Contact us

Plus Membership

Language: English

Validity Period: 365 days

₹6999 including GST

100 CF Coins as Cashback


Description

180+ hours of live learning in a year

Attend knowledge sharing sessions and workshops from our SMEs and Industry leaders, from programs like CF Thursday, CXO connect, fireside chats with CXOs, special knowledge sharing sessions.

500+ hours of recorded sessions

Gain insights into topics like Risk Management, Cyber Security Emerging Technology, and Data Privacy from the backpack of knowledgeable session recordings.

Part of the knowledge-sharing community

Part of CyberFrat WhatsApp and Google knowledge sharing group and Full Access to Microsoft Kaizala groups.

Industry news, jobs, internship

Get updates on industry news, jobs, internship, and candidature requirements. Grooming, Mentoring, and Career Guidance sessions.

Special Discounts on every program

Discounts on all conferences, Partner events, CF Training, and Masterclass.

Networking opportunities

Network opportunities with other professionals across the globe, access to all CyberFrat local chapter& virtual meets.

Updates through Weekly newsletter

Receive a weekly newsletter with educational materials, interesting posts, upcoming free events, popular books, and much more.CyberFrat local chapter& virtual meets.

Digital 4n6 Journal at 25% off for a 1-year subscription.

Package Contents

Introduction to ISO27002:2022
Jagbir Singh
Session on Systems and Organisational Controls
Narasimhan Elangovan
How to build a strong Cybersecurity Culture
Madhu Maganti
Examining Malicious Software and it’s Analysis
Shrutirupa Banerjiee
Cybersecurity in IOT
Vinod Babu
Industrial Control System Cybersecurity Framework
Soumil Khandadia
Why SecDevOps is the New way in Cybersecurity
Saman Fatima
Digital Evidence Handling
Harshita Jadhav
Cyber Crimes
Ritesh Bhatia
DevSecOps
Joel Divekar
End-to-End Cybersecurity
Ajay Bhayani
Incident Management
Lalit Vazirani
Passwordless Authentication
Viral Parmar
Cyber Incident Investigation Case Studies
Nikhil Mahadeshwar
Cyber Laws
Rohit Jain
Wednesday Wisdom: Advanced Web Application Security
Vaisakh T R
Combat Cyber DeceptiCons with AI
F5 Networks
The journey from Legacy to Next Gen Web Security
Netskope
eMudhra: Empowering Digital Transformation
EMudhra
Securing Remote Workforces at Scale
Palo Alto Networks
Haltdos Edge Security Platform
Haltdos
Prevent attacks by fortifying the last mile -The user
Security Advisor
Securing Privilege Identity in Cloud Era
Sectona
Building blocks for dealing with exponentially increasing mail-based frauds
Progist
Shift Left: An approach to incorporate Security early into SDLC for App-based businesses
AppKnox
Security strategy begins with an attitude: Never trust. Always verify
Blackberry
Cyber Risk and Insurance
Howden India
Building Zero Trust Framework
Harshavardhan Lale
Why Milliseconds matter securing against the next Zero-day
Puneet Gupta
Hyperscale SIEM for everyone
DNIF
Taking Bull by Horns… Eliminate The no. 1 Enterprise Risk – PASSWORDS – Go Passwordless.
PureID
Cyber Threat Intelligence Differentiating Signal from Noise
Anomali
Darktrace Cyber AI platform
Dark Trace
Cyber hygiene in the workplace: How IAM counters the complex threat landscape
Last Pass
Simplifying Vulnerability Management
We Secure App
SOC Capability Validation Tool
qSeap
Zero Trust Prevention Strategy – Endpoints
Morphisec
Measuring your cybersecurity risk posture with Cyber Observer
Cyber Observer
Demystifying BlockChain Security
Shrutirupa Banerjiee
Cyber Security for Critical Infrastructure
Dr. Faruk Kazi
Data Protection Within Organizations
Garima Purohit
DevSec Ops and Container Security
Deep Shankar Yadav
Digital Wildfires in a Connected World
Dr. Rama Subramaniam
Mind, Machine and Market
Dr. Lalit Saraswat
Security Is Everyone's Responsibility
Amey Lakeshri
Buisness Agility With Devops
Rakesh Singh/ Arun Kholi
Zero Trust For IIOT & Cloud Environment
Bill Joll
Bluetooth Basics and Hacking
Arun Mane
Incident Management and Business Continuity Planning
Shailendra Srivastava
Attacking Secret Sharing
Adhokshaj Mishra
Cyber Crisis
Smith Gonsalves
At Ease with Cyber Security
Viral Raval
Software Development Security
Rahul Kamath
Data Privacy and Protection
Ramesh Venkataraman
Social Media Security & Online Frauds
Rakshit Tandon
Understanding Azure Security
Amit Kulkarni
Latest Trends in Cyber Crimes
Prof. Triveni Singh IPS
Importance of Digital Evidence in Cyber Security
Arun Soni
Intelligence Threat Hunting
Vishnu Vardhan
Aviation Security ( ACARS )
Arun Mane
Importance of Early Education to Prevent Cyber Crimes
Yogesh Kumar
COSO 2013 Internal Controls Framework
Manoj Agrawal
API Security
Mohit Rampal
Burpsuite
Manpreet Singh
Basics of Cloud and Cloud Certification
Ria Wadhwani
Demystifying 65B Certificate Requirements.
Vicky Shah
Digital Forensics
Arpit Doshi
DMARC
Venkata Satish Guttala
Docker Security
Deep Shankar Yadav
Enhancing Defender Skills
Rohan Bhasin
Deep Dive In RBI's Digital Security Compliance
Vikram Sareen: BlueBricks
Exotic Excel
CA Nachiket Pendharkar
Extraordinary time, Extraordinary change
Dinesh Bareja
Financial Planning
CA Vishnu Gavkare
Lets hunt bounty
Vignesh C.
Introduction to Azure Security Center
Rohit Srivastawa
Security Awareness - 'Key to strengthen your biggest asset - People'
Jatinkumar Modh
Mitigating the risks and challenges that lay in cloud for remote workers
Krishna Narayanswamy & Sasi Murthy
Mobile application Security
Subho Halder
Importance of operational risk during COVID times
Srinath Mantripragada
OT security awareness
Ravindra S Gotavade
OT/ICS Security
Rahul Mehta
Print Security
Kalpesh Jani
Recent Trends in Cyber Crime
Dr. S. Murugan
Key things to consider before investing in a SOAR Platform
Amit Modi
Simple solutions to complex security problems
Sami Petajasoja
Secure SDLC
Umesh Kumar
Securing Cross Border Payment messaging system
Prakash Ranjan
Risk Management in the era of Digitalization
Srinath Mantripragada
Operationalising Threat Intel
Dr. Aditya Mukherjee
360-Degree Cybersecurity
Sanjiv Agarwala
Red Team Assessment
Manpreet Singh Kheberi
Data Privacy and ISO 27701:2019
Anil Lole
Security Entrepreneurship
Samrendra Kumar
Service on Organisation Controls and Reporting
Narasimhan Elangovan
Research in Cyber Forensics
Shweta Tripathi
Exploring Cyber Insurance in Depth
Amit Agarwal & Vernica Walia.
InfraGuard - Simplify and Secure Server Management Practices
Manoj Ludhani, Kislay Chandra
Cyber Risk Analytics powered automation of Remediation
Satyen Jain
Data Privacy and Security Concerns for CXO'S
Amit Dubey
Security of Internet of Things
Purnima Ahirao
DevOps - Enabler of Digital Transformation
Atul Anand
CISSP Domain 8 Software Development Security
Gaurav Batra
Defence for safe DeFI of the Future
Shilpaa Karkeraa
Accounting in the World of Zeros and Ones
Na.Vijayashankar (Naavi)
Data Privacy via Data Protection
Anil Chiplunkar.
Social Media Forensics
Nilay Mistry
Financial Cyber Crimes
Khusbhu Jain
Changing Face of Cybersecurity
Subramanian U
Implementing Information Security at SMBs / SMEs
Aman Chhikara
Cybersecurity Policy Formulation
Nishant Singh
Illuminating Cybercrime & Digital Forensics
Deepak Kumar
Data Forensics hands-on approach
Gaurav Batra
Relevance of Cyber Norms
Gunjan Chawla
Physical & Logical security for Data centers
Abhishek Akkewar
Careers and certification in Cybersecurity
Tariq Wani
Securing your Organization with VAPT
Shashi Sharma
AWS IoT Security
Mukesh Kumar Rao
Malware analysis using malware forensics
Akash Thakkar
Sunday Learnings- APT Attack Techniques & Defense
Suriya Prakash & J Prasanna
USB Data Leakage
Rajeev Khade
Growing Need of Data privacy
Narasimhan Elangovan
Unknown Facts Of Data Privacy
Amit Dubey
Data Privacy Innovations in New Industry Era
Prathamesh Churi
Privacy: Harnessing Digital trust
Anil Lole
Blockchain for Business
Atul Anand
Quickstart: Chat GPT
Hannan Satopay
Exploiting IoT Device Security
Vaibhav Bedi
Securing Quality of service in Mobile Ad-hoc Network
Gautam Borkar
Unveiling Network Security from the Red Team's Perspective
Pratik Chotalia
PCIDSS v4.0 Masterclass
Mr. Vamsi Krishna Maramganti & Mr. Kalpesh Vyas
ICS Security Essentials
Divya Visalakshi Suresh Kumar
Application Security Done Right - What's your Appsec program needs
Riyaz Rafi Ahmed.
Demystifying AWS Cloudwatch and Cloudtrail
Dharmendra Parmar
Securing the Convergence of IT and OT: Bridging the Cybersecurity Gap
Devam Shah
CS3 3.0 Keynote Session: Securing Startups: Navigating the Cyber Landscape
Akshay Garkel, Partner & Leader - Cyber , GT
CS3 3.0-QRC: Streamlining Continuous Compliance Management for Businesses with QRCAssist
Mr. Vamsi Krishna Maramganti, Founder & CEO, QRC Assurance & Solutions
CS3 3.0 Panel Discussion 1: Navigating Emerging Cybersecurity Threats and Innovations in Data Privacy and Protection: Challenges and Solutions for Startups
Moderator: Ajay Bhayani, Panelist: Suresh Sharma, Devam Shah, Archit Rajesh
CS3 3.0 Solution Showcase 2: Darwis - Full Stack Product Walk-Through
Anuradha M, Suriya Prakash
CS3 3.0. Solution Showcase 3: Flexible IR - Getting Prepared for a Ransomware cyber attack - Technical & Management level crisis response Playbooks
Venkat Ramshet, Founder, Flexible IR
CS3 3.0 Solution Showcase 4: Prophaze - The API Security Shield: Defending Your Digital Ecosystem
Vaisakh T R, CEO, Prophaze
CS3 3.0 Panel Discussion 2: Fortifying Cloud Infrastructure and Services: Innovations and Best Practices
Moderator: Sanjay Singh, Speakers: Dr. Yogesh Dadke, Gokulavan Jayaraman, Satish Kumar Dwibhashi
Cs3 3.0 Solution Showcase 5: Cybernxt: CyberVisible- Intelligent Dashboard and Analytics
Pravin Saiya, Founder, CyberNxt Solutions LLP
CS3 3.0 Solution Showcase 7: Culsight- Security Awareness through Motion Graphics
Gaurav Batra, CEO & Founder, CyberFrat Pvt. Ltd., Ria Mahale, Manager, Risk & Analytics, CyberFrat Pvt. Ltd.
CS3 3.0 Solution Showcase 6: Zeron - The Single point of truth for Cybersecurity
Sanket Sarkar, Founder, Zeron
CS3 3.0 Panel Discussion 3: Building a Culture of Cybersecurity: Strategies for Startups
Moderator: Ruchi Balkrishna, Speakers: Senthil Kumar, Akhil Verma, Arvind Kumar
CS3 3.0 Keynote Session: Trends in Cybersecurity - Changing Paradigm
DK Srivastava, Sr. Director- Analytics, Cloud and IOT
CS3 3.0 Panel Discussion 4: Securing Remote Workforces: Startups' Solutions for the New Normal
Moderator: Gaurav Batra, Speakers: Suriya Prakash, Vamsi Krishna Maramganti, Sanket Sarkar, Vaisakh T R
Navigating the Mitre: Advanced Cyber Defense Techniques
Avkash Kathiriya & Aashiq Ramachandran
AI/ML and Generative AI Security
Malini Rao
Vulnerability Management- Planning, Process & Future
Saurabh Jagtap
DPDP Act 2023 Published, What to do Next?
Jatinkumar Modh
Table Top Excercise on Ransomware
CyberFrat
Digital Personal Data Protection Act 2023
Multiple
Explore the potential of Deepfakes: A hands on approach
Sanjay Mistry & Ria Mahale
Demystifying Cyber Risk
Gaurav Batra
Root Cause Analysis- Techniques & Tips
Gokulavan Jayaram
VAPT: Importance & Benefits for securing organisations from cyberattacks
Nikunj Bhatiya
Malware Trends and TTPs A Practical Guide to Defending Against the Latest Threats
Hiren Sadhwani
Advanced IR & Threat Hunting
Mayan Arora
Identity & Data Core of Privacy
Rakesh Kumar Kunwar
Enhancing Cyber Resilience - Navigating Social Engineering Threats in IT Security
Cybersecurity Expert
Navigating the Future: Next-Gen DLP in Cybersecurity
Amrutha Gadagkar
Guardians of the Gateway-Crucial Role of SIEM in Modern Cybersecurity
Apurva Navhate
Shielding & Exploiting Servers: Strategies to defend against Rampant DoS & DDoS Onslaughts.
Ayush Singh
Penetration Testing: Securing Your Digital Fortress Through Ethical Hacking and Cyber Resilience
Anveeksh M. Rao
Fortifying Code: Security Best Practices.
Hrushikesh Walvekar
Attaining Prowess in Shielding Against XSS Breaches.
Sheerin Fathima
Unveiling Account Takeover Tactics: Strategies And Safeguards
Harsh Tandel
Digital Forensics: Unraveling Cyber Crimes in Real Time
Pawan Kumar
Block Chain Security
Falgun Rathod
A Tactical Guide to AWS Offensive Assessment
Prabhsimran Singh

How to Use

After successful purchase, this item would be added to your courses.You can access your courses in the following ways :

  • From the computer, you can access your courses after successful login
  • For other devices, you can access your library using this web app through browser of your device.