{"id":7819,"date":"2025-11-16T08:11:49","date_gmt":"2025-11-16T08:11:49","guid":{"rendered":"https:\/\/gsitssolutions.com\/?page_id=7819"},"modified":"2025-11-16T08:11:49","modified_gmt":"2025-11-16T08:11:49","slug":"web-application-penetration-testing-gradespot-it-solutions","status":"publish","type":"page","link":"https:\/\/gsitssolutions.com\/index.php\/web-application-penetration-testing-gradespot-it-solutions\/","title":{"rendered":"Web Application Penetration Testing"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"7819\" class=\"elementor elementor-7819\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-16fc401 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"16fc401\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7b20977\" data-id=\"7b20977\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-aebf998 elementor-widget elementor-widget-hero3\" data-id=\"aebf998\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hero3.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <!-- Start Banner \n    ============================================= -->\n    <div class=\"banner-area home2-banner-fix shadow heading-border dark bg-cover text-light\" style=\"background-image: url(https:\/\/gsitssolutions.com\/wp-content\/uploads\/2024\/04\/Ethical-Hacking-Training.jpg\">\n        <div class=\"item-box\">\n            <div class=\"item\">\n                <div class=\"container\">\n                    <div class=\"row align-center\">\n                                        \n                        <div class=\"col-lg-6\">\n                            <div class=\"content\">\n                                <h4 class=\"wow fadeInUp\">CEH V13 <\/h4>\n                                <h2 class=\"wow fadeInDown\">Practical <strong>Ethical Hacking Training<\/strong><\/h2>\n                                <p class=\"wow fadeInLeft\">\n                                    Master Ethical Hacking Skills \u2013 Start Your Cybersecurity Career Today!\nBecome a certified Ethical Hacker with our hands-on training. Learn Hacking Concepts, System Hacking, Malware Analysis, and many more.                                <\/p>\n\n                                                                <a class=\"btn btn-light effect btn-md wow fadeInUp\" href=\"https:\/\/gsitssolutions.com\/index.php\/contact-us-gradespot-it-solutions\/\">Contact Us<\/a>\n                                                                \n                                \n                            <\/div>\n                        <\/div>\n                        <!-- Start Appoinment Form -->\n                        <div class=\"col-lg-5 offset-lg-1 appoinment\">\n                            <div class=\"appoinment-box text-center\">\n                                <div class=\"heading\">\n                                    <h4>Registration Form<\/h4>\n                                    <p>\n                                        Complete your registration by filling out the form.                                    <\/p>\n                                <\/div>\n                        \n<div class=\"wpcf7 no-js\" id=\"wpcf7-f639-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"639\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/index.php\/wp-json\/wp\/v2\/pages\/7819#wpcf7-f639-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"639\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.4\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f639-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_extcf7_conditional_options\" value=\"{&quot;form_id&quot;:639,&quot;conditions&quot;:[]}\" \/><input type=\"hidden\" name=\"_extcf7_redirect_options\" value=\"{&quot;form_id&quot;:639,&quot;redirect_options&quot;:{&quot;redirection_enable&quot;:&quot;off&quot;,&quot;custom_url_enable&quot;:&quot;off&quot;,&quot;redirect_page&quot;:&quot;&quot;,&quot;custom_urle&quot;:&quot;&quot;,&quot;redirect_new_tab&quot;:&quot;off&quot;,&quot;js_action&quot;:&quot;off&quot;,&quot;javascript_code&quot;:&quot;&quot;}}\" \/>\n<\/fieldset>\n<div class=\"row\">\n\t<div class=\"col-lg-12\">\n\t\t<div class=\"form-group\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required form-control\" id=\"name\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Name\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span>\n\t\t\t<\/p>\n\t\t<\/div>\n\t<\/div>\n\t<div class=\"col-lg-12\">\n\t\t<div class=\"form-group\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email form-control\" id=\"email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Email*\" value=\"\" type=\"email\" name=\"email\" \/><\/span>\n\t\t\t<\/p>\n\t\t<\/div>\n\t<\/div>\n\t<div class=\"col-lg-12\">\n\t\t<div class=\"form-group\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"tel-36\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Mobile\" value=\"\" type=\"tel\" name=\"tel-36\" \/><\/span>\n\t\t\t<\/p>\n\t\t<\/div>\n\t<\/div>\n\t<div class=\"col-lg-12\">\n\t\t<div class=\"form-group\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"select\"><select class=\"wpcf7-form-control wpcf7-select form-group\" aria-invalid=\"false\" name=\"select\"><option value=\"Select an Option\">Select an Option<\/option><option value=\"Course Training\">Course Training<\/option><option value=\"Certification Voucher\">Certification Voucher<\/option><option value=\"Other Queries\">Other Queries<\/option><\/select><\/span>\n\t\t\t<\/p>\n\t\t<\/div>\n\t<\/div>\n\t<p><button type=\"submit\" name=\"submit\" id=\"submit\">Submit Query<\/button>\n\t<\/p>\n<\/div>\n<div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n                    <\/div>\n                        <\/div>\n                        <!-- End Appoinment Form -->\n\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n    <!-- End Banner -->\n\n\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-9d64aa9 e-flex e-con-boxed e-con e-parent\" data-id=\"9d64aa9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-12710e8 animated-slow elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"12710e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInLeft&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">SOC<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21e8875 animated-slow elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"21e8875\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInRight&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Certified Ethical Hacking Training<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-afd8fd3 animated-slow elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"afd8fd3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInLeft&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Kickstart your cybersecurity career with our hands-on Certified Ethical Hacker training designed to make you job-ready. Learn ethical hacking, penetration testing, vulnerability assessment, and real-world cybersecurity techniques from industry experts. Gain practical experience with live labs, case studies, and guided exercises to ethically hack systems and defend against cyber threats.<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-92143d4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"92143d4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-44493a7\" data-id=\"44493a7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3a9037d elementor-widget elementor-widget-choose\" data-id=\"3a9037d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"choose.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <!-- Start Features \n    ============================================= -->\n    <div class=\"features-area overflow-hidden bg-gray default-padding\">\n        <!-- Fixed Shpae  -->\n        <div class=\"fixed-shape shape left bottom\">\n            <img decoding=\"async\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2022\/01\/3-1.png\" alt=\"Shape\">\n        <\/div>\n        <!-- End Fixed Shpae  -->\n        <div class=\"container\">\n            <div class=\"row align-center\">\n                <div class=\"col-lg-5 why-us\">\n                    <h5>CEH<\/h5>\n                    <h2>CEH V13 Training<\/h2>\n                    <p>\n                        Elevate your cybersecurity career with our Certified Ethical Hacker (CEH) Training\u2014your gateway to mastering the art of ethical hacking and penetration testing. Designed for aspiring ethical hackers and IT security enthusiasts, this program offers hands-on training to help you identify vulnerabilities, exploit weaknesses ethically, and strengthen cybersecurity defenses. Gain practical skills and industry-relevant knowledge to excel in cybersecurity roles worldwide.\n\nIf you&#039;re looking for CEH training in Hyderabad, this course is your ideal choice to unlock new career opportunities and thrive in the dynamic field of ethical hacking and cybersecurity.                    <\/p>\n                                        <a class=\"popup-youtube relative theme video-play-button\" href=\"#\">\n                        <i class=\"fa fa-play\"><\/i> <span>Video Showcase<\/span>\n                    <\/a>\n                                <\/div>\n                <div class=\"col-lg-7 features-box text-center\">\n                    <div class=\"row\">\n                        \n                        <!-- Item Grid -->\n                        <div class=\"col-lg-6 col-md-6 item-grid\">\n                            <!-- Single Item -->\n                            <div class=\"item\">\n                                <i class=\"fal fa-chalkboard-teacher\"><\/i>\n                                <h5><a href=\"#\">Live Classes<\/a><\/h5>\n                                <p>\n                                     Empower your learning journey with our engaging live classes.                                <\/p>\n                            <\/div>\n                            <!-- End Single Item -->\n                            <!-- Single Item -->\n                            <div class=\"item\">\n                                <i class=\"fal fa-video\"><\/i>\n                                <h5><a href=\"#\">Recorded Videos<\/a><\/h5>\n                                <p>\n                                     Unlock a wealth of knowledge with our extensive collection of recorded videos.                                <\/p>\n                            <\/div>\n                            <!-- End Single Item -->\n                        <\/div>\n                        <!-- End Item Grid -->\n\n                        \n                        <!-- Item Grid -->\n                        <div class=\"col-lg-6 col-md-6 item-grid\">\n                            <!-- Single Item -->\n                            <div class=\"item\">\n                                <i class=\"fal fa-certificate\"><\/i>\n                                <h5><a href=\"#\">EC-Council&#039;s C|EHv13  Certification<\/a><\/h5>\n                                <p>\n                                     Get a Complementary EC-Council&#039;s C|EH V13 Exam Voucher and elevate your skills for success.                                <\/p>\n                            <\/div>\n                            <!-- End Single Item -->\n                            <!-- Single Item -->\n                            <div class=\"item\">\n                                <i class=\"fal fa-hands-helping\"><\/i>\n                                <h5><a href=\"#\">Hands-On Practicals<\/a><\/h5>\n                                <p>\n                                     Immerse yourself in practical learning with our hands-on training sessions.                                <\/p>\n                            <\/div>\n                            <!-- End Single Item -->\n                        <\/div>\n                        <!-- End Item Grid -->\n\n                        \n                    <\/div>\n                <\/div>\n                \n            <\/div>\n        <\/div>\n    <\/div>\n    <!-- End Features Area -->\n       \n\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-97d30f5 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"97d30f5\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8408dd4\" data-id=\"8408dd4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ca1f0bb elementor-widget elementor-widget-counter\" data-id=\"ca1f0bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <!-- Start Fun Factor Area\n    ============================================= -->\n    <div class=\"fun-factor-area overflow-hidden\">\n        <div class=\"container\">\n            <div class=\"fun-fact-items default-padding\">\n                <div class=\"row\">\n\n         \n        <div class=\"col-lg-3 col-md-6 item\">\n        <div class=\"fun-fact\">\n            <div class=\"icon\">\n                 <i class=\"fal fa-medal\"><\/i>\n             <\/div>\n             <div class=\"info\">\n                <div class=\"timer\" data-to=\"1500\" data-speed=\"5000\">1500<\/div>\n                <span class=\"medium\">Certified Learners<\/span>\n             <\/div>\n        <\/div>\n    <\/div>\n\n    \n        <div class=\"col-lg-3 col-md-6 item\">\n        <div class=\"fun-fact\">\n            <div class=\"icon\">\n                 <i class=\"fal fa-user-graduate\"><\/i>\n             <\/div>\n             <div class=\"info\">\n                <div class=\"timer\" data-to=\"1500\" data-speed=\"5000\">1500<\/div>\n                <span class=\"medium\">Students Enrolled<\/span>\n             <\/div>\n        <\/div>\n    <\/div>\n\n    \n        <div class=\"col-lg-3 col-md-6 item\">\n        <div class=\"fun-fact\">\n            <div class=\"icon\">\n                 <i class=\"fal fa-users\"><\/i>\n             <\/div>\n             <div class=\"info\">\n                <div class=\"timer\" data-to=\"250\" data-speed=\"5000\">250<\/div>\n                <span class=\"medium\">Interns<\/span>\n             <\/div>\n        <\/div>\n    <\/div>\n\n    \n        <div class=\"col-lg-3 col-md-6 item\">\n        <div class=\"fun-fact\">\n            <div class=\"icon\">\n                 <i class=\"fab fa-wordpress-simple\"><\/i>\n             <\/div>\n             <div class=\"info\">\n                <div class=\"timer\" data-to=\"12\" data-speed=\"5000\">12<\/div>\n                <span class=\"medium\">Web Projects<\/span>\n             <\/div>\n        <\/div>\n    <\/div>\n\n    \n    <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n    <!-- End Fun Factor Area -->\n\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-257976f7 e-flex e-con-boxed e-con e-parent\" data-id=\"257976f7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4e97eaf8 elementor-widget elementor-widget-elementskit-heading\" data-id=\"4e97eaf8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_center   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Course Overview - <span>CEH V13 Training<\/span><\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider elementskit-style-long\"><div class=\"elementskit-border-divider elementskit-style-long\"><\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6345c178 e-con-full e-flex e-con e-child\" data-id=\"6345c178\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-70d5f7a1 elementor-widget elementor-widget-elementskit-drop-caps\" data-id=\"70d5f7a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-drop-caps.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\t\t<div class=\"ekit-dropcap-wraper\">\n\t\t\t\t\t\t<p class=\"ekit-dropcap-cotnent\">In today\u2019s digital world, cyber threats are growing faster than ever. Organizations are constantly looking for skilled ethical hackers who can defend their systems from malicious attacks. GradeSpot IT Solutions brings you the industry-recognized Certified Ethical Hacker (CEH) Training, designed to turn beginners into cybersecurity experts.\n<\/br>\n<\/br>\n<\/br>\nOur comprehensive CEH course helps you master ethical hacking, penetration testing, vulnerability assessments, and the latest hacking techniques. Learn how to think and act like a hacker \u2014 but with a purpose: to secure systems, networks, and data from cyber threats.\n\n<\/br>\n<\/br>\nOur CEH training program is carefully crafted for students, working professionals, and cybersecurity enthusiasts who aim to build a solid foundation in ethical hacking and offensive security. This course covers the most advanced tools, methodologies, and techniques used by hackers \u2014 and how to counter them.\n\n<\/p>\n\t\t\t\t\t<\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-07b0946 e-flex e-con-boxed e-con e-parent\" data-id=\"07b0946\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2c7683e elementor-widget elementor-widget-elementskit-heading\" data-id=\"2c7683e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_center   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Key Learning - <span>Objectives<\/span><\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider elementskit-style-long\"><div class=\"elementskit-border-divider elementskit-style-long\"><\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f3bf67b e-con-full e-flex e-con e-child\" data-id=\"f3bf67b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-88762aa elementor-widget elementor-widget-elementskit-drop-caps\" data-id=\"88762aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-drop-caps.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\t\t<div class=\"ekit-dropcap-wraper\">\n\t\t\t\t\t\t<p class=\"ekit-dropcap-cotnent\">By the end of this 45-day SOC Analyst Training, you will have mastered the essential skills required to excel in a Ethical Hacking. This program focuses on practical, hands-on learning to ensure you can confidently detect, analyze, and respond to cyber threats in real-world environments.\n\n<\/br><\/br>\n<b>Understanding Cybersecurity Fundamentals<\/b>\n<\/br>Gain a solid understanding of cybersecurity principles, terminology, and best practices to establish a strong foundation for your journey into ethical hacking.\n\n\n\n\n<\/br><\/br>\n<b>Exploring Ethical Hacking Techniques<\/b>\n<\/br>\nDive into the methodologies and tools used by ethical hackers to identify vulnerabilities, exploit weaknesses, and assess the security posture of systems and networks.\n<\/br><\/br>\n\n\n\n<b>Hands-On Practice<\/b>\n<\/br>\nDevelop practical skills through hands-on labs and real-world simulations, allowing you to apply ethical hacking techniques in a controlled environment and gain valuable experience.\n<\/br><\/br>\n\n\n\n<b>Risk Assessment and Management<\/b><\/br>\nLearn how to conduct comprehensive risk assessments, prioritize security threats, and develop risk mitigation strategies to protect digital assets effectively.\n<\/br><\/br>\n\n\n\n<b>Ethical and Legal Considerations<\/b><\/br>\nUnderstand the ethical and legal implications of ethical hacking, including adherence to industry standards, regulations, and guidelines governing cybersecurity practices.\n<\/br><\/br>\n\n\n\n<b>Penetration Testing<\/b>\n<\/br>Explore the intricacies of penetration testing, including planning, execution, and reporting, to uncover vulnerabilities and weaknesses in systems and networks before malicious attackers do.\n<\/br><\/br>\n\n\n<b>Defensive Strategies<\/b><\/br>\nLearn how to implement defensive strategies and security controls to strengthen digital defences, mitigate security risks, and protect against cyber threats effectively.\n<\/br><\/br>\n\n<\/p>\n\t\t\t\t\t<\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bd3ba26 e-flex e-con-boxed e-con e-parent\" data-id=\"bd3ba26\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-edccff4 elementor-widget elementor-widget-elementskit-heading\" data-id=\"edccff4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_center   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Program - <span>Features<\/span><\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider elementskit-style-long\"><div class=\"elementskit-border-divider elementskit-style-long\"><\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7a89925 e-con-full e-flex e-con e-child\" data-id=\"7a89925\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-89c8ae3 elementor-widget elementor-widget-elementskit-drop-caps\" data-id=\"89c8ae3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-drop-caps.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\t\t<div class=\"ekit-dropcap-wraper\">\n\t\t\t\t\t\t<p class=\"ekit-dropcap-cotnent\">Our 45-day Ethical Hacking Training is designed to provide a comprehensive, hands-on learning experience that prepares you for real-world cybersecurity challenges. From Attack Methodologies mastery to sophisticated  attacks, this program equips you with the essential skills needed to succeed as an Ethical Hacker.\n\n<\/br><\/br>\n\n\n<b>Expert-Led Training<\/B><\/br>\nLearn from experienced cybersecurity professionals who bring real-world insights and expertise to the classroom, guiding you through the complexities of ethical hacking.\n<\/br><\/br>\n\n\n<b>Certification Preparation<\/b><\/br>\nPrepare for industry-recognized certifications, such as Certified Ethical Hacker (CEH), CompTIA Security+, or Offensive Security Certified Professional (OSCP), validating your skills and enhancing your credibility in the cybersecurity field.\n<\/br><\/br>\n\n\n<b>Flexible Learning Options<\/b><\/br>\nChoose from a variety of learning formats, including in-person classes, online modules, and blended learning approaches, to accommodate your schedule and learning preferences.\n<\/br>\n<\/br>\n\n\n<b>Career Guidance<\/b>\n<\/br>\nReceive career guidance and support from our team of experts, including resume building, interview preparation, and job placement assistance, to help you pursue rewarding opportunities in cybersecurity.\n\n<\/br><\/br>\n\n<b>Networking Opportunities<\/b><\/br>\nConnect with fellow cybersecurity enthusiasts, industry professionals, and potential employers through networking events, workshops, and online forums, expanding your professional network and enhancing your career prospects.<\/p>\n\t\t\t\t\t<\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d8c00cb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d8c00cb\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8ab3f8b\" data-id=\"8ab3f8b\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8f7049b animated-slow elementor-widget elementor-widget-text-editor\" data-id=\"8f7049b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><h2><strong>Enrol in Our Practical Ethical Hacking Training Today!<\/strong><\/h2><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83f7030 elementor-widget__width-initial animated-slow elementor-widget elementor-widget-text-editor\" data-id=\"83f7030\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Upon completing this course, you will gain comprehensive knowledge and hands-on expertise in Ethical Hacking, Penetration Testing, and Cybersecurity. This program equips you with the skills required to launch a successful career in the fast-growing field of ethical hacking and cybersecurity.<\/li><li>\u00a0<\/li><li>Enrol in our Practical Certified Ethical Hacker (CEH) Training Program and take a crucial step toward a rewarding and future-proof career in cybersecurity.<\/li><li>\u00a0<\/li><li>Whether your goal is to ethically hack systems, uncover and fix vulnerabilities, strengthen organizational cyber defenses, or accelerate your professional growth, this program empowers you with the practical skills, industry-relevant insights, and expert guidance needed to thrive in today\u2019s dynamic cybersecurity landscape.<\/li><li>\u00a0<\/li><li>Get certified. Get skilled. Get hired. Start your journey as a Certified Ethical Hacker today!<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-694d4ec elementor-section-content-top elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"694d4ec\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a1e87c5\" data-id=\"a1e87c5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a038acd animated-slow elementor-widget elementor-widget-heading\" data-id=\"a038acd\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why CHoose GradeSpot IT Solutions for CEH Training?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd95320 animated-slow elementor-widget elementor-widget-text-editor\" data-id=\"cd95320\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>100% Practical-Oriented Learning<\/li><li>Live Ethical Hacking Labs<\/li><li>Learn from Certified Cybersecurity Experts<\/li><li>Industry-Recognized CEH Certification Preparation<\/li><li>Real-World Hacking Scenarios<\/li><li>Placement Assistance with MNCs and Cybersecurity Firms<\/li><li>Flexible Batches \u2013 Online &amp; Offline<\/li><li>Affordable Fees with EMI Options<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-82364d7 elementor-section-content-top elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"82364d7\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1fe832b\" data-id=\"1fe832b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e0a09a animated-slow elementor-widget elementor-widget-heading\" data-id=\"4e0a09a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Common Job Roles for Ethical Hacking<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d3c1830 animated-slow elementor-widget elementor-widget-text-editor\" data-id=\"d3c1830\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Ethical Hacker\/Penetration Tester<\/li><li>Cybersecurity Auditor<\/li><li>Security Administrator<\/li><li>Junior Information Security Auditor<\/li><li>IT Security Administrator<\/li><li>Cyber Defense Analyst<\/li><li>Vulnerability Assessment Analyst<\/li><li>Information Security Analyst<\/li><li>Security Analyst<\/li><li>Cybersecurity Analyst L1-3<\/li><li>Security Trainer\/Instructor<\/li><li>Network Security Engineer<\/li><li>Security Manager<\/li><li>Security Consultant<\/li><li>Security Operations Center Analyst<\/li><li>Cybersecurity Consultant<\/li><li>\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-xyz4e9v elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"xyz4e9v\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-27a2e6f animated-slow\" data-id=\"27a2e6f\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2d03d06 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"2d03d06\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"544\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/EC-CouncilCSA-768x544.png\" class=\"attachment-medium_large size-medium_large wp-image-6184\" alt=\"SOC Analyst Training in Hyderabad - GradeSpot IT Solutions\" srcset=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/EC-CouncilCSA-768x544.png 768w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/EC-CouncilCSA-300x212.png 300w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/EC-CouncilCSA-350x248.png 350w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/EC-CouncilCSA-540x382.png 540w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/EC-CouncilCSA-706x500.png 706w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/EC-CouncilCSA-565x400.png 565w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/EC-CouncilCSA.png 828w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-fc55efe animated-slow\" data-id=\"fc55efe\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f07ba44 elementor-widget elementor-widget-heading\" data-id=\"f07ba44\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Get a Free EC-Council C|SA Certification Exam!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a336775 elementor-widget elementor-widget-text-editor\" data-id=\"a336775\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Enroll in our training program and take advantage of an exclusive opportunity to receive a <strong data-start=\"173\" data-end=\"235\" data-is-only-node=\"\">complimentary EC-Council Certified Ethical Hacker (C|EH) exam<\/strong> at no additional cost. Elevate your cybersecurity career with industry-recognized certification and gain the skills needed to excel as an Ethical Hacker. Don&#8217;t miss this chance to validate your expertise for free!<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e704196 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"e704196\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/gsitssolutions.com\/index.php\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Enroll Now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-155e911 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"155e911\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a4fedf3\" data-id=\"a4fedf3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8be25c7 elementor-widget elementor-widget-work_about\" data-id=\"8be25c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"work_about.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n        <!-- Start Works About \n    ============================================= -->\n    <div class=\"works-about-area overflow-hidden\">\n        <div class=\"container\">\n            <div class=\"works-about-items default-padding\">\n                <div class=\"row align-center\">\n                    <div class=\"col-lg-6 info\">\n                        <h5>CEH v13<\/h5>\n                        <h2>Skills To Measure In <br>Ethical Hacking Training<\/h2>\n                        <p>\n                             Earn an industry-recognized CEH certification through our comprehensive Certified Ethical Hacking Training program, validating your expertise and unlocking exciting career opportunities in cybersecurity. \n\nDive deep into the world of ethical hacking as you master advanced techniques to identify vulnerabilities, ethically exploit systems, and strengthen defenses against cyber threats. This program equips you with the skills used by professional ethical hackers to think like an attacker and defend like an expert.\n\nWhether your goal is to launch a career in ethical hacking, advance your cybersecurity expertise, or contribute to protecting organizations from sophisticated attacks, our hands-on training offers real-world labs, practical experience, and expert guidance to help you succeed in the rapidly evolving field of cybersecurity.<\/p>\n                        <ul>\n                                                        <li>\n                                <h5>Computer Networking<\/h5>\n                            <\/li>\n                                                        <li>\n                                <h5>Vulnerability Analysis<\/h5>\n                            <\/li>\n                                                        <li>\n                                <h5>Malware Analysis<\/h5>\n                            <\/li>\n                                                        <li>\n                                <h5>Social Engineering<\/h5>\n                            <\/li>\n                                                        <li>\n                                <h5>VAPT &amp; WAPT<\/h5>\n                            <\/li>\n                                                    <\/ul>\n                                                <a href=\"https:\/\/gsitssolutions.com\/index.php\/contact-us\/\" class=\"btn btn-theme effect btn-sm\">Enroll now<\/a>\n                                             <\/div>\n                    <div class=\"col-lg-6\">\n                        <div class=\"thumb\">\n                            <img decoding=\"async\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2024\/01\/ceh-gradespot-it-solutions.jpg\" alt=\"Thumb\">\n                            <div class=\"fun-fact\">\n                                <div class=\"timer\" data-to=\"90\" data-speed=\"5000\">90<\/div>\n                                <span class=\"medium\">Hours Live Training<\/span>\n                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n    <!-- End Works About Area -->\n       \n\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-45e1ae67 e-flex e-con-boxed e-con e-parent\" data-id=\"45e1ae67\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b494160 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-elementskit-heading\" data-id=\"b494160\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Our Curriculum<\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider ekit-dotted\"><div class=\"elementskit-border-divider ekit-dotted\"><\/div><\/div><h3 class=\"ekit-heading--subtitle elementskit-section-subtitle  \">\n\t\t\t\t\t\tCertified Ethical Hacker v13\n\t\t\t\t\t<\/h3>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>Our <strong>Certified Ethical Hacker (CEH) curriculum<\/strong> is meticulously designed to provide in-depth knowledge and hands-on expertise in <strong>ethical hacking<\/strong> and <strong>penetration testing<\/strong>.<\/p>\n<p>This comprehensive program covers essential cybersecurity concepts, advanced hacking methodologies, vulnerability assessment techniques, exploitation strategies, and countermeasures against modern cyber threats. You will learn how hackers think, operate, and attack systems \u2014 and more importantly, how to ethically hack and secure those systems.<\/p>\n<p>With a structured, practical, and industry-relevant approach, our curriculum empowers you with the skills needed to excel as an Ethical Hacker, Penetration Tester, or Cybersecurity Specialist. You\u2019ll gain hands-on experience in real-world hacking scenarios, mastering tools and techniques to identify, exploit, and mitigate vulnerabilities \u2014 helping organizations stay secure in an ever-evolving threat landscape.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7dfe88f2 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-elementskit-accordion\" data-id=\"7dfe88f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n        <div class=\"elementskit-accordion accordion-4\" id=\"accordion-69f633ab4f2de\">\n\n            \n                <div class=\"elementskit-card active\">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-0-7dfe88f2\">\n                        <a href=\"#collapse-bc2283069f633ab4f2de\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-bc2283069f633ab4f2de\" aria-expanded=\"true\" aria-controls=\"Collapse-bc2283069f633ab4f2de\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">Computer Networking<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-bc2283069f633ab4f2de\" class=\" show collapse\" aria-labelledby=\"primaryHeading-0-7dfe88f2\" data-parent=\"#accordion-69f633ab4f2de\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>Introduction to Computer Networks<\/li><li>OSI Reference Model<\/li><li>TCP\/IP Model<\/li><li>Transmission Media<\/li><li>Network Devices<\/li><li>Network Topologies<\/li><li>IP Address<\/li><li>Protocols &amp; Ports<\/li><li>Ethernet Standards<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-1-7dfe88f2\">\n                        <a href=\"#collapse-8417e7169f633ab4f2de\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-8417e7169f633ab4f2de\" aria-expanded=\"false\" aria-controls=\"Collapse-8417e7169f633ab4f2de\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">Setting up Lab<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-8417e7169f633ab4f2de\" class=\" collapse\" aria-labelledby=\"primaryHeading-1-7dfe88f2\" data-parent=\"#accordion-69f633ab4f2de\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>Setting up virtual machines using VMware<\/li><li>Installing and configuring Kali Linux<\/li><li>Installing and configuring Parrot Linux<\/li><li>Installing and configuring Windows 10<\/li><li>Installing and configuring Windows 11<\/li><li>Setting up a Windows Server environment<\/li><li>Snapshot and backup management for virtual labs<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-2-7dfe88f2\">\n                        <a href=\"#collapse-3dad4e069f633ab4f2de\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-3dad4e069f633ab4f2de\" aria-expanded=\"false\" aria-controls=\"Collapse-3dad4e069f633ab4f2de\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">Linux &amp; Windows Fundamentals<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-3dad4e069f633ab4f2de\" class=\" collapse\" aria-labelledby=\"primaryHeading-2-7dfe88f2\" data-parent=\"#accordion-69f633ab4f2de\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>Introduction to Linux<\/li><li>Linux and it\u2019s distributions<\/li><li>Basic Linux commands<\/li><li>Networking commands<\/li><li>Disk and Device Management<\/li><li>Windows Firewall Configuration<\/li><li>Windows Update<\/li><li>Bit-locker Drive Encryption<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-3-7dfe88f2\">\n                        <a href=\"#collapse-48c95dd69f633ab4f2de\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-48c95dd69f633ab4f2de\" aria-expanded=\"false\" aria-controls=\"Collapse-48c95dd69f633ab4f2de\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">Introduction to Ethical Hacking<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-48c95dd69f633ab4f2de\" class=\" collapse\" aria-labelledby=\"primaryHeading-3-7dfe88f2\" data-parent=\"#accordion-69f633ab4f2de\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>Information security overview<\/li><li>Elements of information security<\/li><li>Motives behind a security attack<\/li><li>Classification of Attacks<\/li><li>Information Warfare<\/li><li>Hacking Concepts<\/li><li>Hacker Classes\/Threat Actors<\/li><li>Ethical Hacking Concepts<\/li><li>Al-Driven Ethical Hacking<\/li><li>GPT-Powered AI Tools for Ethical Hackers<\/li><li>Ethical Hacking Framework<\/li><li>Cyber Kill Chain Methodology<\/li><li>Adversary Behavioral Identification<\/li><li>Information Security Controls<\/li><li>Information Assurance (IA)<\/li><li>Risk &amp; Risk Management<\/li><li>Cyber Threat Intelligence<\/li><li>Threat Intelligence Lifecycle<\/li><li>Role of AI and ML in Cyber Security<\/li><li>Information Security Laws and Standards<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-4-7dfe88f2\">\n                        <a href=\"#collapse-f27d4a869f633ab4f2de\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-f27d4a869f633ab4f2de\" aria-expanded=\"false\" aria-controls=\"Collapse-f27d4a869f633ab4f2de\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">Footprinting and Reconnaissance<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-f27d4a869f633ab4f2de\" class=\" collapse\" aria-labelledby=\"primaryHeading-4-7dfe88f2\" data-parent=\"#accordion-69f633ab4f2de\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>Footprinting Concepts<\/li><li>Footprinting through Search Engines<\/li><li>Footprinting through Web Services<\/li><li>Footprinting through Social Networking Sites<\/li><li>Website Footprinting<\/li><li>Email Footprinting<\/li><li>Competitive Intelligence<\/li><li>Whois Footprinting<\/li><li>DNS Footprinting<\/li><li>Network Footprinting<\/li><li>Footprinting through Social Engineering<\/li><li>Footprinting Tools<\/li><li>Countermeasures<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-5-7dfe88f2\">\n                        <a href=\"#collapse-554082169f633ab4f2de\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-554082169f633ab4f2de\" aria-expanded=\"false\" aria-controls=\"Collapse-554082169f633ab4f2de\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">Scanning Networks &amp; Enumeration<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-554082169f633ab4f2de\" class=\" collapse\" aria-labelledby=\"primaryHeading-5-7dfe88f2\" data-parent=\"#accordion-69f633ab4f2de\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>Network Scanning Concepts<\/li><li>Scanning Tools<\/li><li>Scanning Techniques<\/li><li>Host Discovery Techniques<\/li><li>Port &amp; Service Discovery Techniques<\/li><li>Operating System Discovery<\/li><li>Banner Grabbing<\/li><li>Service Version Discovery<\/li><li>Using Nmap, and Zenmap<\/li><li>Network Scanning using Metasploit<\/li><li>Scanning Beyond IDS and Firewall<\/li><li>Enumeration<\/li><li>Ports &amp; Services to Enumerate<\/li><li>DNS Enumeration<\/li><li>Enumeration Countermeasures<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-6-7dfe88f2\">\n                        <a href=\"#collapse-e3184b769f633ab4f2de\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-e3184b769f633ab4f2de\" aria-expanded=\"false\" aria-controls=\"Collapse-e3184b769f633ab4f2de\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">Vulnerability Analysis<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-e3184b769f633ab4f2de\" class=\" collapse\" aria-labelledby=\"primaryHeading-6-7dfe88f2\" data-parent=\"#accordion-69f633ab4f2de\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>Vulnerability Assessment Concepts<\/li><li>Vulnerability Classifications<\/li><li>Vulnerability Assessment Solutions<\/li><li>Vulnerability Scoring Systems<\/li><li>Common Vulnerability Scoring System (CVSS)<\/li><li>Common Vulnerabilities and Exposures (CVE)<\/li><li>National Vulnerability Database (NVD)<\/li><li>Common Weakness Enumeration (CWE)<\/li><li>Exploit-DB<\/li><li>Vulnerability-Management Life Cycle<\/li><li>Types of Vulnerability Scanning<\/li><li>Vulnerability Assessment Tools<\/li><li>Working with OpenVAS<\/li><li>Working with Nessus<\/li><li>Working with Acunetix<\/li><li>Working with SkipFish<\/li><li>Vulnerability Assessment Reports<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-7-7dfe88f2\">\n                        <a href=\"#collapse-ba785e169f633ab4f2de\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-ba785e169f633ab4f2de\" aria-expanded=\"false\" aria-controls=\"Collapse-ba785e169f633ab4f2de\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">Malware Threats<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-ba785e169f633ab4f2de\" class=\" collapse\" aria-labelledby=\"primaryHeading-7-7dfe88f2\" data-parent=\"#accordion-69f633ab4f2de\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>Introduction to Malware<\/li><li>Components of Malware<\/li><li>Potentially Unwanted Application or Applications (PUAs)<\/li><li>APT Concepts<\/li><li>APT Lifecycle<\/li><li>Trojan Concepts<\/li><li>Indications of Trojan Attack<\/li><li>Types of Trojans<\/li><li>Infect Systems Using a Trojan<\/li><li>Introduction to Viruses<\/li><li>Stages of Virus Lifecycle<\/li><li>Working of Viruses<\/li><li>Types of Viruses<\/li><li>Creating Viruses<\/li><li>Ransomware<\/li><li>Computer Worms<\/li><li>Using Worm Makers<\/li><li>Fileless Malware<\/li><li>How a Fileless Malware work?<\/li><li>Fileless Malware Obfuscation<\/li><li>AI-based Malware<\/li><li>Working of AI-based Malware<\/li><li>Indicators of AI-based Malware<\/li><li>Challenges of AI-based Malware<\/li><li>Examples of AI-based Malware<\/li><li>Sheep Dip Computer<\/li><li>Antivirus Sensor Systems<\/li><li>Malware Analysis<\/li><li>Types of Malware Analysis<\/li><li>Malware Analysis Procedure<\/li><li>Static Malware Analysis<\/li><li>Dynamic Malware Analysis<\/li><li>Virus Detection Methods<\/li><li>Malware Countermeasures<\/li><li>Anti-Malware Software<\/li><li>Fileless Malware Detection Tools<\/li><li>Fileless Malware Protection Tools<\/li><li>AI-Powered Malware Detection and Analysis Tools<\/li><li>Endpoint Detection and Response (EDR\/XDR) Tools<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-8-7dfe88f2\">\n                        <a href=\"#collapse-e5fadff69f633ab4f2de\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-e5fadff69f633ab4f2de\" aria-expanded=\"false\" aria-controls=\"Collapse-e5fadff69f633ab4f2de\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">Sniffing &amp; Spoofing<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-e5fadff69f633ab4f2de\" class=\" collapse\" aria-labelledby=\"primaryHeading-8-7dfe88f2\" data-parent=\"#accordion-69f633ab4f2de\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>Network Sniffing<\/li><li>Types of Sniffing<\/li><li>Protocols Vulnerable to Sniffing<\/li><li>Hardware Protocol Analyzers<\/li><li>Wiretapping<\/li><li>MAC Address<\/li><li>MAC Flooding<\/li><li>Defend against MAC Attacks<\/li><li>Port Security on Cisco Switch<\/li><li>How DHCP Works<\/li><li>DHCP Starvation Attack<\/li><li>Rogue DHCP Server Attack<\/li><li>Defend Against DHCP Attacks<\/li><li>ARP Spoofing Attack<\/li><li>Defend Against ARP Poisoning<\/li><li>Configuring DHCP Snooping<\/li><li>Configuring Dynamic ARP Inspection<\/li><li>ARP Spoofing Detection Tools<\/li><li>MAC Spoofing\/Duplicating<\/li><li>MAC Spoofing Technique: Windows<\/li><li>MAC Spoofing Tools<\/li><li>VLAN Hopping<\/li><li>Defend Against MAC Spoofing<\/li><li>Defend Against VLAN Hopping<\/li><li>STP Attacks<\/li><li>Defend Against STP Attacks<\/li><li>DNS Poisoning Techniques<\/li><li>DNS Cache Poisoning<\/li><li>DNS Poisoning Tools<\/li><li>Defend Against DNS Spoofing<\/li><li>Various Sniffing Tools<\/li><li>Sniffing Countermeasures<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-9-7dfe88f2\">\n                        <a href=\"#collapse-561b37769f633ab4f2de\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-561b37769f633ab4f2de\" aria-expanded=\"false\" aria-controls=\"Collapse-561b37769f633ab4f2de\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">Social Engineering<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-561b37769f633ab4f2de\" class=\" collapse\" aria-labelledby=\"primaryHeading-9-7dfe88f2\" data-parent=\"#accordion-69f633ab4f2de\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>What is Social Engineering?<\/li><li>Phases of a Social Engineering Attack<\/li><li>Types of Social Engineering<\/li><li>Human-based Social Engineering<\/li><li>Computer-based Social Engineering<\/li><li>Mobile-based Social Engineering<\/li><li>Impersonation<\/li><li>Eavesdropping<\/li><li>Shoulder Surfing<\/li><li>Dumpster Diving<\/li><li>Reverse Social Engineering<\/li><li>Piggybacking &amp; Tailgating<\/li><li>Honey Trap<\/li><li>Baiting<\/li><li>Quid Pro Quo<\/li><li>Phishing<\/li><li>Types of Phishing<\/li><li>Phishing Tools<\/li><li>Scareware<\/li><li>Impersonation using AI<\/li><li>Angler Phishing<\/li><li>Catfishing Attack<\/li><li>Identity Theft<\/li><li>Indications of Identity Theft<\/li><li>Publishing Malicious Apps<\/li><li>Repackaging Legitimate Apps<\/li><li>Fake Security Applications<\/li><li>SMiShing<\/li><li>QRLJacking<\/li><li>QR Code Cloning Tools<\/li><li>Social Engineering Countermeasures<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-10-7dfe88f2\">\n                        <a href=\"#collapse-117617269f633ab4f2de\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-117617269f633ab4f2de\" aria-expanded=\"false\" aria-controls=\"Collapse-117617269f633ab4f2de\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">Denial-of-Service<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-117617269f633ab4f2de\" class=\" collapse\" aria-labelledby=\"primaryHeading-10-7dfe88f2\" data-parent=\"#accordion-69f633ab4f2de\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>DoS Concepts<\/li><li>DDoS Concepts<\/li><li>DoS\/DDoS Attack Techniques<\/li><li>Botnets<\/li><li>DDoS Case Study<\/li><li>DoS\/DDoS Attack Tools<\/li><li>Countermeasures<\/li><li>DoS\/DDoS Protection Tools<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-11-7dfe88f2\">\n                        <a href=\"#collapse-f5c166369f633ab4f2de\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-f5c166369f633ab4f2de\" aria-expanded=\"false\" aria-controls=\"Collapse-f5c166369f633ab4f2de\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">SQL Injection<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-f5c166369f633ab4f2de\" class=\" collapse\" aria-labelledby=\"primaryHeading-11-7dfe88f2\" data-parent=\"#accordion-69f633ab4f2de\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>SQL Injection Concepts<\/li><li>Types of SQL Injection<\/li><li>SQL Injection Methodology<\/li><li>SQL Injection Tools<\/li><li>Countermeasures<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-12-7dfe88f2\">\n                        <a href=\"#collapse-f9948c969f633ab4f2de\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-f9948c969f633ab4f2de\" aria-expanded=\"false\" aria-controls=\"Collapse-f9948c969f633ab4f2de\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">Cryptography<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-f9948c969f633ab4f2de\" class=\" collapse\" aria-labelledby=\"primaryHeading-12-7dfe88f2\" data-parent=\"#accordion-69f633ab4f2de\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>Cryptography Concepts<\/li><li>Encryption Algorithms<\/li><li>Cryptography Tools<\/li><li>Public Key Infrastructure (PKI)<\/li><li>Disk Encryption<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-13-7dfe88f2\">\n                        <a href=\"#collapse-5391b4369f633ab4f2de\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-5391b4369f633ab4f2de\" aria-expanded=\"false\" aria-controls=\"Collapse-5391b4369f633ab4f2de\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <svg class=\"e-font-icon-svg e-fas-angle-double-left\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M223.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L319.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L393.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34zm-192 34l136 136c9.4 9.4 24.6 9.4 33.9 0l22.6-22.6c9.4-9.4 9.4-24.6 0-33.9L127.9 256l96.4-96.4c9.4-9.4 9.4-24.6 0-33.9L201.7 103c-9.4-9.4-24.6-9.4-33.9 0l-136 136c-9.5 9.4-9.5 24.6-.1 34z\"><\/path><\/svg>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-arrow-right\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">Incident Detection with Threat Intelligence<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-5391b4369f633ab4f2de\" class=\" collapse\" aria-labelledby=\"primaryHeading-13-7dfe88f2\" data-parent=\"#accordion-69f633ab4f2de\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul><li>Cyber Threat Intelligence<\/li><li>Types of Threat Intelligence\u00a0<\/li><li>Threat Intelligence-driven SOC<\/li><li>Benefits of Threat Intelligence to SOC Analyst<\/li><li>\u00a0Threat Intelligence Use Cases for SOC Analyst<\/li><li>Integration of Threat Intelligence into SIEM<\/li><li>Threat Intelligence Use Cases for Enhanced Incidence Responder<\/li><li>Enhancing Incident Response by establishing SOPs<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                                        <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-81fee5c e-flex e-con-boxed e-con e-parent\" data-id=\"81fee5c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-140c422 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"140c422\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/drive.google.com\/file\/d\/1JbPDUY3STpweUGJxebuTJI24rnsRIcZm\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-download\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M216 0h80c13.3 0 24 10.7 24 24v168h87.7c17.8 0 26.7 21.5 14.1 34.1L269.7 378.3c-7.5 7.5-19.8 7.5-27.3 0L90.1 226.1c-12.6-12.6-3.7-34.1 14.1-34.1H192V24c0-13.3 10.7-24 24-24zm296 376v112c0 13.3-10.7 24-24 24H24c-13.3 0-24-10.7-24-24V376c0-13.3 10.7-24 24-24h146.7l49 49c20.1 20.1 52.5 20.1 72.6 0l49-49H488c13.3 0 24 10.7 24 24zm-124 88c0-11-9-20-20-20s-20 9-20 20 9 20 20 20 20-9 20-20zm64 0c0-11-9-20-20-20s-20 9-20 20 9 20 20 20 20-9 20-20z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download Curriculum<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-456619a e-flex e-con-boxed e-con e-parent\" data-id=\"456619a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-00b0152 elementor-widget elementor-widget-heading\" data-id=\"00b0152\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Tools Covered<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c2e3fad e-flex e-con-boxed e-con e-parent\" data-id=\"c2e3fad\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6d01ae0 e-con-full e-flex e-con e-child\" data-id=\"6d01ae0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fffee0a elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"fffee0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/elementor\/thumbs\/nmap-logo-ethical-hacking-qm9iqms8vyy9jf8oc9k4u4gkd29cn91aqa5yh0yugg.jpg\" title=\"nmap logo ethical hacking\" alt=\"nmap logo ethical hacking\" loading=\"lazy\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Nmap<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-775085c e-con-full e-flex e-con e-child\" data-id=\"775085c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a99d584 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"a99d584\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/elementor\/thumbs\/sflogo-front-qm9ijmvi0ddf3xel78o49w115sqzcd98fnbtuvccs0.png\" title=\"wireshark logo\" alt=\"ethical hacking wireshark logo\" loading=\"lazy\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Wireshark<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-28a613e e-con-full e-flex e-con e-child\" data-id=\"28a613e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-25879f4 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"25879f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/elementor\/thumbs\/metasploit-tool-qm9j0nq9scoddoodslkvfldkh0uar0u83woera3o34.png\" title=\"metasploit tool\" alt=\"metasploit tool\" loading=\"lazy\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Metasploit<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-30c7de5 e-con-full e-flex e-con e-child\" data-id=\"30c7de5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f73b3ef elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"f73b3ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/elementor\/thumbs\/Nessus-qm9j6k5sowr69k3tc5ek33rqq3r92m9k94457tcp0w.png\" title=\"Nessus\" alt=\"Nessus\" loading=\"lazy\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Nessus<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-31c00ce e-flex e-con-boxed e-con e-parent\" data-id=\"31c00ce\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3892af7 e-con-full e-flex e-con e-child\" data-id=\"3892af7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0a340e0 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"0a340e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/elementor\/thumbs\/ov-qmbfc830xvmx140rnrd3uximplyg2x569mji4na2ls.png\" title=\"open vas\" alt=\"open vas\" loading=\"lazy\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">OpenVAS<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-262c782 e-con-full e-flex e-con e-child\" data-id=\"262c782\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-68abcc8 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"68abcc8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/elementor\/thumbs\/maltego-qmbfepdoz515o2f26bynxszf57qbe5zo9wimpxlo6o.jpg\" title=\"maltego\" alt=\"maltego\" loading=\"lazy\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Maltego<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-197d78a e-con-full e-flex e-con e-child\" data-id=\"197d78a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-152ad6c elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"152ad6c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/elementor\/thumbs\/download-qmbfn4zkamkru461xh75t6db0o5vgegz3n8gqb3icw.png\" title=\"acunetix\" alt=\"acunetix\" loading=\"lazy\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Acunetix<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fcf411e e-con-full e-flex e-con e-child\" data-id=\"fcf411e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c5136c5 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"c5136c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/elementor\/thumbs\/1024px-Angry_ip_scan_logo.svg-qmbfpn82iq0asoizak7cgjlk1nt3zcf7g1v2svdprk.png\" title=\"Angry_ip_scan_logo\" alt=\"Angry_ip_scan_logo\" loading=\"lazy\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Angry IP Scanner<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a30be0c e-flex e-con-boxed e-con e-parent\" data-id=\"a30be0c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9654b46 e-con-full e-flex e-con e-child\" data-id=\"9654b46\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-79fe789 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"79fe789\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/elementor\/thumbs\/hashcat-qmbgbt91p2cqlmbsun5lrg7wdsjqidfbhrqb8sih0w.png\" title=\"hashcat\" alt=\"hashcat\" loading=\"lazy\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Hashcat<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-074f7dd e-con-full e-flex e-con e-child\" data-id=\"074f7dd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bde8218 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"bde8218\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/elementor\/thumbs\/Burp-Suite-qmbgcme1kxgmlj5h4hr1eqv6sqk44zmzxryd4db9o0.png\" title=\"Burp Suite\" alt=\"Burp Suite\" loading=\"lazy\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Burp Suite<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f86cd28 e-con-full e-flex e-con e-child\" data-id=\"f86cd28\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-640d3c4 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"640d3c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/elementor\/thumbs\/hydra-qmbga617qi3oa6ptgfk3wd5uyinm1fw89mmq0cy9ww.png\" title=\"THC Hydra\" alt=\"THC Hydra\" loading=\"lazy\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">THC Hydra<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cc3b02a e-con-full e-flex e-con e-child\" data-id=\"cc3b02a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6d87378 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"6d87378\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/elementor\/thumbs\/John-The-Ripper-qmbgay8dfj69yhkuvrqwz61os2smgd06di7aensgq8.png\" title=\"John-The-Ripper\" alt=\"John-The-Ripper\" loading=\"lazy\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">John-The-Ripper<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a1a3035 e-flex e-con-boxed e-con e-parent\" data-id=\"a1a3035\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3498b50c elementor-widget elementor-widget-elementskit-heading\" data-id=\"3498b50c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper center   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Visit our Blog<\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider ekit-dotted\"><div class=\"elementskit-border-divider ekit-dotted\"><\/div><\/div>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>Check out our blog for the latest cybersecurity updates and articles.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-24979d08 e-con-full e-flex e-con e-child\" data-id=\"24979d08\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-75ca216f elementor-widget__width-initial elementor-widget-mobile__width-inherit ekit-equal-height-disable elementor-widget elementor-widget-elementskit-image-box\" data-id=\"75ca216f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n            <div class=\"elementskit-info-image-box ekit-image-box text-left style-sideline\" >\n\n                \n                <div class=\"elementskit-box-header image-box-img-left\">\n\n                    <img decoding=\"async\" width=\"870\" height=\"570\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/2FA.jpg\" class=\"attachment-full size-full wp-image-6145\" alt=\"\" srcset=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/2FA.jpg 870w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/2FA-300x197.jpg 300w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/2FA-768x503.jpg 768w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/2FA-350x229.jpg 350w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/2FA-540x354.jpg 540w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/2FA-763x500.jpg 763w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/2FA-611x400.jpg 611w\" sizes=\"(max-width: 870px) 100vw, 870px\" \/>\n                <\/div>\n                \n                <div class=\"elementskit-box-body ekit-image-box-body\">\n                    <div class=\"elementskit-box-content ekit-image-box-body-inner\">\n                                                <h3 class=\"elementskit-info-box-title\">\n\n                        Two-Factor authentication (2FA): why you should enable it now \u2013 A Comprehensive Overview\n                        \n                    <\/h3>\n                                                        <\/div>\n\n                                <div class=\"elementskit-box-footer\">\n                    <div class=\"box-footer\">\n                        <div class=\"btn-wraper\">\n                                                            <a href=\"\" class=\"elementskit-btn whitespace--normal\">\n                                    \n                                    \n                                    Read More                                <\/a>\n                                                        <\/div>\n                    <\/div>\n                <\/div>\n                            <\/div>\n            <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9f3a0a5 elementor-widget__width-initial elementor-widget-mobile__width-inherit ekit-equal-height-disable elementor-widget elementor-widget-elementskit-image-box\" data-id=\"9f3a0a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n            <div class=\"elementskit-info-image-box ekit-image-box text-left style-sideline\" >\n\n                \n                <div class=\"elementskit-box-header image-box-img-left\">\n\n                    <img decoding=\"async\" width=\"870\" height=\"570\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Information_warfare.jpg\" class=\"attachment-full size-full wp-image-6150\" alt=\"\" srcset=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Information_warfare.jpg 870w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Information_warfare-300x197.jpg 300w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Information_warfare-768x503.jpg 768w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Information_warfare-350x229.jpg 350w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Information_warfare-540x354.jpg 540w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Information_warfare-763x500.jpg 763w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Information_warfare-611x400.jpg 611w\" sizes=\"(max-width: 870px) 100vw, 870px\" \/>\n                <\/div>\n                \n                <div class=\"elementskit-box-body ekit-image-box-body\">\n                    <div class=\"elementskit-box-content ekit-image-box-body-inner\">\n                                                <h3 class=\"elementskit-info-box-title\">\n\n                        Information Warfare: A Comprehensive Overview\n                        \n                    <\/h3>\n                                                        <\/div>\n\n                                <div class=\"elementskit-box-footer\">\n                    <div class=\"box-footer\">\n                        <div class=\"btn-wraper\">\n                                                            <a href=\"https:\/\/digidefense.in\/information-warfare-a-comprehensive-overview\/\" class=\"elementskit-btn whitespace--normal\" target=\"_blank\" rel=\"noopener\">\n                                    \n                                    \n                                    Read More                                <\/a>\n                                                        <\/div>\n                    <\/div>\n                <\/div>\n                            <\/div>\n            <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a76dc7 elementor-widget__width-initial elementor-widget-mobile__width-inherit ekit-equal-height-disable elementor-widget elementor-widget-elementskit-image-box\" data-id=\"7a76dc7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n            <div class=\"elementskit-info-image-box ekit-image-box text-left style-sideline\" >\n\n                \n                <div class=\"elementskit-box-header image-box-img-left\">\n\n                    <img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1154\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Golden-Ticket-Attack.jpg\" class=\"attachment-full size-full wp-image-6149\" alt=\"\" srcset=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Golden-Ticket-Attack.jpg 1920w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Golden-Ticket-Attack-300x180.jpg 300w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Golden-Ticket-Attack-1024x615.jpg 1024w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Golden-Ticket-Attack-768x462.jpg 768w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Golden-Ticket-Attack-1536x923.jpg 1536w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Golden-Ticket-Attack-350x210.jpg 350w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Golden-Ticket-Attack-540x325.jpg 540w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Golden-Ticket-Attack-832x500.jpg 832w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Golden-Ticket-Attack-666x400.jpg 666w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/>\n                <\/div>\n                \n                <div class=\"elementskit-box-body ekit-image-box-body\">\n                    <div class=\"elementskit-box-content ekit-image-box-body-inner\">\n                                                <h3 class=\"elementskit-info-box-title\">\n\n                        Golden Ticket Attack: A Comprehensive Guide to Understand this Attack\n                        \n                    <\/h3>\n                                                        <\/div>\n\n                                <div class=\"elementskit-box-footer\">\n                    <div class=\"box-footer\">\n                        <div class=\"btn-wraper\">\n                                                            <a href=\"https:\/\/digidefense.in\/golden-ticket-attack-a-comprehensive-guide\/\" class=\"elementskit-btn whitespace--normal\" target=\"_blank\" rel=\"noopener\">\n                                    \n                                    \n                                    Read More                                <\/a>\n                                                        <\/div>\n                    <\/div>\n                <\/div>\n                            <\/div>\n            <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-805454a e-flex e-con-boxed e-con e-parent\" data-id=\"805454a\" data-element_type=\"container\" data-e-type=\"container\" id=\"xs_client_3\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a2a09c3 elementor-widget elementor-widget-elementskit-heading\" data-id=\"a2a09c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper center   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Our Students works with<\/h2>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>Our students work with top global companies, leading enterprises, and innovative startups. Their skills and expertise make them valuable assets in every industry.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-48574716 elementor-widget elementor-widget-elementskit-client-logo\" data-id=\"48574716\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-client-logo.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\t\t<div class=\"elementskit-clients-slider  hover_from_bottom banner_logo_image\" data-config=\"{&quot;rtl&quot;:false,&quot;arrows&quot;:false,&quot;dots&quot;:false,&quot;autoplay&quot;:true,&quot;speed&quot;:1000,&quot;slidesPerView&quot;:4,&quot;slidesPerGroup&quot;:1,&quot;pauseOnHover&quot;:true,&quot;loop&quot;:false,&quot;breakpoints&quot;:{&quot;320&quot;:{&quot;slidesPerView&quot;:1,&quot;slidesPerGroup&quot;:1,&quot;spaceBetween&quot;:10},&quot;768&quot;:{&quot;slidesPerView&quot;:2,&quot;slidesPerGroup&quot;:1,&quot;spaceBetween&quot;:-1},&quot;1024&quot;:{&quot;slidesPerView&quot;:4,&quot;slidesPerGroup&quot;:1,&quot;spaceBetween&quot;:-1}},&quot;grid&quot;:{&quot;fill&quot;:&quot;row&quot;,&quot;rows&quot;:3}}\" data-direction=\"hover_from_bottom\">\n\t\t\t<div class=\"ekit-main-swiper swiper\">\n\t\t\t\t<div class=\"swiper-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide \">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"XCube Labs\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/XCubeLabs-logo-Black.png\" class=\"main-image\" alt=\"\" \/><img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/XCubeLabs-logo-white.png\" class=\"hover-image\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide \">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"Cloud4C\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Cloud4C-Logo.png\" class=\"main-image\" alt=\"\" \/><img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Cloud4C-Logo-White-1.png\" class=\"hover-image\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide \">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"Persistant\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Persistent-systems-logo.png\" class=\"main-image\" alt=\"\" \/><img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Persistent-systems-logo-white.png\" class=\"hover-image\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide \">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"Diligent\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Diligient-Logo.png\" class=\"main-image\" alt=\"\" \/><img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Diligient-Logo-white.png\" class=\"hover-image\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide \">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"Wipro\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Wipro-Logo.png\" class=\"main-image\" alt=\"\" \/><img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Wipro-Logo-white.png\" class=\"hover-image\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide \">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"Astreya\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/astreya-logo.png\" class=\"main-image\" alt=\"\" \/><img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/astreya-logo-white.png\" class=\"hover-image\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide \">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"Tericsoft\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Tericsoft-logo.png\" class=\"main-image\" alt=\"\" \/><img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Tericsoft-logo-white.png\" class=\"hover-image\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide \">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"EY\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/EY.png\" class=\"main-image\" alt=\"\" \/><img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/EY-White.png\" class=\"hover-image\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide \">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"Movate\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Movate-Logo.png\" class=\"main-image\" alt=\"\" \/><img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Movate-Logo-white.png\" class=\"hover-image\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide \">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"PurpleTalk\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/PurpleTalk.png\" class=\"main-image\" alt=\"\" \/><img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/PurpleTalk-White.png\" class=\"hover-image\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide \">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"Title #10\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"113\" height=\"48\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Company112-2.svg\" class=\"main-image\" alt=\"\" \/><img loading=\"lazy\" decoding=\"async\" width=\"113\" height=\"48\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/Company112-1-1.svg\" class=\"hover-image\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide \">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"Title #10\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"98\" height=\"48\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/client-logo-33-1-1.svg\" class=\"main-image\" alt=\"\" \/><img loading=\"lazy\" decoding=\"async\" width=\"98\" height=\"48\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/03\/client-white-logo-16-1-1.svg\" class=\"hover-image\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div><!-- .elementskit-clients-slider END -->\n\t\t<\/div>\n\t\t<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6813a94a e-flex e-con-boxed e-con e-parent\" data-id=\"6813a94a\" data-element_type=\"container\" data-e-type=\"container\" id=\"xs_accor_box_shadow_round\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b205f57 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-elementskit-heading\" data-id=\"2b205f57\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">FAQ's<\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider ekit-dotted\"><div class=\"elementskit-border-divider ekit-dotted\"><\/div><\/div>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>Most common questions about SOC Analyst Training<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-56f3b8ce elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-elementskit-accordion\" data-id=\"56f3b8ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n        <div class=\"elementskit-accordion accoedion-primary\" id=\"accordion-69f633ab6adc8\">\n\n            \n                <div class=\"elementskit-card active\">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-0-56f3b8ce\">\n                        <a href=\"#collapse-bc2283069f633ab6adc8\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-bc2283069f633ab6adc8\" aria-expanded=\"true\" aria-controls=\"Collapse-bc2283069f633ab6adc8\">\n                            \n                            <span class=\"ekit-accordion-title\">Are certifications available upon completion of SOC Analyst Training?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-up-arrow\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-bc2283069f633ab6adc8\" class=\" show collapse\" aria-labelledby=\"primaryHeading-0-56f3b8ce\" data-parent=\"#accordion-69f633ab6adc8\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>Yes, there are various certifications available for individuals who complete the SOC Analyst Training, such as Certified Ethical Hacker (CEH), CompTIA Security+, Microsoft Certified: Security Operations Analyst Associate (SC-200), and many more. These certifications validate the skills and knowledge acquired during training and enhance credibility in the field of cybersecurity.<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-1-56f3b8ce\">\n                        <a href=\"#collapse-8417e7169f633ab6adc8\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-8417e7169f633ab6adc8\" aria-expanded=\"false\" aria-controls=\"Collapse-8417e7169f633ab6adc8\">\n                            \n                            <span class=\"ekit-accordion-title\">What is the duration of the training program?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-up-arrow\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-8417e7169f633ab6adc8\" class=\" collapse\" aria-labelledby=\"primaryHeading-1-56f3b8ce\" data-parent=\"#accordion-69f633ab6adc8\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>The training program spans over 30 days, providing comprehensive coverage of Computer Networking, Vulnerability Management, and SOC (Security Operations Center) Analysis.<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-2-56f3b8ce\">\n                        <a href=\"#collapse-3dad4e069f633ab6adc8\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-3dad4e069f633ab6adc8\" aria-expanded=\"false\" aria-controls=\"Collapse-3dad4e069f633ab6adc8\">\n                            \n                            <span class=\"ekit-accordion-title\">Is the training available online, offline, or both?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-up-arrow\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-3dad4e069f633ab6adc8\" class=\" collapse\" aria-labelledby=\"primaryHeading-2-56f3b8ce\" data-parent=\"#accordion-69f633ab6adc8\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>The training is available in both online and offline modes to cater to the diverse learning preferences and geographical locations of participants. Online training offers flexibility and convenience, while offline training provides hands-on experience in a classroom environment.<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                                        <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-77d1a596 e-flex e-con-boxed e-con e-parent\" data-id=\"77d1a596\" data-element_type=\"container\" data-e-type=\"container\" id=\"xs_testi_7\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6683bc30 elementor-widget elementor-widget-elementskit-heading\" data-id=\"6683bc30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_center   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">What Our Learners Say<\/h2>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>Read their success stories and discover why our training is trusted by aspiring professionals worldwide.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-35553b85 e-con-full e-flex e-con e-child\" data-id=\"35553b85\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d5a6fb0 elementor-widget elementor-widget-elementskit-testimonial\" data-id=\"d5a6fb0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-testimonial.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"elementskit-testimonial-slider ekit-testimonia-style-4 arrow_inside slider-dotted\" data-config=\"{&quot;rtl&quot;:false,&quot;arrows&quot;:false,&quot;dots&quot;:true,&quot;pauseOnHover&quot;:true,&quot;autoplay&quot;:true,&quot;speed&quot;:1000,&quot;slidesPerGroup&quot;:1,&quot;slidesPerView&quot;:3,&quot;loop&quot;:true,&quot;spaceBetween&quot;:15,&quot;breakpoints&quot;:{&quot;320&quot;:{&quot;slidesPerView&quot;:&quot;1&quot;,&quot;slidesPerGroup&quot;:&quot;1&quot;,&quot;spaceBetween&quot;:10},&quot;768&quot;:{&quot;slidesPerView&quot;:&quot;2&quot;,&quot;slidesPerGroup&quot;:&quot;1&quot;,&quot;spaceBetween&quot;:10},&quot;1024&quot;:{&quot;slidesPerView&quot;:&quot;3&quot;,&quot;slidesPerGroup&quot;:1,&quot;spaceBetween&quot;:15}}}\">\n\t<div class=\"ekit-main-swiper swiper\">\n\t\t<div class=\"swiper-wrapper\">\n\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t<div class=\"elementskit-single-testimonial-slider elementskit-testimonial-slider-block-style  elementor-repeater-item-42f3647\" >\n\t\t\t\t\t\t\t<div class=\"elementskit-commentor-bio \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-commentor-image ekit-testimonial--avatar\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/05\/47.png\" class=\"attachment-full size-full\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementskit-profile-info\">\n\t\t\t\t\t\t\t\t\t<strong class=\"elementskit-author-name\">Bhairisetti Yaswant kumar<\/strong>\n\t\t\t\t\t\t\t\t\t<span class=\"elementskit-author-des\">Network Administrator<\/span>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementskit-commentor-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<span class=\"elementskit-watermark-icon ekit_watermark_icon_custom_position\">\n\t\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-quote\"><\/i>\t\t\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>I recently completed my CCNA Course at GradeSpot IT Solutions and it was an amazing experience! The trainers were highly knowledgeable and made even the toughest concepts easy to understand. The hands-on labs and real-world examples helped me gain confidence in networking.\nIf you\u2019re looking for professional and effective IT training, GradeSpot IT Solutions is the place<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<ul class=\"elementskit-stars\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div><!-- .commentor-content END -->\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t<div class=\"elementskit-single-testimonial-slider elementskit-testimonial-slider-block-style  elementor-repeater-item-6d313e8\" >\n\t\t\t\t\t\t\t<div class=\"elementskit-commentor-bio \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-commentor-image ekit-testimonial--avatar\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/05\/10.png\" class=\"attachment-full size-full\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementskit-profile-info\">\n\t\t\t\t\t\t\t\t\t<strong class=\"elementskit-author-name\">Naveen Bhaskari<\/strong>\n\t\t\t\t\t\t\t\t\t<span class=\"elementskit-author-des\">SOC Analyst  <\/span>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementskit-commentor-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<span class=\"elementskit-watermark-icon ekit_watermark_icon_custom_position\">\n\t\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-quote\"><\/i>\t\t\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>A big thanks to GradeSpot IT Solutions for their excellent SOC Analysis training! The practical approach and supportive trainers made all the difference. Their guidance helped me land a job at Wipro as a SOC Analyst. I Highly recommend GradeSpot to anyone looking to advance their Cybersecurity career!<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<ul class=\"elementskit-stars\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div><!-- .commentor-content END -->\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t<div class=\"elementskit-single-testimonial-slider elementskit-testimonial-slider-block-style  elementor-repeater-item-163e2ae\" >\n\t\t\t\t\t\t\t<div class=\"elementskit-commentor-bio \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-commentor-image ekit-testimonial--avatar\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/05\/67.png\" class=\"attachment-full size-full\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementskit-profile-info\">\n\t\t\t\t\t\t\t\t\t<strong class=\"elementskit-author-name\">Riyaz Basha Shaik<\/strong>\n\t\t\t\t\t\t\t\t\t<span class=\"elementskit-author-des\">-<\/span>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementskit-commentor-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<span class=\"elementskit-watermark-icon ekit_watermark_icon_custom_position\">\n\t\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-quote\"><\/i>\t\t\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>recently completed the Cyber Security Professional course at GradeSpot IT Solutions and had a great experience. The trainers are knowledgeable, and the teaching is very hands-on, which made it easy to understand even complex topics<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<ul class=\"elementskit-stars\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div><!-- .commentor-content END -->\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t<div class=\"elementskit-single-testimonial-slider elementskit-testimonial-slider-block-style  elementor-repeater-item-3d3cce3\" >\n\t\t\t\t\t\t\t<div class=\"elementskit-commentor-bio \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-commentor-image ekit-testimonial--avatar\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/05\/14.png\" class=\"attachment-full size-full\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementskit-profile-info\">\n\t\t\t\t\t\t\t\t\t<strong class=\"elementskit-author-name\">Kruthi Krishna Dwaraka<\/strong>\n\t\t\t\t\t\t\t\t\t<span class=\"elementskit-author-des\">-<\/span>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementskit-commentor-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<span class=\"elementskit-watermark-icon ekit_watermark_icon_custom_position\">\n\t\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-quote\"><\/i>\t\t\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>Learning Cloud in Gradespot IT solutions added so much value to my existing expertise and I am thankful to the tutors of Gradespot who helped me to clear my cloud certifications with their extensive training. I would really suggest Gradespot to the people who want to improve their Technical Skills and start their career in IT.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<ul class=\"elementskit-stars\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div><!-- .commentor-content END -->\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t<div class=\"elementskit-single-testimonial-slider elementskit-testimonial-slider-block-style  elementor-repeater-item-f7e3f40\" >\n\t\t\t\t\t\t\t<div class=\"elementskit-commentor-bio \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-commentor-image ekit-testimonial--avatar\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/05\/63.png\" class=\"attachment-full size-full\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementskit-profile-info\">\n\t\t\t\t\t\t\t\t\t<strong class=\"elementskit-author-name\">Shiva Gottam<\/strong>\n\t\t\t\t\t\t\t\t\t<span class=\"elementskit-author-des\">-<\/span>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementskit-commentor-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<span class=\"elementskit-watermark-icon ekit_watermark_icon_custom_position\">\n\t\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-quote\"><\/i>\t\t\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>I have take the Azure Administrator training from GradeSpot IT Solutions recently, after the training I have cleared my AZ-104 exam successfully. The training was practical with real time examples, and the certification preparation was also completed at the time of training. Thanks to Nikhil Sir and to the whole team of GSIT for such a good training<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<ul class=\"elementskit-stars\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div><!-- .commentor-content END -->\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t<div class=\"elementskit-single-testimonial-slider elementskit-testimonial-slider-block-style  elementor-repeater-item-58837e7\" >\n\t\t\t\t\t\t\t<div class=\"elementskit-commentor-bio \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-commentor-image ekit-testimonial--avatar\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/05\/60.png\" class=\"attachment-full size-full\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementskit-profile-info\">\n\t\t\t\t\t\t\t\t\t<strong class=\"elementskit-author-name\">Stanes Lovelene Bittari<\/strong>\n\t\t\t\t\t\t\t\t\t<span class=\"elementskit-author-des\">-<\/span>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementskit-commentor-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<span class=\"elementskit-watermark-icon ekit_watermark_icon_custom_position\">\n\t\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-quote\"><\/i>\t\t\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>A place where one can learn a technical course with a beautiful environment. It's not an exaggeration but I recommend people to learn things here. A friendly environment for a student. The best thing is that the trainer, supporting staff is the best.\n\nI've completed my CISCO CCNA 200-301 &amp; AZURE AZ-900 here. They provide good assistance in certification exams also.\n\nI would easily and happily recommend this institute.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<ul class=\"elementskit-stars\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div><!-- .commentor-content END -->\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t<div class=\"elementskit-single-testimonial-slider elementskit-testimonial-slider-block-style  elementor-repeater-item-336b500\" >\n\t\t\t\t\t\t\t<div class=\"elementskit-commentor-bio \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-commentor-image ekit-testimonial--avatar\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2025\/05\/9.png\" class=\"attachment-full size-full\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementskit-profile-info\">\n\t\t\t\t\t\t\t\t\t<strong class=\"elementskit-author-name\">Rohith Kumar<\/strong>\n\t\t\t\t\t\t\t\t\t<span class=\"elementskit-author-des\">-<\/span>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementskit-commentor-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<span class=\"elementskit-watermark-icon ekit_watermark_icon_custom_position\">\n\t\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-quote\"><\/i>\t\t\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>I am incredibly grateful for the guidance provided by GradeSpot IT Solutions Private Limited. Thanks to their expert instruction and support, I was able to learn AWS Cloud and achieve my AWS Solutions Architect certification. Their comprehensive curriculum and dedicated trainers made all the difference in my learning journey. Highly recommended!<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<ul class=\"elementskit-stars\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 576 512\"><path d=\"M316.9 18C311.6 7 300.4 0 288.1 0s-23.4 7-28.8 18L195 150.3 51.4 171.5c-12 1.8-22 10.2-25.7 21.7s-.7 24.2 7.9 32.7L137.8 329 113.2 474.7c-2 12 3 24.2 12.9 31.3s23 8 33.8 2.3l128.3-68.5 128.3 68.5c10.8 5.7 23.9 4.9 33.8-2.3s14.9-19.3 12.9-31.3L438.5 329 542.7 225.9c8.6-8.5 11.7-21.2 7.9-32.7s-13.7-19.9-25.7-21.7L381.2 150.3 316.9 18z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div><!-- .commentor-content END -->\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\n\t\t\t<\/div>\n<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>CEH V13 Practical Ethical Hacking Training Master Ethical Hacking Skills \u2013 Start Your Cybersecurity Career Today! Become a certified Ethical Hacker with our hands-on training. Learn Hacking Concepts, System Hacking, Malware Analysis, and many more. Contact Us Registration Form Complete your registration by filling out the form. Select an OptionCourse TrainingCertification VoucherOther Queries Submit Query [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/home1.php","meta":{"_eb_attr":"","footnotes":""},"class_list":["post-7819","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/gsitssolutions.com\/index.php\/wp-json\/wp\/v2\/pages\/7819","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gsitssolutions.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/gsitssolutions.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/gsitssolutions.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/gsitssolutions.com\/index.php\/wp-json\/wp\/v2\/comments?post=7819"}],"version-history":[{"count":1,"href":"https:\/\/gsitssolutions.com\/index.php\/wp-json\/wp\/v2\/pages\/7819\/revisions"}],"predecessor-version":[{"id":7820,"href":"https:\/\/gsitssolutions.com\/index.php\/wp-json\/wp\/v2\/pages\/7819\/revisions\/7820"}],"wp:attachment":[{"href":"https:\/\/gsitssolutions.com\/index.php\/wp-json\/wp\/v2\/media?parent=7819"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}