Security Education

Home > Services > Security Education

All our trainings are now under Institute of Information Security. For the further details see the following link www.iisecurity.in


The Institute of Information Security - training arm of NII Consulting is established by K. K. Mookhey and his team at NII with the aim of bringing you the best in information security training. We have put together a panel of brilliant trainers who have many years of experience in the exciting field of information security. We all believe that knowledge grows when it is shared.

We offer various trainings on various topics of information Security such as Security Auditing, ISO 27001 Compliance, Ethical Hacking, Network Security, Business Continuity Management, Secure Development, Intrusion detection and Analysis, Incident Response and many more.


Our work truly speaks for itself and our clients (http://iisecurity.in/aboutus/client.html) are the strongest testimony  ( http://iisecurity.in/testimonial.html)  to the quality of our trainings.


Our trainers are contributing authors to the Open Web Application Security Project, have published numerous articles on various security issues, and have presented at a number of industry conferences and workshops.


In the past, some of the clients to whom we've provided in-house training include BNP Paribas, VSNL, HPCL, and others. Participants for our workshops have been from industry leaders across all segments including companies such as HSBC, Citigroup, State Bank of India, Pfizer, Reserve Bank of India, Reliance Infocomm, IDEA Cellular, etc


Updated and revised training schedule - See Training Calendar


The Certified Professional Hacker (CPH)™

The CPH course is a state-of-the-art cutting-edge hands-on intensive training on hacking tools and techniques. It goes much beyond the usual ethical hacking courses with a strong focus on Databases, Web Applications (including Web 2.0), WLANs, and even Bluejacking. The major USP of the course is its focus on learning the fundamentals of Networks, Systems, Databases & Applications before learning how to hack them. This course has been personally designed, developed, and delivered by our Principal Consultant, K. K. Mookhey, and is quickly gaining recognition around the world.

Certified Information Security Consultant (CISC)™

The CISC course is a comprehensive 16-day weekends only training program on every significant subject under the domain of information security. This course is designed to help you become a top-notch security consultant. It not only covers technical and compliance related aspects, but also includes training on selected live projects, where you will get to learn how security assignments are truly executed. The live projects can be done during the weekdays or on weekends as per your convenience. With the aim of making you a top-league security consultant, we also cover report-writing, presentation skills, and communication skills.

Certified Web Application Security Professional (CWASP)

The CSDD course is focused on a comprehensive coverage of secure coding and security programming with the .NET framework. The course will present security guidelines and considerations in .NET applications development with a stronger emphasis on ASP.NET. The participants will learn the basics of application security, how to enforce security on a .NET application, using the .NET Crypto API and other security related issues. In addition, the course presents an overview of .NET's Security Framework, including authentication and authorization implementation. This course is a must for .NET developers wishing to improve their security skills, Development & System Architects wishing to improve their security skills and awareness.

Certified Professional Forensic Analyst (CPFA)™

Our forensics training program has been designed and developed by forensic experts who are Certified Computer Examiners (CCE) and Encase Certified Examiner (ENCE). Right from understanding disk structures to networks, and then getting in-depth knowledge on all the necessary components of becoming a Professional Forensic Analyst. An entire day is dedicated to Encase, however, other forensic tools such as Helix, Winhex, and Forensic Toolkit are also well-covered.

Certified Information Systems Security Professional (CISSP)

Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by the International Information Systems Security Certification Consortium, commonly known as (ISC) ². The CISSP is considered the global standard that proves an individual's proficiency in several security disciplines.CISSP is considered to be as the primary official document when talking about information security. It is an examination that is accredited by two popular organizations on IT security and these are the ISO and ANSI. The award is not just for the assessment of one’s solid knowledge about information security since it is a standard of achievement that is acknowledged worldwide.

About Certified Security and Forensics Analyst (CSFA)

The Certified Security and Fraud Analyst (CSFA) is designed to make you an expert Security as well as Forensic Analyst. This course starts with the basics of Network Security, Database Security and Operating System Security and goes into the Certified Professional Hacker. It goes far beyond the usual courses that talk about the same old port scanning and vulnerability assessments. It goes deep down into the depths of networking, systems, actual exploitation.Along with this it also gives you the skills, knowledge and ability to conduct formal incident investigations and decipher internal and external data breach intrusions, complex digital forensics cases, persistent threats and anti forensics techniques used by attackers. We also make you capable of providing live responses for phishing cases, network forensics, worms and Trojan attacks. And of course report writing, which is most important to present your case. The best part about the CSFA is the fact that you get hands-on practical training on live projects. The entire training program is designed by our Principal Consultant Mr. K K Mookhey, and can assure you that it is designed specifically to make you an expert analyst.

Certified Information Security Consultant(CISC) - Six months training

CISC is 6 months training in information security for amateurs and professionals to make you an expert in the field of Information Security.The course is ideal for those wanting to differentiate themselves from candidates with an undergraduate degree only, as well as those already in industry wishing to advance their skills in this constantly evolving area.Many companies are actively recruiting security specialists and this course will prepare graduates for senior technical and management positions in many industry sectors.

Certified Secure Java Developer (CSJD)™

The CSJD course is focused on a comprehensive coverage of secure coding and security programming with J2EE. The course will present security guidelines and considerations in Java applications development. The participants will learn the basics of application security, how to enforce security on a J2EE application, enabling standard J2EE security mechanisms and other security related issues. In addition, the course presents an overview of Java's Security manager, including authentication and authorization implementation. This course is a must for Java developers wishing to improve their security skills, Development & System Architects wishing to improve their security skills and awareness.

Certified Secure Dotnet Developer (CSDD)™

The CSDD course is focused on a comprehensive coverage of secure coding and security programming with the .NET framework. The course will present security guidelines and considerations in .NET applications development with a stronger emphasis on ASP.NET. The participants will learn the basics of application security, how to enforce security on a .NET application, using the .NET Crypto API and other security related issues. In addition, the course presents an overview of .NET's Security Framework, including authentication and authorization implementation. This course is a must for .NET developers wishing to improve their security skills, Development & System Architects wishing to improve their security skills and awareness.

Other Training Topics

  1. Information Security Fundamentals
  2. Operating Systems Security - Windows & Unix
  3. Database Security - MS SQL Server & Oracle Server
  4. Application Security
  5. Digital Forensics and Incident Response
  6. Intrusion Analysis
  7. ISO 27001 Lead Auditor (IRCA Approved Partner Course)
  8. BS 25999 Lead Auditor
  9. Information Security Awareness