter 17 – OSSEC 102 • Chapter 18 – Intrusion Prevention System • Chapter 19 – Firewalls (Installation, Configuration and Usage) • Chapter 20 – OS Hardening for Networks – Linux and Windows • Chapter 21 – Cryptography – Introduction • Chapter 22 – Symmetric Key Encryption • Chapter 23 – Asymmetric Key Encryption • Chapter 24 – Hash functions • Chapter 25 – Trust models • Chapter 26 – VLAN – Security • Chapter 27 – VPN – Security • Chapter 28 – Wireless Networks – Introduction • Chapter 29 – Radio Frequency Essentials • Chapter 30 – Wireless Security – Basics • Chapter 31 – Wireless Threats • Chapter 32 – Attacking Wireless Hotspot and Security • Chapter 33 – WEP Security • Chapter 34 – WPA/WPA2 Security • Chapter 35 – Secure Wireless Infrastructure Deployment • Chapter 36 – DNS Tunneling • Chapter 37 – Network Forensic Methodology • Chapter 38 – Network Evidence Acquisition • Chapter 39 – OS Logs and Splunk • Chapter 40 – Summary

 

3. Advance Diploma Program in JAVA & Android (ADJA):

Advance Diploma on JAVA & Android (ADJA) which covers the technologies:

  • Certified JAVA Core
  • Certified JAVA Advance
  • Android Application
Highlights of the Program:
  • Course Duration: 150 Hours. / 6 Months (Weekdays /Weekends)
  • You will be awarded with 4 Certifications.
  • In addition, you will also be awarded with 1 year Advance Diploma on JAVA & Android (ADJA) on successful completion of the Program.
  • Training Kit (Books & Software CD) would be provided during Training,
  • 100% Placement Assistance.

4. Advance Diploma In DIGITAL MARKETING:

  • Duration: 6 Months
  • Contents ( Digital/Online Marketing,SEO, PPC, FB Marketing)
  • Training Schedule: Weekdays/Weekends (2/3 hours per day)
  • Training by: Certified Trainer & Industry Expert
  • Training Methodology: Practical & industry oriented with LIVE PROJECTS.
  • Intended Audience: Any Technical & Non-Technical Graduates                                 
  • Training Certificate would  be provided  post completion of training.

5. Diploma In Web Application Development:

Salient Features:

Duration: 12 Months

Schedule: Weekdays (3 alternate days) —      2 hours per day

                  Weekends (Saturday & Sunday) — 3 hours per day

Mode of Payment: Cheque/DD/Cash/EMI’s facility

Topics Covered:                            

C & C++ Basics:                          Duration 1 month

HTML 5:                                       Duration 1 month

PHP Core:                                    Duration 3 months  

JAVA Core :                                 Duration 2 months

Android Apps Development:  Duration 2 months                            

Web Application Security:       Duration 3 months

                             

Training Methodology:

Assignments, Tests, Project

 

Other Features:

Interview Preparation

Placement Assistance

Certificate from Alfa Metis (P) LTD Post completion of Training

 

COURSE CONTENTS:

C Basics:

Unit I 1. What is C
2. Constants, Variables & Key words.
3. C Key Words
4. C Instructions:
Type Declarations Instructions
Arithmetic Instructions
Integers & Float Conversations
Type Conversation In Assignment
5. Decision Control structure
If  Statement
If – Else Statement
Nested If –Elses
Logical Operators
Conditional Operators
Unit II 6. Loop Control Structure
While Loop
For Loop
Do While Loop
Break Statement
Continue Statement
7. Case Control Structure
Switch Case
Go To Statement
Unit III 8. Function
Passing Values Between Functions
Function Declaration
Call by Value And Call By Reference
Pointers
Pointer Notations
Recursion
9. Arrays
Array Initialization
One Dimensional Arrays
Two Dimensional Arrays
Three Dimensional Arrays
Unit IV 10. What Are Strings
Strlen()
Strcpy()
Strrev()
Strcat()
11. Structures
12. Input/Output In C

C++ Basics:

Unit I Introduction to C++
·         Creating a project
·         Writing, compiling and running a program
·         Variables and data types
·         Expressions
·         Constants
·         Operators
·         Type conversions
·         Looping constructs: while, do…while, for loops
·         If…else statements
·         Switch/case construct
Unit II Functions
·         Passing arguments
·         Function prototyping
·         Default argument initializers
·         Inline functions
·         Arrays
·         Array initialisation
·         Multi-dimensional arrays
·         Character arrays
·         Working with character strings
·         STORAGE CLASSES
·         Global variables
·         Pointers
·         Pointer and arrays
·         Pointers to character strings
·         Arrays of pointers
·         Memory slicing
·         Pointers to functions
·         Enumeration types
Unit III  C++ classes
·         Data members and member functions
·         Creating objects
·         The new and delete operators
·         Friends to a class
·         Class initialisation
·         Reference types
·         Reference type arguments
·         Function overloading
·         Operator overloading
·         Copy constructor
·         Assignment operator
·         Template classes
·         Static class members
·         File streams
·         Inheritance
·         Base classes and derived classes
·         Inherited member access
·         Base class initialisation
·         Protected members of a class
Unit IV  Virtual functions
·         Virtual destructors
·         Virtual base classes
·         Virtual base class member access
·         Constructor and destructor ordering
·         Exception handling
·         try…throw…catch block
·         Nested catch handlers

HTML 5:

  • Introduction—Syntax/Commands/Tags
  • Basic Templates
  • The HTML and XHTML Syntax
  • The HTML Vocabulary and APIs

PHP Core:

Chapter 1 – Introduction to Open Source

Chapter 2 – Introduction to LAMP

Chapter 3 – PHP Basics

Chapter 4 – Installing PHP

Chapter 5 – Basic Scripting

Chapter 6 – PHP Building Blocks

Chapter 7 – PHP Structures
Chapter 8 – Function
Chapter 9 – Array
Chapter 10 – Working with Forms

Chapter 11 – Working with Files and Directories

Chapter 12 – Dates

Chapter 13 – OOPS

Chapter 14 – DBMS Basics

Chapter 15 – Database Integration – MySQL

Chapter 16 – Cookies

Chapter 17 – Session Management

Chapter 18 – More Commands

Chapter 19 – Network Programming using PHP

Chapter 20 – Introduction to APIs

Chapter 21 – JavaScript

Chapter 22 – DHTML

Chapter 23 – XML

Chapter 24 – Debugging

Chapter 25 – Introduction to CMS (Joomla,Drupal, WordPress)

Chapter 26 – Threats and Secure Coding Practices

 

Java Core:

1.Getting Started with OOPS and Java

  • Object-Oriented Programming
    • Introduction to Object-Oriented Programming
    • Encapsulation
    • Inheritance
    • Polymorphism
    • Abstraction
  • What is Java?
  • History of Java
  • How to get Java
  • Compiling and interpreting application
  • The JDK Directory Structure
  • Inside JVM
  • A first java program
  • Introduce SOP and Scanner
  • Comments (Line, Block, Java Doc)

2.Datatypes and Variables

  • Primitive Data types
  • Non-Primitive Data types
  • Declarations
  • Variable Names
  • Numeric Literals
  • Character Literals
  • String Literals
  • The Dot Operator

3.Operators and Expressions

  • Assignment Operator
  • Arithmetic Operator
  • Relational Operators
  • Logical Operators
  • Increment and Decrement Operators
  • Operate-Assign Operators(+=,etc.)
  • The Conditional Operator
  • Operator Precedence
  • Implicit Type Conversions
  • The Cast Operator

4.Control Flow

  • Expressions
  • Statements
  • Conditional(if) Statements
  • Adding an else if
  • Conditional (switch) Statements
  • While and do-while Loops
  • For Loops
  • The continue Statement
  • The Break Statement

5.Arrays

  • One Dimensional Arrays
  • Multi-Dimensional Arrays
  • Enhanced For Loop

6.Introducing Classes

  • Classes and Objects
  • Fields and Methods
  • Methods
    • Calling Methods
    • Defining Methods
    • Method Parameters
    • Method Overloading
    • Variable argument parameters methods
  • Constructors
  • Garbage Collection
  • Access Modifier (private, public, protected, default)
  • Non-Access Modifier (static, final, abstract)
  • keywords: this
  • Wrapper Classes
  • String, String Builder and String Buffer

7.Inheritance in Java

  • Inheritance
  • Inheritance in Java
  • Method Overriding
  • Keywords (Super & Final)
  • Abstract Classes
  • Interfaces

8.Inner Classes and Packages

  • Inner Classes Concept
  • Anonymous Inner Class
  • Static inner class
  • Packages
  • Defining Packages
  • Package Scope
  • CLASSPATH and Finding Packages
  • The import Statement
  • Static Imports

9.Exception Handling

  • Exception Overview
  • Catching Exceptions
  • The Finally Block
  • Exception Methods
  • Declaring Exceptions
  • Defining and Throwing Exceptions
  • Errors and Runtime Exceptions

10.Input/Output Streams

  • Overview of Streams
  • Bytes vs. Characters
  • Converting Byte Streams to Character Streams
  • File I/O
  • Binary Input and Output
  • Basic and Filtered Streams
  • Serialization
  • Reading and Writing Objects
  • Print Writer Class
  • Scanner Class
  • File Class

11.MultiThreading in Java

  • Non-Threaded Applications
  • Threaded Applications
  • Creating Threads
  • Thread States
  • Runnable Threads
  • Coordinating Threads
  • Interrupting Threads
  • Runnable Interface
  • Synchronizing Threads
  • Inter thread Communication
  • Thread Groups
  • Advanced Locking Concepts

12.Collection Framework and Generics

  • Generics
  • The Collection Framework
  • The Set Interface
  • Set Implementation Classes
  • The List Interface
  • List Implementation Classes
  • The Map Interface
  • Map Implementation Classes
  • Sorting with Comparator
  • Sorting Lists and Arrays
  • Collections Utility Methods

13.Internalization and Property class

  • Internalizing application
  • Date Time formatter
  • Number Formatter
  • Properties class

14.Annotation and Reflection API 
15.Introduction to Eclipse
16.Introduction to standalone application and Applet

  • (Optional: If required for project)
  • Introduction to AWT
  • Introduction to Swing

ANDROID Apps Devep:

Java Fundamentals:

  • OOPS basics
  • Classes & Objects
  • Components of a Class
  • Structure of a Class & Java File
  • Inheritance
  • Interfaces
  • Abstract Class
  • Polymorphism
  • Overloading
  • Overriding

Android Apps Development Training Contents:

  • Part 1 – Introduction About Android & Smartphones , Installing the SDK Creating Android Emulator · Installing Eclipse · Installing Android Development    Tools · Choosing which Android version to use
  • Part 2 – Android App Fundamentals -Android Stack Android applications structure, The User Interface and Controls – Creating a project · Working with the AndroidManifest.xml · Using the log system · Activities
  • Part 3 – Graphics and Styling Application context Intents · Activity life cycle · Supporting multiple screen sizes, Supporting Multiple Screens · Text controls · Button controls · Toggle buttons · Images
  • Part 4 – Animation and Graphics :View animation draw able animation, Menus and Dialogs :Alert dialog · Custom dialog · Dialog as Activity
  • Part 5- Notifications and Toast Parameters on Intents · Pending intents · Status bar notifications · Toast notifications, Working with Media , Locations and Maps :Google maps · Using GPS to find current location
  • Part 6 – Preferences and Data Storage : Shared preferences Preferences activity · Files access · SQLite database, Lists · Using string arrays · Creating lists · Custom lists
  • Part 7 – Content providers Content provider introduction · Query providers
  • Part 8– Network Communication Web Services · HTTP Client · XML and JSON, Services · Service lifecycle · Foreground service
  • Part 9 – Publishing Your App Preparing for publishing · Signing and preparing the graphics · Publishing to the Android Market

Web Application Security:

Chapter 1 – Web Architectures                                   Chapter 15 – Click jacking
Chapter 2 – Web Application Introduction             Chapter 16 – Attack frameworks: Attack API & BeEF
Chapter 3 – PHP-Basics                                                   Chapter 17 – Penetration testing on DVWA
Chapter 4 – Sessions & Cookies                                  Chapter 18 – Honey tokens
Chapter 5 – XSS Attacks                                                 Chapter 19 – OWASP Top 10
Chapter 6 – Advanced SQLI                                          Chapter 20 – Metasploit and Web Application
Chapter 7 – Cross Site Request Forgery                  Chapter 21 – PHP Curl
Chapter 8 – Session Hijacking                                      Chapter 22 – Automated Bots
Chapter 9 – Web based DDOS Attacks                     Chapter 23 – Phishing 2.0
Chapter 10 – Cookie Poisoning                                    Chapter 24 – Brute forcing Web Applications
Chapter 11 – PHP Injection                                           Chapter 25 – Compliance Methodologies and Legalities
Chapter 12 – Web Based Worms                                                Chapter 26 – Capture the Flag Exercise
Chapter 13 – Flash based Web Attacks                    Chapter 27 – Summary
Chapter 14 – I-Frame based Web Attacks              Chapter 28 – Hardening JoomlaCMS.pptx