Archives: Courses

Hands-On Penetration Testing and Ethical Hacking Training Course

Hands-On Penetration Testing and Ethical Hacking Training Course

This training course offers a collection of live demonstrations featuring a variety of hacking and defensive techniques used by hackers. Tranchulas online labs are available 24×7 for practising the techniques and tools demonstrated by our instructor during the training course.

gchq_-_certified_trainingTranchulas Hands-On Penetration Testing and Ethical Hacking training course is accredited under the GCHQ Certified Training (GCT) scheme. The course material has been rigorously assessed against the exacting standards of GCHQ. The quality of the trainers’ delivery and the course administration has been quality checked and approved by APMG.

Addressing the Need

The need to understand hacker and his methods are vital for better-defending networks. This training course is designed for students who want to get acquainted with the world of hacking.

About the Training

Because security is an ever-changing battlefield, Tranchulas Hands-on Penetration Testing exposes you to the latest in network and application vulnerabilities and defences. Our instructor will illustrate each technology’s default security posture, installation weaknesses, methods hackers use to circumvent “secure” settings, and countermeasures for each vulnerability.

Prerequisites

  • Basic knowledge of TCP/IP
  • Participants must bring their own laptops


CPTP Certification

iisp_training-logo

This course leads to Tranchulas Certified Penetration Testing Professional (CPTP) certification. Tranchulas CPTP is accredited by Institute of Information Security Professionals (IISP), UK. CPTP will test your technical skills in a live network where you are expected to discover and exploit security vulnerabilities. Students are required to pass our online labs in order to receive CPTP certification.

Tranchulas Online Labs

Tranchulas Online Labs are available 24×7 for practising hacking techniques and tools demonstrated by our instructor during the training course. Online Labs simulate a corporate network with several subnets, each protected by a firewall. All machines on the network can be exploited and have different difficulty levels.

Students are required to discover and exploit vulnerabilities in order to pass online labs and receive Tranchulas Certified Penetration Testing Professional (CPTP) Certification.

Post Training Support

You can connect with Tranchulas Online labs for 90 days to practice your hacking kung-fu after the training course. During this time our technical team will provide you email/phone/skype support in order to ensure the skills acquired on the training course are being applied correctly.

About the Trainer

Tranchulas training and workshops are conducted by world’s top information security experts. Our instructors are featured speakers at renowned security conferences such as Hack in the Box Malaysia, InfoSek Slovenia, Hack.lu Luxembourg, CONFidence Krakow, Troopers, Shakacon, OWASP Europe and BruCON Belgium.

Training Testimonial

Tranchulas provided a professionally run, hands-on technical training course – Ethical Hacking and Penetration testing. The course was outstanding and gave real practical insights and examples of the skills and tools required by professional penetration testers. Tranchulas CEO Zubair Khan, who’s technical background and knowledge of the security industry is second to none, presented the course in an efficient and structured manner. Lots of interesting insights and anecdotes were added from his experience around the globe working with a variety of industries and governments. Plenty of hands-on exercises were provided to allow course participants to really learn and understand the content being delivered. I thoroughly recommend Tranchulas and the course to anyone interested in developing and honing their skills in information security and penetration testing.Mark Brown, British Airways

 

Additional Information

What You Will Receive
  • Hacking Field Kit – If you register one week before the training
  • Access to Tranchulas Online Labs via VPN for 90 days to practice your hacking kung-fu learnt during the course
  • Training Manual
  • Rules of engagement and scope sheets for professional penetration tests
  • Certificate of Attendance
  • Tranchulas Hacker T-Shirt
Laptop Requirements
IMPORTANT – PARTICIPANTS MUST BRING THEIR OWN LAPTOPS

Minimum Laptop Requirements

  • CPU: 1.5 GHz or higher
  • Minimum 4 GB RAM
  • 25 GB of free space on your Hard Drive
  • Wireless 802.11 b/g
  • Should have the capability to have local administrator access within the Operating system and disable antivirus if required.
  • You must set up a Windows Virtual machine on your system if your primary OS is not windows. Please let us know if you need any help with it and our support team will gladly help you.
Who Should Attend
  • Information security professionals
  • IT personnel looking to enhance their technical skills and knowledge
  • Penetration testers
  • Ethical hackers
  • Information System Auditors
  • IT Security Managers
  • Anyone who wants to better understand hacking tools and techniques
  • Incident Handlers
*Register 1 week before the training date and get this Hak5 Hacking Field Kit for FREE

The Hacking Field Kit Includes

Exclusive Tools

Wifi Pineapple NANO, USB Rubber Ducky, LAN Turtle

Book

Hak5 Field Kit Pocket Guide: Essentials of Operation

Accessories

USB OTG adapter, USB male-female Y-Cable, Micro SD USB card reader, Softcover equipment organizer, Key-ring flight tag

*Subject to availability.
**For UK, US and Australia customers only.

read more share

Hands-On Web Application Penetration Testing Training Course

Hands-On Web Application Penetration Testing Training Course

This training course is a series of educational interactive training sessions where the attendees will gain hands-on experience. They will be able to identify security flaws in web applications customised or built for the training course. They will also be able to exploit those security flaws to understand the value of fixing those flaws fully.

 

gchq_-_certified_trainingTranchulas Hands-On Web Application Penetration Testing Training Course is accredited under the GCHQ Certified Training (GCT) scheme. The course material has been rigorously assessed against the exacting standards of GCHQ. The quality of the trainers’ delivery and the course administration has been quality checked and approved by APMG.

Prerequisites

  • Basic knowledge of HTML and JavaScript
  • Participants must bring their laptops

CWASP Certification

iisp_training-logo

This course leads to Tranchulas Certified Web Application Security Professional (CWASP) certification. Tranchulas CWASP is accredited by Institute of Information Security Professionals (IISP), UK. Certified Web Application Security Professional (CWASP) is an exclusive certification which will test your technical skills on a live but simulated web application where you are expected to discover and exploit security vulnerabilities. Students are required to pass our online lab test to receive CWASP certification.

Training Online Labs

 

Tranchulas Online Labs are available 24×7 for practising web attacks learnt during the training course. Online labs have several web applications based on real-world scenarios which can be exploited and have different difficulty levels. Vulnerabilities include but are not limited to XSS, SQL Injection, CSRF, cookie manipulation, local file inclusion. Students are required to discover and exploit vulnerabilities to pass online labs and receive Tranchulas Certified Web Application Security Professional (CWASP) Certification.

Post Training Support

 

You can connect with Tranchulas Online labs for 90 days to practice your hacking kung-fu after the training course. During this time, our technical team will provide you email, phone and skype support to ensure the skills acquired on the training course are being applied correctly.

About the Trainer

 

Tranchulas training and workshops are conducted by the world’s top information security experts. Our instructors are featured speakers at renowned security conferences such as Hack in the Box Malaysia, InfoSek Slovenia, Hack.lu Luxembourg, CONFidence Krakow, Troopers, Shakacon, OWASP Europe and BruCON Belgium.

Additional Information

 

What You Will Receive

  • Access to Tranchulas Online Labs via VPN for 90 days to practice your hacking kung-fu learnt during the course
  • Training Manual
  • Rules of engagement and scope sheets for professional penetration tests
  • Certificate of Attendance
  • Tranchulas Hacker T-Shirt

Laptop Requirements
IMPORTANT – PARTICIPANTS MUST BRING THEIR OWN LAPTOPS

Minimum Laptop Requirements

  • CPU: 1.5 GHz or higher
  • Minimum 4 GB RAM
  • 25 GB of free space on your Hard Drive
  • Wireless 802.11 b/g
  • Should have the capability to have local administrator access within the Operating system and disable antivirus if required.

Who Should Attend

  • Information security professionals
  • Penetration testers
  • Ethical hackers
  • Web Application Developers
  • Website designers
  • Anyone who wants to better understand hacking tools and techniques

read more share

CISM – Certified Information Security Manager Training Course

CISM Exam Preparation Training

The CISM certification is one of the leading international IS certification designed for those who manage, design, oversee and/or assess an enterprise’s information security. The CISM certification promotes international information security practices and provides executive management with assurance that those earning the designation have the required experience and knowledge to provide effective security management.

This four-day CISM exam preparation course is designed to help you pass the CISM exam via in-depth lectures and discussions.

Who should attend this course?
  • Information security managers
  • Information security professionals
  • Information security auditors
  • Compliance personnel
  • CISOs and CIOs
What will you learn?

This course provides the core CISM competencies required by professionals planning to sit the CISM exam, and prepares you for the exam in a systematic and comprehensive way.

In-depth coverage of the four CISM job practice domains required to pass the exam:

Domain 1 – Information Security Governance
Domain 2 – Information Risk Management and Compliance
Domain 3 – Information Security Program Development and Management
Domain 4 – Information Security Incident Management

Exam

Please note, the CISM exam is booked separately through ISACA. Exam is conducted three times a year during the months of June, September and December. ISACA has strict booking dates for the exam. For more details please check out ISACA website.

CISM Review Manual

You’ll receive a free copy of ISACA’s latest CISM Review Manual which is essential for any exam candidate.

Trainers

Tranchulas trainings and workshops are conducted by world’s top information security experts. Our trainers are CISM certified with over 10 years of training and information security experience and are featured speakers at renowned security  conferences.

read more share

CISA – Certified Information Systems Auditor Training Course

CISA Exam Preparation Training

This four-day course provides intensive revision for the challenging CISA exam, moving you closer to achieving the known benefits of CISA certification such as higher earning potential and career advancement.

With a growing demand for people with Information Security (IS) Management skills, CISA has become a leading international IS certification designed for those who want to demonstrates proficiency in information systems audit.

Who should attend this course?
  • IS Auditors
  • Information Security Professionals
  • IT consultants
  • Compliance personnel
  • Information security managers
What will you learn?

This course provides the core CISA competencies required by professionals planning to sit the CISA exam, and prepares you for the exam in a systematic and comprehensive way.

In-depth coverage of the four CISM job practice domains required to pass the exam:

  • Domain 1: The Process of Auditing Information Systems
  • Domain 2: Governance and Management of IT
  • Domain 3: Information Systems Acquisition, Development, and Implementation
  • Domain 4: Information Systems Operations, Maintenance and Support
  • Domain 5: Protection of Information Assets
Exam

Please note, the CISA exam is not taken during this training course. It needs to be booked directly with ISACA. There are strict booking dates for the exam, with an advance registration deadline approximately two months before each course start date.

CISA Review Manual

You’ll receive a free copy of ISACA’s latest CISA Review Manual which is essential for any exam candidate.

Trainers

Tranchulas trainings and workshops are conducted by world’s top information security experts. Our trainers are CISA certified with over 10 years of training and information security experience and are featured speakers at renowned security  conferences.

read more share