Ethical Hacking Certification

Course Details

  Basics of Ethical Hacking
  Foot-printing Active
  In-depth Network Scanning
  Viruses and Worms
  Trojans and Backdoor
  Sniffers MITM with Kali
  Web Session Hijacking
  SQL Injection Manual Testing
  Basics of Web App Security

Ethical Hacking Certification

LEVEL 1

Course Details

  Web servers Rooting
  Hacking Wireless Networks
  Evading IDS, Firewalls
  Honey pots
  Buffer Overflow
  Cryptography
  Penetration Testing: Basics
  Mobile Hacking
  Cloud Security

Batch Details

>> 05-June-2018     >> 18-June-2018
>> 13-June-2018     >> 25-June-2018

10:30 - 12:30 pm | 02:00 - 04:00 pm
09:30 - 11:30 pm | 01:30 - 03:30 pm

Penetration Testing Certification

Course Details

  Types of Penetration Testing
  Scope of Penetration Testing
  Rules of Engagements
  Best Tool sets for Scanning
  Web Application Scanning Tool
  Network Mapping Tool NMAP
  Nmap Scripting Engine
  Swizz Knife Netcat
  Network Exploitation Tools

Penetration Testing and Security Analyst Certification

LEVEL 2

Course Details

  Metasploitable
  Post Testing Actions
  Password Cracking
  use Burp Suite
  Cross-Site Request Forgery
  SQL Injection
  Cross-Site Request Forgery
  Standards and Compliance
  Ethics of a Penetration

Batch Details

>> 05-June-2018     >> 18-June-2018
>> 09-June-2018     >> 22-June-2018

10:30 - 12:30 pm | 02:00 - 04:00 pm
09:30 - 11:30 pm | 01:30 - 03:30 pm

Cyber Forensics Certification

Course Details

  What Is Computer Forensics
  Which Computer gets Hacked
  Forensics Investigation Process
  Digital Evidence Gathering
  Computer Forensics Lab
  Windows Filesystem Forensics
  Data Imaging Techniques
  Recovering Deleted Files
  Computer Forensics Lab

Cyber Forensics and Investigation Certification

LEVEL 3

Course Details

  Stenography
  Image File Forensics
  Password Crackers
  Log Capturing
  Event Correlation
  Network Forensics Tools
  Mobile Forensics Tools
  Investigating Logs
  Investigate Wireless Attacks

Batch Details

>> 08-June-2018     >> 15-June-2018
>> 11-June-2018     >> 23-June-2018

10:30 - 12:30 pm | 02:00 - 04:00 pm
09:30 - 11:30 pm | 01:30 - 03:30 pm

Advance Networking Certification

Course Details

  Operation of Protocols
  OSI Layers
  TCP/IP models
  Installing
  Configuring
  Concepts of Layer
  STP, VLANs, CAM,
  IPV4 and IPV6
  OSPF (single and multi-area)

In Depth Advanced Networking Certification

LEVEL 4

Course Details

  Load Balancing
  EIGRP
  Introduction to WAN
  WAN protocol
  HDLC, PPP, NAT
  Introduction to MPLS
  DHCP, SNMP, Netflow
  SSH
  Secret Password

Batch Details

>> 04-June-2018     >> 17-June-2018
>> 13-June-2018     >> 22-June-2018

10:30 - 12:30 pm | 02:00 - 04:00 pm
09:30 - 11:30 pm | 01:30 - 03:30 pm

Web App Vulnerability Certification

Course Details

  SQL Injections Flaws
  Cross Site Scripting Flaw
  Source Code Disclosure Flaw
  OS Command Injection Flaw
  Broken Authentication
  File Upload Vulnerability
  Cross Site Request Forgery
  Sensitive Data Exposure
  Remote File Inclusion

Web Application Vulnerability Certification

LEVEL 5

Course Details

  Directory Traversal Attack
  Invalid Redirection Flaw
  Security Mis-Configuration
  Missing Authorization
  Session Fixation
  Weak Data Encryption
  Information Leakage
  Dangerous File Upload
  Remote File Inclusion

Batch Details

10:30 - 12:30 pm | 02:00 - 04:00 pm
09:30 - 11:30 pm | 01:30 - 03:30 pm

10:30 - 12:30 pm | 02:00 - 04:00 pm
09:30 - 11:30 pm | 01:30 - 03:30 pm

Summer Training 2018

Ethical Hacking and Countermeasure

Penetration Testing and Security Analyst

Cyber Forensics and Investigation

In Depth Advanced Networking

Web Apppcation Vulnerabipty

Cisco Certified Network Associate

Cisco Certified Network Associate SECURITY

CompTIA Security +

F5 load balancer Courses

Check Point Certified Security Administrator

Check Point Certified Security Engineer

Check Point Certified Managed Security Expert

30 days / 60 hours | 15 days / 30 hours

30 days / 60 hours | 15 days / 30 hours

30 days / 60 hours | 15 days / 30 hours

30 days / 60 hours | 15 days / 30 hours

30 days / 60 hours | 15 days / 30 hours

30 days / 60 hours | 15 days / 30 hours

30 days / 60 hours | 15 days / 30 hours


30 days / 60 hours | 15 days / 30 hours

30 days / 60 hours | 15 days / 30 hours

30 days / 60 hours | 15 days / 30 hours

30 days / 60 hours | 15 days / 30 hours

30 days / 60 hours | 15 days / 30 hours

Address:
B-72, Vijay Block
laxmi Nagar, Opp
Metro Pillar No 50

Contact: 8130535445,
011-64601115

Bytecode Cyber Security

To CONFIRM / REGISTER your SEAT please send us a complete refundable deposit as a registration fee of 500$ USD by any of the following methods :

»  NEFT/RTGS to:
hdfc logo
Acc. Name : "Bytecode Cyber Security Pvt Ltd"
Account No. : 003705018009
IFSC Code :ICIC0000037,
Swift Code :BRAJINBBDSE
»  Cash/Cheque/Demand Draft Deposit to:
ICICI logo
Acc. Name : "Bytecode Cyber Security Pvt Ltd"
Account No. : 003705018009
Branch :Preet Vihar, Delhi
IFSC Code :ICIC0000037
Swift Code :BRAJINBBDSE
paypal logo
Paypal Transfer :
Our paypal account id is :
register@bytecode.in
(Paypal payments will payable a surcharge of 4%.)
credit card logo
Credit/Debit cards & Net Banking payments

paypal
western union

Send Money to: Mohit Kumar Yadav,

You can go to any WESTERN UNION location,
deposit the money ,

fills up a "TO SEND MONEY FORM"
and receive an 10 digit numeric code called as
MTCN (MONEY TRANSFER CONTROL NUMBER)
.After the transaction, email the MTCN to info@bytecode.in.
You can find the nearest WESTERN UNION outlet HERE.


You can also send money via moneygram.
Click here for money gram process.

Course Calender 2018

Ethical Hacking and Countermeasure

Penetration Testing and Security Analyst

Cyber Forensics and Investigation

In Depth Advanced Networking

Web Apppcation Vulnerabipty

Cisco Certified Network Associate

Cisco Certified Network Associate SECURITY

CompTIA Security +

F5 load balancer Courses

Check Point Certified Security Administrator

Check Point Certified Security Engineer

Check Point Certified Managed Security Expert

30 days / 60 hours | 15 days / 30 hours

30 days / 60 hours | 15 days / 30 hours

30 days / 60 hours | 15 days / 30 hours

30 days / 60 hours | 15 days / 30 hours

30 days / 60 hours | 15 days / 30 hours

30 days / 60 hours | 15 days / 30 hours

30 days / 60 hours | 15 days / 30 hours


30 days / 60 hours | 15 days / 30 hours

30 days / 60 hours | 15 days / 30 hours

30 days / 60 hours | 15 days / 30 hours

30 days / 60 hours | 15 days / 30 hours

30 days / 60 hours | 15 days / 30 hours

Address:
B-72, Vijay Block
laxmi Nagar, Opp
Metro Pillar No 50

Contact: 8130535445,
011-64601115

Upcoming Workshop 2018

Workshop Name: Android Development view details
Duration: 1 Day
Dates: 14th January 2018
Venue: Institute of Technical Education and Research (ITER), Bhubaneswar

Workshop Name: Internetof Things IOT view details
Duration: 1 Day
Dates: 15th January 2018
Venue: Institute of Technical Education and Research (ITER), Bhubaneswar

Workshop Name: Internetof Things IOT view details
Duration: 1 Day
Dates: 22nd January 2018
Venue: Maulana Azad National Institute of Technology (MANIT), Bhopal

Workshop Name: Ethical Hacking & Countermeasure view details
Duration: 1 Day
Dates: 28th January 2018
Venue: Madhav Institute of Technology and Science, Gwalior

Workshop Name: Android Development view details
Duration: 1 Day
Dates: 5th February 2018
Venue: University of Engineering & Management (UEM), Kolkata

Workshop Name: Ethical Hacking & Countermeasure view details
Duration: 1 Day
Dates: 11th February 2018
Venue: Babu Banarasi Das University, Lucknow

Workshop Name: Ethical Hacking & Countermeasure view details
Duration: 1 Day
Dates: 11th February 2018
Venue: IEC College of Engineering and Technology , Noida

Workshop Name: Internetof Things IOT view details
Duration: 1 Day
Dates: 12th February 2018
Venue: Babu Banarasi Das University, Lucknow

WELCOME TO BYTECODE CYBER SECURITY

Bytecode is an Information Security Training and development company,based in New Delhi (India). We started our operations on 1st, February 2008, since its foundation we are committed to offer best information security training and services to our students, clients and partners, with a high standard content, because we believe that high standards bring excellent output in long run, our standards is our strength, and we maintain this so that when we say "We are Professional in it" and we must really mean it.

In just a few years of its inception Bytecode has grown with a rapid increment in its students,clients and customers, We started operations from a small office, now it has grown from its original three founders to more than 150 employees, and 5 centers across globe with a head office in New Delhi.

bytecode
bytecode

WORKSHOPS PROGRAMS

bytecode

SUMMER INTERNSHIP

bytecode

OUR FRANCHISE

bytecode

CORPORATE TRAINING

bytecode

COMBO OFFERS

bytecode

APPLY FOR JOBS

bytecode

Copyright © 2018, Bytecode Cyber Security (P) Limited, All Rights Reserved.

Website : Bytec0de.com