Contact us

Gold Membership

Language: English

₹49999 including GST

100 CF Coins as Cashback


Description

Gold Membership Features:

Secure Connections

  • Network with industry leaders & experts.
  • Build meaningful professional relationships.
  • Access unlimited city chapter meets.
  • Connect with like-minded individuals & peers.

Sharing Knowledge

  • Participate in 100+ hours of live learning sessions annually.
  • Access to the over 650+ hours of premium cybersecurity content library through our exclusive LMS.
  • Participate in expert talks, masterclasses, workshops, and tabletop exercises.
  • Earn CPE Credits & Training Certificates.

Strengthening Careers

  • Receive job information and career advice.
  • Business Development opportunities within the community.
  • Enjoy special discounts on CyberFrat's training programs and events.

Additional Benefits

  • Speaking Opportunity as an expert.
  • Branding Opportunities: Get featured and recognized within the community through social media, fireside chats, exclusive panel discussion.
  • Participate in member-only forums.
  • Enjoy priority registration for events and workshops.
  • Access a resource library of templates, checklist, and best practice guides.
  • Gain knowledge from professionals across industries.
  • Stay updated on industry news and trends.
  • Benefit from mentorship programs with seasoned professionals.
  • Be a part of & contribute in the playbook creation sessions through collaborative learning.

Package Contents

Certified Information Systems Security Professional -CISSP
Gaurav Batra
CCSK- Certificate of Cloud Security and Knowledge
Rahul Kamath
Certified Information Systems Security Professional (CISSP)
Multiple Trainers
DevSec Ops and Container Security
Deep Shankar Yadav
Azure Architecture Technologies
Amit Kulkarni
Threat Intel & Dark Web
Muslim Koser
DevSecops & Container Security
Deep Shankar Yadav
Kubernetes & Advanced Observability
Nalin Agarwal & Bharath S
Demystifying Cyber Risk
Gaurav Batra
NIST Cybersecurity Framework
Anil Chiplunkar
PCIDSS v4.0 Masterclass
Mr. Vamsi Krishna Maramganti & Mr. Kalpesh Vyas
Runtime Security: Challenges and Solution Space
Rahul Jadhav
Application Security Done Right - What's your Appsec program needs
Riyaz Rafi Ahmed.
Demystifying AWS Cloudwatch and Cloudtrail
Dharmendra Parmar
Securing Quality of service in Mobile Ad-hoc Network
Gautam Borkar
Storage Covert Channel for Secure Communication
Dr. Dhananjay M Dakhane
Securing the Convergence of IT and OT: Bridging the Cybersecurity Gap
Devam Shah
Red Team Assessment Training
Manpreet Singh
ICS Security Essentials
Divya Visalakshi Suresh Kumar
Unveiling Network Security from the Red Team's Perspective
Pratik Chotalia
CS3 3.0 Solution Showcase 2: Darwis - Full Stack Product Walk-Through
Anuradha M, Suriya Prakash
Exploiting IoT Device Security
Vaibhav Bedi
Quickstart: Chat GPT
Hannan Satopay
Blockchain for Business
Atul Anand
Privacy: Harnessing Digital trust
Anil Lole
CS3 3.0 Solution Showcase 7: Culsight- Security Awareness through Motion Graphics
Gaurav Batra, CEO & Founder, CyberFrat Pvt. Ltd., Ria Mahale, Manager, Risk & Analytics, CyberFrat Pvt. Ltd.
Explore the potential of Deepfakes: A hands on approach
Sanjay Mistry & Ria Mahale
Navigating the Mitre: Advanced Cyber Defense Techniques
Avkash Kathiriya & Aashiq Ramachandran
Blockchain
Narasimhan Elangovan
Operational Risk
Srinath Mantripragada
CS3 3.0 Panel Discussion 4: Securing Remote Workforces: Startups' Solutions for the New Normal
Moderator: Gaurav Batra, Speakers: Suriya Prakash, Vamsi Krishna Maramganti, Sanket Sarkar, Vaisakh T R
CS3 3.0 Keynote Session: Trends in Cybersecurity - Changing Paradigm
DK Srivastava, Sr. Director- Analytics, Cloud and IOT
CS3 3.0 Panel Discussion 3: Building a Culture of Cybersecurity: Strategies for Startups
Moderator: Ruchi Balkrishna, Speakers: Senthil Kumar, Akhil Verma, Arvind Kumar
CS3 3.0 Solution Showcase 6: Zeron - The Single point of truth for Cybersecurity
Sanket Sarkar, Founder, Zeron
Certified Cloud Security Professional - CCSP
Gaurav Batra
Cs3 3.0 Solution Showcase 5: Cybernxt: CyberVisible- Intelligent Dashboard and Analytics
Pravin Saiya, Founder, CyberNxt Solutions LLP
CS3 3.0 Panel Discussion 2: Fortifying Cloud Infrastructure and Services: Innovations and Best Practices
Moderator: Sanjay Singh, Speakers: Dr. Yogesh Dadke, Gokulavan Jayaraman, Satish Kumar Dwibhashi
CS3 3.0 Solution Showcase 4: Prophaze - The API Security Shield: Defending Your Digital Ecosystem
Vaisakh T R, CEO, Prophaze
CS3 3.0. Solution Showcase 3: Flexible IR - Getting Prepared for a Ransomware cyber attack - Technical & Management level crisis response Playbooks
Venkat Ramshet, Founder, Flexible IR
AI/ML and Generative AI Security
Malini Rao
CS3 3.0 Panel Discussion 1: Navigating Emerging Cybersecurity Threats and Innovations in Data Privacy and Protection: Challenges and Solutions for Startups
Moderator: Ajay Bhayani, Panelist: Suresh Sharma, Devam Shah, Archit Rajesh
CS3 3.0-QRC: Streamlining Continuous Compliance Management for Businesses with QRCAssist
Mr. Vamsi Krishna Maramganti, Founder & CEO, QRC Assurance & Solutions
CS3 3.0 Keynote Session: Securing Startups: Navigating the Cyber Landscape
Akshay Garkel, Partner & Leader - Cyber , GT
Accounting in the World of Zeros and Ones
Na.Vijayashankar (Naavi)
Cybersecurity Policy Formulation
Nishant Singh
Implementing Information Security at SMBs / SMEs
Aman Chhikara
Changing Face of Cybersecurity
Subramanian U
Financial Cyber Crimes
Khusbhu Jain
Social Media Forensics
Nilay Mistry
Data Privacy via Data Protection
Anil Chiplunkar.
Cyber Financial Frauds & their Mitigation Techniques
Dr. AK Agarwal
Code to cloud – automate security and accelerate modern development
Om Vyas, Ronak Shah, Pushpa Redkar- Oak 9
Illuminating Cybercrime & Digital Forensics
Deepak Kumar
Defence for safe DeFI of the Future
Shilpaa Karkeraa
Digital Identity : The New Golden Standard for Secure Access
Ravi Vaz
CISSP Domain 8 Software Development Security
Gaurav Batra
DevOps - Enabler of Digital Transformation
Atul Anand
Security of Internet of Things
Purnima Ahirao
Decentralized Finance
Narasimhan Elangovan
Data Privacy and Security Concerns for CXO'S
Amit Dubey
Cyber Risk Analytics powered automation of Remediation
Satyen Jain
Sunday Learnings- APT Attack Techniques & Defense
Suriya Prakash & J Prasanna
Unknown Facts Of Data Privacy
Amit Dubey
Growing Need of Data privacy
Narasimhan Elangovan
CISM Certified Information Security Manager 2023
Gaurav Batra
Cyber Risk Trends-2023
Gaurav Batra
Python
Rutuja Kulkarni
USB Data Leakage
Rajeev Khade
Chatbot with Dialogflow
Parth Doshi
Wednesday Wisdom: Security and observability for Kubernetes with Calico Enterprise
Peter Marini
Data Privacy Innovations in New Industry Era
Prathamesh Churi
Malware analysis using malware forensics
Akash Thakkar
AWS IoT Security
Mukesh Kumar Rao
Securing your Organization with VAPT
Shashi Sharma
Careers and certification in Cybersecurity
Tariq Wani
Physical & Logical security for Data centers
Abhishek Akkewar
Breaking into android devices
Kiran Kumar
Relevance of Cyber Norms
Gunjan Chawla
Data Forensics hands-on approach
Gaurav Batra
Paradigm Shift of Buisness Resilience in light of cyber security
Lopa Mudraa Basu
Advancements in Quantum Computing Technologies
Ayush Singh
Understanding Generative AI & its Ethics and Evolution
Sharade Kamalanathan
Data Lakes and Security
Tariq Wani
Human Transformation with Blockchain
Prasanna Lohar
Smart Manufacturing opportunity and challenge and be yourself
Yogesh Dadke
Digital Transformation
Ramesh Kadaganchi
Network Security Strategies
Aditya Mukherjee
What, Why and How of GDPR
Mansi Thappar
Integration Security Simplified
Priyanka Tamhankar
Challenges and Dimensions of IT Audit
Komal Vora
Managing Startup Risks in Digital World
Bharath Panchal
Digital Safety in the Scareful Journey of Cyber Security
Amit Ghodekar
Threats of Manufacturing Environments In The Era Of Industry 4.0
Apurva Dalal
Panel Discussion on How to build a career in Infosec
Sanil Nadkarni, Rajiv Pandey, Santosh Khadsare, Dr. S. Murugan IPS
European Digital Decade and Impact on India
Saurabh Jain
Advanced Techniques in Red Teaming - Mastering Cyber Resilience
Saubhagya Tripathi
A Tactical Guide to AWS Offensive Assessment
Prabhsimran Singh
"Implementing SOAR: Effective Use Cases and Navigating Common Challenges
Bhavdip Ghadhvi, IT Security & Compliance Manager at Astics Techlabs Pvt Ltd.
The Future of IAM - Trends and Innovations
Anand Kumar Jha
Securing AI Masterclass
Ramakrishnan Seshagiri Founder & Managing Director, CyberSafeHaven Consulting
Start your Cloud Security Journey with CCSK
Mohammad Aamir
Active Directory Hardening
Mohamed Hamdi Ouardi.
CISA & CISM: A Unified Approach to Information Security & Auditing
Dr. Vijayan Muralidharan, Vice President – Governance, Risk and Compliance at QRC Assurance And Solutions
Azure Red Teaming
Edrian Miranda, Senior Cybersecurity Analyst at Syniverse
RF Hacking Meets Social Engineering: How Attackers Combine Tactics for Maximum Impact.
Tej Singh Rathore, Founder, Level 7 Infosec Private Limited
OWASP Top 10 for LLM Applications
Anugrah SR, Sr. Security Consultant - The SecOps Group
Cyber Security Ethics
Shannon Sedgwick
Masterclass on Understanding Payment Rails
Dr. Raghuveer Kaur
EXPLORING THE UNEXPLORED - API PENTESTING
Abhijeet Singh - Cybersecurity Researcher
Mastering Attack Surface Management
Kiran Bidua
Security Concerns in AI Training Data Models
Shweta Tripathi
ELEVATING ORGANIZATIONAL SECURITY WITH SASE, SD-WAN, ZERO TRUST, AND IDENTITY MANAGEMENT
Skillmine
How AI Solves the Kubernetes Complexity Challenge
Dynatrace
ISO 27001 Evolution from 2013 to 2022
Manoj Sharma
Implement an Effective Third Party Risk Management Program
Ranjitha Paramesh
Identity & Data Core of Privacy
Rakesh Kumar Kunwar
CISSP Refresher Course
Gaurav Batra
Elevate your Cloud Skills: The Ultimate AWS Masterclass
Pankaj Dube
Shielding & Exploiting Servers: Strategies to defend against Rampant DoS & DDoS Onslaughts.
Ayush Singh
Guardians of the Gateway-Crucial Role of SIEM in Modern Cybersecurity
Apurva Navhate
Navigating the Future: Next-Gen DLP in Cybersecurity
Amrutha Gadagkar
Enhancing Cyber Resilience - Navigating Social Engineering Threats in IT Security
Cybersecurity Expert
Importance of Vulnerability Intelligence
Mohammad Aamir
Let's Understand The Real Malwares: Detection & Defense
Prashant Saxena
Penetration Testing: Securing Your Digital Fortress Through Ethical Hacking and Cyber Resilience
Anveeksh M. Rao
Advanced IR & Threat Hunting
Mayan Arora
Malware Trends and TTPs A Practical Guide to Defending Against the Latest Threats
Hiren Sadhwani
VAPT: Importance & Benefits for securing organisations from cyberattacks
Nikunj Bhatiya
Root Cause Analysis- Techniques & Tips
Gokulavan Jayaram
Service on Organisation Controls and Reporting
Narasimhan Elangovan
Digital Personal Data Protection Act 2023
Multiple
Table Top Excercise on Ransomware
CyberFrat
DPDP Act 2023 Published, What to do Next?
Jatinkumar Modh
Masterclass on MASTERING WEB SECURITY: ADVANCED TECHNIQUES IN WEB ATTACKS & BUG BOUNTY STRATEGIES
Riddhi Soral
Cyber Security Communications
Karissa A. Breen
Building Cyber Security Culture
Ashutosh Jain
Diversity Growth: Getting Women to Leadership
Saloni Vijay
Block Chain Security
Falgun Rathod
Cyber Physical Security Risks and Cybersecurity Framework
Soumil K
Masterclass on Comprehensive Study Into Bug Bounty Tools
Harsh Tandel
Digital Forensics: Unraveling Cyber Crimes in Real Time
Pawan Kumar
Unveiling Account Takeover Tactics: Strategies And Safeguards
Harsh Tandel
Vulnerability Management- Planning, Process & Future
Saurabh Jagtap
Software-Defined Network (SDN) Security
Satyajeet Mishra
Masterclass on Zero Trust Demystified
Rajesh T R
Behind The Inbox : Unmasking The Art Of Email Analysis
Riddhi Soral
Securing the Digital Ecosystem: Threat Modeling, Risk Assessment, and Mitigation Strategies
Sajeeda Riyaj Shikalgar
Uncovering Secrets of Bug Bounty
Armaan Sidana
Masterclass on Active Directory Security
Hrushikesh Walvekar
Attaining Prowess in Shielding Against XSS Breaches.
Sheerin Fathima
Fortifying Code: Security Best Practices.
Hrushikesh Walvekar
Manufacturing Operational Risk
Atul Anand
Take Control of Business Critical Data for effective Protection & Compliance
Klassify
Securing Privilege Identity in Cloud Era
Sectona
Prevent attacks by fortifying the last mile -The user
Security Advisor
Haltdos Edge Security Platform
Haltdos
Securing Remote Workforces at Scale
Palo Alto Networks
eMudhra: Empowering Digital Transformation
EMudhra
The journey from Legacy to Next Gen Web Security
Netskope
Combat Cyber DeceptiCons with AI
F5 Networks
Building blocks for dealing with exponentially increasing mail-based frauds
Progist
HealthCare Risk
SMEs
Operational risk (IT/ITES)
SMEs
Retail Success
SMEs
Audit Analytics Using Caseware Idea Software
CA Murtaza Q. Ghadiali
Insurance process lifecycle
SMEs
Banking IT
SMEs
Operational Risk (NBFC)
SMEs
Privacy Software Development Life Cycle
Anil Lole
Cyber Threat Intelligence Differentiating Signal from Noise
Anomali
The Art of open Source Intelligence
Saumay Srivastava
CTIX Lite – Enabling Threat Intelligence Automation for Everyone
Cyware
Measuring your cybersecurity risk posture with Cyber Observer
Cyber Observer
Zero Trust Prevention Strategy – Endpoints
Morphisec
SOC Capability Validation Tool
qSeap
Simplifying Vulnerability Management
We Secure App
Cyber hygiene in the workplace: How IAM counters the complex threat landscape
Last Pass
Darktrace Cyber AI platform
Dark Trace
Data privacy
Gaurav Khera
Taking Bull by Horns… Eliminate The no. 1 Enterprise Risk – PASSWORDS – Go Passwordless.
PureID
Hyperscale SIEM for everyone
DNIF
Why Milliseconds matter securing against the next Zero-day
Puneet Gupta
Building Zero Trust Framework
Harshavardhan Lale
Infosec Fusion 2.0
Multiple Speakers
Cyber Risk and Insurance
Howden India
Security strategy begins with an attitude: Never trust. Always verify
Blackberry
Shift Left: An approach to incorporate Security early into SDLC for App-based businesses
AppKnox
Cybersecurity in IOT
Vinod Babu
Digital Evidence Handling
Harshita Jadhav
CISSP 2022
Gaurav Batra
Why SecDevOps is the New way in Cybersecurity
Saman Fatima
Examining Malicious Software and it’s Analysis
Shrutirupa Banerjiee
How to build a strong Cybersecurity Culture
Madhu Maganti
Industrial Control System Cybersecurity Framework
Soumil Khandadia
Certified Information Systems Auditor-CISA
Rajeev Gupta
Systems and Organisational Controls
Narasimhan Elangovan
Cyber Crimes
Ritesh Bhatia
Introduction to ISO27002:2022
Jagbir Singh
Digital Forensics Training
Samir Datt
Certificate of Information Security Manager-CISM
Multiple Trainers
Docker and AWS ECS
Amit Kulkarni
Azure Security AZ-500 Training
Amit Kulkarni
Certificate of Cloud Security Professional- CCSP
Gaurav Batra
Linux Essentials & AWS
Amit Kulkarni
Defense In-Depth
Multiple Trainers
Cyber Incident Investigation Case Studies
Nikhil Mahadeshwar
Enterprise Risk Framework
Vinod Nair
Wednesday Wisdom: Advanced Web Application Security
Vaisakh T R
Blockchain in Cybersecurity
Narasimhan Elangovan
Cyber Laws
Rohit Jain
AI / ML in Cybersecurity
Apurva Jain
Cloud Computing
Gaurav Batra
Artificial Intelligence
Vikram Verma, Dr. Deepak Singh
Data Analytics
CA Murtaza Q. Ghadiali
Demystifying BlockChain Security
Shrutirupa Banerjiee
Passwordless Authentication
Viral Parmar
Incident Management
Lalit Vazirani
End-to-End Cybersecurity
Ajay Bhayani
DevSecOps
Joel Divekar
Web Application Security
Omkar Prakash Joshi
DNS Training for security practitioners
Infoblox
Fundamentals of Cyber Security
Venkata Satish Guttala
Network Security
Smith Gonsalves
Lets hunt bounty
Vignesh C.
OT security awareness
Ravindra S Gotavade
Importance of operational risk during COVID times
Srinath Mantripragada
Mobile application Security
Subho Halder
Strengthening Cybersecurity Defenses using MITRE ATT&CK Framework
Shaikh Sartaj Ahmed
Mitigating the risks and challenges that lay in cloud for remote workers
Krishna Narayanswamy & Sasi Murthy
Security Awareness - 'Key to strengthen your biggest asset - People'
Jatinkumar Modh
Cyber security challenges in industry 4.0
Pawan Desai
Introduction to Azure Security Center
Rohit Srivastawa
OT/ICS Security
Rahul Mehta
Financial Planning
CA Vishnu Gavkare
Interactive Application Security Testing
Mohit Rampal
Extraordinary time, Extraordinary change
Dinesh Bareja
Exotic Excel
CA Nachiket Pendharkar
Cloud Security Threats & Challenges
Kavitha Srinivasulu
Deep Dive In RBI's Digital Security Compliance
Vikram Sareen: BlueBricks
ISO 27002:2022 Readiness and Awareness
Vijayan Muralidaran
Enhancing Defender Skills
Rohan Bhasin
Operationalising Threat Intel
Dr. Aditya Mukherjee
Exploring Cyber Insurance in Depth
Amit Agarwal & Vernica Walia.
Research in Cyber Forensics
Shweta Tripathi
Certified in Risk and Information Systems Control (CRISC)
Nishant Singh
National Cyber Security Policy of Govt of India
Dhruv .A. Pandit
Security Entrepreneurship
Samrendra Kumar
Data Privacy and ISO 27701:2019
Anil Lole
Red Team Assessment
Manpreet Singh Kheberi
360-Degree Cybersecurity
Sanjiv Agarwala
Docker Security
Deep Shankar Yadav
Risk Management in the era of Digitalization
Srinath Mantripragada
Securing Cross Border Payment messaging system
Prakash Ranjan
Secure SDLC
Umesh Kumar
Simple solutions to complex security problems
Sami Petajasoja
Key things to consider before investing in a SOAR Platform
Amit Modi
Recent Trends in Cyber Crime
Dr. S. Murugan
Print Security
Kalpesh Jani
Emerging Risks and Industry Trends in the growing Cyberspace
Kavitha Srinivasulu
Buisness Agility With Devops
Rakesh Singh/ Arun Kholi
Data Privacy and Protection
Ramesh Venkataraman
Software Development Security
Rahul Kamath
At Ease with Cyber Security
Viral Raval
Cyber Crisis
Smith Gonsalves
Attacking Secret Sharing
Adhokshaj Mishra
Incident Management and Business Continuity Planning
Shailendra Srivastava
Bluetooth Basics and Hacking
Arun Mane
Zero Trust For IIOT & Cloud Environment
Bill Joll
Social Media Security & Online Frauds
Rakshit Tandon
Security Is Everyone's Responsibility
Amey Lakeshri
Mind, Machine and Market
Dr. Lalit Saraswat
Digital Wildfires in a Connected World
Dr. Rama Subramaniam
Data Protection Within Organizations
Garima Purohit
SOC Blueprint
Om Ahuja
Secure Coding
Dr. Gopakumaran Thampi
Cyber Security for Critical Infrastructure
Dr. Faruk Kazi
Securing your Apps in AWS
Amit Kulkarni
Aviation Security ( ACARS )
Arun Mane
DMARC
Venkata Satish Guttala
Digital Forensics
Arpit Doshi
Demystifying 65B Certificate Requirements.
Vicky Shah
Basics of Cloud and Cloud Certification
Ria Wadhwani
Burpsuite
Manpreet Singh
API Security
Mohit Rampal
COSO 2013 Internal Controls Framework
Manoj Agrawal
Importance of Early Education to Prevent Cyber Crimes
Yogesh Kumar
InfraGuard - Simplify and Secure Server Management Practices
Manoj Ludhani, Kislay Chandra
The Future is Cloudy: Cloud security challenges and how to overcome them
Raphel Peyret, Horangi
Data Discovery & Classification
Aakriti Sarivastav & Aaron Kinchen
Intelligence Threat Hunting
Vishnu Vardhan
Importance of Digital Evidence in Cyber Security
Arun Soni
Latest Trends in Cyber Crimes
Prof. Triveni Singh IPS
Understanding Azure Security
Amit Kulkarni
Machine Learning - Practical application for cybersecurity
Hannan Satopay

How to Use

After successful purchase, this item would be added to your courses.You can access your courses in the following ways :

  • From the computer, you can access your courses after successful login
  • For other devices, you can access your library using this web app through browser of your device.