Welcome to Centium

G1- Provati Apartment, East Enclave
Rajarhat Kolkata 700102

9088127888, 9836411688
admin@centiumworld.com

Sun - Sat 9.00 A.M - 7.00 P.M

We are into training and education long before we have started other services, so training is one of our core and strong delivery point. We have partnered with EC-Council, Cloud Security Alliance to provide world class training for Security Certifications like (CEH, ECSA, CHFI) and Cloud Security Modules like CCSK. We are 1st Training provider for certifications like CCSK, CISSP, CISM and CISA in Eastern India.

image

CEH

The Certified Ethical Hacker (CEH v9) program is the core of the most desired information security training system any information security professional will ever want to be in. The CEH, is the first part of a 3 part EC-Council Information Security Track which helps you master hacking technologies. You will become a hacker, but an ethical one!

Topics Covered

  1. Introduction to Ethical Hacking
  2. Footprinting and Reconnaissance
  3. Scanning Networks
  4. Enumeration
  5. System Hacking
  6. Malware Threats
  7. Sniffing
  8. Social Engineering
  9. Denial of Service
  10. Session Hijacking
  11. Hacking Web Servers
  12. Hacking Web Applications
  13. SQL Injection
  14. Hacking Wireless Networks
  15. Hacking Mobile Platforms
  16. Evading IDS, Firewalls, and Honeypots
  17. Cloud Computing
  18. Cryptography
image

ECSA

The ECSAV9 penetration testing course is designed to enhance the skills based competency of a penetration tester. This course is intensively hands-on and a tremendous amount of emphasis is placed on the practical competency of the student.

Topics Covered

  1. Need for Security Analysis
  2. TCP IP Packet Analysis
  3. Penetration Testing Methodologies
  4. Customers and Legal Agreements
  5. Rules of Engagement
  6. Penetration Testing Planning and Scheduling
  7. Pre-penetration Testing Steps
  8. Information Gathering
  9. Vulnerability Analysis
  10. External Penetration Testing
  11. Internal Network Penetration Testing
  12. Firewall Penetration Testing
  13. IDS Penetration Testing
  14. Password Cracking Penetration Testing
  15. Social Engineering Penetration Testing
  16. Web Application Penetration Testing
  17. SQL Penetration Testing
  18. Penetration Testing Reports and Post Testing Actions
image

CHFI v8

CHFIv8 presents detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enables students to acquire necessary hands-on experience on various forensic investigation techniques and standard forensic tools necessary to successfully carryout a computer forensic investigation leading to prosecution of perpetrators.

Topics Covered

  1. Computer Forensics in Today’s World
  2. Computer Forensics Investigation Process
  3. Searching and Seizing Computers
  4. Digital Evidence
  5. First Responder Procedures
  6. Computer Forensics Lab
  7. Understanding Hard Disks and File Systems
  8. Windows Forensics
  9. Data Acquisition and Duplication
  10. Recovering Deleted Files and Deleted Partitions
  11. Forensics Investigation Using AccessData FTK
  12. Forensics Investigation Using EnCase
  13. Steganography and Image File Forensics
  14. Application Password Crackers
  15. Log Capturing and Event Correlation
  16. Network Forensics, Investigating Logs and Investigating Network Traffic
  17. Investigating Wireless Attacks
  18. Investigating Web Attacks
  19. Tracking Emails and Investigating Email Crimes
  20. Mobile Forensics
  21. Investigative Reports
  22. Becoming an Expert Witness
image

CISSP

We are pleased to provide you the CISSP Classroom program proposal along with course topics and trainer’s details. Centium technologies is one of the leading IT training provider in Eastern India as well as product based IT solution provider. We are operating different IT Security related courses along with CISSP . Please find the below contents of CISSP curriculum covering in-depth 8 CBK Domains with 100 hours instructor led program.
The goal of the Centium Technologies CISSP classroom program is to prepare professionals for the challenging CISSP certification exam, covering the objectives of the exam as defined in the (ISC)2 Common Body of Knowledge.

Course Outline

  1. Security and Risk Management (Security, Risk, Compliance, Law, Regulations, Business Continuity)
  2. Asset Security (Protecting Security of Assets)
  3. Security Engineering (Engineering and Management of Security)
  4. Communications and Network Security (Designing and Protecting Network Security)
  5. Identity and Access Management (Controlling Access and Managing Identity)
  6. Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)
  7. Security Operations (Foundational Concepts, Investigations, Incident Management, Disaster Recovery)
  8. Software Development Security (Understanding, Applying, and Enforcing Software Security)
image

CISM

The Certified Information Security Manager® (CISM®) certification program is developed specifically for experienced information security managers and those who have information security management responsibilities. The CISM certification is for the individual who manages, designs, oversees and/or assesses an enterprise’s information security (IS). The CISM certification promotes international practices and provides executive management with assurance that those earning the designation have the required experience and knowledge to provide effective security management and consulting services. Individuals earning the CISM certification become part of an elite peer network, attaining a one-of-a-kind credential. The CISM job practice also defines a global job description for the information security manager and a method to measure existing staff or compare prospective new hires.

Course Outline

  1. Information Security Governance
  2. Information Risk Management and Compliance
  3. Information Security Program Development and Management
  4. Information Security Incident Management
image

CISA

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

Consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

image

CCSK

The Cloud Computing Security Knowledge class provides students thorough coverage of cloud security fundamentals and prepares them to take the Cloud Security Alliance CCSK certification exam. The course begins with a detailed description of cloud computing, and expands into all major domains such as Governance and Risk Management, the Cloud Architectural Framework, and Business Continuity/Disaster Recovery. Upon course completion, students will be prepared for the CCSK Exam, and experts in the following topics: understanding cloud computing, security challenges, cloud computing security, controls recommendation, elasticity, resiliency and measured usage, and understand the cloud computing architectual framework.

Course Outline

Module 1: Architecture
  1. Cloud Security Overview Part 1
  2. Cloud Security Overview Part 2
  3. Cloud Diagrams
  4. Cloud Services
Module 2: Governance and Enterprise Risk
  1. Risk Management
  2. Corporate Governance
  3. Enterprise Risk Management
  4. Risk Management Balance Process | Supply Chain Security
  5. ERM Incidents | Recommendations Part 1
  6. ERM Incidents | Recommendations Part 2
  7. ERM Incidents | Recommendations Part 3
Module 3: Legal Issues – Contracts and Electronic
  1. Cloud Legal Issues Part 1
  2. Cloud Legal Issues Part 2 – Possession, Contract Consideration
  3. Cloud Legal Issues Part 3 – Native Production
Module 4: Compliance and Audit Management
  1. Audits
  2. Compliance & Audit
  3. Audit Recommendations
  4. Audit Requirements
Module 5: Information Management and Data Security
  1. Information & Security
  2. Storage
  3. Information Governance | Classification
  4. Data Security
  5. Data Security Part 2 – Protecting Data Moving
  6. Client Database Encryption
  7. PaaS Encryption
Module 6: Interoperability and Portability
  1. Interoperability & Portability
  2. Interoperability Recommendations
  3. Portability Recommendations
  4. Recommendations SaaS
Module 7: Traditional Security, Business Continuity, and Disaster Recovery
  1. Business Conitnuity & Disaster Recovery
  2. Assessing CSP Security
  3. Equipment Maintenance
  4. Recommendations
Module 8: Data Center Operations
  1. Data Center Operations
Module 9: Incident Response
  1. Incident Response
  2. Testing
  3. IaaS
  4. C.E.R. = Containment, Eradication, & Recovery
Module 10: Application Security
  1. Application Security
  2. Security Testing
  3. Audit Compliance
  4. Security Assurance Recommendations
Module 11: Encryption and Key Management
  1. Encryption & Key Management
  2. Content Aware Encryption
  3. Storage of Keys
Module 12: Identity, Entitlement, and Access Management
  1. Building Access Control
  2. Intro to Identity
  3. Entitlement Process
  4. Trust with Identity
  5. Recommendations for Identity Management
Module 13: Virtualization
  1. Virtualization
  2. Hypervisor & Virtual Machine
  3. Inter-Virtual Machine Attacks
  4. Virtual Machine Encryption
  5. Virtual Machine Recommendations & Requirements
Module 14: Security as a Service
  1. Security as a Service (SaaS)
  2. Implementing Advantages
  3. Security Offerings
  4. Intrusion Detection | Prevention
  5. Business Continuity & Disaster Recovery
  6. European CCSK
  7. Top Security Benefits
  8. European Legal Based Issues
image

CCSA (Checkpoint FW)

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

Consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

image

HP Archsight (SIEM)

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

Consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

image

F5 Load Balancer

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

Consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

image

ITIL (Foundation to Expert)

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

Consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

image

Prince 2 (Foundation to Practitioner)

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

Consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

image

TOGAF (Foundation to Practitioner)

The Open Group Architecture Framework (TOGAF) is a proven enterprise architecture methodology and framework used by the world’s leading organizations to improve business efficiency. TOGAF helps practitioners avoid being locked into proprietary methods, utilize resources more efficiently and effectively, and realize a greater return on investment. TOGAF is an industry-standard architecture framework that may be used freely by your organization to develop an information systems architecture.

What is TOGAF?

  1. Ensures that everyone “speaks the same language”
  2. Most prominent and useful EA standard
  3. Combines industry best practices in organizations
  4. Saves time and money
  5. Avoid being locked into proprietary methods
  6. Proven, tested, and effective
  7. Utilize resources more effectively
  8. Demonstrates ROI
  9. Reliable

Course Outline

  1. Management
  2. The TOGAF 9 Components
  3. Architecture Development Method
  4. The Enterprise Continuum
  5. The Architecture Repository
  6. The Architecture Content Framwork
  7. The Architecture Content Metamodel
  8. The Preliminary Phase
  9. Architecture Governance
  10. Busines Scenarios
  11. Stakeholder Management
  12. Architecture Views and Viewpoints
  13. Building Blocks and the ADM
  14. Architecture Implementation Support Techniques
  15. Phase A: Architecture Vision
  16. Phase B: Business Architecture
  17. Phase C: Information Systems Architectures
  18. The Integrated Information Infrastructure Reference Model
  19. Foundation Architecture
  20. Phase D: Technology Architecture
  21. Migration Planning Techniques
  22. Phase E: Opportunities and Solutions
  23. Phase F: Migration Planning
  24. Phase G: Implementation Governance
  25. Phase H: Architecture Change Management
  26. ADM Requirements Management
  27. Architecture Partitioning
  28. Guidelines for Adapting the ADM
  29. Architecture Maturity Models
  30. Architecture Skills Framework

Testimonials

images

CEH

Ritesh Pal (Manager IT at Deloitte)

Don’t bother reading 1700 pages book, just spend 7 days with Centium, you should be through.

images

CEH

Sudip Kurmar Bardhan (Manager IT at Wipro Technologies)

A very Interesting seven days training session on ethical hacking. Suman as a trainer is really excellent due to his sound knowledge on domain , made all the sessions interactive and likely.

images

CEH

Nantu Mondal (SME - Network Security at Tata Consultancy Services)

As per my observations Centium World is one of the best certified training center in Kolkata. Apart from providing the best and most comprehensive methods of learning they also impart value added career guidance.

images

CISM

Debashis Dey (Deputy Manager IT at Tega Industries Limited)

I truly appreciate Centium's commitment toward education and belief in the importance of value adition through real life exposure.

images

CEH

Nantu Mondal (SME - Network Security at Tata Consultancy Services)

As per my observations Centium World is one of the best certified training center in Kolkata. Apart from providing the best and most comprehensive methods of learning they also impart value added career guidance.

images

CCSK, CHFI, PCI DSS, ISO 27001

Abhishek Sen (Director Operation)

I'm really satisfied with the courses of Centium Technology. Finally I understood complicated topics of infosec that for years I tried to figure out with guides and tutorials without success. The quality of content and the ease with which they are expressed make this course of study the best available.

images

CCSK, CHFI

Dr. Sudip Sinha (Network Specialist at Linde)

My experience with Cloud Security and CHFI Expert has been really great ! This course is the most complete one and really allow me to progress in Cloud Security and CHFI. The classes, the explanations and the exercises are great qualities and the exam was really fun. I recommend!!!

images

CCSK

Debashish Saha (Network Specialist at Linde)

The CCSK training met all my job needs, the lab environment was really good, and the instructor was quite a professional at delivering the content

images

CCSA

Pranay Biswas (Associate IT Consultant at ITC Infotech)

I enjoyed my experience of studying at Centium. Trainers are qualified and have amazing knowledge.

Training Professionals From

Centium trains professionals from various companies. Some of them are:

  • image
  • image
  • image
  • image
  • image
  • image
  • image
  • image
  • image
  • image
  • image
  • image
  • image
  • image

Our Clients

Our clients are:

  • image
  • image
  • image
  • image
  • image
  • image
  • image
  • image
  • image
  • image
  • image
  • image
  • image
  • image
  • image
  • image
  • image
  • image
  • image
  • image
  • image
  • image
  • image
  • image
  • image
  • image
  • image
  • image
  • image

Our Partners

Our partners are:

  • image
  • image
  • image
  • image
  • image
  • image
  • image