COURSES

We have excellent training facilities, practical hands-on training using latest devices and techniques reinforced with additional knowledge  in the form of  study material, continuous sharing of knowledge, mock tests etc . Our trainers have years of industry experience,  which is shared rather than theories or book examples. Our emphasis on practical oriented, hands on  training make our students industry ready

CEH v10

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems. The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. 

CHFI v9

Computer Investigation techniques are being used by police, government and corporate entities globally and many of them turn to EC-Council for our Computer Hacking Forensic Investigator CHFI Certification Program. Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks

CISA

The CISA certification is a globally recognized standard for appraising an IT auditor's knowledge, expertise and skill in assessing vulnerabilities and instituting IT controls in an enterprise environment. It is designed for IT auditors, audit managers, consultants and security professionals. Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an organization's IT and business systems are monitored, managed and protected; the certification is presented after completion of a comprehensive testing and application process.

ECIH v2

It is a comprehensive specialist-level program that imparts knowledge and skills that organizations need to effectively handle post breach consequences by reducing the impact of the incident, from both a financial and a reputational perspective.

CYBER LAW CERTIFICATION 

This comprehensice course on Cyber Law includes detail study of Information Technology (Amendment) Act, 2008, corresponding IT Rules, amendments to various statutes such as Indian Penal Code, Indian Evidence Act, Banker's Book Evidence Act and RBI Act. Apart from this concepts of digital evidence collection, analysis, preservation etc. and computer forensics are the major topics covered in this course. 

ABOUT US

With the collective experience of almost 100 years of our Directors  in the field of Banking , Auditing , IT Security, Risk Management, Cyber Crime Investigation and Forensics, we have a distinct edge over our competitors.

ADDRESS
SIDR Solutions & Technologies

908, 9th Floor, IJMIMA  Commercial Complex, Behind INFINITY Mall,

Link Road, Malad(W), Mumbai

Contact No.

+91 7045927979 

+91 8767766325

+91 9820072439

CONTACT FOR MORE INFO

© 2019, SIDR Solutions & Technologies Pvt. Ltd.