Skip to main content

About us

WHO WE ARE

Craw Security is a Training and Consulting Company with high industry training and consulting Standards. Craw Security Deals with various kinds of products like It Infrastructure Implementation, Security Implementations, Security Audits, Vulnerability Assessments and Penetration Testing.  Craw Security focus on delivering Best industry Certifications from top vendors and testing facilities for various Vendors.

WHAT WE TRY TO GIVE

We try to give you real industry standards with best possible quality to all our customers and clients. We focus on Various sections of Society and running a national level campaign to literate Students from all parts of company who can’t Afford “Basic IT Computer Training”. We wish we could teach as many students from all over the world and make it a beautiful place to work. We work on minimum gross margins to strength the Indian It infrastructure.

OUR COURSES


OUR WORKSHOPS

CRAW Security has conducted various workshops on Information Security, Ethical HackingiOS DevelopmentAndroid DevelopmentSoftware DevelopmentCloud ComputingArtificial IntelligenceAutomobiles Mechanics  & IC EnginesEmbedded SystemBasic NetworkingInternet Marketing and Sixth Sense Robotics many more topics in many top engineering Colleges,  Schools Such as IIT Jodhpur, Amity University, Noida International University, TECHKRITI, Delhi Technology University, IMS Noida, TATA Communication, IGNOU, PEC and others.

Comments

Popular posts from this blog

Certified Ethical Hacker(CEH) Official (CEH) Training and Certification Course

Certified Ethical Hacker (CEH) Official (CEH) Training and Certification Course Certified Ethical Hacker  (CEH)  Training  is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a black hate hacker, but Certified Ethical Hacker (ceh)   is work with a lawful  manner to assess the security posture of a target system(s). the  ethical hacking  certification (ceh)  have the power to provide you to better understating  of  ethical hacking  and it’s course (CEH)Certified Ethical Hacker summer Internship  Contents Introduction to Ethical Hacking Foot printing and reconnaissance Foot-printing Active (Tool Based Practical) Foot-printing Passive (Passive Approach) In-depth Network Scanning Enumeration User Identification System Hacking Password Cracking & Bypassing Viruses and Worms Trojan a...

SUMMER INTERNSHIP TRAINING 2018

SUMMER INTERNSHIP 2018 CRAW Security  invites applicants or candidates for its 2018 Summer Internship Program in Computer Science, Information Security, Networking, Web Development , Software Development, Management and Marketing at its locations in New Delhi. We are seeking highly motivated students, who are interested in experiencing an exciting Summer of research. The selected students will have the opportunity to work closely with an outstanding research team on challenging problems that range from leading-edge exploratory work to prototyping real-world systems and applications. During the internship, the students will also have the opportunity to participate in the workshops, competitions, events, live projects of the largest industrial research organization in the world and network with other top students in different fields from other universities. We offer internship positions in various research. Benefits of Summer Internship 2018   ...

User Enumeration

User Enumeration User Enumeration in the enumeration phase attacker creates and performs activities connections to system and perms directed queries to gain more information about the taget attackers use extracted information to identify system attack point and perform password attacks to gain unauthorized access to information system resources. Enumeration pen testing Enumeration Pen Testing in order to enumerate important servers find the network range using tools such as “whoise lookup” calculate the subnet mask required for the ip range using subnet mask calculators that can be given as an input to many of the ping sweep and port scanning tools perform port scanning to check for the open ports on the nodes using such as nmap