English | Espanol | Francais
VSAT Interception, Monitoring and Logging Infrastructure |Passive GSM Interception systems with A5.1/ A5.2 Online Decoding.|BTS/BSC GSM Link Passive Surveillance, Monitoring and Logging System.|Shoghi Multi Channel Signal Classifier, Demodulator and Decoder System.
Communication Security
Communication Jamming
Communication Intelligence
Signal Intelligence
System Engineering
Research & Development
Software Development
Technical Support
Offset Services
Trainings
Partners' Login


Enter your email address to
get regular updates of our products.
 
 
Become Our Representative
Network Security
 

Courses And Training

Shoghi Communications Ltd in its endeavor for excellence provides specialized training in the field of Network security, Cyber Security, Information Warfare and Information Technology. It has a team of dedicated professionals and infrastructure to conduct this training.

Cyber Security and Network Security
Information Warfare
Information Technology

Cyber Security and Network Security
Course Code : CNSP

We conduct training in the following areas :

Cyber Security

Intrusion Detection

Communication and Internet Security

Network Penetration testing

Applied Hacking and Countermeasure Techniques

CERTIFIED NETWORK SECURITY PROFESSIONAL COURSE

Target Personnel : Network Server Administrators, System Administrators, Application Developers, IT Security Officers.

Prerequisites : Computer System Foundations, Server Administration and Networking/ Network Administration knowledge.

Duration : Six Days (10 AM - 5 PM)

Additional Bonus : CIW Security Analyst Certification.


Module 1 Network Security and Firewalls

Network Security and Firewalls module is designed to teach participants how to secure networks from unauthorized activity. Participants learn about establishing an effective security policy, identifying different types of hacker activities, understanding the hacker's mind - set, and preventing and managing hacker penetration. Participants will also learn about authentication procedures, encryption standards and implementations, ports and protocols that hackers manipulate, and how to engage in proactive detection and response/reporting methods.

Module 2 Operating System Security

Operating System Security is a module designed to teach participants the latest security industry recommendations and how to properly protect Windows 2000 and Linux servers in a variety of settings. Participants will learn how to protect Windows 2000 and Linux systems from attacks, harden the operating system to fully protect it, and scan hosts for known security problems. By the end of the module, participants will have a solid understanding of the security architectures used by Windows 2000 and Linux/ Unix.

Module 3 Security Auditing, Attacks, and Threat Analysis

Security Auditing, Attacks, and Threat Analysis is a module that teaches participants how to perform different phases of a security audit, including discovery and penetration, and how to prevent unauthorized users from controlling organization networks. The module discusses how to use Windows 2000 and Linux to identify security issues and suggest industry-standard solutions. Participants will also learn how to generate effective audit reports that can help organizations improve their security and become current with industry security standards.


Course Venue

The Knowledge Company,
Advanced Cyber Security Laboratory-I,
7th Floor, Ansal Bhawan, 16 K G Marg,
New Delhi, India.

The Knowledge Company,
Advanced Cyber Security Laboratory-II,
Plot No.74, Electronics Complex,
Industrial Area Shoghi,
Distt. Shimla (H.P.), India.

We also conduct training on the following :

Public Key Infrastructure (PKI)

E-security Inspector

E-security Auditor

E-security Operator

Information Warfare

"There are but two powers in the world, the sword and the mind. In the long run the sword is always beaten by the mind."

- Napoleon Bonaparte

Information Warfare is the offensive and defensive use of information and information systems to deny, exploit, corrupt, or destroy, an adversary's information, information-based processes, information systems , and computer-based networks while protecting one's own. Such actions are designed to achieve advantages over military or business adversaries.

We conduct a six day programme which acquaints participants with the latest techniques of both Offensive and Defensive Information Warfare. The curriculum includes hands on exercises.

Training in Information Warfare includes :

Electronic Warfare

Information Warfare & RF technology

Computer Forensics Investigations and Incident response

Communication and Internet Security

Information Technology

We at Shoghi Communications Ltd. maintain an aggressive schedule bringing you the latest courses in order to meet the requirements of fast paced IT industry.

For S/W and H/W Trainings we are having two Authorized Training Centers in Himachal Pradesh (located in two different locations i.e. one in Industrial Area, Shoghi and another within Shimla town) with the name of Sidhi Vinayak Technologies governed by CFS-CEDTI (Center for Electronics Design and Technology of India), a unit of DOEACC Society, which is an autonomous body of Department of Information Technology under Ministry of Communications & Information Technology, Govt. of India. With the session 2004-05 we are launching DOEACC "O" & "A" Level Courses.

We are closely associated with Indira Gandhi National Open University (IGNOU) for executing training exercises for working of Regional Centre in Shimla, Himachal Pradesh with code 1100 workshop of Tele-learning centre, for running various courses governed by the Open University.

We conduct training for Microsoft Certifications under different streams of online international certifications known as MCP, MCDBA, MCSD & MCSE.

Besides above courses, we also offer many specialized and advanced courses viz. E-commerce, Java, RDBMS, Multimedia, Networking & Troubleshooting etc.

We have successfully executed state-wise training projects for Government Departments. We also work in collaboration with Govt. and Non-Govt. institutes for Educational tie-ups.

 
The Products on the site are strictly for Government and Defense use only.
  © Copyright 2006-2007. All Rights Reserved.