K7CSSE (Cybersecurity Sentinel)

Safety and privacy are always a concern in the digital world. This programme will give you an overview of the cyber threat landscape. It extends the understanding of threats, common human errors, and social engineering attacks. It gives an short overview of cyber laws that defend the common person.

Formats: Offline Seminar or Online Webinar (Lecture & Demo)

Duration: 8 hours (One day or 3 sessions of 2 hours online)

  • Define and relate to Cybersecurity
  • Understand the current threat Landscape
  • Relate to various cyber-attacks and its outcomes

K7CSSH (Cybersecurity Shield)

Devices that we use, platforms we logged in and websites we browse are filled with pitfalls and digital mines. The program helps you navigate through the digital world. It will help you manage mobile devices, passwords, emails, browsers, back-ups, and harden your operating system

Formats: Offline Seminar or Online Webinar (Lecture & Demo)

Duration: 8 hours (One day or 3 sessions of 2 hours online)

  • Define and relate social media identity and safe guards in social media
  • Understand the importance and security behind passwords
  • Understand vulnerabilities & data protection through back ups

K7NAS (Network Administration Specialist)

Everyone is digitally connected and data is everywhere. Understanding and relating to the networks that carry this information is critical for securing cyberspace. This programme provides a fundamental overview of networks, and various setup and configurations of servers.

Formats: Offline Seminar or Online Webinar (Lecture & Demo)

Duration: 16 hours (two days or 6 sessions of 2+1 hours online for 3 weekends)

  • Relate to network fundamentals, topologies, and network devices
  • Explore the TCP/IP protocols and their evolving compatibility transition
  • Configuring Switch, Active Directory, DNS, DHCP, Database, Web Servers

K7NDS (Network Defence Security)

The safety of an individual, a company, and society at large depends on the level of security the networks have built in. This programme provides a thorough overview of network security concepts, taking you through OSI layer and describing various vulnerabilities and known attacks on each layer.

Format: Offline Seminar or Online Webinar (Lecture & Demo)

Duration: 16 hours (two days or 6 sessions of 2+1 hours online for 3 weekends)

  • Relate to the various OSI security layers in a network and possible threats thereof
  • Relate to various attacks on the network and mitigation techniques
  • Relate to various network anomalies and their methods of identification

K7TMPA (Traffic Monitoring & Packet Analysis)

We are under constant attack through the digital landscape. This programme provides a thorough overview of how logs can help us monitor network and mitigate risks in traffic. Get strong understanding of packet analysis and network log monitoring techniques.

Format: Offline Seminar or Online Webinar (Lecture & Demo)

Duration: 16 hours (two days or 6 sessions of 2+1 hours online for 3 weekends)

  • Practice traffic monitoring, packet capture & analysis using Wireshark tool
  • Understand the concept of packet sniffing and identifying malicious packets
  • Relate to traffic log analysis and archiving of log files; log file retrieval & parsing

K7OSINT (Open Source Intelligence)

As organisations and governments are grappling with huge volumes of sensitive data it easy to access much of structured data from open source data points. This programme offers an overview of various sources and techniques in collecting open source intelligence and foot printing a potential target.

Format: Offline Seminar or Online Webinar (Lecture & Demo)

Duration: 16 hours (two days or 6 sessions of 2+1 hours online for 3 weekends)

  • Relate to various sources of open source intelligence on a potential target
  • Conduct reconnaissance using the internet through foot-printing techniques
  • Experiment with social engineering methods and mitigation

K7SVA (Security Vulnerability Audit)

Data breach and loss of digital assets have become a norm of the day. There are huge vulnerabilities which expose sensitive data of the organisation and governments. This programme offers a step by step method of assessing vulnerability in a system and ability to mitigate common vulnerabilities

Format: Offline Seminar or Online Webinar (Lecture & Demo)

Duration: 16 hours (two days or 6 sessions of 2+1 hours online for 3 weekends)

  • Understand the importance of scanning ports, operating system and infrastructure
  • Employ scanning techniques using various vulnerability scan tools
  • Understand the enumeration concept and its application in vulnerability scans

K7IPT (Introduction to Penetration Testing)

Best offence is in the defence. To relate to an attacker, one has think and operate like an attacker. This programme shares the tools, techniques and processes of penetration tester who legally explores methods of exploiting vulnerability and highlights weakness to strengthen in the future.

Format: Offline Seminar or Online Webinar (Lecture & Demo)

Duration: 16 hours (two days or 6 sessions of 2+1 hours online for 3 weekends)

  • Relate to the attack surface in an organisation and various possible attack vecotrs
  • Experiment by penetration testing a WordPress site using hacked credentials
  • Apply concepts of penetration testing in exploiting data and functions in digital infrastructure

K7AMS (Android Mobile Security)

Today‚Äôs world is connected through Android devices and people have become accustomed to using their smartphone for everything in their lives. This programme explores the Android Security framework, exposes various attacks on the system, and details the various Android Security features over the years.  

Format: Offline Seminar or Online Webinar (Lecture & Demo)

Duration: 16 hours (two days or 6 sessions of 2+1 hours online for 3 weekends)

  • Define the structure of the Android operating system
  • Relate to the APK file structure and how mobile apps function
  • Identify basic vulnerabilities & types of malwares in flavours of Android OS