IndiaSoft Technologies (P) Ltd.
DUA Building, 2nd Floor, Ghule Patil Road, Near Raheja Vista Premiere, Mohammedwadi, Pune – 411060.
Ph. : +91 9325111066, E-mail: rkirani@indiasoft.co.in, mail@indiasoft.co.in, www.indiasoft.co.in
Powerful & Intuitive Modeling, Simulation & Optimization Tools
Engineering Simulation Solutions

Cyber Security Laboratories: Levels of Courses & Implementation
Various levels of Courses and Implementation:
A. Foundation Training Programs consisting of:
-
Introductory Foundation Training Program in Computer Architecture & Operation, Common Software Packages and Usage, Consumer Maintenance Practices, Scripting (Python), and Databases (SQL) Training Program.
-
Introduction to Networking and Introduction to Cyber Security* (Combo) Training Program.
-
Fundamentals of Information Technology Training Program.​​​

B. Industry-Essential Training Programs consisting of:
The Industry-Essential Course Curricula and Labs will focus and should include the below mandatory courses.
​
-
Maintaining and Repairing PCs Training Program.
-
Networking Technology Training Program.
-
Cyber Security Essentials Training Program.
​ ​
Once the students are familiar with the foundation course and have a good working knowledge on the basics of Computers, IOT, cyber security, coding, databases, Networking, Operating systems etc. The next challenge for them is to familiarize with understanding of cyber security challenges, tools, and techniques, as well as to develop the foundations of a professional cyber security skill set.
​
This essential program should focus on the minimum areas as below:
-
Critical Infrastructure Security Systems and Devices.
-
Security for local Intelligent Computing and Controlling Devices and Systems.
-
Security for Local Area Network Components and Systems.
-
Cyber Security for Users and Networks Attached to the Internet.
-
Enterprise Information Technology (IT) Network Security Systems and Techniques.
-
Industrial/Utility Industrial Control System (ICS) Networks and Devices Security.
-
Medical Network and Data System Security.
-
Ethical Hacking Roles and Tools.​


C. Advanced Cybersecurity Training Programs consisting of:
The Advanced Cybersecurity Course Curricula and Labs will focus and should include the below mandatory courses.
1. Advanced Enterprise Network Security Training Program:
The Advanced Enterprise Network Security Training Program prepares students for network administration and security positions in small, medium and enterprise sized networks. Students will acquire the knowledge and skills required to install and configure systems to secure applications, networks, and devices. They will perform threat analysis and respond with appropriate risk mitigation techniques and activities. In addition, they will work with network security policies, perform risk assessments, and examine incident response plans.
2. Advanced Industrial Network Security Training Program:
In the Advanced Industrial Network Security Training Program, students will be introduced to ICS embedded devices including PLCs, RTUs and IEDs. Students will also become acquainted with Industrial Control Systems (ICS) and Operational Technology (OT) network security environment which is is built on devices, protocols including – Modbus, DNP3, BacNet, etc., ICS/Utility network communication methods and the real-time AIC tenets associated with these networks that do not exist in the SOHO or Enterprise network environments.
​ ​
3. Cyber Security Systems Analyst Training Program:
The Cyber Security Systems Analyst Training Program prepares students for CySA job roles including – Security Operations Center Analyst, network administrators, incident response team members, threat intelligence analysts and Cybersecurity Analysts. In this course, students will learn to configure and use threat detection tools, perform data analysis and interpret the results to identify vulnerabilities, threats, and risks to an organization with the end goal of securing and protecting applications and systems within an organization. Students will build and operate honeypots; install, configure, and operate SEIM systems; conduct threat and vulnerability operations; perform incident response functions; and identify and monitor vulnerabilities across a network.
4. Certified PenTester Training Program:
The Certified PenTester Training Program provides students with the knowledge and skills required to perform remote and local reconnaissance operations that probe targeted networks for available attack surfaces. They will also be introduced to tools and techniques for creating exploits, delivering the exploit to the target from different locations (across the internet, from close proximity to the target, from inside the target, and inside the network) and establishing command and control after the initial exploit. The students will be introduced to advanced hacking techniques and tools to build on their existing networking and security knowledge.
​
​
D. Digital Forensics with Professional Software Toolkits Training Program:
The Digital Forensics with Professional Software Toolkits Course Curriculum and Lab should be focusing on the below requirements.
1. Digital Forensics Training program:
In the Digital Forensics Training program, students will work through an actual criminal case by using forensics software and hardware tools to solve the crime. Working through a step-by-step process, students will investigate a crime scene, bring the evidence back into their lab to find, extract and analyze the information while creating a “chain of custody” to ensure the findings are admissible in a court of law.
​
This program should focus on the minimum areas as below:
-
Digital forensics
-
Investigative procedures
-
Data Storage
-
Storage Media and Hardware Devices
-
Dealing with Passwords
-
Forensic Tools Trade
-
Steganography
-
Static, Live Acquisition
-
Mobile Forensics
-
Network Forensics
-
Email and Cloud evidence
2. Data Forensics Tool – Disk Lab - myFRT:
Disk Lab is forensic digital investigation tool that can be used to automatically analyse data from a wide range of computing & electronic devices. Includes tally files investigations.
​
Data Forensics Lab Process Automation has the following features:
-
Acquire from Multiple Sources
-
Analysis of Data and Reports
-
Chain of Clusters Generations
-
Made in India, considering Indian scenarios.
-
Automated Processing
-
Reporting
3. Multimedia Forensics Tools – Video/Image Forensics – ICVPro Suite:
-
ICVPro Enhance
-
ICVPro Authenticate
-
ICVPro Analytics
Unveiling Insights, Ensuring Authenticity: Advanced Tools for Image, Video Analysis, Authentication, Analytics, and Deepfake Detection in Forensics Investigations. Highlight Features of ICVPro Suite are:
-
Support Deep-fake Detection.
-
Automatically generate Chain of Custody from in just a few clicks.
-
150+ Dynamic Filters for the enhancement of images and videos.
-
Automated Video and Image Authentication.
-
Al-based Automation.
-
Modern User Interface & Easy Reporting.
-
Forensics processing & COC.