'Advanced Cyber Security Training at TCG Cyber Range'


  1. It will teach participants how to be secure from hackers in today's digital world, be it online or offline.
  2. It will also impart essential IT security knowledge for Software Developers,DBA,Network Administrators and other key IT resources.

The job of an ethical hacker is to get into the minds of computer criminals, think like them and come up with innovative methods to protect their networks, websites and IT infrastructure. As per National Cyber Security Policy 2013(NCSP) India requires a workforce of 5,000,00 skilled professionals in Cyber security. An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. Prior to attending this course, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks.
Note : students will be given hands on exposure on threat dynamics and security devices.

Course details :

  • Introduction to Ethical Hacking.
  • Foot printing and Reconnaissance.
  • Google hacking.
  • Scanning and structuring a network.
  • Different types of Enumeration.
  • System Hacking and protection.
  • Virus, Trojans, key loggers and rootkit.
  • Different types of password attacks.
  • Steganography.
  • Covering tracks.
  • Sniffing.
  • MAC attacks.
  • DHCP attacks.
  • ARP poisoning.
  • Social engineering attack.
  • Denial of service and DDOS attack and it’s countermeasure.
  • Network penetration using Metasploit.
    1. Configuring Metasploit.
    2. Setting up Penetration testing Lab.
    3. Phases of Penetration Testing Execution System(PTSE).
    4. Getting a shell.
  • Vulnerability assessment of a network
  • Attacking Webservers and countermeasures.
  • Session Hijacking.
  • Hacking Web Applications and countermeasures.
  • SQL Injection and it’s types.
  • OWASP top 10 attacks and protecting them.
  • 10 dangerous programming mistakes by web developers
  • Attacking Wireless Networks.
  • Evading IDS, Firewalls, and Honeypots.
  • Bufferoverflow.
  • Cryptography and it’s role in information security.
  • Duration : 40 hours
    Course Fees : Rs 17,000/-(including tax )
    Eligibility : Basic Knowledge of networking and database.

    Contact:Abir Atarthy | +91 9434243285 | abir.atarthy@tcg-digital.com

    Python is a programming language which is object oriented and easy to learn.Python is widely used in Artificial Intelligence, Natural Language Generation, cryptography and other advanced fields of Computer Science and Mathematics.. It is also language for ethical hackers, forensic experts and penetration testers. Most of the security tools are written in Python. If you want to be a IT security professional Python is the language you must learn.

    1. Datatype & Variables.
    2. Python Numbers.
    3. Datatype & Variables.
    4. Python Numbers.
    5. Python Strings.
    6. Python Lists.
    7. Python Dictionaries.
    8. Python Tuples.
    9. Datatype Conversion.
    10. Python Control Statements.
    11. Python User Defined Functions.
    12. Python Loops.
    13. Python Mathematical Function.
    14. Python Generating Random numbers.
    15. Python File Handling.
    16. Python Object and Classes.
    17. Python Inheritance and Polymorphism.
    18. Python Exception Handling.
    19. Python Modules.
    20. Creating GUI Applications.
    21. System Programming using Python.
    22. Creating Hacking Tool Using Python.
    23. Socket Programming.
    24. Creating Client-Server Application.
    25. Creating Port Scanner Usung Python.
    26. Creating Forensic Tools Using Python.

    Duration : 40 hours
    Course Fees : Rs 8,000/-(including tax )
    Eligibility : Basic Knowledge of C programming.

    Contact:Abir Atarthy | +91 9434243285 | abir.atarthy@tcg-digital.com

    Eligibility : Graduates in Engineering or Computer science/application.

    You will be working on real IT security projects with industry renowned cyber security professionals. Internship can be done on:

    1. Ethical Hacking.
    2. Network security.
    3. Python Programming.
    4. Web application security.
    5. Digital forensic.

    To apply for internship mail your CV at abir.atarthy@tcg-digital.com Or Contact Abir Atarthy | +91 9434243285

    Cryptography is the essence of security. In this course you will be learning how cryptography is implemented to secure applications and networks. You will also learn different cryptographic threats and how to remediate those.

    Course details:

    1. Introduction to Cryptography.
    2. Key concepts of Cryptography.
    3. Cypher text.
    4. Different types of encryption (Symmetric and Asymmetric).
    5. Stream ciphers, XOR and RC4.
    6. Pros and Cons of symmetric cryptography.
    7. Public Key Exchange.
    8. Pros and cons of asymmetric cryptography.
    9. PKI infrastructure.
    10. Introduction to different cryptographic tools.
    11. Threats of cryptography.
    12. Code breaking methodologies.
    13. Hashing and hash collision.
    14. Hash calculation.
    15. Hashing vs Encryption.
    16. Cryptographic suit.
    17. Digital signature and digital certificate.
    18. Hash my file.
    19. Role of cryptography in information security.
    20. SSL (Secure Sockets Layer).
    21. Transport Layer Security (TLS).
    22. SSL and TLS vulnerabilities and their mitigation.
    23. Using cryptography to maintain application security.
    24. Using cryptography to maintain Network security.
    25. Cryptoprocessor and HSM cryptography.

    Duration: 40 Hrs.
    Course Fees: INR 20,000/-(excluding tax)
    Eligibility: Knowledge of Data Structure, computer network, understanding of programming algorithm

    To apply for internship mail your CV at abir.atarthy@tcg-digital.com Or Contact Abir Atarthy | +91 9434243285

    Python is an object oriented programming language which is very easy to learn due to it's simple syntax.

    Python can be applied to pretty much any software development or operations scenario you can find today. Most of the cryptography and Information security tools are made using Python. For information security professionals learning Python is must.

    EC Council Cyber Security Courses

    Download Brochure


    Training Contact

    Abir Atarthy

    +91 9434243285

    Tathagata Datta

    +91 9830089446

    Vikash Chauhan

    +91 9582248088

    Joydeep Bhattacharya

    +91 9830184530