Contact us

Gold Membership

Language: English

₹75000 including GST

100 CF Coins as Cashback


Description

180+ hours of live learning in a year

Attend knowledge-sharing sessions and workshops from our SMEs and Industry leaders, from programs like CF Thursday, CXO connect, fireside chats with CXOs, and special knowledge-sharing sessions.

600+ hours of recorded sessions

Gain insights into topics like Risk Management, Cyber Security Emerging Technology, and Data Privacy from the backpack of knowledgeable session recordings.

Part of the knowledge-sharing community

Part of CyberFrat WhatsApp and Google knowledge sharing group and Full Access to Microsoft Kaizala groups.

Industry news, jobs, internship

Get updates on industry news, jobs, internship, and candidature requirements. Grooming, Mentoring, and Career Guidance sessions.

Special Discounts on every program

Discounts on all conferences, Partner events, CF Training, and Masterclass.

Networking opportunities

Network opportunities with other professionals across the globe, access to all CyberFrat local chapters & virtual meets.

Updates through Weekly newsletter

Receive a weekly newsletter with educational materials, interesting posts, upcoming free events, popular books, and much more.CyberFrat local chapter& virtual meets.

Digital 4n6 Journal at 25% off for a 1-year subscription.

Package Contents

Defense In-Depth
Multiple Trainers
Certificate of Cloud Security Professional- CCSP
Gaurav Batra
CCSK- Certificate of Cloud Security and Knowledge
Rahul Kamath
Digital Forensics Training
Samir Datt
Introduction to ISO27002:2022
Jagbir Singh
NIST Cybersecurity Framework
Anil Chiplunkar
Session on Systems and Organisational Controls
Narasimhan Elangovan
Certified Information Systems Auditor-CISA
Rajeev Gupta
How to build a strong Cybersecurity Culture
Madhu Maganti
Examining Malicious Software and it’s Analysis
Shrutirupa Banerjiee
Certified Information Systems Security Professional -CISSP 2022 Batch 2
Gaurav Batra
Docker and AWS ECS
Amit Kulkarni
Certified Information Systems Security Professional (CISSP)
Multiple Trainers
DevSecops & Container Security
Deep Shankar Yadav
Cybersecurity in IOT
Vinod Babu
Linux Essentials & AWS
Amit Kulkarni
Azure Security AZ-500 Training
Amit Kulkarni
Certificate of Information Security Manager
Multiple Trainers
Azure Architecture Technologies
Amit Kulkarni
Threat Intel & Dark Web
Muslim Koser
Certified in Risk and Information Systems Control (CRISC)
Nishant Singh
Industrial Control System Cybersecurity Framework
Soumil Khandadia
Why SecDevOps is the New way in Cybersecurity
Saman Fatima
CISSP 2022
Gaurav Batra
Digital Evidence Handling
Harshita Jadhav
Cyber Crimes
Ritesh Bhatia
Network Security
Smith Gonsalves
Fundamentals of Cyber Security
Venkata Satish Guttala
DNS Training for security practitioners
Infoblox
Web Application Security
Omkar Prakash Joshi
DevSecOps
Joel Divekar
End-to-End Cybersecurity
Ajay Bhayani
Incident Management
Lalit Vazirani
Passwordless Authentication
Viral Parmar
Cyber Incident Investigation Case Studies
Nikhil Mahadeshwar
Data Analytics
CA Murtaza Q. Ghadiali
Artificial Intelligence
Vikram Verma, Dr. Deepak Singh
Cloud Computing
Gaurav Batra
AI / ML in Cybersecurity
Apurva Jain
Cyber Laws
Rohit Jain
Blockchain in Cybersecurity
Narasimhan Elangovan
Wednesday Wisdom: Advanced Web Application Security
Vaisakh T R
Enterprise Risk Framework
Vinod Nair
Data privacy
Gaurav Khera
Privacy Software Development Life Cycle
Anil Lole
Operational Risk (NBFC)
SMEs
Banking IT
SMEs
Insurance process lifecycle
SMEs
Audit Analytics Using Caseware Idea Software
CA Murtaza Q. Ghadiali
Retail Success
SMEs
Operational risk (IT/ITES)
SMEs
HealthCare Risk
SMEs
Manufacturing Operational Risk
Atul Anand
Combat Cyber DeceptiCons with AI
F5 Networks
The journey from Legacy to Next Gen Web Security
Netskope
eMudhra: Empowering Digital Transformation
EMudhra
Securing Remote Workforces at Scale
Palo Alto Networks
Haltdos Edge Security Platform
Haltdos
Prevent attacks by fortifying the last mile -The user
Security Advisor
Securing Privilege Identity in Cloud Era
Sectona
Take Control of Business Critical Data for effective Protection & Compliance
Klassify
Building blocks for dealing with exponentially increasing mail-based frauds
Progist
Shift Left: An approach to incorporate Security early into SDLC for App-based businesses
AppKnox
Security strategy begins with an attitude: Never trust. Always verify
Blackberry
Cyber Risk and Insurance
Howden India
Infosec Fusion 2.0
Multiple Speakers
Building Zero Trust Framework
Harshavardhan Lale
Why Milliseconds matter securing against the next Zero-day
Puneet Gupta
Hyperscale SIEM for everyone
DNIF
Taking Bull by Horns… Eliminate The no. 1 Enterprise Risk – PASSWORDS – Go Passwordless.
PureID
Cyber Threat Intelligence Differentiating Signal from Noise
Anomali
Darktrace Cyber AI platform
Dark Trace
Cyber hygiene in the workplace: How IAM counters the complex threat landscape
Last Pass
Simplifying Vulnerability Management
We Secure App
SOC Capability Validation Tool
qSeap
Zero Trust Prevention Strategy – Endpoints
Morphisec
Measuring your cybersecurity risk posture with Cyber Observer
Cyber Observer
CTIX Lite – Enabling Threat Intelligence Automation for Everyone
Cyware
The Art of open Source Intelligence
Saumay Srivastava
Demystifying BlockChain Security
Shrutirupa Banerjiee
Securing your Apps in AWS
Amit Kulkarni
Cyber Security for Critical Infrastructure
Dr. Faruk Kazi
Secure Coding
Dr. Gopakumaran Thampi
SOC Blueprint
Om Ahuja
Data Protection Within Organizations
Garima Purohit
DevSec Ops and Container Security
Deep Shankar Yadav
Digital Wildfires in a Connected World
Dr. Rama Subramaniam
Mind, Machine and Market
Dr. Lalit Saraswat
Security Is Everyone's Responsibility
Amey Lakeshri
Buisness Agility With Devops
Rakesh Singh/ Arun Kholi
Zero Trust For IIOT & Cloud Environment
Bill Joll
Bluetooth Basics and Hacking
Arun Mane
Incident Management and Business Continuity Planning
Shailendra Srivastava
Attacking Secret Sharing
Adhokshaj Mishra
Cyber Crisis
Smith Gonsalves
At Ease with Cyber Security
Viral Raval
Software Development Security
Rahul Kamath
Data Privacy and Protection
Ramesh Venkataraman
Social Media Security & Online Frauds
Rakshit Tandon
Machine Learning - Practical application for cybersecurity
Hannan Satopay
Understanding Azure Security
Amit Kulkarni
Latest Trends in Cyber Crimes
Prof. Triveni Singh IPS
Importance of Digital Evidence in Cyber Security
Arun Soni
Intelligence Threat Hunting
Vishnu Vardhan
Data Discovery & Classification
Aakriti Sarivastav & Aaron Kinchen
The Future is Cloudy: Cloud security challenges and how to overcome them
Raphel Peyret, Horangi
Aviation Security ( ACARS )
Arun Mane
Importance of Early Education to Prevent Cyber Crimes
Yogesh Kumar
COSO 2013 Internal Controls Framework
Manoj Agrawal
API Security
Mohit Rampal
Burpsuite
Manpreet Singh
Basics of Cloud and Cloud Certification
Ria Wadhwani
Demystifying 65B Certificate Requirements.
Vicky Shah
Digital Forensics
Arpit Doshi
DMARC
Venkata Satish Guttala
Docker Security
Deep Shankar Yadav
Enhancing Defender Skills
Rohan Bhasin
ISO 27002:2022 Readiness and Awareness
Vijayan Muralidaran
Deep Dive In RBI's Digital Security Compliance
Vikram Sareen: BlueBricks
Cloud Security Threats & Challenges
Kavitha Srinivasulu
Exotic Excel
CA Nachiket Pendharkar
Extraordinary time, Extraordinary change
Dinesh Bareja
Interactive Application Security Testing
Mohit Rampal
Financial Planning
CA Vishnu Gavkare
Lets hunt bounty
Vignesh C.
Introduction to Azure Security Center
Rohit Srivastawa
Cyber security challenges in industry 4.0
Pawan Desai
Security Awareness - 'Key to strengthen your biggest asset - People'
Jatinkumar Modh
Mitigating the risks and challenges that lay in cloud for remote workers
Krishna Narayanswamy & Sasi Murthy
Strengthening Cybersecurity Defenses using MITRE ATT&CK Framework
Shaikh Sartaj Ahmed
Mobile application Security
Subho Halder
Importance of operational risk during COVID times
Srinath Mantripragada
OT security awareness
Ravindra S Gotavade
OT/ICS Security
Rahul Mehta
Emerging Risks and Industry Trends in the growing Cyberspace
Kavitha Srinivasulu
Print Security
Kalpesh Jani
Recent Trends in Cyber Crime
Dr. S. Murugan
Key things to consider before investing in a SOAR Platform
Amit Modi
Simple solutions to complex security problems
Sami Petajasoja
Secure SDLC
Umesh Kumar
Securing Cross Border Payment messaging system
Prakash Ranjan
Risk Management in the era of Digitalization
Srinath Mantripragada
Operationalising Threat Intel
Dr. Aditya Mukherjee
360-Degree Cybersecurity
Sanjiv Agarwala
Red Team Assessment
Manpreet Singh Kheberi
Data Privacy and ISO 27701:2019
Anil Lole
Security Entrepreneurship
Samrendra Kumar
National Cyber Security Policy of Govt of India
Dhruv .A. Pandit
Service on Organisation Controls and Reporting
Narasimhan Elangovan
Research in Cyber Forensics
Shweta Tripathi
Exploring Cyber Insurance in Depth
Amit Agarwal & Vernica Walia.
InfraGuard - Simplify and Secure Server Management Practices
Manoj Ludhani, Kislay Chandra
Cyber Risk Analytics powered automation of Remediation
Satyen Jain
Data Privacy and Security Concerns for CXO'S
Amit Dubey
Decentralized Finance
Narasimhan Elangovan
Security of Internet of Things
Purnima Ahirao
DevOps - Enabler of Digital Transformation
Atul Anand
CISSP Domain 8 Software Development Security
Gaurav Batra
Digital Identity : The New Golden Standard for Secure Access
Ravi Vaz
Defence for safe DeFI of the Future
Shilpaa Karkeraa
Accounting in the World of Zeros and Ones
Na.Vijayashankar (Naavi)
Code to cloud – automate security and accelerate modern development
Om Vyas, Ronak Shah, Pushpa Redkar- Oak 9
Cyber Financial Frauds & their Mitigation Techniques
Dr. AK Agarwal
Data Privacy via Data Protection
Anil Chiplunkar.
Social Media Forensics
Nilay Mistry
Financial Cyber Crimes
Khusbhu Jain
Changing Face of Cybersecurity
Subramanian U
Implementing Information Security at SMBs / SMEs
Aman Chhikara
Cybersecurity Policy Formulation
Nishant Singh
Illuminating Cybercrime & Digital Forensics
Deepak Kumar
Data Forensics hands-on approach
Gaurav Batra
Relevance of Cyber Norms
Gunjan Chawla
Breaking into android devices
Kiran Kumar
Physical & Logical security for Data centers
Abhishek Akkewar
Careers and certification in Cybersecurity
Tariq Wani
Securing your Organization with VAPT
Shashi Sharma
AWS IoT Security
Mukesh Kumar Rao
Malware analysis using malware forensics
Akash Thakkar
Sunday Learnings- APT Attack Techniques & Defense
Suriya Prakash & J Prasanna
Wednesday Wisdom: Security and observability for Kubernetes with Calico Enterprise
Peter Marini
Chatbot with Dialogflow
Parth Doshi
USB Data Leakage
Rajeev Khade
Python
Rutuja Kulkarni
Cyber Risk Trends-2023
Gaurav Batra
CISM Certified Information Security Manager 2023
Gaurav Batra
Growing Need of Data privacy
Narasimhan Elangovan
Unknown Facts Of Data Privacy
Amit Dubey
Data Privacy Innovations in New Industry Era
Prathamesh Churi
Privacy: Harnessing Digital trust
Anil Lole
Blockchain for Business
Atul Anand
Quickstart: Chat GPT
Hannan Satopay
Exploiting IoT Device Security
Vaibhav Bedi
Securing Quality of service in Mobile Ad-hoc Network
Gautam Borkar
Unveiling Network Security from the Red Team's Perspective
Pratik Chotalia
PCIDSS v4.0 Masterclass
Mr. Vamsi Krishna Maramganti & Mr. Kalpesh Vyas
ICS Security Essentials
Divya Visalakshi Suresh Kumar
Application Security Done Right - What's your Appsec program needs
Riyaz Rafi Ahmed.
Demystifying AWS Cloudwatch and Cloudtrail
Dharmendra Parmar
Runtime Security: Challenges and Solution Space
Rahul Jadhav
Storage Covert Channel for Secure Communication
Dr. Dhananjay M Dakhane
Securing the Convergence of IT and OT: Bridging the Cybersecurity Gap
Devam Shah
Red Team Assessment Training
Manpreet Singh
Certified Cloud Security Professional - CCSP
Gaurav Batra
CS3 3.0 Keynote Session: Securing Startups: Navigating the Cyber Landscape
Akshay Garkel, Partner & Leader - Cyber , GT
CS3 3.0-QRC: Streamlining Continuous Compliance Management for Businesses with QRCAssist
Mr. Vamsi Krishna Maramganti, Founder & CEO, QRC Assurance & Solutions
CS3 3.0 Panel Discussion 1: Navigating Emerging Cybersecurity Threats and Innovations in Data Privacy and Protection: Challenges and Solutions for Startups
Moderator: Ajay Bhayani, Panelist: Suresh Sharma, Devam Shah, Archit Rajesh
CS3 3.0 Solution Showcase 2: Darwis - Full Stack Product Walk-Through
Anuradha M, Suriya Prakash
CS3 3.0. Solution Showcase 3: Flexible IR - Getting Prepared for a Ransomware cyber attack - Technical & Management level crisis response Playbooks
Venkat Ramshet, Founder, Flexible IR
CS3 3.0 Solution Showcase 4: Prophaze - The API Security Shield: Defending Your Digital Ecosystem
Vaisakh T R, CEO, Prophaze
CS3 3.0 Panel Discussion 2: Fortifying Cloud Infrastructure and Services: Innovations and Best Practices
Moderator: Sanjay Singh, Speakers: Dr. Yogesh Dadke, Gokulavan Jayaraman, Satish Kumar Dwibhashi
Cs3 3.0 Solution Showcase 5: Cybernxt: CyberVisible- Intelligent Dashboard and Analytics
Pravin Saiya, Founder, CyberNxt Solutions LLP
CS3 3.0 Solution Showcase 7: Culsight- Security Awareness through Motion Graphics
Gaurav Batra, CEO & Founder, CyberFrat Pvt. Ltd., Ria Mahale, Manager, Risk & Analytics, CyberFrat Pvt. Ltd.
CS3 3.0 Solution Showcase 6: Zeron - The Single point of truth for Cybersecurity
Sanket Sarkar, Founder, Zeron
CS3 3.0 Panel Discussion 3: Building a Culture of Cybersecurity: Strategies for Startups
Moderator: Ruchi Balkrishna, Speakers: Senthil Kumar, Akhil Verma, Arvind Kumar
CS3 3.0 Keynote Session: Trends in Cybersecurity - Changing Paradigm
DK Srivastava, Sr. Director- Analytics, Cloud and IOT
CS3 3.0 Panel Discussion 4: Securing Remote Workforces: Startups' Solutions for the New Normal
Moderator: Gaurav Batra, Speakers: Suriya Prakash, Vamsi Krishna Maramganti, Sanket Sarkar, Vaisakh T R
Operational Risk
Srinath Mantripragada
Blockchain
Narasimhan Elangovan
Navigating the Mitre: Advanced Cyber Defense Techniques
Avkash Kathiriya & Aashiq Ramachandran
AI/ML and Generative AI Security
Malini Rao
Vulnerability Management- Planning, Process & Future
Saurabh Jagtap
DPDP Act 2023 Published, What to do Next?
Jatinkumar Modh
Table Top Excercise on Ransomware
CyberFrat
Digital Personal Data Protection Act 2023
Multiple
Explore the potential of Deepfakes: A hands on approach
Sanjay Mistry & Ria Mahale
Demystifying Cyber Risk
Gaurav Batra
Root Cause Analysis- Techniques & Tips
Gokulavan Jayaram
VAPT: Importance & Benefits for securing organisations from cyberattacks
Nikunj Bhatiya
Malware Trends and TTPs A Practical Guide to Defending Against the Latest Threats
Hiren Sadhwani
Advanced IR & Threat Hunting
Mayan Arora
Identity & Data Core of Privacy
Rakesh Kumar Kunwar
Let's Understand The Real Malwares: Detection & Defense
Prashant Saxena
Importance of Vulnerability Intelligence
Mohammad Aamir
Enhancing Cyber Resilience - Navigating Social Engineering Threats in IT Security
Cybersecurity Expert
Navigating the Future: Next-Gen DLP in Cybersecurity
Amrutha Gadagkar
Guardians of the Gateway-Crucial Role of SIEM in Modern Cybersecurity
Apurva Navhate
Shielding & Exploiting Servers: Strategies to defend against Rampant DoS & DDoS Onslaughts.
Ayush Singh
Elevate your Cloud Skills: The Ultimate AWS Masterclass
Pankaj Dube
CISSP Refresher Course
Gaurav Batra
Penetration Testing: Securing Your Digital Fortress Through Ethical Hacking and Cyber Resilience
Anveeksh M. Rao
Fortifying Code: Security Best Practices.
Hrushikesh Walvekar
Attaining Prowess in Shielding Against XSS Breaches.
Sheerin Fathima
Masterclass on Active Directory Security
Hrushikesh Walvekar
Uncovering Secrets of Bug Bounty
Armaan Sidana
Securing the Digital Ecosystem: Threat Modeling, Risk Assessment, and Mitigation Strategies
Sajeeda Riyaj Shikalgar
Behind The Inbox : Unmasking The Art Of Email Analysis
Riddhi Soral
Masterclass on Zero Trust Demystified
Rajesh T R
Software-Defined Network (SDN) Security
Satyajeet Mishra
Masterclass on MASTERING WEB SECURITY: ADVANCED TECHNIQUES IN WEB ATTACKS & BUG BOUNTY STRATEGIES
Riddhi Soral
Unveiling Account Takeover Tactics: Strategies And Safeguards
Harsh Tandel
Digital Forensics: Unraveling Cyber Crimes in Real Time
Pawan Kumar
Masterclass on Comprehensive Study Into Bug Bounty Tools
Harsh Tandel

How to Use

After successful purchase, this item would be added to your courses.You can access your courses in the following ways :

  • From the computer, you can access your courses after successful login
  • For other devices, you can access your library using this web app through browser of your device.