• certified-ethical-hacking

    Ethical Hacking

    Summer Internship Program 2019

    Summer training in cyber security Join Batches starting
    from Feb, March Batches. Registration Started for internships in April May 2019.

  • Cyber-Forensics-Investigation

    Python For Pentesting

    best career opportunity For Students

    The More You Do Hard Work, The More You Get Lucky.Believe In Your Efforts, ‘tumhara Time Aayega’
    Join Summer Internship Program 2019 By Craw Cyber Security, New Delhi Registration Started

  • In-depth-Advance-Networking

    Are Ready.?

    Become a Certified Ethical Hacker (v10)

    Certified Ethical Hacker (CEH) is a qualification obtained by assessing the security of computer systems, using penetration testing techniques.
    The code for the CEH exam is 312-50, and the certification is in Version 10 .

Summer Training 2019

RESERVE YOUR SEAT TODAY

Craw Cyber Security - invites applications or candidates for its 2019 Summer Internship Program in Ethical Hacking, Information Security, Networking, Web Development , Software Development, Management and Marketing at its locations in New Delhi. We are seeking highly motivated students, who are interested in experiencing an exciting summer of research. The selected students will have the opportunity to work closely with an outstanding research team on challenging problems that range from leading-edge exploratory work to prototyping real-world systems and applications. During the internship, the students will also have the opportunity to participate in the workshops, competitions, events, live projects of the largest industrial research organization in the world and network with other top students in different fields from other universities. We offer internship positions in various research areas such as:

If you are interested in Joining Ethical Hacking Summer Training Program than get in touch using the contact us form or you can directly email us at training@craw.in or use the phone numbers to contact us.
Call Now 011-40394315 +91-9650202445 +91-9650677445

Get In Touch

Course Module Details Of Summer Training 2019

Need more clarity on schedule and prices? Email training@craw.in/contact us +91-9650202445

  • MODULE 1:- INTRODUCTION TO BASICS OF ETHICAL HACKING
  • MODULE 2:- FOOT-PRINTING ACTIVE(TOOL BASED PRACTICAL)
  • MODULE 3:- FOOT-PRINTING PASSIVE(PASSIVE APPROACH)
  • MODULE 4:- IN-DEPTH NETWORK SCANNING
  • MODULE 5:- ENUMERATION USER IDENTIFICATION
  • MODULE 6:- SYSTEM HACKING PASSWORD
  • MODULE 7:- VIRUSES AND WORMS
  • MODULE 8:- TROJANS AND BACKDOOR
  • MODULE 9:- SNIFFERS MITM WITH WINDOW
  • MODULE 10:- BOT AND BOTNETS
  • MODULE 11:- SNIFFERS MITM WITH WINDOW
  • MODULE 12:- SOCIAL ENGINEERING TECHNIQUES
  • MODULE 13:- SOCIAL ENGINEERING TOOLKIT PRACTICAL BASED
  • MODULE 14:- DENIAL O SERVICES DOS DDOS ATTACKS
  • MODULE 15:- WEB SESSION HIJECKING
  • MODULE 16:- SQL INJECTION MANUAL TESTING
  • MODULE 17:- SQL INJECTION AUTOMATED TOOL BASED TESTING
  • MODULE 18:- BASICS OF WEB APP SECURITY
  • MODULE 19:- HACKING WEB SERVERS SERVERS ROOTING
  • MODULE 20:- HACKING WIRELESS NETWORK MANUAL CLI BASED
  • MODULE 21:- HACKING WIRELESS NETWORK : AUTOMATED TOOL BASED
  • MODULE 22:- EVADING IDS,FIRWALLS
  • MODULE 23:- HONEY POTS
  • MODULE 24:- BUFFER OVERFLOW
  • MODULE 25:- CRYPTOGRAPHY
  • MODULE 26:- PENETRATION TESTING : BASICS
  • MODULE 27:- MOBILE HACKING
  • MODULE 28:- CLOUD SECURITY AND MANY MORE,…….

Need more clarity on schedule and prices? Email training@craw.in/contact us +91-9650202445

  • MODULE 1 :-HOW TO PLAN YOUR PENETRATION TESTING
  • MODULE 2 :-SCOPING YOUR PENETRATION TESTING
  • MODULE 3 :-NETWORK AND WEB-APPLICATION
  • MODULE 4 :-POST EXPLOITATION PHASE
  • MODULE 5:-IN DEPTH PASSWORD ATTACKS
  • MODULE 6 :-WEB APPLICATION PENETRATION TESTING
  • MODULE 7:-PENETRATION TEST REPORTING

Need more clarity on schedule and prices? Email training@craw.in/contact us +91-9650202445

  • Module 01: Introduction to Python
  • Module 02: Basic Syntax
  • Module 03: Variable Types
  • Module 04: Basic Operators
  • Module 05: Decision Making
  • Module 06: Loops
  • Module 07: File I/O
  • Module 08: Numbers
  • Module 09: Strings
  • Module 10: Lists
  • Module 11: Tuples
  • Module 12: Dictionary
  • Module 13: Date & Time
  • Module 14: Function
  • Module 15: Modules
  • Module 16: Exceptions
  • Module 17: Classes & Objects
  • Module 18: Regular Expressions
  • Module 19: Database Access .
  • Module 20: Programming with Raspberry Pi
  • Module 21: Python Programming with Hacking
  • Module 22: Hacking based on Python Programming
  • Module 23: In-Depth Hacking Training
  • Module 23: Live Creating Script virues,malware,Remote Connection Script

Need more clarity on schedule and prices? Email training@craw.in/contact us +91-9650202445

  • MODULE 1 :- WHAT IS COMPUTER FORENSICS
  • MODULE 2:- METHODS BY WHICH COMPUTER GETS HACKED
  • MODULE 3 :- COMPUTER FORENSICS INVESTIGATION PROCESS
  • MODULE 4:- DIGITAL EVIDENCE GATHERING
  • MODULE 5 :- COMPUTER FORENSICS LAB
  • MODULE 6 :- SETTING UP FORENSICS LAB
  • MODULE 7 :- UNDERSTANDING HARD DISKS
  • MODULE 8 :- FILE SYSTEMS ANALYSIS : LINUX/WINDOWS/MAC
  • MODULE 9 :- WINDOWS FILE SYSTEM FORENSICS
  • MODULE 10 :- DATA ACQUISITION TOOLS AND TECHNIQES
  • MODULE 11 :- DATA IMAGING TECHNIQUES AND TOOLS
  • MODULE 12 :- RECOVERY DELETED FILES AND FOLDERS
  • MODULE 13 :- DELETED PARTITIONS RECOVERY TECHNIQUE
  • MODULE 14 :- FORENSICS INVESTIGATIONS USING FORENSICS TOOLKIT (FTK)
  • MODULE 15 :- FORENSICS INVESTIGATIONS USING FORENSICS TOOLKIT (OXYGEN)
  • MODULE 16 :- FORENSICS INVESTIGATIONS USING ENCASE TOOL
  • MODULE 17 :- STENOGRAPHY AND IMAGE FILE FORENSICS
  • MODULE 18 :- APPLICATION PASSWORD CRACKERS
  • MODULE 19 :- LOG COMPUTING AND EVENT CORRELATION
  • MODULE 20 :- NETWORK FORENSICS TOOLS: CELLEBRITE TOOLS
  • MODULE 21 :- INVESTIGATING TOOLS
  • MODULE 22 :- INVESTIGATING NETWORK TRAFFIC : WIRESHARK
  • MODULE 23 :- INVESTIGATING WIRELESS ATTACKS
  • MODULE 24 :- INVESTIGATING WEB APPLICATION ATTACKS VIA LOGS
  • MODULE 25 :- TRACKING AND INVESTIGATING VARIOUS EMAIL CRIMES
  • MODULE 26 :- DETAILED INVESTIGATIVE REPORTING

Need more clarity on schedule and prices? Email training@craw.in/contact us +91-9650202445

  • MODLES 1 :- OPERATION OF PROTOCOLS
  • MODLES 2 :-OSI LAYERS
  • MODLES 3:-TCP/IP MODELS
  • MODLES 4 :-INSTALLING
  • MODLES 5:-CONFIGURING
  • MODLES 6 :-CONCEPTS OF LAYERS
  • MODLES 7:-TSP,VLAN,CAM
  • MODLES 8 :-IPV4 AND IPV6
  • MODLES 9:-OSPF (SINGLE AND MULTI-AREA)
  • MODLES 10:-LOAD BALANCING
  • MODLES 11 :-EIGRP
  • MODLES 12 :-INTRODUCTION TO WAN
  • MODLES 1 3:-WAN PROTOCOL
  • MODLES 14:-HDLC,PPP,NAT
  • MODLES 15 :-INTRODUCTION TO MPLS
  • MODLES 16:-DHCP,SNMP,NETFLOW
  • MODLES 17 :-SSH
  • MODLES 18 :-SECRET PASSWORD

Need more clarity on schedule and prices? Email training@craw.in/contact us +91-9650202445

  • MODULE 1 :- SQL INJECTION FLAWS
  • MODULE 2 :-CROSS SITE SCRIPTING FLAW
  • MODULE 3:-SOURCE CODE DISCLOSURE FLOW
  • MODULE 4:-OS COMMAND INJECTION FLOW
  • MODULE 5:-BROKEN AUTHENTICATION
  • MODULE 6 :-FILE UPLOAD VULNERABILITY
  • MODULE 7 :-CROSS SITE REQUEST FORGERY
  • MODULE 8 :-SENSITIVE DATA EXPLOSURE
  • MODULE 9:-REMOTE FILE INCLUSION
  • MODULE 10 :-DIRECTORY TRAVERSAL ATTACKS
  • MODULE 11 :-INVALID TRAVERSAL FLOW
  • MODULE 12 :-SECURITY MIS–CONFIGURATION
  • MODULE 13 :-MISSING AUTHENTICATION
  • MODULE 14 :-SESSION FIXATION
  • MODULE 15 :-WEEK DATA ENCRYPTION
  • MODULE 16 :-INFORMATION LEAKAGE
  • MODULE 17 :-DANGEROUS FILE UPLOAD
  • MODULE 18 :-TRANSPORT LEVEL COMMUNICATION
  • MODULE 19 :-INVALID URL REDIRECTION FLAW
  • MODULE 20 :-SECURITY MIS-CONFIGURATION
  • MODULE 21 :-INSECURE DIRECT OBJECT REFERENCE

Need more clarity on schedule and prices? Email training@craw.in/contact us +91-9650202445

  • MODULE 1 :- SQL INJECTION FLAWS
  • MODULE 2 :-Insecure Data Storage
  • MODULE 3:--Insecure Communication
  • MODULE 4:-Insecure Authentication
  • MODULE 5:-Insufficient Cryptography
  • MODULE 6 :-Insecure Authorization
  • MODULE 7 :-Client Code Quality
  • MODULE 8 :-Trojan and Back door
  • MODULE 9:-Code tempering
  • MODULE 10 :-Reverse Engineering
  • MODULE 11 :-- Extraneous Functionality

Need more clarity on schedule and prices? Email training@craw.in/contact us +91-9650202445

Chapter 1: Understanding the Android Architecture

  • Android System architecture
  • Various Functions of Android
  • Different Activities of Android
  • Android Components
  • Android Manifest

Chapter 2: Working of Android Development Tools

  • How to Install Android Development Tools (ADP)
  • Building different Android projects
  • Understanding the Devices, Emulator & Images

Chapter 3: Understanding Android User Interfaces

  • Views & Layouts in Apps
  • How to Access widgets in Activities
  • How to view interaction Layouts

Chapter 4: How to develop different Screen Sizes in Android

  • Understanding the different Screen sizes & Densities
  • How to Use device independent pixel (dp)
  • Converting between pixels and dp

Chapter 5: Overview of Intents & Activity Communication

  • Intents & Intent Filter
  • Defining Activities for Apps
  • Activity stack

Chapter 6: Understanding the Action Bar

  • Difference between Action Bar & Option Menu
  • Understanding the Action Bar menu
  • Custom Views in the Action Bar
  • Contextual action mode

Chapter 7: Working of Styling & Themes

  • How to Use Themes for styling Activities
  • Styling of Views
  • Extending Android themes (Holo)

Chapter 8: What are List Views & List Activity

  • Understanding List Activity
  • Understanding List View
  • Optimizing the Performance of App
  • Understanding the List Adapter

Chapter 9: How to use File based Persistence

  • File and Access restrictions
  • Preferences
  • Permissions

Chapter 9: Implying Security in Android Apps

  • Androids security concept
  • Using Permissions
  • Defining Permissions

Chapter 10: How to Use Network Communication

  • REST
  • Apache HTTP Client
  • JSON
  • XML
Chapter 11: Understanding the Processing of Asynchronous in Android

  • User Interface Updates through Threads
  • Multitasking
  • Androids Limits - Application Not Responding
  • How to use Handler for message communication
  • Working with Async Task

Chapter 12: What is SQLite & Content Provider ?

  • How to use the SQLite Database in Android
  • Outlook: Using & defining Content Provider
  • Outlook: Loader

Chapter 13: Different Services in Android

  • Android System Services including Alert Manager, Vibrator Manager and so on.
  • Outlook: Definition of own Services

Chapter 14: Concept of Broadcast Receiver

  • What is Broadcast Receiver?
  • How to register own Broadcast Receiver

Chapter 15: Complete Understanding of Notification Manager

  • How to use Notification Manager
  • Notification Builder
  • Rich Notifications

Chapter 16: What is Canvas API for custom Views?

  • What are custom Views
  • View state persistence
  • Canvas API

Chapter 17: Location services & Google Maps

  • Understanding Google Maps
  • Location based Services
  • Map-Overlays
  • Geocoding Reverse Geocoding
  • How to use GPS, Wifi?

Chapter 18: Overview of Home screen Widgets

  • Remote Views & Pending Intents
  • Updates with Services
  • Updates with a fixed time interval

Chapter 19: Using Android Sensors

  • Accelerometer Remote Views and Pending Intents
  • Orientation
  • Camera

Chapter 20: Playing Audio & Video

  • Playing & recording audio
  • Playing & recording video

Chapter 21: Build Management in Android

  • Apache Ant
  • Maven

Chapter 22: Professional Testing in Android

  • Overview Android testing
  • Android Test Project Updates with a fixed time interval
  • How to use Robotium?
  • How to use Robolectric?

Chapter 23: Targeting Tablets & Smart phones

  • Fragments Overview
  • How to design layouts for tablets & phones
  • Multi-Pane Layouts with Fragments

Chapter 23: Deployment of Apps

  • Deployment Option
  • Markets (Google Play and Amazon)

Need more clarity on schedule and prices? Email training@craw.in/contact us +91-9650202445

1. Introduction of HTML 5
  • Structural Elements Of HTML Documents
  • Differences Between HTML5 & HTML
  • HTML New Elements
  • HTML Form Types & Attributes
  • HTML 5 Canavas
  • HTML 5 SVG
  • New Multi-Media Elements
  • HTML Plugins(HELPERS)
2. Introduction of CSS 3
  • What Is CSS
  • Difference between CSS2 & CSS3
  • CSS3 border-radius Property
  • CSS3 Multiple Backgrounds
  • CSS3 Shadow Effects
  • How to Use CSS3 Transitions
  • Transition + Transformation
  • CSS3 Animations
PHP Introduction
  • PHP Install
  • PHP Syntax
  • PHP Variables
  • PHP Echo / Print
  • PHP Data Types
  • PHP Strings
  • PHP Constants
  • PHP Operators
  • PHP If...Else...Elseif
  • PHP Switch
  • PHP While Loops
  • PHP For Loops
  • PHP Functions
  • PHP Arrays
  • PHP Sorting Arrays
PHP Forms
  • PHP Form Handling
  • PHP Form Complete
PHP Advanced
  • PHP Arrays Multi
  • PHP Date and Time
  • PHP Include
  • PHP Cookies
  • PHP Sessions
PHP Mysql
  • MySQL Connect
  • MySQL Create DB
  • MySQL Create Table
  • MySQL Insert Data
  • MySQL Get Last ID
  • MySQL Insert Multiple
  • MySQL Select Data
  • MySQL Delete Data
  • MySQL Update Data
  • MySQL Limit Data
PHP Frameworks
  • Introduction to MVC
  • CodeIgniter
  • CakePHP
  • Laravel

Benefits Of Training Complete Package Details For Indian & International Students

  • Official Training by certified instructors
  • Head-2-Head training by Certified Subject matter experts
  • Highly interactive lectures, group exercises, and review sessions
  • 2 years membership of Craw Cyber Security international training group
  • Chance to become country representative for Craw Cyber Security
  • Certification Exam Fees Included.
  • Individual study environment
  • Training Environment
  • Practical live hacking
  • Concept based training
  • 24/7 High speed internet connectivity
  • Stay, food( breakfast, lunch and dinner)
  • Post training support after training & certification

Batch Options

Weekday Classes

  • Monday to Friday
  • Duration : 2-3 Hours
  • Number of classes: 60-80 Hours(Instructor-Led Training))
  • 8:2 Practical Theory Ratio

Weekend Classes

  • Every Sunday and Saturday
  • Duration : 4 to 8 hours.
  • Number of classes : (60-80 Hours)
  • 8:2 Practical Theory Ratio
0
Awards Win
0+
Happy student
0
Our Placements
0+
Projects Done

Career Path In Diploma Information Security

The chief information security officer (CISO) is typically a mid-executive level position whose job is to oversee the general operations of a company's or organization's IT security division. CISOs are directly responsible for planning, coordinating and directing all computer, network and data security needs of their employers. CISOs work directly with upper-level management to determine an organization's unique cyber security needs. They are commonly tasked with assembling an effective staff of security professionals, which means that the position requires an individual with a strong background in IT security architecture and strategy, as well as solid communication and personnel management skills.

The forensic computer analyst is the detective of the cyber security world. Forensic computer analysts review computer-based information for evidence following a security breach or other incident. Tasks include handling hard drives and other storage devices and employing specialized software programs in order to identify vulnerabilities and recover data from damaged or destroyed devices. Forensic computer analysts must be sensitive to the security concerns of their employers or clients and follow closely all privacy procedures when dealing with financial and personal information. They must also keep detailed and accurate logs and records of their findings, which are often used in litigation

Penetration testing concerns the proactive authorized employment of testing techniques on IT infrastructures to identify system vulnerabilities. Simply put, penetration testers attempt to (with authorization) hack into computer and network systems to preemptively discover operating system vulnerabilities, service and application problems, improper configurations and more, before outside intruders have the opportunity to cause real damage. Penetration testers must be highly creative in their methods, often using testing tools of their own design, to "break into" the systems under scrutiny. Penetration testers are required to keep careful records of their activities and discovered vulnerabilities

A Security architect is responsible for establishing and maintaining network security for his or her organization. Security architects work in all sectors of the economy for companies, government agencies, and nonprofits. They may be employees of companies or independent contractors. In addition to working on specific security systems, security architects develop and implement organization security policies and procedures for employees and others with access to computer, network and data systems. Security architects are responsible for the hands-on repair of issues raised in problem reports as well as analysis of breaches following security incidents. They typically work in an office environment on a full-time basis

Security engineering provides a specialized engineering approach to cyber security, specifically regarding the design of security systems to counter potentially catastrophic issues. Security engineers are often involved in systems maintenance, performing security checks to identify potential vulnerabilities, as well as keeping logs and developing automation scripts to track security incidents. To succeed as a security engineer, individuals must have strong math and communication skills and a solid working knowledge of computer operating systems and languages

A security systems administrator's core responsibilities are quite similar to those of many other cyber security jobs: installing, administering, maintaining and troubleshooting computer, network and data security systems. The main distinction between security systems administrators and other cyber security professionals is that the security systems administrator is normally the person in charge of the daily operation of those security systems. Typical tasks include systems monitoring and running regular backups, and setting up, deleting and maintaining individual user accounts. Security systems administrators are additionally often involved in developing organizational security procedures

A web developer is a programmer who specializes in, or is specifically engaged in, the development of World Wide Web applications, or applications that are run over HTTP from a web server to a web browser

Digital Marketing is one of the booming industries right now. With 40% growth rate, people are attracted to this industry. However, it is best when it’s done in-house and that’s why Digital Marketers are in-demand all over the world these days

One Month Python is an introduction to programming with Python for total beginners. Python is a popular language used by companies like Google, Facebook, Dropbox, Instagram, and Reddit for all sorts of things like building websites, web scraping, data analysis, machine learning, and natural language processing. Python is designed to be easy to read while still being very powerful, which makes it an ideal language for beginners

Diploma Information Security Salaries

The explosion in the demand for skilled cyber security professionals combined with a scarcity in talent supply has resulted in high wages and excellent benefits for qualified applicants. Below is a brief look at the national median salaries (as of September 2017) available for some of the most in-demand cyber security careers

$143,334
Chief Information Security Officer
$124,624
Security Director (Computing, Networking, IT)
$113, 905
Security Architect
$89,209
Security Engineer
$81,980
IT Security Consultant
$143,334
Chief Information Security Officer
Craw Cyber Security Has trained more than 52,500 students & corporates. The trained students are successfully working in MNC's like TCS(Tata Consultancy Services), HCL, INFOSYS,Amazon (Amazon Web Services) (NASDAQ:AMZN),FireEye (NASDAQ:FEYE), Symantec (NASDAQ:SYMC),BAE Systems (OTCP:BAESY) and many more.

Get World Class Certification Training Online & Classroom

Craw Security Students Testimonial

All Summer Internship Program 2019

Certified-ethical hacking

About Internship

  • Training Centers: Laxmi Nagar,Country In Central Africa,Haryana,Delhi
  • Training Duration: 6 Months, 6 Weeks and 45 Days
  • Starting Date: 01, 07, 14, 21, 28,
  • Book Now: Book Your Seats
Advanced Penetration Testing

About Internship

  • Training Centers: Laxmi Nagar,Country In Central Africa,Haryana,Delhi
  • Training Duration: 6 Months, 6 Weeks and 45 Days
  • Starting Date: 01, 07, 14, 21, 28,
  • Book Now: Book Your Seats

Cyber Forensics Investigation

About Internship

  • Training Centers: Laxmi Nagar,Country In Central Africa,Haryana,Delhi
  • Training Duration: 6 Months, 6 Weeks and 45 Days
  • Starting Date: 01, 07, 14, 21, 28,
  • Book Now: Book Your Seats

In-depth Advance Networking

About Internship

  • Training Centers: Laxmi Nagar,Country In Central Africa,Haryana,Delhi
  • Training Duration: 6 Months, 6 Weeks and 45 Days
  • Starting Date: 01, 07, 14, 21, 28,
  • Book Now: Book Your Seats

Web Application Security

About Internship

  • Training Centers: Laxmi Nagar,Country In Central Africa,Haryana,Delhi
  • Training Duration: 6 Months, 6 Weeks and 45 Days
  • Starting Date: 01, 07, 14, 21, 28,
  • Book Now: Book Your Seats

Mobile Application Security

About Internship

  • Training Centers: Laxmi Nagar,Country In Central Africa,Haryana,Delhi
  • Training Duration: 6 Months, 6 Weeks and 45 Days
  • Starting Date: 01, 07, 14, 21, 28,
  • Book Now: Book Your Seats

Web Application Security

About Internship

  • Training Centers: Laxmi Nagar,Country In Central Africa,Haryana,Delhi
  • Training Duration: 6 Months, 6 Weeks and 45 Days
  • Starting Date: 01, 07, 14, 21, 28,
  • Book Now: Book Your Seats

Web Application Security

About the Exam

  • Training Centers: Laxmi Nagar,Country In Central Africa,Haryana,Delhi
  • Training Duration: 6 Months, 6 Weeks and 45 Days
  • Starting Date: 01, 07, 14, 21, 28,
  • Book Now: Book Your Seats

Web Application Security

About the Exam

  • Training Centers: Laxmi Nagar,Country In Central Africa,Haryana,Delhi
  • Training Duration: 6 Months, 6 Weeks and 45 Days
  • Starting Date: 01, 07, 14, 21, 28,
  • Book Now: Book Your Seats