{"id":5997,"date":"2025-03-24T12:51:29","date_gmt":"2025-03-24T12:51:29","guid":{"rendered":"https:\/\/gsitssolutions.com\/?page_id=5997"},"modified":"2025-05-12T10:38:17","modified_gmt":"2025-05-12T10:38:17","slug":"soc-analyst-training","status":"publish","type":"page","link":"https:\/\/gsitssolutions.com\/index.php\/soc-analyst-training\/","title":{"rendered":"Security Operations Center (SOC) Analyst Training in Hyderabad"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5997\" class=\"elementor elementor-5997\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-16fc401 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"16fc401\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7b20977\" data-id=\"7b20977\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-aebf998 elementor-widget elementor-widget-hero3\" data-id=\"aebf998\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hero3.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <!-- Start Banner \n    ============================================= -->\n    <div class=\"banner-area home2-banner-fix shadow heading-border dark bg-cover text-light\" style=\"background-image: url(https:\/\/gsitssolutions.com\/wp-content\/uploads\/2024\/04\/Ethical-Hacking-Training.jpg\">\n        <div class=\"item-box\">\n            <div class=\"item\">\n                <div class=\"container\">\n                    <div class=\"row align-center\">\n                                        \n                        <div class=\"col-lg-6\">\n                            <div class=\"content\">\n                                <h4 class=\"wow fadeInUp\">SOC Analyst <\/h4>\n                                <h2 class=\"wow fadeInDown\">Practical <strong>SOC Analyst Training<\/strong><\/h2>\n                                <p class=\"wow fadeInLeft\">\n                                    Master SOC Analyst Skills \u2013 Start Your Cybersecurity Career Today!\nBecome a certified SOC Analyst with our hands-on training. Learn threat detection, incident response, SIEM tools, and more. Enroll today!                                <\/p>\n\n                                                                <a class=\"btn btn-light effect btn-md wow fadeInUp\" href=\"https:\/\/gsitssolutions.com\/index.php\/contact-us-gradespot-it-solutions\/\">Contact Us<\/a>\n                                                                \n                                \n                            <\/div>\n                        <\/div>\n                        <!-- Start Appoinment Form -->\n                        <div class=\"col-lg-5 offset-lg-1 appoinment\">\n                            <div class=\"appoinment-box text-center\">\n                                <div class=\"heading\">\n                                    <h4>Registration Form<\/h4>\n                                    <p>\n                                        Complete your registration by filling out the form.                                    <\/p>\n                                <\/div>\n                        \n<div class=\"wpcf7 no-js\" id=\"wpcf7-f639-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"639\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/index.php\/wp-json\/wp\/v2\/pages\/5997#wpcf7-f639-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"639\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.4\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f639-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_extcf7_conditional_options\" value=\"{&quot;form_id&quot;:639,&quot;conditions&quot;:[]}\" \/><input type=\"hidden\" name=\"_extcf7_redirect_options\" value=\"{&quot;form_id&quot;:639,&quot;redirect_options&quot;:{&quot;redirection_enable&quot;:&quot;off&quot;,&quot;custom_url_enable&quot;:&quot;off&quot;,&quot;redirect_page&quot;:&quot;&quot;,&quot;custom_urle&quot;:&quot;&quot;,&quot;redirect_new_tab&quot;:&quot;off&quot;,&quot;js_action&quot;:&quot;off&quot;,&quot;javascript_code&quot;:&quot;&quot;}}\" \/>\n<\/fieldset>\n<div class=\"row\">\n\t<div class=\"col-lg-12\">\n\t\t<div class=\"form-group\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required form-control\" id=\"name\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Name\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span>\n\t\t\t<\/p>\n\t\t<\/div>\n\t<\/div>\n\t<div class=\"col-lg-12\">\n\t\t<div class=\"form-group\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email form-control\" id=\"email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Email*\" value=\"\" type=\"email\" name=\"email\" \/><\/span>\n\t\t\t<\/p>\n\t\t<\/div>\n\t<\/div>\n\t<div class=\"col-lg-12\">\n\t\t<div class=\"form-group\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"tel-36\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Mobile\" value=\"\" type=\"tel\" name=\"tel-36\" \/><\/span>\n\t\t\t<\/p>\n\t\t<\/div>\n\t<\/div>\n\t<div class=\"col-lg-12\">\n\t\t<div class=\"form-group\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"select\"><select class=\"wpcf7-form-control wpcf7-select form-group\" aria-invalid=\"false\" name=\"select\"><option value=\"Select an Option\">Select an Option<\/option><option value=\"Course Training\">Course Training<\/option><option value=\"Certification Voucher\">Certification Voucher<\/option><option value=\"Other Queries\">Other Queries<\/option><\/select><\/span>\n\t\t\t<\/p>\n\t\t<\/div>\n\t<\/div>\n\t<p><button type=\"submit\" name=\"submit\" id=\"submit\">Submit Query<\/button>\n\t<\/p>\n<\/div>\n<div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n                    <\/div>\n                        <\/div>\n                        <!-- End Appoinment Form -->\n\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n    <!-- End Banner -->\n\n\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-9d64aa9 e-flex e-con-boxed e-con e-parent\" data-id=\"9d64aa9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-12710e8 animated-slow elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"12710e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInLeft&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">SOC<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21e8875 animated-slow elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"21e8875\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInRight&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">SOC Analyst Training<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-afd8fd3 animated-slow elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"afd8fd3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInLeft&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Kickstart your cybersecurity career with our hands-on SOC Analyst training designed to make you job-ready. Learn threat detection, SIEM tools, incident response, and real-world security operations from industry experts. Gain practical experience with live labs, case studies, and guided exercises to tackle real cyber threats.<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-92143d4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"92143d4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-44493a7\" data-id=\"44493a7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3a9037d elementor-widget elementor-widget-choose\" data-id=\"3a9037d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"choose.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <!-- Start Features \n    ============================================= -->\n    <div class=\"features-area overflow-hidden bg-gray default-padding\">\n        <!-- Fixed Shpae  -->\n        <div class=\"fixed-shape shape left bottom\">\n            <img decoding=\"async\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2022\/01\/3-1.png\" alt=\"Shape\">\n        <\/div>\n        <!-- End Fixed Shpae  -->\n        <div class=\"container\">\n            <div class=\"row align-center\">\n                <div class=\"col-lg-5 why-us\">\n                    <h5>SOC<\/h5>\n                    <h2>SOC Analyst Taining<\/h2>\n                    <p>\n                        Elevate your cybersecurity career with our SOC Analyst Training\u2014your gateway to mastering the art of digital defense. Designed for aspiring SOC professionals and IT enthusiasts, our program delivers hands-on training to help you identify vulnerabilities, assess risks, and implement robust security measures. Gain practical skills and industry-relevant knowledge to excel in Security Operations Centers (SOC). \n\nIf you&#039;re looking for SOC Analyst training in Hyderabad, this course is your ideal choice to unlock new career opportunities and thrive in the ever-evolving world of cybersecurity.                    <\/p>\n                                        <a class=\"popup-youtube relative theme video-play-button\" href=\"#\">\n                        <i class=\"fa fa-play\"><\/i> <span>Video Showcase<\/span>\n                    <\/a>\n                                <\/div>\n                <div class=\"col-lg-7 features-box text-center\">\n                    <div class=\"row\">\n                        \n                        <!-- Item Grid -->\n                        <div class=\"col-lg-6 col-md-6 item-grid\">\n                            <!-- Single Item -->\n                            <div class=\"item\">\n                                <i class=\"fal fa-chalkboard-teacher\"><\/i>\n                                <h5><a href=\"#\">Live Classes<\/a><\/h5>\n                                <p>\n                                     Empower your learning journey with our engaging live classes.                                <\/p>\n                            <\/div>\n                            <!-- End Single Item -->\n                            <!-- Single Item -->\n                            <div class=\"item\">\n                                <i class=\"fal fa-video\"><\/i>\n                                <h5><a href=\"#\">Recorded Videos<\/a><\/h5>\n                                <p>\n                                     Unlock a wealth of knowledge with our extensive collection of recorded videos.                                <\/p>\n                            <\/div>\n                            <!-- End Single Item -->\n                        <\/div>\n                        <!-- End Item Grid -->\n\n                        \n                        <!-- Item Grid -->\n                        <div class=\"col-lg-6 col-md-6 item-grid\">\n                            <!-- Single Item -->\n                            <div class=\"item\">\n                                <i class=\"fal fa-certificate\"><\/i>\n                                <h5><a href=\"#\">EC-Council&#039;s C|SA  Certification<\/a><\/h5>\n                                <p>\n                                     Get a Complementary EC-Council&#039;s C|SA Exam Voucher and elevate your skills for success.                                <\/p>\n                            <\/div>\n                            <!-- End Single Item -->\n                            <!-- Single Item -->\n                            <div class=\"item\">\n                                <i class=\"fal fa-hands-helping\"><\/i>\n                                <h5><a href=\"#\">Hands-On Practicals<\/a><\/h5>\n                                <p>\n                                     Immerse yourself in practical learning with our hands-on training sessions.                                <\/p>\n                            <\/div>\n                            <!-- End Single Item -->\n                        <\/div>\n                        <!-- End Item Grid -->\n\n                        \n                    <\/div>\n                <\/div>\n                \n            <\/div>\n        <\/div>\n    <\/div>\n    <!-- End Features Area -->\n       \n\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-97d30f5 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"97d30f5\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8408dd4\" data-id=\"8408dd4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ca1f0bb elementor-widget elementor-widget-counter\" data-id=\"ca1f0bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <!-- Start Fun Factor Area\n    ============================================= -->\n    <div class=\"fun-factor-area overflow-hidden\">\n        <div class=\"container\">\n            <div class=\"fun-fact-items default-padding\">\n                <div class=\"row\">\n\n         \n        <div class=\"col-lg-3 col-md-6 item\">\n        <div class=\"fun-fact\">\n            <div class=\"icon\">\n                 <i class=\"fal fa-medal\"><\/i>\n             <\/div>\n             <div class=\"info\">\n                <div class=\"timer\" data-to=\"1200\" data-speed=\"5000\">1200<\/div>\n                <span class=\"medium\">Certified Learners<\/span>\n             <\/div>\n        <\/div>\n    <\/div>\n\n    \n        <div class=\"col-lg-3 col-md-6 item\">\n        <div class=\"fun-fact\">\n            <div class=\"icon\">\n                 <i class=\"fal fa-user-graduate\"><\/i>\n             <\/div>\n             <div class=\"info\">\n                <div class=\"timer\" data-to=\"1500\" data-speed=\"5000\">1500<\/div>\n                <span class=\"medium\">Students Enrolled<\/span>\n             <\/div>\n        <\/div>\n    <\/div>\n\n    \n        <div class=\"col-lg-3 col-md-6 item\">\n        <div class=\"fun-fact\">\n            <div class=\"icon\">\n                 <i class=\"fal fa-users\"><\/i>\n             <\/div>\n             <div class=\"info\">\n                <div class=\"timer\" data-to=\"250\" data-speed=\"5000\">250<\/div>\n                <span class=\"medium\">Interns<\/span>\n             <\/div>\n        <\/div>\n    <\/div>\n\n    \n        <div class=\"col-lg-3 col-md-6 item\">\n        <div class=\"fun-fact\">\n            <div class=\"icon\">\n                 <i class=\"fab fa-wordpress-simple\"><\/i>\n             <\/div>\n             <div class=\"info\">\n                <div class=\"timer\" data-to=\"12\" data-speed=\"5000\">12<\/div>\n                <span class=\"medium\">Web Projects<\/span>\n             <\/div>\n        <\/div>\n    <\/div>\n\n    \n    <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n    <!-- End Fun Factor Area -->\n\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-257976f7 e-flex e-con-boxed e-con e-parent\" data-id=\"257976f7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4e97eaf8 elementor-widget elementor-widget-elementskit-heading\" data-id=\"4e97eaf8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_center   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Course Overview - <span>SOC Analyst Training<\/span><\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider elementskit-style-long\"><div class=\"elementskit-border-divider elementskit-style-long\"><\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6345c178 e-con-full e-flex e-con e-child\" data-id=\"6345c178\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-70d5f7a1 elementor-widget elementor-widget-elementskit-drop-caps\" data-id=\"70d5f7a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-drop-caps.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\t\t<div class=\"ekit-dropcap-wraper\">\n\t\t\t\t\t\t<p class=\"ekit-dropcap-cotnent\">Our SOC Analyst Training is designed to equip you with the essential skills needed to thrive in a Security Operations Center (SOC). Over the course of 90 days, you will gain in-depth knowledge of threat detection, SIEM tools, incident response, and cybersecurity best practices. This hands-on training program covers real-world attack scenarios, log analysis, and threat intelligence to help you become a job-ready SOC Analyst. You\u2019ll work with industry-leading SIEM platforms like Splunk and Microsoft Sentinel, learning how to monitor security events, detect anomalies, and respond to cyber threats effectively. By the end of the program, you will have the practical experience and expertise required to protect organizations from evolving security threats.\n <\/br><\/br>\nThis cybersecurity analyst certification course is perfect for beginners and IT professionals looking to enter the cybersecurity field. Whether you\u2019re transitioning from IT support, networking, or another technology role, our structured learning path ensures that you build a strong foundation in cybersecurity operations. Through interactive labs, case studies, and expert-led training, you will develop key SOC Analyst skills such as threat hunting, malware analysis, forensics, and incident response. With the increasing demand for cybersecurity professionals, this training gives you a competitive edge, helping you land roles in SOC teams, security engineering, or cybersecurity consulting. Start your journey today and become a skilled SOC Analyst in just 90 days!<\/p>\n\t\t\t\t\t<\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-07b0946 e-flex e-con-boxed e-con e-parent\" data-id=\"07b0946\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2c7683e elementor-widget elementor-widget-elementskit-heading\" data-id=\"2c7683e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_center   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Key Learning - <span>Objectives<\/span><\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider elementskit-style-long\"><div class=\"elementskit-border-divider elementskit-style-long\"><\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f3bf67b e-con-full e-flex e-con e-child\" data-id=\"f3bf67b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-88762aa elementor-widget elementor-widget-elementskit-drop-caps\" data-id=\"88762aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-drop-caps.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\t\t<div class=\"ekit-dropcap-wraper\">\n\t\t\t\t\t\t<p class=\"ekit-dropcap-cotnent\">By the end of this 90-day SOC Analyst Training, you will have mastered the essential skills required to excel in a Security Operations Center (SOC). This program focuses on practical, hands-on learning to ensure you can confidently detect, analyze, and respond to cyber threats in real-world environments.\n\n<\/br><\/br>\n<b>Understand SOC Operations &amp; Cyber Threats<\/b>\n<\/br>Learn the role of a SOC Analyst and how security teams detect and mitigate cyber threats.<\/br>\nUnderstand the cyber threat landscape, including attack vectors and hacker methodologies.\n<\/br><\/br>\n<b>Master SIEM &amp; Log Analysis<\/b>\n<\/br>\nWork with industry-leading SIEM tools like Splunk, Microsoft Sentinel, and QRadar.<\/br>\nLearn how to collect, analyze, and correlate logs to detect suspicious activities.\n<\/br><\/br>\n\n<b>Develop Threat Hunting &amp; Threat Intelligence Skills<\/b>\n<\/br>\nUse the MITRE ATT&amp;CK framework to proactively hunt for threats.<\/br>\nUnderstand Indicators of Compromise (IoCs) and how to respond to cyber incidents.\n<\/br><\/br>\n\n<b>Gain Expertise in Incident Response &amp; Digital Forensics<\/b><\/br>\nLearn how to investigate, contain, and mitigate security incidents.<\/br>\nMaster digital forensics techniques to analyze malware, phishing attacks, and unauthorized access.\n<\/br><\/br>\n\n<b>Work on Real-World Cybersecurity Scenarios<\/b><\/br>\nEngage in hands-on labs simulating real cyberattacks.<\/br>Apply SOC workflows to detect and stop threats in simulated environments.\n<\/br><\/br>\n\n<b>Prepare for SOC Analyst Job Roles &amp; Certifications<\/b>\n<\/br>Build the skills needed to land a SOC Analyst role in top organizations.<\/br>\nGet guidance on preparing for SOC Analyst certifications like CompTIA Security+, CompTIA CySA+, CEH, SC-900, SC-200, and more.\n\n<\/p>\n\t\t\t\t\t<\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bd3ba26 e-flex e-con-boxed e-con e-parent\" data-id=\"bd3ba26\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-edccff4 elementor-widget elementor-widget-elementskit-heading\" data-id=\"edccff4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_center   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Program - <span>Features<\/span><\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider elementskit-style-long\"><div class=\"elementskit-border-divider elementskit-style-long\"><\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7a89925 e-con-full e-flex e-con e-child\" data-id=\"7a89925\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-89c8ae3 elementor-widget elementor-widget-elementskit-drop-caps\" data-id=\"89c8ae3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-drop-caps.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\t\t<div class=\"ekit-dropcap-wraper\">\n\t\t\t\t\t\t<p class=\"ekit-dropcap-cotnent\">Our 90-day SOC Analyst Training is designed to provide a comprehensive, hands-on learning experience that prepares you for real-world cybersecurity challenges. From SIEM mastery to incident response, this program equips you with the essential skills needed to succeed as a SOC Analyst.\n\n<\/br><\/br>\n\n\n<b>Expert-Led Training<\/B><\/br>\nLearn from industry professionals and SOC practitioners with real-world experience.<\/br>\nGet insights into the latest cyber threats, attack tactics, and defense strategies.\n<\/br><\/br>\n<b>Hands-On Labs &amp; Real-World Scenarios<\/b><\/br>\nWork on live cybersecurity incidents and develop threat detection skills.<\/br>\nPerform log analysis, SIEM correlation, malware analysis, and forensic investigations.\n\n<\/br><\/br>\n\n<b>Flexible Online Learning with Mentorship<\/b><\/br>\nSelf-paced learning modules with live Q&amp;A sessions and mentorship.<\/br>Access course materials, cybersecurity tools, and practice labs anytime.<\/br>\n<\/br>\n\n<b>Career Support &amp; Resume Building<\/b>\n<\/br>\nReceive resume guidance, mock interviews, and career coaching.\n\n<\/br>\nGet connected with hiring partners and job placement assistance.<\/br><\/br>\n<b>Career Guidance<\/b>\n<\/br>\nReceive career guidance and support from our team of experts, including resume building, interview preparation, and job placement assistance, to help you pursue rewarding opportunities in cybersecurity.<\/br><\/br>\n\n<b>Networking Opportunities<\/b><\/br>\nConnect with fellow cybersecurity enthusiasts, industry professionals, and potential employers through networking events, workshops, and online forums, expanding your professional network and enhancing your career prospects.<\/p>\n\t\t\t\t\t<\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d8c00cb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d8c00cb\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8ab3f8b\" data-id=\"8ab3f8b\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8f7049b animated-slow elementor-widget elementor-widget-text-editor\" data-id=\"8f7049b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><h2><strong>Enroll in Our Practical SOC Analysis Training Today!<\/strong><\/h2><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83f7030 elementor-widget__width-initial animated-slow elementor-widget elementor-widget-text-editor\" data-id=\"83f7030\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Upon completing this course, you will acquire essential knowledge and hands-on expertise in <strong data-start=\"92\" data-end=\"108\">SOC Analysis<\/strong>, equipping you for a successful career in this rapidly expanding field.<\/li><li><br><\/li>\n<li>Enroll in our <strong data-start=\"198\" data-end=\"240\">Practical SOC Analyst Training Program<\/strong> and take a significant step toward a rewarding career in cybersecurity. Whether your goal is to strengthen cyber defenses, advance professionally, or contribute to securing the digital landscape, this program provides the necessary skills, insights, and support to help you excel.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-694d4ec elementor-section-content-top elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"694d4ec\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a1e87c5\" data-id=\"a1e87c5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a038acd animated-slow elementor-widget elementor-widget-heading\" data-id=\"a038acd\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Common Job Roles for SOC Analysis<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd95320 animated-slow elementor-widget elementor-widget-text-editor\" data-id=\"cd95320\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>SOC Analyst (Tier 1, Tier 2, Tier 3)<\/li><li>Cybersecurity Analyst<\/li><li>Threat Intelligence Analyst<\/li><li>Incident Response Specialist<\/li><li>Security Analyst<\/li><li>Security Operations Specialist<\/li><li>Cyber Threat Hunter<\/li><li>SIEM Administrator<\/li><li>Vulnerability Assessment Specialist<\/li><li>Network Security Analyst<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-xyz4e9v elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"xyz4e9v\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-27a2e6f animated-slow\" data-id=\"27a2e6f\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2d03d06 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"2d03d06\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"544\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/EC-CouncilCSA-768x544.png\" class=\"attachment-medium_large size-medium_large wp-image-6184\" alt=\"SOC Analyst Training in Hyderabad - GradeSpot IT Solutions\" srcset=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/EC-CouncilCSA-768x544.png 768w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/EC-CouncilCSA-300x212.png 300w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/EC-CouncilCSA-350x248.png 350w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/EC-CouncilCSA-540x382.png 540w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/EC-CouncilCSA-706x500.png 706w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/EC-CouncilCSA-565x400.png 565w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/EC-CouncilCSA.png 828w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-fc55efe animated-slow\" data-id=\"fc55efe\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f07ba44 elementor-widget elementor-widget-heading\" data-id=\"f07ba44\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Get a Free EC-Council C|SA Certification Exam!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a336775 elementor-widget elementor-widget-text-editor\" data-id=\"a336775\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Enroll in our training program and take advantage of an exclusive opportunity to receive a <strong data-start=\"173\" data-end=\"235\" data-is-only-node=\"\">complimentary EC-Council Certified SOC Analyst (C|SA) exam<\/strong> at no additional cost. Elevate your cybersecurity career with industry-recognized certification and gain the skills needed to excel as a SOC Analyst. Don&#8217;t miss this chance to validate your expertise for free!<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e704196 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"e704196\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/gsitssolutions.com\/index.php\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Enroll Now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-155e911 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"155e911\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a4fedf3\" data-id=\"a4fedf3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8be25c7 elementor-widget elementor-widget-work_about\" data-id=\"8be25c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"work_about.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n        <!-- Start Works About \n    ============================================= -->\n    <div class=\"works-about-area overflow-hidden\">\n        <div class=\"container\">\n            <div class=\"works-about-items default-padding\">\n                <div class=\"row align-center\">\n                    <div class=\"col-lg-6 info\">\n                        <h5>SOC Analysis<\/h5>\n                        <h2>Skills To Measure In <br>SOC Analysis Training<\/h2>\n                        <p>\n                             Earn industry-recognized certifications through our comprehensive SOC Analyst Training program, validating your expertise and unlocking exciting opportunities in cybersecurity. Dive deep into the core functions of Security Operations Centers as you master advanced techniques to monitor, detect, and respond to cyber threats. Whether you aim to launch your career or enhance your cybersecurity expertise, our program offers hands-on training and practical experience to help you thrive in the ever-evolving field of security operations.<\/p>\n                        <ul>\n                                                        <li>\n                                <h5>Computer Networking<\/h5>\n                            <\/li>\n                                                        <li>\n                                <h5>Vulnerability Analysis<\/h5>\n                            <\/li>\n                                                        <li>\n                                <h5>Malware Analysis<\/h5>\n                            <\/li>\n                                                        <li>\n                                <h5>SOC Analysis<\/h5>\n                            <\/li>\n                                                        <li>\n                                <h5>Incident Handling<\/h5>\n                            <\/li>\n                                                        <li>\n                                <h5>SIEM tools<\/h5>\n                            <\/li>\n                                                    <\/ul>\n                                                <a href=\"https:\/\/gsitssolutions.com\/index.php\/contact-us\/\" class=\"btn btn-theme effect btn-sm\">Enroll now<\/a>\n                                             <\/div>\n                    <div class=\"col-lg-6\">\n                        <div class=\"thumb\">\n                            <img decoding=\"async\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/01\/SOC-gradespot-it-solutions.jpg\" alt=\"Thumb\">\n                            <div class=\"fun-fact\">\n                                <div class=\"timer\" data-to=\"90\" data-speed=\"5000\">90<\/div>\n                                <span class=\"medium\">Hours Live Training<\/span>\n                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n    <!-- End Works About Area -->\n       \n\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-45e1ae67 e-flex e-con-boxed e-con e-parent\" data-id=\"45e1ae67\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b494160 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-elementskit-heading\" data-id=\"b494160\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Our Curriculum<\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider ekit-dotted\"><div class=\"elementskit-border-divider ekit-dotted\"><\/div><\/div>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>Our <strong>SOC Analyst curriculum<\/strong> is designed to provide in-depth knowledge and hands-on expertise in <strong>Security Operations Center (SOC) analysis<\/strong>. This program covers essential cybersecurity concepts, threat detection methodologies, incident response techniques, and advanced security monitoring tools. With a structured and practical approach, our curriculum ensures you gain the necessary skills to excel as a SOC Analyst and effectively safeguard organizations from evolving cyber threats.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7dfe88f2 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-elementskit-accordion\" data-id=\"7dfe88f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n        <div class=\"elementskit-accordion accordion-4\" id=\"accordion-69f4670f46e12\">\n\n            \n                <div class=\"elementskit-card active\">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-0-7dfe88f2\">\n                        <a href=\"#collapse-bc2283069f4670f46e12\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-bc2283069f4670f46e12\" aria-expanded=\"true\" aria-controls=\"Collapse-bc2283069f4670f46e12\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">Computer Networking<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-bc2283069f4670f46e12\" class=\" show collapse\" aria-labelledby=\"primaryHeading-0-7dfe88f2\" data-parent=\"#accordion-69f4670f46e12\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>Introduction to Computer Networks<\/li><li>OSI Reference Model<\/li><li>TCP\/IP Model<\/li><li>Transmission Media<\/li><li>Network Devices<\/li><li>Network Topologies<\/li><li>IP Address<\/li><li>Protocols &amp; Ports<\/li><li>Ethernet Standards<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-1-7dfe88f2\">\n                        <a href=\"#collapse-8417e7169f4670f46e12\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-8417e7169f4670f46e12\" aria-expanded=\"false\" aria-controls=\"Collapse-8417e7169f4670f46e12\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">Setting up Lab<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-8417e7169f4670f46e12\" class=\" collapse\" aria-labelledby=\"primaryHeading-1-7dfe88f2\" data-parent=\"#accordion-69f4670f46e12\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>Setting up virtual machines using VMware<\/li><li>Installing and configuring Kali Linux<\/li><li>Installing and configuring Parrot Linux<\/li><li>Installing and configuring Windows 10<\/li><li>Installing and configuring Windows 11<\/li><li>Setting up a Windows Server environment<\/li><li>Snapshot and backup management for virtual labs<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-2-7dfe88f2\">\n                        <a href=\"#collapse-3dad4e069f4670f46e12\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-3dad4e069f4670f46e12\" aria-expanded=\"false\" aria-controls=\"Collapse-3dad4e069f4670f46e12\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">Linux &amp; Windows Fundamentals<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-3dad4e069f4670f46e12\" class=\" collapse\" aria-labelledby=\"primaryHeading-2-7dfe88f2\" data-parent=\"#accordion-69f4670f46e12\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>Introduction to Linux<\/li><li>Linux and it\u2019s distributions<\/li><li>Basic Linux commands<\/li><li>Networking commands<\/li><li>Disk and Device Management<\/li><li>Windows Firewall Configuration<\/li><li>Windows Update<\/li><li>Bit-locker Drive Encryption<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-3-7dfe88f2\">\n                        <a href=\"#collapse-3663cae69f4670f46e12\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-3663cae69f4670f46e12\" aria-expanded=\"false\" aria-controls=\"Collapse-3663cae69f4670f46e12\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">Essential Security Principles<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-3663cae69f4670f46e12\" class=\" collapse\" aria-labelledby=\"primaryHeading-3-7dfe88f2\" data-parent=\"#accordion-69f4670f46e12\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>Introduction to Cybersecurity<\/li><li>Vulnerabilities, Threats, Risks<\/li><li>Principles of confidentiality, integrity, and availability (CIA Triad)<\/li><li>Defense-in-depth and layered security strategies<\/li><li>Authentication, authorization, and accounting (AAA) principles<\/li><li>RADIUS and TACACS+<\/li><li>Multi-Factor Authentication<\/li><li>Password Policies<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-4-7dfe88f2\">\n                        <a href=\"#collapse-48c95dd69f4670f46e12\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-48c95dd69f4670f46e12\" aria-expanded=\"false\" aria-controls=\"Collapse-48c95dd69f4670f46e12\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">Introduction to Ethical Hacking<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-48c95dd69f4670f46e12\" class=\" collapse\" aria-labelledby=\"primaryHeading-4-7dfe88f2\" data-parent=\"#accordion-69f4670f46e12\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>Information security overview<\/li><li>Elements of information security<\/li><li>Motives behind a security attack<\/li><li>Classification of Attacks<\/li><li>Information Warfare<\/li><li>Hacking Concepts<\/li><li>Hacker Classes\/Threat Actors<\/li><li>Ethical Hacking Concepts<\/li><li>Al-Driven Ethical Hacking<\/li><li>GPT-Powered AI Tools for Ethical Hackers<\/li><li>Ethical Hacking Framework<\/li><li>Cyber Kill Chain Methodology<\/li><li>Adversary Behavioral Identification<\/li><li>Information Security Controls<\/li><li>Information Assurance (IA)<\/li><li>Risk &amp; Risk Management<\/li><li>Cyber Threat Intelligence<\/li><li>Threat Intelligence Lifecycle<\/li><li>Role of AI and ML in Cyber Security<\/li><li>Information Security Laws and Standards<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-5-7dfe88f2\">\n                        <a href=\"#collapse-f27d4a869f4670f46e12\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-f27d4a869f4670f46e12\" aria-expanded=\"false\" aria-controls=\"Collapse-f27d4a869f4670f46e12\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">Footprinting and Reconnaissance<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-f27d4a869f4670f46e12\" class=\" collapse\" aria-labelledby=\"primaryHeading-5-7dfe88f2\" data-parent=\"#accordion-69f4670f46e12\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>Footprinting Concepts<\/li><li>Footprinting through Search Engines<\/li><li>Footprinting through Web Services<\/li><li>Footprinting through Social Networking Sites<\/li><li>Website Footprinting<\/li><li>Email Footprinting<\/li><li>Competitive Intelligence<\/li><li>Whois Footprinting<\/li><li>DNS Footprinting<\/li><li>Network Footprinting<\/li><li>Footprinting through Social Engineering<\/li><li>Footprinting Tools<\/li><li>Countermeasures<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-6-7dfe88f2\">\n                        <a href=\"#collapse-554082169f4670f46e12\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-554082169f4670f46e12\" aria-expanded=\"false\" aria-controls=\"Collapse-554082169f4670f46e12\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">Scanning Networks &amp; Enumeration<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-554082169f4670f46e12\" class=\" collapse\" aria-labelledby=\"primaryHeading-6-7dfe88f2\" data-parent=\"#accordion-69f4670f46e12\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>Network Scanning Concepts<\/li><li>Scanning Tools<\/li><li>Scanning Techniques<\/li><li>Host Discovery Techniques<\/li><li>Port &amp; Service Discovery Techniques<\/li><li>Operating System Discovery<\/li><li>Banner Grabbing<\/li><li>Service Version Discovery<\/li><li>Using Nmap, and Zenmap<\/li><li>Network Scanning using Metasploit<\/li><li>Scanning Beyond IDS and Firewall<\/li><li>Enumeration<\/li><li>Ports &amp; Services to Enumerate<\/li><li>DNS Enumeration<\/li><li>Enumeration Countermeasures<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-7-7dfe88f2\">\n                        <a href=\"#collapse-e3184b769f4670f46e12\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-e3184b769f4670f46e12\" aria-expanded=\"false\" aria-controls=\"Collapse-e3184b769f4670f46e12\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">Vulnerability Analysis<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-e3184b769f4670f46e12\" class=\" collapse\" aria-labelledby=\"primaryHeading-7-7dfe88f2\" data-parent=\"#accordion-69f4670f46e12\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>Vulnerability Assessment Concepts<\/li><li>Vulnerability Classifications<\/li><li>Vulnerability Assessment Solutions<\/li><li>Vulnerability Scoring Systems<\/li><li>Common Vulnerability Scoring System (CVSS)<\/li><li>Common Vulnerabilities and Exposures (CVE)<\/li><li>National Vulnerability Database (NVD)<\/li><li>Common Weakness Enumeration (CWE)<\/li><li>Exploit-DB<\/li><li>Vulnerability-Management Life Cycle<\/li><li>Types of Vulnerability Scanning<\/li><li>Vulnerability Assessment Tools<\/li><li>Working with OpenVAS<\/li><li>Working with Nessus<\/li><li>Working with Acunetix<\/li><li>Working with SkipFish<\/li><li>Vulnerability Assessment Reports<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-8-7dfe88f2\">\n                        <a href=\"#collapse-ba785e169f4670f46e12\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-ba785e169f4670f46e12\" aria-expanded=\"false\" aria-controls=\"Collapse-ba785e169f4670f46e12\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">Malware Threats<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-ba785e169f4670f46e12\" class=\" collapse\" aria-labelledby=\"primaryHeading-8-7dfe88f2\" data-parent=\"#accordion-69f4670f46e12\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>Introduction to Malware<\/li><li>Components of Malware<\/li><li>Potentially Unwanted Application or Applications (PUAs)<\/li><li>APT Concepts<\/li><li>APT Lifecycle<\/li><li>Trojan Concepts<\/li><li>Indications of Trojan Attack<\/li><li>Types of Trojans<\/li><li>Infect Systems Using a Trojan<\/li><li>Introduction to Viruses<\/li><li>Stages of Virus Lifecycle<\/li><li>Working of Viruses<\/li><li>Types of Viruses<\/li><li>Creating Viruses<\/li><li>Ransomware<\/li><li>Computer Worms<\/li><li>Using Worm Makers<\/li><li>Fileless Malware<\/li><li>How a Fileless Malware work?<\/li><li>Fileless Malware Obfuscation<\/li><li>AI-based Malware<\/li><li>Working of AI-based Malware<\/li><li>Indicators of AI-based Malware<\/li><li>Challenges of AI-based Malware<\/li><li>Examples of AI-based Malware<\/li><li>Sheep Dip Computer<\/li><li>Antivirus Sensor Systems<\/li><li>Malware Analysis<\/li><li>Types of Malware Analysis<\/li><li>Malware Analysis Procedure<\/li><li>Static Malware Analysis<\/li><li>Dynamic Malware Analysis<\/li><li>Virus Detection Methods<\/li><li>Malware Countermeasures<\/li><li>Anti-Malware Software<\/li><li>Fileless Malware Detection Tools<\/li><li>Fileless Malware Protection Tools<\/li><li>AI-Powered Malware Detection and Analysis Tools<\/li><li>Endpoint Detection and Response (EDR\/XDR) Tools<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-9-7dfe88f2\">\n                        <a href=\"#collapse-e5fadff69f4670f46e12\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-e5fadff69f4670f46e12\" aria-expanded=\"false\" aria-controls=\"Collapse-e5fadff69f4670f46e12\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">Sniffing &amp; Spoofing<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-e5fadff69f4670f46e12\" class=\" collapse\" aria-labelledby=\"primaryHeading-9-7dfe88f2\" data-parent=\"#accordion-69f4670f46e12\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>Network Sniffing<\/li><li>Types of Sniffing<\/li><li>Protocols Vulnerable to Sniffing<\/li><li>Hardware Protocol Analyzers<\/li><li>Wiretapping<\/li><li>MAC Address<\/li><li>MAC Flooding<\/li><li>Defend against MAC Attacks<\/li><li>Port Security on Cisco Switch<\/li><li>How DHCP Works<\/li><li>DHCP Starvation Attack<\/li><li>Rogue DHCP Server Attack<\/li><li>Defend Against DHCP Attacks<\/li><li>ARP Spoofing Attack<\/li><li>Defend Against ARP Poisoning<\/li><li>Configuring DHCP Snooping<\/li><li>Configuring Dynamic ARP Inspection<\/li><li>ARP Spoofing Detection Tools<\/li><li>MAC Spoofing\/Duplicating<\/li><li>MAC Spoofing Technique: Windows<\/li><li>MAC Spoofing Tools<\/li><li>VLAN Hopping<\/li><li>Defend Against MAC Spoofing<\/li><li>Defend Against VLAN Hopping<\/li><li>STP Attacks<\/li><li>Defend Against STP Attacks<\/li><li>DNS Poisoning Techniques<\/li><li>DNS Cache Poisoning<\/li><li>DNS Poisoning Tools<\/li><li>Defend Against DNS Spoofing<\/li><li>Various Sniffing Tools<\/li><li>Sniffing Countermeasures<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-10-7dfe88f2\">\n                        <a href=\"#collapse-561b37769f4670f46e12\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-561b37769f4670f46e12\" aria-expanded=\"false\" aria-controls=\"Collapse-561b37769f4670f46e12\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">Social Engineering<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-561b37769f4670f46e12\" class=\" collapse\" aria-labelledby=\"primaryHeading-10-7dfe88f2\" data-parent=\"#accordion-69f4670f46e12\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>What is Social Engineering?<\/li><li>Phases of a Social Engineering Attack<\/li><li>Types of Social Engineering<\/li><li>Human-based Social Engineering<\/li><li>Computer-based Social Engineering<\/li><li>Mobile-based Social Engineering<\/li><li>Impersonation<\/li><li>Eavesdropping<\/li><li>Shoulder Surfing<\/li><li>Dumpster Diving<\/li><li>Reverse Social Engineering<\/li><li>Piggybacking &amp; Tailgating<\/li><li>Honey Trap<\/li><li>Baiting<\/li><li>Quid Pro Quo<\/li><li>Phishing<\/li><li>Types of Phishing<\/li><li>Phishing Tools<\/li><li>Scareware<\/li><li>Impersonation using AI<\/li><li>Angler Phishing<\/li><li>Catfishing Attack<\/li><li>Identity Theft<\/li><li>Indications of Identity Theft<\/li><li>Publishing Malicious Apps<\/li><li>Repackaging Legitimate Apps<\/li><li>Fake Security Applications<\/li><li>SMiShing<\/li><li>QRLJacking<\/li><li>QR Code Cloning Tools<\/li><li>Social Engineering Countermeasures<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-11-7dfe88f2\">\n                        <a href=\"#collapse-117617269f4670f46e12\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-117617269f4670f46e12\" aria-expanded=\"false\" aria-controls=\"Collapse-117617269f4670f46e12\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">Denial-of-Service<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-117617269f4670f46e12\" class=\" collapse\" aria-labelledby=\"primaryHeading-11-7dfe88f2\" data-parent=\"#accordion-69f4670f46e12\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>DoS Concepts<\/li><li>DDoS Concepts<\/li><li>DoS\/DDoS Attack Techniques<\/li><li>Botnets<\/li><li>DDoS Case Study<\/li><li>DoS\/DDoS Attack Tools<\/li><li>Countermeasures<\/li><li>DoS\/DDoS Protection Tools<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-12-7dfe88f2\">\n                        <a href=\"#collapse-f5c166369f4670f46e12\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-f5c166369f4670f46e12\" aria-expanded=\"false\" aria-controls=\"Collapse-f5c166369f4670f46e12\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">SQL Injection<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-f5c166369f4670f46e12\" class=\" collapse\" aria-labelledby=\"primaryHeading-12-7dfe88f2\" data-parent=\"#accordion-69f4670f46e12\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>SQL Injection Concepts<\/li><li>Types of SQL Injection<\/li><li>SQL Injection Methodology<\/li><li>SQL Injection Tools<\/li><li>Countermeasures<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-13-7dfe88f2\">\n                        <a href=\"#collapse-f9948c969f4670f46e12\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-f9948c969f4670f46e12\" aria-expanded=\"false\" aria-controls=\"Collapse-f9948c969f4670f46e12\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">Cryptography<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-f9948c969f4670f46e12\" class=\" collapse\" aria-labelledby=\"primaryHeading-13-7dfe88f2\" data-parent=\"#accordion-69f4670f46e12\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>Cryptography Concepts<\/li><li>Encryption Algorithms<\/li><li>Cryptography Tools<\/li><li>Public Key Infrastructure (PKI)<\/li><li>Disk Encryption<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-14-7dfe88f2\">\n                        <a href=\"#collapse-89469e669f4670f46e12\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-89469e669f4670f46e12\" aria-expanded=\"false\" aria-controls=\"Collapse-89469e669f4670f46e12\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">SOC Operations and Management<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-89469e669f4670f46e12\" class=\" collapse\" aria-labelledby=\"primaryHeading-14-7dfe88f2\" data-parent=\"#accordion-69f4670f46e12\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>Security management<\/li><li>Security Operations<\/li><li>Security Operations Center (SOC)<\/li><li>Need of SOC<\/li><li>SOC Capabilities<\/li><li>SOC Operations<\/li><li>Components of SOC<\/li><li>Types of SOC Models<\/li><li>SOC Maturity Models<\/li><li>SOC Generations<\/li><li>SOC Implementation<\/li><li>SOC Key Performance Indicators<\/li><li>SOC Metrics<\/li><li>Challenges in Implementation of SOC<\/li><li>Best practices for running SOC<\/li><li>SOC vs NOC<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-15-7dfe88f2\">\n                        <a href=\"#collapse-6e249a369f4670f46e12\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-6e249a369f4670f46e12\" aria-expanded=\"false\" aria-controls=\"Collapse-6e249a369f4670f46e12\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">Cyber Threats, IoCs &amp; Attack Methodology<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-6e249a369f4670f46e12\" class=\" collapse\" aria-labelledby=\"primaryHeading-15-7dfe88f2\" data-parent=\"#accordion-69f4670f46e12\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>Cyber Threats<\/li><li>Cyber Security Attack Vectors<\/li><li>Intent-Motive-Goal<\/li><li>Tactics-Techniques-Procedures (TTPs)<\/li><li>Opportunity-Vulnerability-Weakness<\/li><li>Network Level Attacks<\/li><li>Reconnaissance Attacks<\/li><li>Network Scanning<\/li><li>Port Scanning<\/li><li>DNS Footprinting<\/li><li>Network Sniffing<\/li><li>Man-in-the-Middle Attack<\/li><li>Password Attacks<\/li><li>Privilege Escalation<\/li><li>DNS Poisoning<\/li><li>DNS Cache Poisoning<\/li><li>ARP Poisoning<\/li><li>DHCP Starvation Attacks<\/li><li>DHCP Spoofing Attack<\/li><li>MAC Spoofing<\/li><li>Malware Attacks<\/li><li>Network-based Denial-of-Service Attack (DoS)<\/li><li>Distributed Denial-of-Service Attack (DDoS)<\/li><li>Host Level Attacks<\/li><li>Application-Level Attacks<\/li><li>SQL Injection<\/li><li>Cross-site Scripting (XSS)<\/li><li>Directory Traversal<\/li><li>Cross-site Request Forgery (CSRF)<\/li><li>Indicators of Compromise (loCs)<\/li><li>IoCs of Application Security Threats<\/li><li>IOC Detection Techniques<\/li><li>IoCs of Network Security Threats<\/li><li>Tools for Network IoC Detection<\/li><li>IoCs of Malware Threats<\/li><li>IoCs of Insider Threats<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-16-7dfe88f2\">\n                        <a href=\"#collapse-4590f6369f4670f46e12\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-4590f6369f4670f46e12\" aria-expanded=\"false\" aria-controls=\"Collapse-4590f6369f4670f46e12\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">Incidents, Events, and Logging<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-4590f6369f4670f46e12\" class=\" collapse\" aria-labelledby=\"primaryHeading-16-7dfe88f2\" data-parent=\"#accordion-69f4670f46e12\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>Logs<\/li><li>Events<\/li><li>Incidents<\/li><li>Typical Log Sources<\/li><li>Need of Log<\/li><li>Logging Requirements<\/li><li>Typical Log Format<\/li><li>Logging Approaches<\/li><li>Windows Logs<\/li><li>Windows Event Log Types and Entries<\/li><li>Event Types<\/li><li>Finding Events in Event Viewer<\/li><li>Examining Event Log Entries<\/li><li>Linux Logs<\/li><li>Linux Log Formats<\/li><li>Security Levels &amp; Values of Linux Logs<\/li><li>Monitoring &amp; Analysis of Linux Logs<\/li><li>Mac Logs<\/li><li>Types of logs in Mac<\/li><li>Mac Log Files<\/li><li>Log Formats in Mac system<\/li><li>Monitoring and Analysis of Mac Logs<\/li><li>Firewall Logging\u00a0<\/li><li>Monitoring and Analysis of Firewall Logs<\/li><li>Windows Firewall Logs<\/li><li>Monitoring and Analysis of Windows Firewall Logs<\/li><li>Severity levels of Cisco Logs<\/li><li>IIS Logs<\/li><li>Centralized Logging<\/li><li>Log Analysis Approach<\/li><li>Log Analysis best practices<\/li><li>What is an Alert<\/li><li>\u00a0Log Management Tools<\/li><li>Centralized Logging Challanges<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-17-7dfe88f2\">\n                        <a href=\"#collapse-ca85b8769f4670f46e12\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-ca85b8769f4670f46e12\" aria-expanded=\"false\" aria-controls=\"Collapse-ca85b8769f4670f46e12\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">Incident Detection with SIEM<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-ca85b8769f4670f46e12\" class=\" collapse\" aria-labelledby=\"primaryHeading-17-7dfe88f2\" data-parent=\"#accordion-69f4670f46e12\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>Security Information and Event Management<\/li><li>Security Analysis<\/li><li>Need of SIEM<\/li><li>SIEM Compatibilities<\/li><li>SIEM Architecture<\/li><li>SIEM Components<\/li><li>Types of SIEM Solutions<\/li><li>Splunk Enterprise Security<\/li><li>IBM Security QRadar<\/li><li>Alien Vault Unified Security Management<\/li><li>Additional SIEM Solutions<\/li><li>SIEM Deployment<\/li><li>Challanges in SIEM Deployment<\/li><li>Use Phased Approach<\/li><li>SIEM Scope<\/li><li>SIEM Use Cases<\/li><li>Log Data Requirements<\/li><li>Contextual Data Requirements<\/li><li>Traffic Flow Data requirements<\/li><li>EPS Volume &amp; Hardware<\/li><li>SIEM Deployment Architecture<\/li><li>Deployment Architecture Options<\/li><li>SIEM Threat Detections<\/li><li>Use Case Examples<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-18-7dfe88f2\">\n                        <a href=\"#collapse-5391b4369f4670f46e12\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-5391b4369f4670f46e12\" aria-expanded=\"false\" aria-controls=\"Collapse-5391b4369f4670f46e12\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">Incident Detection with Threat Intelligence<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-5391b4369f4670f46e12\" class=\" collapse\" aria-labelledby=\"primaryHeading-18-7dfe88f2\" data-parent=\"#accordion-69f4670f46e12\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>Cyber Threat Intelligence<\/li><li>Types of Threat Intelligence\u00a0<\/li><li>Threat Intelligence-driven SOC<\/li><li>Benefits of Threat Intelligence to SOC Analyst<\/li><li>\u00a0Threat Intelligence Use Cases for SOC Analyst<\/li><li>Integration of Threat Intelligence into SIEM<\/li><li>Threat Intelligence Use Cases for Enhanced Incidence Responder<\/li><li>Enhancing Incident Response by establishing SOPs<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-19-7dfe88f2\">\n                        <a href=\"#collapse-c6bb88569f4670f46e12\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-c6bb88569f4670f46e12\" aria-expanded=\"false\" aria-controls=\"Collapse-c6bb88569f4670f46e12\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">IncidentResponse<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-c6bb88569f4670f46e12\" class=\" collapse\" aria-labelledby=\"primaryHeading-19-7dfe88f2\" data-parent=\"#accordion-69f4670f46e12\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>Incident Response<\/li><li>SOC and IRT Collaboration<\/li><li>Incident Response Process<\/li><li>Responding to the Network Security Incidents<\/li><li>Responding to Application Security Incidents<\/li><li>Responding to Email Security Incidents<\/li><li>Responding to an Insider Incidents<\/li><li>Responding to Malware Incidents<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                                        <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-81fee5c e-flex e-con-boxed e-con e-parent\" data-id=\"81fee5c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-140c422 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"140c422\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/drive.google.com\/file\/d\/1JbPDUY3STpweUGJxebuTJI24rnsRIcZm\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-download\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M216 0h80c13.3 0 24 10.7 24 24v168h87.7c17.8 0 26.7 21.5 14.1 34.1L269.7 378.3c-7.5 7.5-19.8 7.5-27.3 0L90.1 226.1c-12.6-12.6-3.7-34.1 14.1-34.1H192V24c0-13.3 10.7-24 24-24zm296 376v112c0 13.3-10.7 24-24 24H24c-13.3 0-24-10.7-24-24V376c0-13.3 10.7-24 24-24h146.7l49 49c20.1 20.1 52.5 20.1 72.6 0l49-49H488c13.3 0 24 10.7 24 24zm-124 88c0-11-9-20-20-20s-20 9-20 20 9 20 20 20 20-9 20-20zm64 0c0-11-9-20-20-20s-20 9-20 20 9 20 20 20 20-9 20-20z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download Curriculum<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a1a3035 e-flex e-con-boxed e-con e-parent\" data-id=\"a1a3035\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3498b50c elementor-widget elementor-widget-elementskit-heading\" data-id=\"3498b50c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper center   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Visit our Blog<\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider ekit-dotted\"><div class=\"elementskit-border-divider ekit-dotted\"><\/div><\/div>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>Check out our blog for the latest cybersecurity updates and articles.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-24979d08 e-con-full e-flex e-con e-child\" data-id=\"24979d08\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-75ca216f elementor-widget__width-initial elementor-widget-mobile__width-inherit ekit-equal-height-disable elementor-widget elementor-widget-elementskit-image-box\" data-id=\"75ca216f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n            <div class=\"elementskit-info-image-box ekit-image-box text-left style-sideline\" >\n\n                \n                <div class=\"elementskit-box-header image-box-img-left\">\n\n                    <img decoding=\"async\" width=\"870\" height=\"570\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/2FA.jpg\" class=\"attachment-full size-full wp-image-6145\" alt=\"\" srcset=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/2FA.jpg 870w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/2FA-300x197.jpg 300w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/2FA-768x503.jpg 768w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/2FA-350x229.jpg 350w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/2FA-540x354.jpg 540w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/2FA-763x500.jpg 763w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/2FA-611x400.jpg 611w\" sizes=\"(max-width: 870px) 100vw, 870px\" \/>\n                <\/div>\n                \n                <div class=\"elementskit-box-body ekit-image-box-body\">\n                    <div class=\"elementskit-box-content ekit-image-box-body-inner\">\n                                                <h3 class=\"elementskit-info-box-title\">\n\n                        Two-Factor authentication (2FA): why you should enable it now \u2013 A Comprehensive Overview\n                        \n                    <\/h3>\n                                                        <\/div>\n\n                                <div class=\"elementskit-box-footer\">\n                    <div class=\"box-footer\">\n                        <div class=\"btn-wraper\">\n                                                            <a href=\"\" class=\"elementskit-btn whitespace--normal\">\n                                    \n                                    \n                                    Read More                                <\/a>\n                                                        <\/div>\n                    <\/div>\n                <\/div>\n                            <\/div>\n            <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9f3a0a5 elementor-widget__width-initial elementor-widget-mobile__width-inherit ekit-equal-height-disable elementor-widget elementor-widget-elementskit-image-box\" data-id=\"9f3a0a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n            <div class=\"elementskit-info-image-box ekit-image-box text-left style-sideline\" >\n\n                \n                <div class=\"elementskit-box-header image-box-img-left\">\n\n                    <img decoding=\"async\" width=\"870\" height=\"570\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Information_warfare.jpg\" class=\"attachment-full size-full wp-image-6150\" alt=\"\" srcset=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Information_warfare.jpg 870w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Information_warfare-300x197.jpg 300w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Information_warfare-768x503.jpg 768w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Information_warfare-350x229.jpg 350w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Information_warfare-540x354.jpg 540w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Information_warfare-763x500.jpg 763w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Information_warfare-611x400.jpg 611w\" sizes=\"(max-width: 870px) 100vw, 870px\" \/>\n                <\/div>\n                \n                <div class=\"elementskit-box-body ekit-image-box-body\">\n                    <div class=\"elementskit-box-content ekit-image-box-body-inner\">\n                                                <h3 class=\"elementskit-info-box-title\">\n\n                        Information Warfare: A Comprehensive Overview\n                        \n                    <\/h3>\n                                                        <\/div>\n\n                                <div class=\"elementskit-box-footer\">\n                    <div class=\"box-footer\">\n                        <div class=\"btn-wraper\">\n                                                            <a href=\"https:\/\/digidefense.in\/information-warfare-a-comprehensive-overview\/\" class=\"elementskit-btn whitespace--normal\" target=\"_blank\" rel=\"noopener\">\n                                    \n                                    \n                                    Read More                                <\/a>\n                                                        <\/div>\n                    <\/div>\n                <\/div>\n                            <\/div>\n            <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a76dc7 elementor-widget__width-initial elementor-widget-mobile__width-inherit ekit-equal-height-disable elementor-widget elementor-widget-elementskit-image-box\" data-id=\"7a76dc7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n            <div class=\"elementskit-info-image-box ekit-image-box text-left style-sideline\" >\n\n                \n                <div class=\"elementskit-box-header image-box-img-left\">\n\n                    <img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1154\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Golden-Ticket-Attack.jpg\" class=\"attachment-full size-full wp-image-6149\" alt=\"\" srcset=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Golden-Ticket-Attack.jpg 1920w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Golden-Ticket-Attack-300x180.jpg 300w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Golden-Ticket-Attack-1024x615.jpg 1024w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Golden-Ticket-Attack-768x462.jpg 768w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Golden-Ticket-Attack-1536x923.jpg 1536w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Golden-Ticket-Attack-350x210.jpg 350w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Golden-Ticket-Attack-540x325.jpg 540w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Golden-Ticket-Attack-832x500.jpg 832w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Golden-Ticket-Attack-666x400.jpg 666w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/>\n                <\/div>\n                \n                <div class=\"elementskit-box-body ekit-image-box-body\">\n                    <div class=\"elementskit-box-content ekit-image-box-body-inner\">\n                                                <h3 class=\"elementskit-info-box-title\">\n\n                        Golden Ticket Attack: A Comprehensive Guide to Understand this Attack\n                        \n                    <\/h3>\n                                                        <\/div>\n\n                                <div class=\"elementskit-box-footer\">\n                    <div class=\"box-footer\">\n                        <div class=\"btn-wraper\">\n                                                            <a href=\"https:\/\/digidefense.in\/golden-ticket-attack-a-comprehensive-guide\/\" class=\"elementskit-btn whitespace--normal\" target=\"_blank\" rel=\"noopener\">\n                                    \n                                    \n                                    Read More                                <\/a>\n                                                        <\/div>\n                    <\/div>\n                <\/div>\n                            <\/div>\n            <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-805454a e-flex e-con-boxed e-con e-parent\" data-id=\"805454a\" data-element_type=\"container\" data-e-type=\"container\" id=\"xs_client_3\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a2a09c3 elementor-widget elementor-widget-elementskit-heading\" data-id=\"a2a09c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper center   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Our Students works with<\/h2>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>Our students work with top global companies, leading enterprises, and innovative startups. Their skills and expertise make them valuable assets in every industry.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-48574716 elementor-widget elementor-widget-elementskit-client-logo\" data-id=\"48574716\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-client-logo.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\t\t<div class=\"elementskit-clients-slider  hover_from_bottom banner_logo_image\" data-config=\"{&quot;rtl&quot;:false,&quot;arrows&quot;:false,&quot;dots&quot;:false,&quot;autoplay&quot;:true,&quot;speed&quot;:1000,&quot;slidesPerView&quot;:4,&quot;slidesPerGroup&quot;:1,&quot;pauseOnHover&quot;:true,&quot;loop&quot;:false,&quot;breakpoints&quot;:{&quot;320&quot;:{&quot;slidesPerView&quot;:1,&quot;slidesPerGroup&quot;:1,&quot;spaceBetween&quot;:10},&quot;768&quot;:{&quot;slidesPerView&quot;:2,&quot;slidesPerGroup&quot;:1,&quot;spaceBetween&quot;:-1},&quot;1024&quot;:{&quot;slidesPerView&quot;:4,&quot;slidesPerGroup&quot;:1,&quot;spaceBetween&quot;:-1}},&quot;grid&quot;:{&quot;fill&quot;:&quot;row&quot;,&quot;rows&quot;:3}}\" data-direction=\"hover_from_bottom\">\n\t\t\t<div class=\"ekit-main-swiper swiper\">\n\t\t\t\t<div class=\"swiper-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide \">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"XCube Labs\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/XCubeLabs-logo-Black.png\" class=\"main-image\" alt=\"\" \/><img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/XCubeLabs-logo-white.png\" class=\"hover-image\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide \">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"Cloud4C\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Cloud4C-Logo.png\" class=\"main-image\" alt=\"\" \/><img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Cloud4C-Logo-White-1.png\" class=\"hover-image\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide \">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"Persistant\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Persistent-systems-logo.png\" class=\"main-image\" alt=\"\" \/><img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Persistent-systems-logo-white.png\" class=\"hover-image\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide \">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"Diligent\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Diligient-Logo.png\" class=\"main-image\" alt=\"\" \/><img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Diligient-Logo-white.png\" class=\"hover-image\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide \">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"Wipro\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Wipro-Logo.png\" class=\"main-image\" alt=\"\" \/><img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Wipro-Logo-white.png\" class=\"hover-image\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide \">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"Astreya\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/astreya-logo.png\" class=\"main-image\" alt=\"\" \/><img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/astreya-logo-white.png\" class=\"hover-image\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide \">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"Tericsoft\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Tericsoft-logo.png\" class=\"main-image\" alt=\"\" \/><img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Tericsoft-logo-white.png\" class=\"hover-image\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide \">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"EY\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/EY.png\" class=\"main-image\" alt=\"\" \/><img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/EY-White.png\" class=\"hover-image\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide \">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"Movate\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Movate-Logo.png\" class=\"main-image\" alt=\"\" \/><img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Movate-Logo-white.png\" class=\"hover-image\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide \">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"PurpleTalk\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/PurpleTalk.png\" class=\"main-image\" alt=\"\" \/><img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/PurpleTalk-White.png\" class=\"hover-image\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide \">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"Title #10\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"113\" height=\"48\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Company112-2.svg\" class=\"main-image\" alt=\"\" \/><img loading=\"lazy\" decoding=\"async\" width=\"113\" height=\"48\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Company112-1-1.svg\" class=\"hover-image\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide \">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"Title #10\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"98\" height=\"48\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/client-logo-33-1-1.svg\" class=\"main-image\" alt=\"\" \/><img loading=\"lazy\" decoding=\"async\" width=\"98\" height=\"48\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/client-white-logo-16-1-1.svg\" class=\"hover-image\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div><!-- .elementskit-clients-slider END -->\n\t\t<\/div>\n\t\t<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6813a94a e-flex e-con-boxed e-con e-parent\" data-id=\"6813a94a\" data-element_type=\"container\" data-e-type=\"container\" id=\"xs_accor_box_shadow_round\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b205f57 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-elementskit-heading\" data-id=\"2b205f57\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">FAQ's<\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider ekit-dotted\"><div class=\"elementskit-border-divider ekit-dotted\"><\/div><\/div>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>Most common questions about SOC Analyst Training<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-56f3b8ce elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-elementskit-accordion\" data-id=\"56f3b8ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n        <div class=\"elementskit-accordion accoedion-primary\" id=\"accordion-69f4670f5962c\">\n\n            \n                <div class=\"elementskit-card active\">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-0-56f3b8ce\">\n                        <a href=\"#collapse-bc2283069f4670f5962c\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-bc2283069f4670f5962c\" aria-expanded=\"true\" aria-controls=\"Collapse-bc2283069f4670f5962c\">\n                            \n                            <span class=\"ekit-accordion-title\">Are certifications available upon completion of SOC Analyst Training?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-up-arrow\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-bc2283069f4670f5962c\" class=\" show collapse\" aria-labelledby=\"primaryHeading-0-56f3b8ce\" data-parent=\"#accordion-69f4670f5962c\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>Yes, there are various certifications available for individuals who complete the SOC Analyst Training, such as Certified Ethical Hacker (CEH), CompTIA Security+, Microsoft Certified: Security Operations Analyst Associate (SC-200), and many more. These certifications validate the skills and knowledge acquired during training and enhance credibility in the field of cybersecurity.<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-1-56f3b8ce\">\n                        <a href=\"#collapse-8417e7169f4670f5962c\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-8417e7169f4670f5962c\" aria-expanded=\"false\" aria-controls=\"Collapse-8417e7169f4670f5962c\">\n                            \n                            <span class=\"ekit-accordion-title\">What is the duration of the training program?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-up-arrow\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-8417e7169f4670f5962c\" class=\" collapse\" aria-labelledby=\"primaryHeading-1-56f3b8ce\" data-parent=\"#accordion-69f4670f5962c\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>The training program spans over 30 days, providing comprehensive coverage of Computer Networking, Vulnerability Management, and SOC (Security Operations Center) Analysis.<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-2-56f3b8ce\">\n                        <a href=\"#collapse-3dad4e069f4670f5962c\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-3dad4e069f4670f5962c\" aria-expanded=\"false\" aria-controls=\"Collapse-3dad4e069f4670f5962c\">\n                            \n                            <span class=\"ekit-accordion-title\">Is the training available online, offline, or both?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-up-arrow\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-3dad4e069f4670f5962c\" class=\" collapse\" aria-labelledby=\"primaryHeading-2-56f3b8ce\" data-parent=\"#accordion-69f4670f5962c\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>The training is available in both online and offline modes to cater to the diverse learning preferences and geographical locations of participants. Online training offers flexibility and convenience, while offline training provides hands-on experience in a classroom environment.<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                                        <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-77d1a596 e-flex e-con-boxed e-con e-parent\" data-id=\"77d1a596\" data-element_type=\"container\" data-e-type=\"container\" id=\"xs_testi_7\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6683bc30 elementor-widget elementor-widget-elementskit-heading\" data-id=\"6683bc30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_center   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">What Our Learners Say<\/h2>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>Read their success stories and discover why our training is trusted by aspiring professionals worldwide.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-35553b85 e-con-full e-flex e-con e-child\" data-id=\"35553b85\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d5a6fb0 elementor-widget elementor-widget-elementskit-testimonial\" data-id=\"d5a6fb0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-testimonial.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"elementskit-testimonial-slider ekit-testimonia-style-4 arrow_inside slider-dotted\" data-config=\"{&quot;rtl&quot;:false,&quot;arrows&quot;:false,&quot;dots&quot;:true,&quot;pauseOnHover&quot;:true,&quot;autoplay&quot;:true,&quot;speed&quot;:1000,&quot;slidesPerGroup&quot;:1,&quot;slidesPerView&quot;:3,&quot;loop&quot;:true,&quot;spaceBetween&quot;:15,&quot;breakpoints&quot;:{&quot;320&quot;:{&quot;slidesPerView&quot;:&quot;1&quot;,&quot;slidesPerGroup&quot;:&quot;1&quot;,&quot;spaceBetween&quot;:10},&quot;768&quot;:{&quot;slidesPerView&quot;:&quot;2&quot;,&quot;slidesPerGroup&quot;:&quot;1&quot;,&quot;spaceBetween&quot;:10},&quot;1024&quot;:{&quot;slidesPerView&quot;:&quot;3&quot;,&quot;slidesPerGroup&quot;:1,&quot;spaceBetween&quot;:15}}}\">\n\t<div class=\"ekit-main-swiper swiper\">\n\t\t<div class=\"swiper-wrapper\">\n\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t<div class=\"elementskit-single-testimonial-slider elementskit-testimonial-slider-block-style  elementor-repeater-item-42f3647\" >\n\t\t\t\t\t\t\t<div class=\"elementskit-commentor-bio \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-commentor-image ekit-testimonial--avatar\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/05\/47.png\" class=\"attachment-full size-full\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementskit-profile-info\">\n\t\t\t\t\t\t\t\t\t<strong class=\"elementskit-author-name\">Bhairisetti Yaswant kumar<\/strong>\n\t\t\t\t\t\t\t\t\t<span class=\"elementskit-author-des\">Network Administrator<\/span>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementskit-commentor-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<span class=\"elementskit-watermark-icon ekit_watermark_icon_custom_position\">\n\t\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-quote\"><\/i>\t\t\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>I recently completed my CCNA Course at GradeSpot IT Solutions and it was an amazing experience! The trainers were highly knowledgeable and made even the toughest concepts easy to understand. The hands-on labs and real-world examples helped me gain confidence in networking.\nIf you\u2019re looking for professional and effective IT training, GradeSpot IT Solutions is the place<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<ul class=\"elementskit-stars\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div><!-- .commentor-content END -->\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t<div class=\"elementskit-single-testimonial-slider elementskit-testimonial-slider-block-style  elementor-repeater-item-6d313e8\" >\n\t\t\t\t\t\t\t<div class=\"elementskit-commentor-bio \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-commentor-image ekit-testimonial--avatar\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/05\/10.png\" class=\"attachment-full size-full\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementskit-profile-info\">\n\t\t\t\t\t\t\t\t\t<strong class=\"elementskit-author-name\">Naveen Bhaskari<\/strong>\n\t\t\t\t\t\t\t\t\t<span class=\"elementskit-author-des\">SOC Analyst  <\/span>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementskit-commentor-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<span class=\"elementskit-watermark-icon ekit_watermark_icon_custom_position\">\n\t\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-quote\"><\/i>\t\t\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>A big thanks to GradeSpot IT Solutions for their excellent SOC Analysis training! The practical approach and supportive trainers made all the difference. Their guidance helped me land a job at Wipro as a SOC Analyst. I Highly recommend GradeSpot to anyone looking to advance their Cybersecurity career!<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<ul class=\"elementskit-stars\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div><!-- .commentor-content END -->\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t<div class=\"elementskit-single-testimonial-slider elementskit-testimonial-slider-block-style  elementor-repeater-item-163e2ae\" >\n\t\t\t\t\t\t\t<div class=\"elementskit-commentor-bio \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-commentor-image ekit-testimonial--avatar\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/05\/67.png\" class=\"attachment-full size-full\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementskit-profile-info\">\n\t\t\t\t\t\t\t\t\t<strong class=\"elementskit-author-name\">Riyaz Basha Shaik<\/strong>\n\t\t\t\t\t\t\t\t\t<span class=\"elementskit-author-des\">-<\/span>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementskit-commentor-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<span class=\"elementskit-watermark-icon ekit_watermark_icon_custom_position\">\n\t\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-quote\"><\/i>\t\t\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>recently completed the Cyber Security Professional course at GradeSpot IT Solutions and had a great experience. The trainers are knowledgeable, and the teaching is very hands-on, which made it easy to understand even complex topics<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<ul class=\"elementskit-stars\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div><!-- .commentor-content END -->\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t<div class=\"elementskit-single-testimonial-slider elementskit-testimonial-slider-block-style  elementor-repeater-item-3d3cce3\" >\n\t\t\t\t\t\t\t<div class=\"elementskit-commentor-bio \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-commentor-image ekit-testimonial--avatar\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/05\/14.png\" class=\"attachment-full size-full\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementskit-profile-info\">\n\t\t\t\t\t\t\t\t\t<strong class=\"elementskit-author-name\">Kruthi Krishna Dwaraka<\/strong>\n\t\t\t\t\t\t\t\t\t<span class=\"elementskit-author-des\">-<\/span>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementskit-commentor-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<span class=\"elementskit-watermark-icon ekit_watermark_icon_custom_position\">\n\t\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-quote\"><\/i>\t\t\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>Learning Cloud in Gradespot IT solutions added so much value to my existing expertise and I am thankful to the tutors of Gradespot who helped me to clear my cloud certifications with their extensive training. I would really suggest Gradespot to the people who want to improve their Technical Skills and start their career in IT.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<ul class=\"elementskit-stars\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div><!-- .commentor-content END -->\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t<div class=\"elementskit-single-testimonial-slider elementskit-testimonial-slider-block-style  elementor-repeater-item-f7e3f40\" >\n\t\t\t\t\t\t\t<div class=\"elementskit-commentor-bio \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-commentor-image ekit-testimonial--avatar\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/05\/63.png\" class=\"attachment-full size-full\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementskit-profile-info\">\n\t\t\t\t\t\t\t\t\t<strong class=\"elementskit-author-name\">Shiva Gottam<\/strong>\n\t\t\t\t\t\t\t\t\t<span class=\"elementskit-author-des\">-<\/span>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementskit-commentor-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<span class=\"elementskit-watermark-icon ekit_watermark_icon_custom_position\">\n\t\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-quote\"><\/i>\t\t\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>I have take the Azure Administrator training from GradeSpot IT Solutions recently, after the training I have cleared my AZ-104 exam successfully. The training was practical with real time examples, and the certification preparation was also completed at the time of training. Thanks to Nikhil Sir and to the whole team of GSIT for such a good training<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<ul class=\"elementskit-stars\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div><!-- .commentor-content END -->\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t<div class=\"elementskit-single-testimonial-slider elementskit-testimonial-slider-block-style  elementor-repeater-item-58837e7\" >\n\t\t\t\t\t\t\t<div class=\"elementskit-commentor-bio \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-commentor-image ekit-testimonial--avatar\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/05\/60.png\" class=\"attachment-full size-full\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementskit-profile-info\">\n\t\t\t\t\t\t\t\t\t<strong class=\"elementskit-author-name\">Stanes Lovelene Bittari<\/strong>\n\t\t\t\t\t\t\t\t\t<span class=\"elementskit-author-des\">-<\/span>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementskit-commentor-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<span class=\"elementskit-watermark-icon ekit_watermark_icon_custom_position\">\n\t\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-quote\"><\/i>\t\t\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>A place where one can learn a technical course with a beautiful environment. It's not an exaggeration but I recommend people to learn things here. A friendly environment for a student. The best thing is that the trainer, supporting staff is the best.\n\nI've completed my CISCO CCNA 200-301 &amp; AZURE AZ-900 here. They provide good assistance in certification exams also.\n\nI would easily and happily recommend this institute.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<ul class=\"elementskit-stars\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div><!-- .commentor-content END -->\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t<div class=\"elementskit-single-testimonial-slider elementskit-testimonial-slider-block-style  elementor-repeater-item-336b500\" >\n\t\t\t\t\t\t\t<div class=\"elementskit-commentor-bio \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-commentor-image ekit-testimonial--avatar\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/05\/9.png\" class=\"attachment-full size-full\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementskit-profile-info\">\n\t\t\t\t\t\t\t\t\t<strong class=\"elementskit-author-name\">Rohith Kumar<\/strong>\n\t\t\t\t\t\t\t\t\t<span class=\"elementskit-author-des\">-<\/span>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementskit-commentor-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<span class=\"elementskit-watermark-icon ekit_watermark_icon_custom_position\">\n\t\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-quote\"><\/i>\t\t\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>I am incredibly grateful for the guidance provided by GradeSpot IT Solutions Private Limited. Thanks to their expert instruction and support, I was able to learn AWS Cloud and achieve my AWS Solutions Architect certification. Their comprehensive curriculum and dedicated trainers made all the difference in my learning journey. Highly recommended!<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<ul class=\"elementskit-stars\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div><!-- .commentor-content END -->\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\n\t\t\t<\/div>\n<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>SOC Analyst Practical SOC Analyst Training Master SOC Analyst Skills \u2013 Start Your Cybersecurity Career Today! Become a certified SOC Analyst with our hands-on training. Learn threat detection, incident response, SIEM tools, and more. Enroll today! Contact Us Registration Form Complete your registration by filling out the form. Select an OptionCourse TrainingCertification VoucherOther Queries Submit [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/home1.php","meta":{"_eb_attr":"","footnotes":""},"class_list":["post-5997","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/gsitssolutions.com\/index.php\/wp-json\/wp\/v2\/pages\/5997","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gsitssolutions.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/gsitssolutions.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/gsitssolutions.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/gsitssolutions.com\/index.php\/wp-json\/wp\/v2\/comments?post=5997"}],"version-history":[{"count":391,"href":"https:\/\/gsitssolutions.com\/index.php\/wp-json\/wp\/v2\/pages\/5997\/revisions"}],"predecessor-version":[{"id":6625,"href":"https:\/\/gsitssolutions.com\/index.php\/wp-json\/wp\/v2\/pages\/5997\/revisions\/6625"}],"wp:attachment":[{"href":"https:\/\/gsitssolutions.com\/index.php\/wp-json\/wp\/v2\/media?parent=5997"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}