Contact us

Gold Membership

Language: English

₹49999 including GST

100 CF Coins as Cashback


Description

180+ hours of live learning in a year

Attend knowledge-sharing sessions and workshops from our SMEs and Industry leaders, from programs like CF Thursday, CXO connect, fireside chats with CXOs, and special knowledge-sharing sessions.

600+ hours of recorded sessions

Gain insights into topics like Risk Management, Cyber Security Emerging Technology, and Data Privacy from the backpack of knowledgeable session recordings.

Part of the knowledge-sharing community

Part of CyberFrat WhatsApp and Google knowledge sharing group and Full Access to Microsoft Kaizala groups.

Industry news, jobs, internship

Get updates on industry news, jobs, internship, and candidature requirements. Grooming, Mentoring, and Career Guidance sessions.

Special Discounts on every program

Discounts on all conferences, Partner events, CF Training, and Masterclass.

Networking opportunities

Network opportunities with other professionals across the globe, access to all CyberFrat local chapters & virtual meets.

Updates through Weekly newsletter

Receive a weekly newsletter with educational materials, interesting posts, upcoming free events, popular books, and much more.CyberFrat local chapter& virtual meets.

Digital 4n6 Journal at 25% off for a 1-year subscription.

Package Contents

Certified Information Systems Security Professional -CISSP
Gaurav Batra
CCSK- Certificate of Cloud Security and Knowledge
Rahul Kamath
Certified Information Systems Security Professional (CISSP)
Multiple Trainers
Azure Architecture Technologies
Amit Kulkarni
DevSec Ops and Container Security
Deep Shankar Yadav
DevSecops & Container Security
Deep Shankar Yadav
Threat Intel & Dark Web
Muslim Koser
Kubernetes & Advanced Observability
Nalin Agarwal & Bharath S
Demystifying Cyber Risk
Gaurav Batra
NIST Cybersecurity Framework
Anil Chiplunkar
PCIDSS v4.0 Masterclass
Mr. Vamsi Krishna Maramganti & Mr. Kalpesh Vyas
Certified in Risk and Information Systems Control (CRISC)
Nishant Singh
Defense In-Depth
Multiple Trainers
Linux Essentials & AWS
Amit Kulkarni
Certificate of Cloud Security Professional- CCSP
Gaurav Batra
Azure Security AZ-500 Training
Amit Kulkarni
Docker and AWS ECS
Amit Kulkarni
Certificate of Information Security Manager-CISM
Multiple Trainers
Digital Forensics Training
Samir Datt
Introduction to ISO27002:2022
Jagbir Singh
Cybersecurity in IOT
Vinod Babu
Systems and Organisational Controls
Narasimhan Elangovan
Certified Information Systems Auditor-CISA
Rajeev Gupta
Industrial Control System Cybersecurity Framework
Soumil Khandadia
How to build a strong Cybersecurity Culture
Madhu Maganti
Examining Malicious Software and it’s Analysis
Shrutirupa Banerjiee
Why SecDevOps is the New way in Cybersecurity
Saman Fatima
CISSP 2022
Gaurav Batra
Digital Evidence Handling
Harshita Jadhav
Cyber Crimes
Ritesh Bhatia
Network Security
Smith Gonsalves
Fundamentals of Cyber Security
Venkata Satish Guttala
DNS Training for security practitioners
Infoblox
Web Application Security
Omkar Prakash Joshi
DevSecOps
Joel Divekar
End-to-End Cybersecurity
Ajay Bhayani
Incident Management
Lalit Vazirani
Passwordless Authentication
Viral Parmar
Cyber Incident Investigation Case Studies
Nikhil Mahadeshwar
Data Analytics
CA Murtaza Q. Ghadiali
Artificial Intelligence
Vikram Verma, Dr. Deepak Singh
Cloud Computing
Gaurav Batra
AI / ML in Cybersecurity
Apurva Jain
Cyber Laws
Rohit Jain
Blockchain in Cybersecurity
Narasimhan Elangovan
Wednesday Wisdom: Advanced Web Application Security
Vaisakh T R
Enterprise Risk Framework
Vinod Nair
Data privacy
Gaurav Khera
Privacy Software Development Life Cycle
Anil Lole
Operational Risk (NBFC)
SMEs
Banking IT
SMEs
Insurance process lifecycle
SMEs
Audit Analytics Using Caseware Idea Software
CA Murtaza Q. Ghadiali
Retail Success
SMEs
Operational risk (IT/ITES)
SMEs
HealthCare Risk
SMEs
Manufacturing Operational Risk
Atul Anand
Combat Cyber DeceptiCons with AI
F5 Networks
The journey from Legacy to Next Gen Web Security
Netskope
eMudhra: Empowering Digital Transformation
EMudhra
Securing Remote Workforces at Scale
Palo Alto Networks
Haltdos Edge Security Platform
Haltdos
Prevent attacks by fortifying the last mile -The user
Security Advisor
Securing Privilege Identity in Cloud Era
Sectona
Take Control of Business Critical Data for effective Protection & Compliance
Klassify
Building blocks for dealing with exponentially increasing mail-based frauds
Progist
Shift Left: An approach to incorporate Security early into SDLC for App-based businesses
AppKnox
Security strategy begins with an attitude: Never trust. Always verify
Blackberry
Cyber Risk and Insurance
Howden India
Infosec Fusion 2.0
Multiple Speakers
Building Zero Trust Framework
Harshavardhan Lale
Why Milliseconds matter securing against the next Zero-day
Puneet Gupta
Hyperscale SIEM for everyone
DNIF
Taking Bull by Horns… Eliminate The no. 1 Enterprise Risk – PASSWORDS – Go Passwordless.
PureID
Cyber Threat Intelligence Differentiating Signal from Noise
Anomali
Darktrace Cyber AI platform
Dark Trace
Cyber hygiene in the workplace: How IAM counters the complex threat landscape
Last Pass
Simplifying Vulnerability Management
We Secure App
SOC Capability Validation Tool
qSeap
Zero Trust Prevention Strategy – Endpoints
Morphisec
Measuring your cybersecurity risk posture with Cyber Observer
Cyber Observer
CTIX Lite – Enabling Threat Intelligence Automation for Everyone
Cyware
The Art of open Source Intelligence
Saumay Srivastava
Demystifying BlockChain Security
Shrutirupa Banerjiee
Securing your Apps in AWS
Amit Kulkarni
Cyber Security for Critical Infrastructure
Dr. Faruk Kazi
Secure Coding
Dr. Gopakumaran Thampi
SOC Blueprint
Om Ahuja
Data Protection Within Organizations
Garima Purohit
Digital Wildfires in a Connected World
Dr. Rama Subramaniam
Mind, Machine and Market
Dr. Lalit Saraswat
Security Is Everyone's Responsibility
Amey Lakeshri
Buisness Agility With Devops
Rakesh Singh/ Arun Kholi
Zero Trust For IIOT & Cloud Environment
Bill Joll
Bluetooth Basics and Hacking
Arun Mane
Incident Management and Business Continuity Planning
Shailendra Srivastava
Attacking Secret Sharing
Adhokshaj Mishra
Cyber Crisis
Smith Gonsalves
At Ease with Cyber Security
Viral Raval
Software Development Security
Rahul Kamath
Data Privacy and Protection
Ramesh Venkataraman
Social Media Security & Online Frauds
Rakshit Tandon
Machine Learning - Practical application for cybersecurity
Hannan Satopay
Understanding Azure Security
Amit Kulkarni
Latest Trends in Cyber Crimes
Prof. Triveni Singh IPS
Importance of Digital Evidence in Cyber Security
Arun Soni
Intelligence Threat Hunting
Vishnu Vardhan
Data Discovery & Classification
Aakriti Sarivastav & Aaron Kinchen
The Future is Cloudy: Cloud security challenges and how to overcome them
Raphel Peyret, Horangi
Aviation Security ( ACARS )
Arun Mane
Importance of Early Education to Prevent Cyber Crimes
Yogesh Kumar
COSO 2013 Internal Controls Framework
Manoj Agrawal
API Security
Mohit Rampal
Burpsuite
Manpreet Singh
Basics of Cloud and Cloud Certification
Ria Wadhwani
Demystifying 65B Certificate Requirements.
Vicky Shah
Digital Forensics
Arpit Doshi
DMARC
Venkata Satish Guttala
Docker Security
Deep Shankar Yadav
Enhancing Defender Skills
Rohan Bhasin
ISO 27002:2022 Readiness and Awareness
Vijayan Muralidaran
Deep Dive In RBI's Digital Security Compliance
Vikram Sareen: BlueBricks
Cloud Security Threats & Challenges
Kavitha Srinivasulu
Exotic Excel
CA Nachiket Pendharkar
Extraordinary time, Extraordinary change
Dinesh Bareja
Interactive Application Security Testing
Mohit Rampal
Financial Planning
CA Vishnu Gavkare
Lets hunt bounty
Vignesh C.
Introduction to Azure Security Center
Rohit Srivastawa
Cyber security challenges in industry 4.0
Pawan Desai
Security Awareness - 'Key to strengthen your biggest asset - People'
Jatinkumar Modh
Mitigating the risks and challenges that lay in cloud for remote workers
Krishna Narayanswamy & Sasi Murthy
Strengthening Cybersecurity Defenses using MITRE ATT&CK Framework
Shaikh Sartaj Ahmed
Mobile application Security
Subho Halder
Importance of operational risk during COVID times
Srinath Mantripragada
OT security awareness
Ravindra S Gotavade
OT/ICS Security
Rahul Mehta
Emerging Risks and Industry Trends in the growing Cyberspace
Kavitha Srinivasulu
Print Security
Kalpesh Jani
Recent Trends in Cyber Crime
Dr. S. Murugan
Key things to consider before investing in a SOAR Platform
Amit Modi
Simple solutions to complex security problems
Sami Petajasoja
Secure SDLC
Umesh Kumar
Securing Cross Border Payment messaging system
Prakash Ranjan
Risk Management in the era of Digitalization
Srinath Mantripragada
Operationalising Threat Intel
Dr. Aditya Mukherjee
360-Degree Cybersecurity
Sanjiv Agarwala
Red Team Assessment
Manpreet Singh Kheberi
Data Privacy and ISO 27701:2019
Anil Lole
Security Entrepreneurship
Samrendra Kumar
National Cyber Security Policy of Govt of India
Dhruv .A. Pandit
Service on Organisation Controls and Reporting
Narasimhan Elangovan
Research in Cyber Forensics
Shweta Tripathi
Exploring Cyber Insurance in Depth
Amit Agarwal & Vernica Walia.
InfraGuard - Simplify and Secure Server Management Practices
Manoj Ludhani, Kislay Chandra
Cyber Risk Analytics powered automation of Remediation
Satyen Jain
Data Privacy and Security Concerns for CXO'S
Amit Dubey
Decentralized Finance
Narasimhan Elangovan
Security of Internet of Things
Purnima Ahirao
DevOps - Enabler of Digital Transformation
Atul Anand
CISSP Domain 8 Software Development Security
Gaurav Batra
Digital Identity : The New Golden Standard for Secure Access
Ravi Vaz
Defence for safe DeFI of the Future
Shilpaa Karkeraa
Accounting in the World of Zeros and Ones
Na.Vijayashankar (Naavi)
Code to cloud – automate security and accelerate modern development
Om Vyas, Ronak Shah, Pushpa Redkar- Oak 9
Cyber Financial Frauds & their Mitigation Techniques
Dr. AK Agarwal
Data Privacy via Data Protection
Anil Chiplunkar.
Social Media Forensics
Nilay Mistry
Financial Cyber Crimes
Khusbhu Jain
Changing Face of Cybersecurity
Subramanian U
Implementing Information Security at SMBs / SMEs
Aman Chhikara
Cybersecurity Policy Formulation
Nishant Singh
Illuminating Cybercrime & Digital Forensics
Deepak Kumar
Data Forensics hands-on approach
Gaurav Batra
Relevance of Cyber Norms
Gunjan Chawla
Breaking into android devices
Kiran Kumar
Physical & Logical security for Data centers
Abhishek Akkewar
Careers and certification in Cybersecurity
Tariq Wani
Securing your Organization with VAPT
Shashi Sharma
AWS IoT Security
Mukesh Kumar Rao
Malware analysis using malware forensics
Akash Thakkar
Sunday Learnings- APT Attack Techniques & Defense
Suriya Prakash & J Prasanna
Wednesday Wisdom: Security and observability for Kubernetes with Calico Enterprise
Peter Marini
Chatbot with Dialogflow
Parth Doshi
USB Data Leakage
Rajeev Khade
Python
Rutuja Kulkarni
Cyber Risk Trends-2023
Gaurav Batra
CISM Certified Information Security Manager 2023
Gaurav Batra
Growing Need of Data privacy
Narasimhan Elangovan
Unknown Facts Of Data Privacy
Amit Dubey
Data Privacy Innovations in New Industry Era
Prathamesh Churi
Privacy: Harnessing Digital trust
Anil Lole
Blockchain for Business
Atul Anand
Quickstart: Chat GPT
Hannan Satopay
Exploiting IoT Device Security
Vaibhav Bedi
Securing Quality of service in Mobile Ad-hoc Network
Gautam Borkar
Unveiling Network Security from the Red Team's Perspective
Pratik Chotalia
ICS Security Essentials
Divya Visalakshi Suresh Kumar
Application Security Done Right - What's your Appsec program needs
Riyaz Rafi Ahmed.
Demystifying AWS Cloudwatch and Cloudtrail
Dharmendra Parmar
Runtime Security: Challenges and Solution Space
Rahul Jadhav
Storage Covert Channel for Secure Communication
Dr. Dhananjay M Dakhane
Securing the Convergence of IT and OT: Bridging the Cybersecurity Gap
Devam Shah
Red Team Assessment Training
Manpreet Singh
Certified Cloud Security Professional - CCSP
Gaurav Batra
CS3 3.0 Keynote Session: Securing Startups: Navigating the Cyber Landscape
Akshay Garkel, Partner & Leader - Cyber , GT
CS3 3.0-QRC: Streamlining Continuous Compliance Management for Businesses with QRCAssist
Mr. Vamsi Krishna Maramganti, Founder & CEO, QRC Assurance & Solutions
CS3 3.0 Panel Discussion 1: Navigating Emerging Cybersecurity Threats and Innovations in Data Privacy and Protection: Challenges and Solutions for Startups
Moderator: Ajay Bhayani, Panelist: Suresh Sharma, Devam Shah, Archit Rajesh
CS3 3.0 Solution Showcase 2: Darwis - Full Stack Product Walk-Through
Anuradha M, Suriya Prakash
CS3 3.0. Solution Showcase 3: Flexible IR - Getting Prepared for a Ransomware cyber attack - Technical & Management level crisis response Playbooks
Venkat Ramshet, Founder, Flexible IR
CS3 3.0 Solution Showcase 4: Prophaze - The API Security Shield: Defending Your Digital Ecosystem
Vaisakh T R, CEO, Prophaze
CS3 3.0 Panel Discussion 2: Fortifying Cloud Infrastructure and Services: Innovations and Best Practices
Moderator: Sanjay Singh, Speakers: Dr. Yogesh Dadke, Gokulavan Jayaraman, Satish Kumar Dwibhashi
Cs3 3.0 Solution Showcase 5: Cybernxt: CyberVisible- Intelligent Dashboard and Analytics
Pravin Saiya, Founder, CyberNxt Solutions LLP
CS3 3.0 Solution Showcase 7: Culsight- Security Awareness through Motion Graphics
Gaurav Batra, CEO & Founder, CyberFrat Pvt. Ltd., Ria Mahale, Manager, Risk & Analytics, CyberFrat Pvt. Ltd.
CS3 3.0 Solution Showcase 6: Zeron - The Single point of truth for Cybersecurity
Sanket Sarkar, Founder, Zeron
CS3 3.0 Panel Discussion 3: Building a Culture of Cybersecurity: Strategies for Startups
Moderator: Ruchi Balkrishna, Speakers: Senthil Kumar, Akhil Verma, Arvind Kumar
CS3 3.0 Keynote Session: Trends in Cybersecurity - Changing Paradigm
DK Srivastava, Sr. Director- Analytics, Cloud and IOT
CS3 3.0 Panel Discussion 4: Securing Remote Workforces: Startups' Solutions for the New Normal
Moderator: Gaurav Batra, Speakers: Suriya Prakash, Vamsi Krishna Maramganti, Sanket Sarkar, Vaisakh T R
Operational Risk
Srinath Mantripragada
Blockchain
Narasimhan Elangovan
Navigating the Mitre: Advanced Cyber Defense Techniques
Avkash Kathiriya & Aashiq Ramachandran
AI/ML and Generative AI Security
Malini Rao
Vulnerability Management- Planning, Process & Future
Saurabh Jagtap
DPDP Act 2023 Published, What to do Next?
Jatinkumar Modh
Table Top Excercise on Ransomware
CyberFrat
Digital Personal Data Protection Act 2023
Multiple
Explore the potential of Deepfakes: A hands on approach
Sanjay Mistry & Ria Mahale
Root Cause Analysis- Techniques & Tips
Gokulavan Jayaram
VAPT: Importance & Benefits for securing organisations from cyberattacks
Nikunj Bhatiya
Malware Trends and TTPs A Practical Guide to Defending Against the Latest Threats
Hiren Sadhwani
Advanced IR & Threat Hunting
Mayan Arora
Identity & Data Core of Privacy
Rakesh Kumar Kunwar
Let's Understand The Real Malwares: Detection & Defense
Prashant Saxena
Importance of Vulnerability Intelligence
Mohammad Aamir
Enhancing Cyber Resilience - Navigating Social Engineering Threats in IT Security
Cybersecurity Expert
Navigating the Future: Next-Gen DLP in Cybersecurity
Amrutha Gadagkar
Guardians of the Gateway-Crucial Role of SIEM in Modern Cybersecurity
Apurva Navhate
Shielding & Exploiting Servers: Strategies to defend against Rampant DoS & DDoS Onslaughts.
Ayush Singh
Elevate your Cloud Skills: The Ultimate AWS Masterclass
Pankaj Dube
CISSP Refresher Course
Gaurav Batra
Penetration Testing: Securing Your Digital Fortress Through Ethical Hacking and Cyber Resilience
Anveeksh M. Rao
Fortifying Code: Security Best Practices.
Hrushikesh Walvekar
Attaining Prowess in Shielding Against XSS Breaches.
Sheerin Fathima
Masterclass on Active Directory Security
Hrushikesh Walvekar
Uncovering Secrets of Bug Bounty
Armaan Sidana
Securing the Digital Ecosystem: Threat Modeling, Risk Assessment, and Mitigation Strategies
Sajeeda Riyaj Shikalgar
Behind The Inbox : Unmasking The Art Of Email Analysis
Riddhi Soral
Masterclass on Zero Trust Demystified
Rajesh T R
Software-Defined Network (SDN) Security
Satyajeet Mishra
Masterclass on MASTERING WEB SECURITY: ADVANCED TECHNIQUES IN WEB ATTACKS & BUG BOUNTY STRATEGIES
Riddhi Soral
Unveiling Account Takeover Tactics: Strategies And Safeguards
Harsh Tandel
Digital Forensics: Unraveling Cyber Crimes in Real Time
Pawan Kumar
Masterclass on Comprehensive Study Into Bug Bounty Tools
Harsh Tandel
Cyber Physical Security Risks and Cybersecurity Framework
Soumil K
Block Chain Security
Falgun Rathod
Diversity Growth: Getting Women to Leadership
Saloni Vijay
Building Cyber Security Culture
Ashutosh Jain
Cyber Security Communications
Karissa A. Breen
Cyber Security Ethics
Shannon Sedgwick
A Tactical Guide to AWS Offensive Assessment
Prabhsimran Singh
Advanced Techniques in Red Teaming - Mastering Cyber Resilience
Saubhagya Tripathi
European Digital Decade and Impact on India
Saurabh Jain
Panel Discussion on How to build a career in Infosec
Sanil Nadkarni, Rajiv Pandey, Santosh Khadsare, Dr. S. Murugan IPS
Threats of Manufacturing Environments In The Era Of Industry 4.0
Apurva Dalal
Digital Safety in the Scareful Journey of Cyber Security
Amit Ghodekar
Managing Startup Risks in Digital World
Bharath Panchal
Challenges and Dimensions of IT Audit
Komal Vora
Paradigm Shift of Buisness Resilience in light of cyber security
Lopa Mudraa Basu
What, Why and How of GDPR
Mansi Thappar
Network Security Strategies
Aditya Mukherjee
Digital Transformation
Ramesh Kadaganchi
Smart Manufacturing opportunity and challenge and be yourself
Yogesh Dadke
Human Transformation with Blockchain
Prasanna Lohar
Data Lakes and Security
Tariq Wani
Understanding Generative AI & its Ethics and Evolution
Sharade Kamalanathan
Advancements in Quantum Computing Technologies
Ayush Singh
Integration Security Simplified
Priyanka Tamhankar
Implement an Effective Third Party Risk Management Program
Ranjitha Paramesh
ISO 27001 Evolution from 2013 to 2022
Manoj Sharma
How AI Solves the Kubernetes Complexity Challenge
Dynatrace
ELEVATING ORGANIZATIONAL SECURITY WITH SASE, SD-WAN, ZERO TRUST, AND IDENTITY MANAGEMENT
Skillmine
Security Concerns in AI Training Data Models
Shweta Tripathi
Mastering Attack Surface Management
Kiran Bidua
EXPLORING THE UNEXPLORED - API PENTESTING
Abhijeet Singh - Cybersecurity Researcher
Masterclass on Understanding Payment Rails
Dr. Raghuveer Kaur
"Implementing SOAR: Effective Use Cases and Navigating Common Challenges
Bhavdip Ghadhvi, IT Security & Compliance Manager at Astics Techlabs Pvt Ltd.
OWASP Top 10 for LLM Applications
Anugrah SR, Sr. Security Consultant - The SecOps Group

How to Use

After successful purchase, this item would be added to your courses.You can access your courses in the following ways :

  • From the computer, you can access your courses after successful login
  • For other devices, you can access your library using this web app through browser of your device.