Welcome to Centium

G1- Provati Apartment, East Enclave
Rajarhat Kolkata 700102

9088127888, 9836411688
admin@centiumworld.com

Sun - Sat 9.00 A.M - 7.00 P.M

We are into training and education long before we have started other services, so training is one of our core and strong delivery point. We have partnered with EC-Council, Cloud Security Alliance to provide world class training for Security Certifications like (CEH, ECSA, CHFI) and Cloud Security Modules like CCSK. We are 1st Training provider for certifications like CCSK, CISSP, CISM and CISA in Eastern India.

image

Wireless Penetration Testing

Wireless Networks have become ubiquitous in today’s world. Millions of people use it worldwide every day at their homes, offices and public hotspots to logon to the Internet and do both personal and professional work. Even though wireless makes life incredibly easy and gives us such great mobility, it comes with risks. In recent times, insecure wireless networks have been used to break into companies, banks and government organizations. The frequency of these attacks is only intensified, as network administrators are still clueless when it comes to securing wireless networks in a robust and fool proof way..

Topics Covered


  • Chapter 1: Wireless Lab Setup
  • Chapter 2: WLAN and its Inherent Insecurities
  • Chapter 3: Bypassing WLAN Authentication
  • Chapter 4: WLAN Encryption Flaws
  • Chapter 5: Attacks on the WLAN Infrastructure
  • Chapter 6: Attacking the Client
  • Chapter 7: Advanced WLAN Attacks
  • Chapter 8: Attacking WPA-Enterprise and RADIUS
  • Chapter 9: WLAN Penetration Testing Methodology
  • image

    Web Penetration Testing

    Web Penetration Testing is designed to be a guide for professional Penetration Testers looking to include Kali in a web application penetration engagement. Our goal is to identify the best Kali tool(s) for a specific assignment, provide details on using the application(s), and offer examples of what information could be obtained for reporting purposes based on expert field experience. Kali has various programs and utilities; however, this book will focus on the strongest tool(s) for a specific task at the time of publishing.

    Topics Covered


  • Chapter 1: Penetration Testing and Setup
  • Chapter 2: Reconnaissance
  • Chapter 3: Server Side Attacks
  • Chapter 4: Client Side Attacks
  • Chapter 5: Attacking Authentication
  • Chapter 6: Web Attacks
  • Chapter 7: Defensive Countermeasures
  • Chapter 8: Penetration Test Executive Report
  • image

    Network Penetration Testing

    Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

    Topics Covered


  • Chapter 1: Getting Comfortable with Kali Linux
  • Chapter 2: Information Gathering
  • Chapter 3: Vulnerability Scanning
  • Chapter 4: Buffer Overflows
  • Chapter 5: Working with Exploits
  • Chapter 6: Privilege Escalation
  • Chapter 7: Client Side Attacks
  • Chapter 8: Password Attacks
  • Chapter 9: Bypassing Antivirus
  • Chapter 10: Metasploit Framework
  • image

    Android Penetration Testing

    Android Penetration Testing is a course intended for people who want to get started into Android Security, or even who are a bit familiar with the Android security space but want to learn more about Android Application Security. This is a hands-on course where you will get to reverse applications, find security vulnerabilities, perform debugging and API hooking, use tools like Androguard and Drozer, and a lot more.

    Topics Covered


    • Introduction to Android
    • Android Security Architecture
    • Android Permissions
    • Android Application Internals
    • Setting up Genymotion
    • Android Application Components
    • DEX File Analysis
    • Introduction to Android Debug Bridge
    • Logging Based Vulnerabilities
    • Reversing Android Applications
    • Analyzing Android Malwares
    • Analyzing Android Traffic
    • Bypassing SSL Pinning
    • Leaking Content Providers
    • Introduction to Drozer
    • Read based Content Provider vulnerability
    • Advanced Drozer Usage
    • Drozer Scripting
    • Dropbox Content Provider Vulnerability
    • Backup Based Vulnerability
    • Client Side Injection
    • Hooking Introduction and Setting up Insecure Bank
    • Android Debugging with Andbug
    • Debugging with JDB
    • Automated Hooking with Introspy
    • Cydia Substrate and Hooking
    • Xposed Framework and Hooking
    • Analysis and Scripting using AndroGuard
    • Webview Based vulnerabilities
    • Exploiting Webview with Metasploit

    image

    IOS Penetration Testing

    This course focuses on the iOS platform and application security and is ideal for pentesters, researchers and the casual iOS enthusiast who would like to dive deep and understand how to analyze and systematically audit applications on this platform using a variety of bleeding edge tools and techniques.

    Topics Covered


    • Module 1: Introduction to iOS Security
    • Module 2: Creating an Application Pentest Platform
    • Module 3: Advanced Application Runtime Analysis
    • Module 4: Exploiting iOS Applications
    • Module 5: iOS Forensics and Data Recovery
    • Module 6: iOS Malware and Backdoors
    • Module 7: Further Study and Roadmap

    image

    Pentesting with Metasploit

    This course is ideal for penetration testers, security enthusiasts and network administrators.

    Topics Covered


    • Metasploit Basics and Framework Organization
    • Server and Client Side Exploitation
    • Meterpreter – Extensions and Scripting
    • Database Integration and Automated Exploitation
    • Post Exploitation Kung-Fu – Exploring the system, Privilege escalation, Log deletion and AV / Firewall bypass
    • Token stealing and impersonation, Backdoors and Rootkits, Pivoting and Port forwarding, Railgun and Custom Scripting,
    • Backdoor an Executable
    • Exploit research with Metasploit- Buffer Overlows, SEH etc.
    • Scenario Based Hacking using Metasploit

    Testimonials

    images

    CEH

    Ritesh Pal (Manager IT at Deloitte)

    Don’t bother reading 1700 pages book, just spend 7 days with Centium, you should be through.

    images

    CEH

    Sudip Kurmar Bardhan (Manager IT at Wipro Technologies)

    A very Interesting seven days training session on ethical hacking. Suman as a trainer is really excellent due to his sound knowledge on domain , made all the sessions interactive and likely.

    images

    CEH

    Nantu Mondal (SME - Network Security at Tata Consultancy Services)

    As per my observations Centium World is one of the best certified training center in Kolkata. Apart from providing the best and most comprehensive methods of learning they also impart value added career guidance.

    images

    CISM

    Debashis Dey (Deputy Manager IT at Tega Industries Limited)

    I truly appreciate Centium's commitment toward education and belief in the importance of value adition through real life exposure.

    images

    CEH

    Nantu Mondal (SME - Network Security at Tata Consultancy Services)

    As per my observations Centium World is one of the best certified training center in Kolkata. Apart from providing the best and most comprehensive methods of learning they also impart value added career guidance.

    images

    CCSK, CHFI, PCI DSS, ISO 27001

    Abhishek Sen (Director Operation)

    I'm really satisfied with the courses of Centium Technology. Finally I understood complicated topics of infosec that for years I tried to figure out with guides and tutorials without success. The quality of content and the ease with which they are expressed make this course of study the best available.

    images

    CCSK, CHFI

    Dr. Sudip Sinha (Network Specialist at Linde)

    My experience with Cloud Security and CHFI Expert has been really great ! This course is the most complete one and really allow me to progress in Cloud Security and CHFI. The classes, the explanations and the exercises are great qualities and the exam was really fun. I recommend!!!

    images

    CCSK

    Debashish Saha (Network Specialist at Linde)

    The CCSK training met all my job needs, the lab environment was really good, and the instructor was quite a professional at delivering the content

    images

    CCSA

    Pranay Biswas (Associate IT Consultant at ITC Infotech)

    I enjoyed my experience of studying at Centium. Trainers are qualified and have amazing knowledge.

    Training Professionals From

    Centium trains professionals from various companies. Some of them are:

    • image
    • image
    • image
    • image
    • image
    • image
    • image
    • image
    • image
    • image
    • image
    • image
    • image
    • image

    Our Clients

    Our clients are:

    • image
    • image
    • image
    • image
    • image
    • image
    • image
    • image
    • image
    • image
    • image
    • image
    • image
    • image
    • image
    • image
    • image
    • image
    • image
    • image
    • image
    • image
    • image
    • image
    • image
    • image
    • image
    • image
    • image

    Our Partners

    Our partners are:

    • image
    • image
    • image
    • image
    • image
    • image
    • image