www.iisecurity.in Open in urlscan Pro
2606:4700:3032::ac43:ae9c  Public Scan

Submitted URL: http://www.iisecurity.in/
Effective URL: https://www.iisecurity.in/
Submission: On April 27 via api from IN — Scanned from DE

Form analysis 3 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; background: url(&quot;https://www.google.com/cse/static/images/1x/en/branding.png&quot;) left center no-repeat rgb(255, 255, 255); outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

POST /thanks-newsletter.php

<form id="newsLetterForm" class="widget-subscribe-form form-inline" action="/thanks-newsletter.php" method="post" novalidate="novalidate">
  <h4 class="widget-title">Newsletter</h4>
  <small>Stay informed on our latest news!</small>
  <div class="input-group">
    <input id="newslMail" name="newslMail" type="email" aria-required="true" class="form-control required email" placeholder="Enter your Email">
    <span class="input-group-btn">
      <button type="button" onclick="if (!window.__cfRLUnblockHandlers) return false; submitNewsletter()" id="widget-subscribe-submit-button" class="btn btn-default"><i class="fa fa-paper-plane"></i></button>
    </span>
  </div>
  <div id="newsErrorDiv" class="input-group" style="margin-top: 10px;margin-left: 10px;color: red;font-weight: bold;">
  </div>
</form>

POST /whitepaperDownload.php

<form id="whitepaperForm" class="form-gray-fields" action="/whitepaperDownload.php" method="post">
  <div class="row">
    <div class="col-md-6">
      <div class="form-group">
        <label class="upper" for="name">First Name</label>
        <input class="form-control required" name="senderName" placeholder="Enter First Name" id="senderName" aria-required="true" type="text">
      </div>
    </div>
    <div class="col-md-6">
      <div class="form-group">
        <label class="upper" for="name">Last Name</label>
        <input class="form-control required" name="senderLName" placeholder="Enter Last Name" id="senderLName" aria-required="true" type="text">
      </div>
    </div>
  </div>
  <div class="row">
    <div class="col-md-6">
      <div class="form-group">
        <label class="upper" for="email">Email</label>
        <input class="form-control required email" name="senderEmail" placeholder="Enter email" id="senderEmail" aria-required="true" type="email">
      </div>
    </div>
    <div class="col-md-6">
      <div class="form-group">
        <label class="upper" for="phone">Phone</label>
        <input class="form-control required phone" name="senderPhone" placeholder="Enter Phone" id="senderPhone" aria-required="true" type="text">
      </div>
    </div>
  </div>
  <div class="row">
    <div class="col-md-6">
      <div class="form-group">
        <label class="upper" for="name">Profession</label>
        <select id="profession" name="profession" class="input-xlarge">
          <option value="0" selected="selected">Please Select Your Profession</option>
          <option value="1">Student</option>
          <option value="2">Working</option>
        </select>
      </div>
    </div>
  </div>
  <div class="row">
    <div class="col-md-6" style="margin-top:15px;">
      <div class="form-group">
        <script src="https://www.google.com/recaptcha/api.js" type="text/javascript"></script>
        <div class="g-recaptcha" data-sitekey="6LeBt08UAAAAAPYMVAReP5Vh_hjdM4I3H27HyNGE" style="width: fit-content;float: left;">
          <div style="width: 304px; height: 78px;">
            <div><iframe title="reCAPTCHA"
                src="https://www.google.com/recaptcha/api2/anchor?ar=1&amp;k=6LeBt08UAAAAAPYMVAReP5Vh_hjdM4I3H27HyNGE&amp;co=aHR0cHM6Ly93d3cuaWlzZWN1cml0eS5pbjo0NDM.&amp;hl=de&amp;v=QENb_qRrX0-mQMyENQjD6Fuj&amp;size=normal&amp;cb=rov17mqmxa8o"
                width="304" height="78" role="presentation" name="a-dmwuwhk5utyk" frameborder="0" scrolling="no"
                sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"></iframe></div><textarea id="g-recaptcha-response" name="g-recaptcha-response"
              class="g-recaptcha-response" style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
          </div><iframe style="display: none;"></iframe>
        </div>
        <div style="float: left;padding: 3%;width: 100%;color: red;font-weight: bold;" id="errorDiv"></div>
      </div>
    </div>
  </div>
</form>

Text Content

×

search
 

Custom Search

Sort by:
Relevance

Relevance
Date




 * 
 *   PRICING


 * Home
 * Trainings
   * Featured Trainings
     * Blockchain Security
     * API Security
     * Big Data for Security Analytics
     * IoT Security
       * Basic
       * Advanced
     * Exploit Development and Malware Analysis
     * Windows Internals Essentials
   * Kick Start Your Cybersecurity CareerNEW
     * Certified Information Security Consultant (CISC)
     * Certified in Governance, Risk Management & Compliance (CGRC)
     * Certified Security Operations Center Analyst (CSOC)
     * Certified Cybersecurity Analyst (CCA)
     * Ethical Hacking for Beginners
     * Certified Cybersecurity Expert (CCE)
     * Digital Forensics for Beginners
     * Wireless Security
     * Certified Professional Hacker (CPH+)
   * Application Security
     * Cloud Computing Security (CCS)
     * Devops Security
     * Mobile Application Security (MAS)
     * Certified Web Application Security Professional (CWASP™)
     * Certified Secure .NET Developer (CSDD™)
     * Certified Secure Java Developer (CSJD™)
     * Secure Coding in JavaScript
     * Certified Secure PHP Developer (CSPD)
     * Secure Coding in Python (Django)
     * Source Code Analysis
   * Infrastructure Security
     * Windows Security
     * Unix Security
     * Database Security
     * Network Security
     * Wireless Security
     * Critical Infrastructure Security
     * Virtualization Security
   * Business Continuity Management Systems
     * ISO 22301 LA
     * ISO 22301 LI
     * Business Continuity Management Systems (BCMS) Workshop
     * IT DR Workshop
     * Crisis Management Workshop
     * Crisis Management and Simulation Workshop
     * Risk Management Workshop
     * Integrated BCM & IT DR Workshop
   * Governance Risk Compliance
     * ISO 27001 LA
     * ISO 27001 LI
     * IT Disaster Recovery
     * Risk Management
     * PCI DSS - CPSP
     * HIPAA
     * ISO 20000 / ITIL
     * Enterprise Risk Management
     * Certified General Data Protection Practitioner (CGDPP)
   * Certifications
     * Certified Information Systems Security Professional (CISSP)
     * Certified Information System Auditor (CISA)
     * Certified Ethical Hacker v11 (CEH-v11)
     * Computer Hacking Forensic Investigator (CHFI-v9)
     * Certified Network Defense (CND)
     * Certified Secure Computer User (CSCU)
     * Certified Payment Security Practitioner (CPSP)
     * Certified Data Privacy Practitioner (CDPP)
   * Digital Forensics Incident Response
     * Certified Professional Forensics Analyst (CPFA)
     * Certified Digital Forensics Expert
     * Incident Response
     * Course for Law Enforcement
     * Emerging Security Threats And Countermeasures
     * Risk Management
     * Fraud Detection, Investigation and Prevention
     * Security Operations Centre Training
     * Certified Security Forensics Analyst (CSFA)
     * E-Crime Computer Forensics
     * Intrusion Detection Analysis
     * Enterprise Threat Hunting
   * Technology Trainings
     * Data Leakage Prevention
     * Information Rights Management
     * Mobile Device Management
     * Network Access Control
     * Privileged Identity Management
     * Web Application Firewalls
     * Web App Wifi Security Training
     * Palo-Alto Training
   * Advanced Trainings
     * Advance Metasploit
     * Reverse Engineering Malware
     * Reverse Engineering Training
   * EC Council certifications
     * Basic Certifications
       * Ethical Hacking Preparation Course (EHPC)- 4 days
       * CERTIFIED SECURE COMPUTER USER (CSCU)- 2 days
       * EC-Council Certified Security Specialist (ECSS)- 5 days
     * Advance Certifications
       * Advance Network Defender (AND)- 5 days
       * Licensed Penetration Tester - LPT (Master)- 5 days
       * EC-Council Disaster Recovery Professional (EDRP)- 5 days
       * EC-Council Certified Security Analyst (ECSA)- 5 days
       * Certified SOC Analyst (CSA)- 5 days
     * Core Certifications
       * Network Security Expert- 10 days
       * Certified Network Defender (CND)- 5 days
       * EC-Council's Certified Incident Handler (ECIH)- 3 days
       * Certified Ethical Hacker (CEH)- 6 days
       * Computer Hacking Forensic Investigator (CHFI)- 4 days
       * Certified Threat Intelligence Analyst (C|TIA)- 3 days
   * Security Awareness
     * Security Awareness for IT Team
     * Security Awareness for Management Team
     * Security Awareness for General Users
   * Corporate Trainings
   * Trainings for Colleges
     * Security Awareness Basic
     * Network Security
     * Ethical Hacking for Beginners
     * Web App Wifi Security Training
 * About Us
   * Company
   * Testimonials
   * Our Team
   * Careers
   * Our Labs
   * Students Placements
   * Clients
   * FAQs
   * Certificate Validation
 * Calendar
 * Blog
 * Partner with us
 * Register
 * Modes of Training
   * Instructor-led online Training
   * Classroom Training
   * Online Trainings
   * Blended Trainings
   * Corporate Training


CYBER SECURITY COURSES


 

Sign up for one of our cybersecurity courses and break the mould!

Get in Touch


WHY CHOOSE US

LATEST TECHNOLOGY COVERAGE

Be it cloud security or IoT security or the use of Big Data for Security
Analytics, our training programs are always being updated to cover the latest
trends in cybersecurity

CYBERSECURITY INDUSTRY ALIGNMENT

Our training programs are developed and vetted by hands-on practitioners who
ensure that the content is closely aligned to the market needs of the
cybersecurity industry

EMPHASIS ON HANDS-ON PRACTICALS

Across all our courses, more than 60% of time is spent on practical hands-on
activities designed to help participants get confidence via assignments,
hands-on exercises and labs that simulate real-world scenarios

FLEXIBLE DELIVERY MODELS

Our trainings are available as standard courses delivered at our various
branches, as well as customized programs that can be delivered on-premises or
virtually.

PIONEERS OF INFORMATION SECURITY TRAINING

EXTENSIVE CONSULTING EXPERIENCE

INTERNATIONAL & DOMESTIC ACCREDITATION

80% HANDS ON TRAINING ON ALL THE COURSE

COMPREHENSIVE KNOWLEDGE TRANSFER

COMMITMENT TO SECURITY RESEARCH


FROM OUR YOUTUBE CHANNEL

GETTING YOUR BREACH RESPONSE STRATEGY RIGHT




TRAINING CATALOGUE

Click on any of the sections below to select the right training course for you


BEGINNERS

These courses will help set your cybersecurity career on the right path


DEVELOPERS

Do you Devops? Or even if you're into standard programming approaches. Our wide
variety of trainings focused on application security will appeal to you.


ADMINISTRATORS

Applying patches, hardening systems, addressing Windows, Unix, and Databases -
these courses are highly customizable to your specific environment


FORENSICS AND INCIDENT RESPONDERS

Be it imaging hard drives and analyzing them using Encase or FTK, or analyzing
gigabytes of logs or getting a deeper insight into the killchain.


CERTIFICATIONS

Jumpstart your career into next gear with an industry-valued certification such
as the CISSP, CISM, CISA, CEH or CHFI


LAW ENFORCEMENT AGENCIES

As an LEA official, no matter what the nature of the crime you are
investigating, a cybercrime angle tends to come in almost always. Be it call log
analysis, data imaging and analysis or plain old email header tracing. These
courses will help fill in the missing gaps in your arsenal.


CHIEF INFORMATION SECURITY OFFICERS

CISOs operate in an increasingly high-risk and demanding role and need to be
constantly updated on the latest cybersecurity technologies, appropriate
organizational structures and regulatory requirements.


END-USERS

End-users form the first line of defense and our security awareness capsules are
designed to address key aspects and get your employees to come onboard your
cybersecurity program.


GRC PRACTITIONERS

Understanding the myriad regulatory and compliance requirements for cybsecurity
is an ongoing challenge. These courses cover standards such as ISO 27001, PCI
DSS, HIPAA and others.


LAUNCH OF OUR ONLINE TRAININGS ON OUR NEW DIGITAL PLATFORM

Learn more


Register for a 1 month free trial of Network Security course


TESTIMONIAL VIDEOS




CAREER OPPORTUNITIES IN CYBERSECURITY

Cybersecurity Ventures predicts there will be 3.5 million unfilled cybersecurity
positions globally by 2021. Data from Burning Glass Technologies Research found
that cyber security professionals tend to make about 9 percent more compared to
other IT workers, yet there remains a lack of enough qualified professionals in
the field. Read our comprehensive report on cybersecurity as a career choice
covering the various types of roles, the skillsets required, and the career
roadmap for a cybersecurity professional.

Download Now


OUR BLOGS

Check out our latest blog posts
Technology
April 21, 2021 0 Comments


CYBER-ATTACKS ON CRITICAL INFRASTRUCTURE OF A COUNTRY- HOW DO THEY HAPPEN? HOW
SHOULD WE PREVENT THEM?

“For those on the ramparts of the world’s sole superpower, the digital winds are
blowing an icy chill through

Read More
Technology
April 9, 2021 0 Comments


STALKERWARE – IS SOMEBODY WATCHING YOU?

She runs through an endless corridor of darkness, confused and helpless. Her
heartbeat racing, her mind on overdrive. Why would he? How could he have known?

Read More
Technology
April 1, 2021 0 Comments


DEARCRY MAKES ORGANISATIONS CRY

It’s a warm summer morning. While sipping your morning coffee, you access the
work email. But you’re unable to log in.After trying a few tricks you’ve read up
in some tech blogs, you reach out to your IT

Read More
+


Students Trained So Far

Training Centres

Corporate Trainings

Happy Clients


OUR CLIENTS

Some of the awesome clients we've had the pleasure to work with!

--------------------------------------------------------------------------------




MEET OUR TEAM

The people who make it happen at IIS!


KARISHMA MOOKHEY

Founder

Karishma is the co-founder of IIS and began the journey in 2008!

Twitter LinkedIn Mail


SARALADEVI N

Operations Head

Saraladevi is the Operations Head of IIS and began the journey in 2008!

Twitter LinkedIn Mail


VAIBHAV V

Senior Consultant

One of our star trainers and consultants

Twitter LinkedIn Mail


LIONEL F

Trainer and Security Analyst

One of our star trainers

Twitter LinkedIn Mail


KK MOOKHEY

CEO

Kanwal K. Mookhey (CISA, CISSP, CISM) is the Principal Consultant and Founder at
Network Intelligence and IIS

Twitter LinkedIn Mail


KARISHMA MOOKHEY

Founder

Karishma is the co-founder of IIS and began the journey in 2008!

Twitter LinkedIn Mail


SARALADEVI N

Operations Head

Saraladevi is the Operations Head of IIS and began the journey in 2008!

Twitter LinkedIn Mail


VAIBHAV V

Senior Consultant

One of our star trainers and consultants

Twitter LinkedIn Mail


LIONEL F

Trainer and Security Analyst

One of our star trainers

Twitter LinkedIn Mail


KK MOOKHEY

CEO

Kanwal K. Mookhey (CISA, CISSP, CISM) is the Principal Consultant and Founder at
Network Intelligence and IIS

Twitter LinkedIn Mail


KARISHMA MOOKHEY

Founder

Karishma is the co-founder of IIS and began the journey in 2008!

Twitter LinkedIn Mail


SARALADEVI N

Operations Head

Saraladevi is the Operations Head of IIS and began the journey in 2008!

Twitter LinkedIn Mail


VAIBHAV V

Senior Consultant

One of our star trainers and consultants

Twitter LinkedIn Mail


ABOUT IIS

 * Dubai | Mumbai | Pune | Bengaluru | Chandigarh | Delhi | Hyderabad
 * 1800 2700 374 (Toll Free)
 * info@iisecurity.in
 * 
   Monday - Saturday: 09:00 - 18:00
   Sunday: Closed

 * 
 * 
 * 
 * 
 * 

QUICK LINKS

 * Home
 * Programs
 * Calendar
 * Contact
 * Blog
 * Terms and Conditions
 * Privacy Policy
 * Sitemap



NEWSLETTER

Stay informed on our latest news!


©2022 Institute of Information Security. All Rights Reserved.
×

WHITEPAPER DOWNLOAD REQUEST

First Name
Last Name
Email
Phone
Profession Please Select Your Profession Student Working

Submit
×
1
Across all our courses 60% time is spent on practical hands-on activities.

Interested?
×
Loading...