'Advanced Cyber Security Training at TCG Cyber Range'

GCCS Hackathon 2017: IT Challenge

The GCCS hackathon the flagship event of GCCS 2017 was held under the aegis of NCIIPC on 20 Nov 2017. There were two challenger tracks keeping in mind the current cyber threats on the IT as well as OT (Operational Technology) environments consisting of SCADA and industrial control systems. The hackathon was a global event where a large number of participants from many countries took part in an online challenge. At the end of round one, seven teams from IT consisting of three foreign teams were shortlisted for the final round.

The final round of the Global IT Hackathon challenge was conducted by TCG Digital. The company has India's first state of the art Cyber Range which has the capability to simulate complex cyber threats that are prevalent in the world today. The Rangers Vikas and Yogesh of team TCG set up some out of the box challenges for the hackathon which made the participants push their limits and test their hacking skills in coding, steganography, Data Modification, Identity Spoofing, Compromised-Key Attack as well as deep understanding of security hardware like firewalls and UTMs.

The theme was set where the teams had to gain access of a node in a hostile network and migrate from one network to another accomplishing various minor tasks on which they were being assessed continuously. The challenges were emulating the real world scenarios on various flavours of Linux machines as well as windows servers.

Teams often use a large number of proprietary tools to accomplish the tasks, however that does not truly reflect on their caliber, as automated tools do all the hard work. To obviate these situations all participants were given the same set of basic tools. This bought them on even playing ground and thus their true intellect could be tested. The IT challenge was won by team from IIIT Delhi consisting of two students.


We offer Advanced Cyber Security Training at TCG Digital. As a leading cyber security thought leader of the country we believe that expertise in cyber education should be provided so that students and professionals may learn about the exciting new career opportunities that are available today in the field of cyber security – both at the Information Technology and Operational Technology levels. This will enhance the career prospects of aspiring students as well equip working professionals with in-depth IT security knowhow.

Keeping the above in mind, there are different course modules that TCG Digital has developed for students and corporates which covers Ethical Hacking, Python Programming, Digital Forensic, Cryptography and CEH Certification of EC-Council

  1. It will teach participants how to be secure from hackers in today's digital world, be it online or offline.
  2. It will also impart essential IT security knowledge for Software Developers,DBA,Network Administrators and other key IT resources.

The job of an ethical hacker is to get into the minds of computer criminals, think like them and come up with innovative methods to protect their networks, websites and IT infrastructure. As per National Cyber Security Policy 2013(NCSP) India requires a workforce of 5,000,00 skilled professionals in Cyber security. An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. Prior to attending this course, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks.
Note : students will be given hands on exposure on threat dynamics and security devices.

Course details :

  • Introduction to Ethical Hacking.
  • Foot printing and Reconnaissance.
  • Google hacking.
  • Scanning and structuring a network.
  • Different types of Enumeration.
  • System Hacking and protection.
  • Virus, Trojans, key loggers and rootkit.
  • Different types of password attacks.
  • Steganography.
  • Covering tracks.
  • Sniffing.
  • MAC attacks.
  • DHCP attacks.
  • ARP poisoning.
  • Social engineering attack.
  • Denial of service and DDOS attack and it’s countermeasure.
  • Network penetration using Metasploit.
    1. Configuring Metasploit.
    2. Setting up Penetration testing Lab.
    3. Phases of Penetration Testing Execution System(PTSE).
    4. Getting a shell.
  • Vulnerability assessment of a network
  • Attacking Webservers and countermeasures.
  • Session Hijacking.
  • Hacking Web Applications and countermeasures.
  • SQL Injection and it’s types.
  • OWASP top 10 attacks and protecting them.
  • 10 dangerous programming mistakes by web developers
  • Attacking Wireless Networks.
  • Evading IDS, Firewalls, and Honeypots.
  • Bufferoverflow.
  • Cryptography and it’s role in information security.
  • Duration : 40 hours
    Course Fees : Rs 17,000/-(including tax )
    Eligibility : Basic Knowledge of networking and database.

    Contact:Abir Atarthy | +91 9434243285 | abir.atarthy@tcg-digital.com

    Python is a programming language which is object oriented and easy to learn.Python is widely used in Artificial Intelligence, Natural Language Generation, cryptography and other advanced fields of Computer Science and Mathematics.. It is also language for ethical hackers, forensic experts and penetration testers. Most of the security tools are written in Python. If you want to be a IT security professional Python is the language you must learn.

    1. Datatype & Variables.
    2. Python Numbers.
    3. Datatype & Variables.
    4. Python Numbers.
    5. Python Strings.
    6. Python Lists.
    7. Python Dictionaries.
    8. Python Tuples.
    9. Datatype Conversion.
    10. Python Control Statements.
    11. Python User Defined Functions.
    12. Python Loops.
    13. Python Mathematical Function.
    14. Python Generating Random numbers.
    15. Python File Handling.
    16. Python Object and Classes.
    17. Python Inheritance and Polymorphism.
    18. Python Exception Handling.
    19. Python Modules.
    20. Creating GUI Applications.
    21. System Programming using Python.
    22. Creating Hacking Tool Using Python.
    23. Socket Programming.
    24. Creating Client-Server Application.
    25. Creating Port Scanner Usung Python.
    26. Creating Forensic Tools Using Python.

    Duration : 40 hours
    Course Fees : Rs 8,000/-(including tax )
    Eligibility : Basic Knowledge of C programming.

    Contact:Abir Atarthy | +91 9434243285 | abir.atarthy@tcg-digital.com

    Eligibility : Graduates in Engineering or Computer science/application.

    You will be working on real IT security projects with industry renowned cyber security professionals. Internship can be done on:

    1. Ethical Hacking.
    2. Network security.
    3. Python Programming.
    4. Web application security.
    5. Digital forensic.

    To apply for internship mail your CV at abir.atarthy@tcg-digital.com Or Contact Abir Atarthy | +91 9434243285

    Cryptography is the essence of security. In this course you will be learning how cryptography is implemented to secure applications and networks. You will also learn different cryptographic threats and how to remediate those.

    Course details:

    1. Introduction to Cryptography.
    2. Key concepts of Cryptography.
    3. Cypher text.
    4. Different types of encryption (Symmetric and Asymmetric).
    5. Stream ciphers, XOR and RC4.
    6. Pros and Cons of symmetric cryptography.
    7. Public Key Exchange.
    8. Pros and cons of asymmetric cryptography.
    9. PKI infrastructure.
    10. Introduction to different cryptographic tools.
    11. Threats of cryptography.
    12. Code breaking methodologies.
    13. Hashing and hash collision.
    14. Hash calculation.
    15. Hashing vs Encryption.
    16. Cryptographic suit.
    17. Digital signature and digital certificate.
    18. Hash my file.
    19. Role of cryptography in information security.
    20. SSL (Secure Sockets Layer).
    21. Transport Layer Security (TLS).
    22. SSL and TLS vulnerabilities and their mitigation.
    23. Using cryptography to maintain application security.
    24. Using cryptography to maintain Network security.
    25. Cryptoprocessor and HSM cryptography.

    Duration: 40 Hrs.
    Course Fees: INR 20,000/-(excluding tax)
    Eligibility: Knowledge of Data Structure, computer network, understanding of programming algorithm

    To apply for internship mail your CV at abir.atarthy@tcg-digital.com Or Contact Abir Atarthy | +91 9434243285

    Python is an object oriented programming language which is very easy to learn due to it's simple syntax.

    Python can be applied to pretty much any software development or operations scenario you can find today. Most of the cryptography and Information security tools are made using Python. For information security professionals learning Python is must.

    EC Council Cyber Security Courses

    Download Brochure


    Training Contact

    Abir Atarthy

    +91 9434243285

    Vikash Chauhan

    +91 9582248088

    Joydeep Bhattacharya

    +91 9830184530