www.iisecurity.in
Open in
urlscan Pro
2606:4700:3032::6815:1f09
Public Scan
Submitted URL: http://www.iisecurity.in/
Effective URL: https://www.iisecurity.in/
Submission: On November 22 via api from IN — Scanned from DE
Effective URL: https://www.iisecurity.in/
Submission: On November 22 via api from IN — Scanned from DE
Form analysis
3 forms found in the DOM<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
<table cellspacing="0" cellpadding="0" class="gsc-search-box">
<tbody>
<tr>
<td class="gsc-input">
<div class="gsc-input-box" id="gsc-iw-id1">
<table cellspacing="0" cellpadding="0" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
<tbody>
<tr>
<td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; background: url("https://www.google.com/cse/static/images/1x/en/branding.png") left center no-repeat rgb(255, 255, 255); outline: none;"></td>
<td class="gsib_b">
<div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
</td>
</tr>
</tbody>
</table>
</div>
</td>
<td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
<title>search</title>
<path
d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
</path>
</svg></button></td>
<td class="gsc-clear-button">
<div class="gsc-clear-button" title="clear results"> </div>
</td>
</tr>
</tbody>
</table>
</form>
POST /thanks-newsletter.php
<form id="newsLetterForm" class="widget-subscribe-form form-inline" action="/thanks-newsletter.php" method="post" novalidate="novalidate">
<h4 class="widget-title">Newsletter</h4>
<small>Stay informed on our latest news!</small>
<div class="input-group">
<input id="newslMail" name="newslMail" type="email" aria-required="true" class="form-control required email" placeholder="Enter your Email">
<span class="input-group-btn">
<button type="button" onclick="if (!window.__cfRLUnblockHandlers) return false; submitNewsletter()" id="widget-subscribe-submit-button" class="btn btn-default"><i class="fa fa-paper-plane"></i></button>
</span>
</div>
<div id="newsErrorDiv" class="input-group" style="margin-top: 10px;margin-left: 10px;color: red;font-weight: bold;">
</div>
</form>
POST /whitepaperDownload.php
<form id="whitepaperForm" class="form-gray-fields" action="/whitepaperDownload.php" method="post">
<div class="row">
<div class="col-md-6">
<div class="form-group">
<label class="upper" for="name">First Name</label>
<input class="form-control required" name="senderName" placeholder="Enter First Name" id="senderName" aria-required="true" type="text">
</div>
</div>
<div class="col-md-6">
<div class="form-group">
<label class="upper" for="name">Last Name</label>
<input class="form-control required" name="senderLName" placeholder="Enter Last Name" id="senderLName" aria-required="true" type="text">
</div>
</div>
</div>
<div class="row">
<div class="col-md-6">
<div class="form-group">
<label class="upper" for="email">Email</label>
<input class="form-control required email" name="senderEmail" placeholder="Enter email" id="senderEmail" aria-required="true" type="email">
</div>
</div>
<div class="col-md-6">
<div class="form-group">
<label class="upper" for="phone">Phone</label>
<input class="form-control required phone" name="senderPhone" placeholder="Enter Phone" id="senderPhone" aria-required="true" type="text">
</div>
</div>
</div>
<div class="row">
<div class="col-md-6">
<div class="form-group">
<label class="upper" for="name">Profession</label>
<select id="profession" name="profession" class="input-xlarge">
<option value="0" selected="selected">Please Select Your Profession</option>
<option value="1">Student</option>
<option value="2">Working</option>
</select>
</div>
</div>
</div>
<div class="row">
<div class="col-md-6" style="margin-top:15px;">
<div class="form-group">
<script src="https://www.google.com/recaptcha/api.js" type="text/javascript"></script>
<div class="g-recaptcha" data-sitekey="6LeBt08UAAAAAPYMVAReP5Vh_hjdM4I3H27HyNGE" style="width: fit-content;float: left;">
<div style="width: 304px; height: 78px;">
<div><iframe title="reCAPTCHA"
src="https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LeBt08UAAAAAPYMVAReP5Vh_hjdM4I3H27HyNGE&co=aHR0cHM6Ly93d3cuaWlzZWN1cml0eS5pbjo0NDM.&hl=de&v=_7Co1fh8iT2hcjvquYJ_3zSP&size=normal&cb=mvdq4bmfhqrb"
width="304" height="78" role="presentation" name="a-2wdgevcl7vjp" frameborder="0" scrolling="no"
sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"></iframe></div><textarea id="g-recaptcha-response" name="g-recaptcha-response"
class="g-recaptcha-response" style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
</div><iframe style="display: none;"></iframe>
</div>
<div style="float: left;padding: 3%;width: 100%;color: red;font-weight: bold;" id="errorDiv"></div>
</div>
</div>
</div>
</form>
Text Content
× search Custom Search Sort by: Relevance Relevance Date * * PRICING * Home * Trainings * Featured Trainings * Blockchain Security * API Security * Big Data for Security Analytics * IoT Security * Basic * Advanced * Exploit Development and Malware Analysis * Windows Internals Essentials * Kick Start Your Cybersecurity CareerNEW * Certified Information Security Consultant (CISC) * Certified in Governance, Risk Management & Compliance (CGRC) * Certified Security Operations Center Analyst (CSOC) * Certified Cybersecurity Analyst (CCA) * Ethical Hacking for Beginners * Certified Cybersecurity Expert (CCE) * Digital Forensics for Beginners * Wireless Security * Certified Professional Hacker (CPH+) * Application Security * Cloud Computing Security (CCS) * Devops Security * Mobile Application Security (MAS) * Certified Web Application Security Professional (CWASP™) * Certified Secure .NET Developer (CSDD™) * Certified Secure Java Developer (CSJD™) * Secure Coding in JavaScript * Certified Secure PHP Developer (CSPD) * Secure Coding in Python (Django) * Source Code Analysis * Infrastructure Security * Windows Security * Unix Security * Database Security * Network Security * Wireless Security * Critical Infrastructure Security * Virtualization Security * Business Continuity Management Systems * Certificate of the BCI (CBCI) (Presented by Network Intelligence) * ISO 22301 LA * ISO 22301 LI * Business Continuity Management Systems (BCMS) Workshop * IT DR Workshop * Crisis Management Workshop * Crisis Management and Simulation Workshop * Risk Management Workshop * Integrated BCM & IT DR Workshop * Governance Risk Compliance * ISO 27001 LA * ISO 27001 LI * IT Disaster Recovery * Risk Management * PCI DSS - CPSP * HIPAA * ISO 20000 / ITIL * Enterprise Risk Management * Certified General Data Protection Practitioner (CGDPP) * Certifications * Certificate of the BCI (CBCI) (Presented by Network Intelligence) * Certified Information Systems Security Professional (CISSP) * Certified Information System Auditor (CISA) * Certified Ethical Hacker v11 (CEH-v11) * Computer Hacking Forensic Investigator (CHFI-v9) * Certified Network Defense (CND) * Certified Secure Computer User (CSCU) * Certified Payment Security Practitioner (CPSP) * Certified Data Privacy Practitioner (CDPP) * Digital Forensics Incident Response * Certified Professional Forensics Analyst (CPFA) * Certified Digital Forensics Expert * Incident Response * Course for Law Enforcement * Emerging Security Threats And Countermeasures * Risk Management * Fraud Detection, Investigation and Prevention * Security Operations Centre Training * Certified Security Forensics Analyst (CSFA) * E-Crime Computer Forensics * Intrusion Detection Analysis * Enterprise Threat Hunting * Technology Trainings * Data Leakage Prevention * Information Rights Management * Mobile Device Management * Network Access Control * Privileged Identity Management * Web Application Firewalls * Web App Wifi Security Training * Palo-Alto Training * Advanced Trainings * Advance Metasploit * Reverse Engineering Malware * Reverse Engineering Training * EC Council certifications * Basic Certifications * Ethical Hacking Preparation Course (EHPC)- 4 days * CERTIFIED SECURE COMPUTER USER (CSCU)- 2 days * EC-Council Certified Security Specialist (ECSS)- 5 days * Advance Certifications * Advance Network Defender (AND)- 5 days * Licensed Penetration Tester - LPT (Master)- 5 days * EC-Council Disaster Recovery Professional (EDRP)- 5 days * EC-Council Certified Security Analyst (ECSA)- 5 days * Certified SOC Analyst (CSA)- 5 days * Core Certifications * Network Security Expert- 10 days * Certified Network Defender (CND)- 5 days * EC-Council's Certified Incident Handler (ECIH)- 3 days * Certified Ethical Hacker (CEH)- 6 days * Computer Hacking Forensic Investigator (CHFI)- 4 days * Certified Threat Intelligence Analyst (C|TIA)- 3 days * Security Awareness * Security Awareness for IT Team * Security Awareness for Management Team * Security Awareness for General Users * Corporate Trainings * Trainings for Colleges * Security Awareness Basic * Network Security * Ethical Hacking for Beginners * Web App Wifi Security Training * About Us * Company * Testimonials * Our Team * Careers * Our Labs * Students Placements * Clients * FAQs * Certificate Validation * Calendar * Blog * Partner with us * Register * Modes of Training * Instructor-led online Training * Classroom Training * Online Trainings * Blended Trainings * Corporate Training Sign up for one of our cybersecurity courses and break the mould! Get in Touch WHY CHOOSE US LATEST TECHNOLOGY COVERAGE Be it cloud security or IoT security or the use of Big Data for Security Analytics, our training programs are always being updated to cover the latest trends in cybersecurity CYBERSECURITY INDUSTRY ALIGNMENT Our training programs are developed and vetted by hands-on practitioners who ensure that the content is closely aligned to the market needs of the cybersecurity industry EMPHASIS ON HANDS-ON PRACTICALS Across all our courses, more than 60% of time is spent on practical hands-on activities designed to help participants get confidence via assignments, hands-on exercises and labs that simulate real-world scenarios FLEXIBLE DELIVERY MODELS Our trainings are available as standard courses delivered at our various branches, as well as customized programs that can be delivered on-premises or virtually. PIONEERS OF INFORMATION SECURITY TRAINING EXTENSIVE CONSULTING EXPERIENCE INTERNATIONAL & DOMESTIC ACCREDITATION 80% HANDS ON TRAINING ON ALL THE COURSE COMPREHENSIVE KNOWLEDGE TRANSFER COMMITMENT TO SECURITY RESEARCH FROM OUR YOUTUBE CHANNEL GETTING YOUR BREACH RESPONSE STRATEGY RIGHT TRAINING CATALOGUE Click on any of the sections below to select the right training course for you BEGINNERS These courses will help set your cybersecurity career on the right path DEVELOPERS Do you Devops? Or even if you're into standard programming approaches. Our wide variety of trainings focused on application security will appeal to you. ADMINISTRATORS Applying patches, hardening systems, addressing Windows, Unix, and Databases - these courses are highly customizable to your specific environment FORENSICS AND INCIDENT RESPONDERS Be it imaging hard drives and analyzing them using Encase or FTK, or analyzing gigabytes of logs or getting a deeper insight into the killchain. CERTIFICATIONS Jumpstart your career into next gear with an industry-valued certification such as the CISSP, CISM, CISA, CEH or CHFI LAW ENFORCEMENT AGENCIES As an LEA official, no matter what the nature of the crime you are investigating, a cybercrime angle tends to come in almost always. Be it call log analysis, data imaging and analysis or plain old email header tracing. These courses will help fill in the missing gaps in your arsenal. CHIEF INFORMATION SECURITY OFFICERS CISOs operate in an increasingly high-risk and demanding role and need to be constantly updated on the latest cybersecurity technologies, appropriate organizational structures and regulatory requirements. END-USERS End-users form the first line of defense and our security awareness capsules are designed to address key aspects and get your employees to come onboard your cybersecurity program. GRC PRACTITIONERS Understanding the myriad regulatory and compliance requirements for cybsecurity is an ongoing challenge. These courses cover standards such as ISO 27001, PCI DSS, HIPAA and others. LAUNCH OF OUR ONLINE TRAININGS ON OUR NEW DIGITAL PLATFORM Learn more Register for a 1 month free trial of Network Security course TESTIMONIAL VIDEOS CAREER OPPORTUNITIES IN CYBERSECURITY Cybersecurity Ventures predicts there will be 3.5 million unfilled cybersecurity positions globally by 2021. Data from Burning Glass Technologies Research found that cyber security professionals tend to make about 9 percent more compared to other IT workers, yet there remains a lack of enough qualified professionals in the field. Read our comprehensive report on cybersecurity as a career choice covering the various types of roles, the skillsets required, and the career roadmap for a cybersecurity professional. Download Now OUR BLOGS Check out our latest blog posts Technology April 21, 2021 0 Comments CYBER-ATTACKS ON CRITICAL INFRASTRUCTURE OF A COUNTRY- HOW DO THEY HAPPEN? HOW SHOULD WE PREVENT THEM? “For those on the ramparts of the world’s sole superpower, the digital winds are blowing an icy chill through Read More Technology April 9, 2021 0 Comments STALKERWARE – IS SOMEBODY WATCHING YOU? She runs through an endless corridor of darkness, confused and helpless. Her heartbeat racing, her mind on overdrive. Why would he? How could he have known? Read More Technology April 1, 2021 0 Comments DEARCRY MAKES ORGANISATIONS CRY It’s a warm summer morning. While sipping your morning coffee, you access the work email. But you’re unable to log in.After trying a few tricks you’ve read up in some tech blogs, you reach out to your IT Read More + Students Trained So Far Training Centres Corporate Trainings Happy Clients OUR CLIENTS Some of the awesome clients we've had the pleasure to work with! -------------------------------------------------------------------------------- MEET OUR TEAM The people who make it happen at IIS! KARISHMA MOOKHEY Founder Karishma is the co-founder of IIS and began the journey in 2008! Twitter LinkedIn Mail SARALADEVI N Operations Head Saraladevi is the Operations Head of IIS and began the journey in 2008! Twitter LinkedIn Mail VAIBHAV V Senior Consultant One of our star trainers and consultants Twitter LinkedIn Mail LIONEL F Trainer and Security Analyst One of our star trainers Twitter LinkedIn Mail KK MOOKHEY CEO Kanwal K. Mookhey (CISA, CISSP, CISM) is the Principal Consultant and Founder at Network Intelligence and IIS Twitter LinkedIn Mail KARISHMA MOOKHEY Founder Karishma is the co-founder of IIS and began the journey in 2008! Twitter LinkedIn Mail SARALADEVI N Operations Head Saraladevi is the Operations Head of IIS and began the journey in 2008! Twitter LinkedIn Mail VAIBHAV V Senior Consultant One of our star trainers and consultants Twitter LinkedIn Mail LIONEL F Trainer and Security Analyst One of our star trainers Twitter LinkedIn Mail KK MOOKHEY CEO Kanwal K. Mookhey (CISA, CISSP, CISM) is the Principal Consultant and Founder at Network Intelligence and IIS Twitter LinkedIn Mail KARISHMA MOOKHEY Founder Karishma is the co-founder of IIS and began the journey in 2008! Twitter LinkedIn Mail SARALADEVI N Operations Head Saraladevi is the Operations Head of IIS and began the journey in 2008! Twitter LinkedIn Mail VAIBHAV V Senior Consultant One of our star trainers and consultants Twitter LinkedIn Mail ABOUT IIS * Dubai | Mumbai | Pune | Bengaluru | Chandigarh | Delhi | Hyderabad * 1800 2700 374 (Toll Free) * info@iisecurity.in * Monday - Saturday: 09:00 - 18:00 Sunday: Closed * * * * * QUICK LINKS * Home * Programs * Calendar * Contact * Blog * Terms and Conditions * Privacy Policy * Sitemap NEWSLETTER Stay informed on our latest news! ©2021 Institute of Information Security. All Rights Reserved. × WHITEPAPER DOWNLOAD REQUEST First Name Last Name Email Phone Profession Please Select Your Profession Student Working Submit × 1 Looking for cyber security courses ? × Loading...