Information Sharing and Analysis Center

India's leading non-profit foundation advancing national cyber security and professional ethics at workplace

NSD Empaneled ISAC CERTIFIED

Datacenter Security Professional (ICDS)

The program is intended to provide a first hand experience in understanding a hack attack, malware creation, spreading and anti malware evasion. It will also provide an insight as to how a data center could take steps to recognize and react to a cyber attack through malwares and protect its clients from phishing, social engineering, DDoS and other cyber attacks.
The approach of this workshop would be in the manner of Offensive Security, so as to understand better the way to deal with a hack/malware attack. This approach would make sure that the right defense mechanisms are thought and applied for.
At the end a thoughtful insight is given into the needs of SOC and practices to improve the outcome of SOC setup.

Available on GeM

Data Forensics. Digital Forensic Investigator at Work

PROGRAM

Features & Benefits

ISAC ID Card

  • Get the exclusive ISAC ID Card
  • Enhance your profile credibility globally
  • Eligible for NSD Empanelment

30 Days Access to Cyberange Virtual Labs

  • Exclusive labs
  • Real-world scenarios for practice
  • Cloud-based labs with new challenges added every month!

VALUE ADDITION : PROFESSIONAL ETHICS AT WORKPLACE TRAINING AND CERTIFICATION

Get NSD Empanelment Today!

Learn everything to get started Datacenter Security Professional

Module 1: Introduction

  • Hacking Methodologies
  • Attack Scenarios
  • Case Studies
  • Challenges of Information Security
  • Find your way across – A CTF designed to exploit through a combination of network and Web Exploitation Techniques.
Module 2: Information Gathering
  • Open Source Intel
  • Scanning the infrastructure
Module 3: Attack Planning
  • Attack Planning
  • Vulnerability analysis
Module 4: Exploiting Servers
  • Exploitation Techniques
  • Web Services Exploitation
  • Network Service Exploitation
Module 5: Payloads and Post Exploitation
  • Payload and Malware Delivery
  • Privilege Escalation
Module 6: Malware Analysis
  • Understanding Malwares
  • Practical Malware Analysis
  • Processes and threads
  • Malware (including rootkit technologies)
  • Network sockets, URLs, IP addresses
  • Open files
  • User generated content
  • Passwords, caches, clipboards
  • Encryption keys
Module 7: Password Hacking
  • Brute force tools
  • Bypassing Captcha
  • Using bots to increase bandwidth.
Module 8: Phishing
  • Detecting Phishing pages
  • Analysing DNS Data
  • Proactive Measures
Module 9: Network Malware Analysis
  • Analyzing PCAP data
  • Extracting Malware
Module 10: Network Malware Detection Tools
  • Snort IDS / IPS
  • Understanding Yara Rules.
  • Working with Yara
Module 11: SOC Essentials
  • Components of SOC
  • Monitoring
  • Alerting
  • Escalation
  • Investigation
  • Incident Logging
  • Compliance Monitoring
Module 12: SOC Setup
  • Staffing Considerations
  • Setting Up Operations
  • Managing Daily Operations
  • Cost Considerations
  • Legal and Regulatory Issues
  • Advanced Threat Response
Module 13: Threat Intelligence Team
  • Network security monitoring team
  • Threat intelligence team
  • The incident response team
  • The steering committee team
Module 14: Security Operations Center Challenges
  • Infiltrating the dark web
  • Dealing With High volumes of alerts and information
  • Actionable Insights
  • Implementing Machine Learning and NLP.
  • Infiltrate the data center – A CTF designed to exploit the data center as a black hat.

Instructors

Dr Bhupendra Singh


ISAC Certified Instructor
Assistant Professor, Dept. of Computer Science & Engg. Indian Institute of Information Technology (IIIT), Pune

Upcoming Events:

You will get weekly assignments and research work to enhance your course understanding. 

Who Should Attend

The course is best suited for:

  • Security Researchers
  • Students and Professionals keen in Forensics Investigations
  • Security Teams
  • Law Enforcement Agencies
  • Military and police personnel

Examination

24 Hours Lab Exam under the Information Sharing and Analysis Center

What you get

Get 30 days access to Cyber Range Virtual Labs - Practice with predefined vulnerable Applications and Kali OS Distribution in the cloud, in an exclusive private network only for you!

Get access to course videos on the ISAC e-learning portal, updated regularly!

The program includes Clean Exit Professional Ethics Certification that is mandatory for empanelment in the National Security Database.

Get listed in the National Security Database program at the Falcon level by completing the program.

30 Days Access to Cyber Range Virtual Labs

The ISAC Datacenter Security Professional is a fully hands-on program! You get access to Cyber Range Virtual Labs for 30 days. Gain practical knowledge and fundamental skills with multiple vulnerable applications and Kali OS Distribution on the cloud exclusively for you.
Hands On Labs