New-Age Undergraduate Programme

Size: px
Start display at page:

Download "New-Age Undergraduate Programme"

Transcription

1 New-Age Undergraduate Programme B. Tech Cloud Technology & Information Security (4 Year Full Time Programme) Academic Year 2015 Page 1

2 Course Objective This unique B. Tech course provides dual career options for the students in the fast growing technology sectors of Cloud Technology and Information Security. In addition to all the mandatory subjects of a traditional B. Tech, this specialized course offers in-depth practical know-how of the current trend Technology Cloud and Information Security. These Sectors have the potential to grow exponentially and they provide challenging job opportunities for young professionals with the right skill sets. On the Cloud Technology front, the course will provide students with the fundamental knowledge of all aspects of Cloud Technology. The course focuses on Virtualization Technology, Cloud Technology, Datacenters, Networking and Operating Systems. On the Information Security front, this course equips the students with the concepts and the technical skills in Information Security. The focus of the course is on the models, tools and techniques for enforcement of Security Policies, with emphasis on Cryptography, Ethical Hacking, Computer Forensics and Virtualization and Cloud Security. Course Particulars Course Name B. Tech Cloud Technology & Information Security Degree Awarded Bachelor Of Technology Duration of the Course 4 Year (8 semesters) Certifying University Medium of Instruction & Examination English Study Campus V.P.O Sahauran, Tehsil kharar, Distt. Mohali, Punjab Eligibility The minimum quali ication required to apply is a pass in the 10+2 examination from PUC / ISC / CBSE or equivalent board or a course recognised as equivalent thereto by the university. Examinations & Assessments 1. Internal test 2. Assignments 3. Seminar presentation 4. Class tests 5. Preparatory theory and Practical examination 6. Term end Theory and Practical examination Page 2

3 Curriculum* Semester 1 Technical English Matrices and Calculus Engineering Physics Engineering Chemistry Computer fundamentals & organization Programming in C Soft skill, Effective speaking and Analytical Skills - I Programming in C Lab Physics Laboratory Chemistry Laboratory Semester 3 Fourier Series and Transforms OSI layer & Security Network Security Basics Data structures using C Computer Networks Desktop Operating Systems Personal Effectiveness Computer Networks Lab Network Security Lab Desktop Operating Systems Lab Data structures using C- Lab Semester 2 Communication Skills Differential Equations and Complex Analysis OOPS with C++ Operating System Information Security I Web Technology I Soft Skills, Effective speaking and Analytical Skills- II Information Security I- Lab OOPS with C++ - Lab Web Technology I - Lab Semester 4 Probability and Queuing Theory Introduction to Cloud Technology Introduction to Linux Information Security II Server Operating System I RDBMS Effective Communication Introduction to Linux Lab Server Operating System - I Lab RDBMS - Lab Semester 5 Semester 6 Principles of Virtualization Fundamentals of Datacenter Cryptography Fundamentals Fundamentals of Storage Ethical Hacking Fundamentals Disaster Recovery and Business Continuity Management Life and Career Skills Principles of Virtualization Lab Ethical Hacking Fundamentals - Lab Mini Project Industrial Training Introduction to Cloud Computing Solutions Server Operating System II IT Governance, Risk and Information Security Audit Cyber Forensics Basics Fundamentals of Exchange Server Elective I Security Threats and Trends OWASP Framework Hacktivism, Cyber warfare and Cyber Terrorism ISO27001, PCIDSS and HIPAA Linux Security and Forensics Page 3

4 Advanced Web Technology Transition from Campus to Corporate Introduction to Cloud Computing Solutions Lab Server Operating System II Lab Cyber Forensics Basics Lab Transition from Campus to Corporate Semester 7 Server Operating System I - Advanced Virtualization and Cloud Security Security in Wireless, VOIP and Mobile Apps Android Security Elective II Introduction to VOIP E-Commerce Management Theory and Practice Industrial Organization and Management Business Communication Fundamentals of IT Infrastructure Library Server Operating System I - Advanced Lab Mini Project Android Security- Lab Semester 8 Internship/Project *Subject to changes made by the university Career Opportunities for Cloud Technology Professionals* Global Scenario Combined Market of Private and Public Cloud Services - $11 Billion in 2012 Poised to grow to $ 65 to 85$ Billion in McKinsey Analysis: Winning in the SMB Cloud: Charting a Path to Success Growth and Forecast There are currently about 50 million enterprise users of Cloud Of ice Systems which represent only 8 percen t of overall of ice system users, excluding China and India. Predicts that a major shift toward cloud of ice systems will begin by the irst half of 2015 and reach 33 % penetration by Gartner Report Worldwide spending on public IT cloud services will be more than $40 billion in 2014 Expected to approach $100 billion in Over the forecast period, public IT cloud services will enjoy a compound annual growth rate (CAGR) of 26.4%, ive times that of the IT industry overall - IDC research Page 4

5 Jobs and Opportunities - Global Cloud Computing to Create 14 Million New Jobs by By 2015, business revenues from IT innovation enabled by the cloud could reach US$1.1 trillion a year. Career Progression Path for Cloud Technology* Industry Entry level (0-1 yrs exp.) Mid Level (3-5 yrs exp.) Advanced level (5 yrs plus exp.) Average Salary ` 400, ,000 ` 400, ,000 ` 800,000 + Job Role Self - employment Cloud Architect Cloud Engineer Sr. Cloud Engineer Manager Cloud Technlogies Cloud Consultant Manager Cloud Technology Datacentre Technician Datacentre Engineer Datacentre Manager Remote Desktop Engineer Cloud Provisioning Engineer Datacentre Manager Cloud Security Specialist Security Engineer Manager Cloud Security Compensation commensurate to the efforts put in Career Opportunities for Information Security Professionals* Global Scenario Cyber Security Need Drives IT Job Growth *Terms & Conditions Apply New research has found that job openings in the ield of cyber security have grown by more than 100 percent in the past year. Those openings are only expected to grow in the coming year, jumping an additional 30 percent in The demands for security workers points to the importance companies are placing on responding to the growth of recent attacks on businesses of all sizes. - Business News Daily The Army is building a new cyber command centre at Fort Meade to eventually house 1,500, leading a worldwide cyber corps of 21,000 soldiers and civilians. By 2017, the Air Force will add more than 1,000 uniformed cyber forces to its 6,000 experts now working at the Air Force Space Command. The Navy had 800 cyber security staffers in 2013 and will reach nearly 1,000 by 2017, working toward a mix of 80 percent uniformed personnel and 20 percent civilian employees and contractors. The Marines currently have 300 uniformed personnel, civilians and contractors at work, and plan to increase that number to just fewer than 1,000 by Capital Business Page 5

6 Indian Scenario National Cyber Security Policy 2013: As per this Govt. of India policy document, there will be a requirement of 500,000 professionals skilled in cyber security in the next 5 years. Also the Ministry of Communication and Information Technology will encourage all organisations, private and public to designate a member of senior management, as Chief Information Security Of icer (CISO), responsible for cyber security efforts and initiatives. Analysts said that India currently has around certi ied cyber security professionals, which is signi icantly lesser than the requirement of personnel. The current number is miniscule when compared to the nearly 25 million cyber warriors in China. According to recent data, India would need 4.7 lakh cyber security professionals by 2015 to protect its IT infrastructure. - The Times of India Even in the most dif icult of economic times, IT security is a full-employment ield. With the growing number of threats on the horizon, and the growing awareness of cyber security vulnerabilities and issues inside the enterprise, it is clear that security will be a top priority for the coming year and likely for years to come Job Opportunity for Cyber Security Professionals in various departments of different sectors: Corporate (Information Security, Compliance, IT&IS Audit, Software Development etc.) Banking, Finance and Insurance Sector (IT and Data Security, E-Commerce and Net-banking Security, Compliance, Information Risk Management, IT&IS Audit etc.) Defence and Police (R&D, Investigation and Forensics, IT Infrastructure Security etc.) Governance (E-Governance, Public Key Infrastructure Management, Forensic Science Labs etc.) Legal Department (Cyber Forensics Consultants, Cyber Law Expert, Expert witness etc.) Cyber Fraud Consultants / Management (Ethical Hacker, Penetration Testers, Cyber Fraud Detectives) Career Progression Path for Information Security* Industry Entry level (0-1 yrs exp.) Mid Level (3-5 yrs exp.) Advanced level (5 yrs plus exp.) Average Salary ` 200, ,000 ` 400, ,000 ` 800,000 + Executive Information Security Sr. Information Security Officer Chief Information Security Officer Malware Analyst Sr. Malware Analyst Manager Anti Virus Development Job Role Self - employment Datacentre Technician Datacentre Engineer Datacentre Manager Junior Penetration Tester Penetration Tester Ethical Hacker Database Manager IT Security Network and Database Manager - IT Security Datacentre Security Engineer Junior Cyber Forensic Analyst Cyber Forensic Analyst Cyber Forensic Investigator Compensation commensurate to the efforts put in *Terms & Conditions Apply Page 6

7 Partial List of Organizations Where Our Students Received Employment Opportunities* *Terms & Conditions Apply For Enquiry & Admission, Contact Bhawan Negi Mobile : Page 7

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme B. Tech Mobile Applications & Information Security (4 Year Full Time Programme) Academic Year 2015 Page 1 Course Objective This unique course provides dual career options

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme B. Tech - Cloud Technology & Information Security (4 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective B. Tech - Cloud Technology & Information Security

More information

New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme)

New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme) New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective The course provides dual career options for students

More information

New-Age Master s Programme

New-Age Master s Programme New-Age Master s Programme MCA (Information Security Management Services) (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective MCA (Information Security Management Services) This unique

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme BCA - Information Security & Mobile Applications (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective This unique course provides dual career options

More information

B. Tech - Computer Engineering (4 Year Full-Time Programme)

B. Tech - Computer Engineering (4 Year Full-Time Programme) New-Age Undergraduate Programme B. Tech - Computer Engineering (4 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective This program provides students with an overall knowledge of the different

More information

New-Age Degrees for New-Age Careers! Are you ready for the take-off?

New-Age Degrees for New-Age Careers! Are you ready for the take-off? Admission 2015-16 www.kluniversity.in New-Age Degrees for New-Age Careers! Are you ready for the take-off? President s Message Dr. L.S.S. Reddy is an eminent Professor in Computer Science and Engineering

More information

New-Age IT Degrees for New-Age IT Careers!

New-Age IT Degrees for New-Age IT Careers! www.poornima.edu.in Admission 2015-16 New-Age IT Degrees for New-Age IT Careers! Are you ready for the take-off? B. Tech / BCA / BFA Cloud Technology Information Security Mobile Applications IT Infrastructure

More information

Computer Security and Investigations

Computer Security and Investigations Computer Security and Investigations Program Locations: Program Code: Coordinator: Credential: Peterborough CSI Blair Brown Ontario College Advanced Diploma Start Dates: September 06, 2016 January 09,

More information

Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437. Specialist Security Training Catalogue

Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437. Specialist Security Training Catalogue Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time MSc Cyber Security International Students Can Apply UKPASS P052286 Code: Course 1 Year Full-Time, 2-3 Years Part-Time Length: Start Dates: September 2015, January 2016, September 2016, January 2017 Department:Department

More information

Programme In Information Security Management

Programme In Information Security Management Programme In Information Security Management One-year programme in Information Security (IS) MIEL Academy is pleased to announce PRISM TM (Programme in Information Security Management) a one-year Fulltime

More information

Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time

Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time Flexible Online Bachelor s Degree Completion Programs Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time Cyber Security Major The Program You ve heard about

More information

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88 Career Survey 1. In which country are you based? 88 answered question 88 skipped question 0 2. What is your job title? 88 answered question 88 skipped question 0 3. Travel budget not at all 21.0% 17 somewhat

More information

InfoSec Academy Application & Secure Code Track

InfoSec Academy Application & Secure Code Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

An enterprise grade information security & forensic technical team

An enterprise grade information security & forensic technical team An enterprise grade information security & forensic technical team 1-647-892-3363 About Us Pyramid Cyber Security & Forensic (P) Limited is an ISO 9001-2008 and ISO 27001-2005 certified boutique Digital

More information

Cyber Defense Operations Graduate Certificate

Cyber Defense Operations Graduate Certificate The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Cyber threats are growing.

Cyber threats are growing. Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

Michelle Govan & Anand Philip Network & Security Engineering

Michelle Govan & Anand Philip Network & Security Engineering Michelle Govan & Anand Philip Network & Security Engineering Network & Security Engineering Suite Dr Michelle Govan Anand Philip Programme Philosophy The philosophy of the programmes is unique to others

More information

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path

More information

Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws

Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services announces

More information

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document

More information

Cyber security Indian perspective & Collaboration With EU

Cyber security Indian perspective & Collaboration With EU Cyber security Indian perspective & Collaboration With EU Abhishek Sharma, BIC IAG member, On behalf of Dr. A.S.A Krishnan, Sr. Director, Department of Electronics & Information Technology Government of

More information

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Fernanda Tapia Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS Apply today: strayer.edu/apply FLEXIBLE / AFFORDABLE

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

Career Paths in Information Security v6.0

Career Paths in Information Security v6.0 Career Paths in Information Security v6.0 Have you ever considered a career in computer security but didn t know how to get started? The Information Security industry is an exciting and diverse place to

More information

Information Systems Security Certificate Program

Information Systems Security Certificate Program Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate

More information

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations

More information

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services

More information

www.innobuzz.in Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0

www.innobuzz.in Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0 Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0 Innobuzz Knowledge Solutions (P) Limited is a Leading Global Firm providing Training Programs

More information

Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement

Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement 2015 Burning Glass Technologies Cybersecurity has a Big Problem Attacks are rising Cyber incidents jumped

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

Principles of Information Assurance Syllabus

Principles of Information Assurance Syllabus Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information

More information

Information Technology Cluster

Information Technology Cluster Network Systems Pathway Information Technology Cluster Assistant Network Technician -- This major prepares students to install, configure, operate, and connections to remote sites in a wide area network

More information

(Funding for training support means all you pay is the apprentice s wage)

(Funding for training support means all you pay is the apprentice s wage) Your apprentices of today will be your skilled workers of the future. Due to the fast moving nature of the digital world, the demand for talent has never been higher and nurturing skills in-house is one

More information

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services announces Training

More information

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril. Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing

More information

Academic Programs INFORMATION TECHNOLOGY

Academic Programs INFORMATION TECHNOLOGY Academic Programs INFORMATION TECHNOLOGY INFORMATION TECHNOLOGY The Information Systems programs at Tidewater Community College cover the essential areas of study in information systems technology. The

More information

CYBERSTRAT IS PART OF GMTL LLP, 26 YORK STREET, LONDON, W1U 6PZ, UNITED KINGDOM WWW.CYBERSTRAT.CO INFO@CYBERSTRAT.CO

CYBERSTRAT IS PART OF GMTL LLP, 26 YORK STREET, LONDON, W1U 6PZ, UNITED KINGDOM WWW.CYBERSTRAT.CO INFO@CYBERSTRAT.CO CYBERSTRAT IS PART OF GMTL LLP, 26 YORK STREET, LONDON, W1U 6PZ, UNITED KINGDOM WWW.CYBERSTRAT.CO INFO@CYBERSTRAT.CO CYBER, INFORMATION SECURITY - OVERVIEW A cyber security breach is no longer just an

More information

OVERVIEW DEGREES & CERTIFICATES

OVERVIEW DEGREES & CERTIFICATES OVERVIEW DEGREES & CERTIFICATES 015 The best. Made better. SANS graduate programs are the ultimate expression of our 25 years dedicated to the education and development of information security professionals.

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int

(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int 2011 15 (BDT) BDT/POL/CYB/Circular-002 +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int 2008 2010 2010 International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland Tel: +41

More information

COMPUTER SCIENCE & INFORMATION TECHNOLOGY

COMPUTER SCIENCE & INFORMATION TECHNOLOGY ST. JOHNS RIVER STATE COLLEGE COMPUTER SCIENCE & INFORMATION TECHNOLOGY Computer Information Technology Computer Network Engineering Technology Computer Programming and Analysis Computer Programmer Computer

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 229 Information Security Fundamentals I. Basic Course Information A. Course Number & Title: CISY-229 Information Security Fundamentals B. New or Modified

More information

MSc Cyber Security. identity. hacker. virus. network. information

MSc Cyber Security. identity. hacker. virus. network. information identity MSc Cyber Security hacker virus QA is the foremost provider of education in the UK. We work with individuals at all stages of their careers, from our award-winning apprenticeship programmes, through

More information

National Cyber League (NCL) Syllabus

National Cyber League (NCL) Syllabus Note to Faculty The NCL Syllabus is intended as a supplement to a CompTIA Security+ class, or related Network Security course. A primary goal of the NCL is to integrate exercises and competitions into

More information

InfoSec Academy Forensics Track

InfoSec Academy Forensics Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

Networking and Information Security

Networking and Information Security Networking and Information Security College of Engineering & Information Sciences Careers That Fit You Build a career around your interests and talents Do you like figuring out how things work? Solving

More information

Digital Pathways. Penetration Testing

Digital Pathways. Penetration Testing Penetration Testing inftouch@digitalpathwyas.co.uk Penetration testing, vulnerability tests, assurance projects, ethical hacking it all means broadly the same thing; testing a corporate network to determine

More information

InfoSec Academy Pen Testing & Hacking Track

InfoSec Academy Pen Testing & Hacking Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

Roger s Cyber Security and Compliance Mini-Guide

Roger s Cyber Security and Compliance Mini-Guide Roger s Cyber Security and Compliance Mini-Guide A Mini Guide for Small and Medium Business and not for profit organisations. By Roger Smith Managed Service Provider and Cyber Security Coach R & I ICT

More information

Excellence Doesn t Need a Certificate. Be an. Believe in You. 2014 AMIGOSEC Consulting Private Limited

Excellence Doesn t Need a Certificate. Be an. Believe in You. 2014 AMIGOSEC Consulting Private Limited Excellence Doesn t Need a Certificate Be an 2014 AMIGOSEC Consulting Private Limited Believe in You Introduction In this age of emerging technologies where IT plays a crucial role in enabling and running

More information

PROGRAMME DETAIL SPECIFICATION. Programme Summary

PROGRAMME DETAIL SPECIFICATION. Programme Summary PROGRAMME DETAIL SPECIFICATION Programme Summary 1 Awarding institution Liverpool John Moores University 2 Teaching institution university Liverpool John Moores University 3a Programme accredited by: 3b

More information

CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST

CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST CENTER FOR ADVANCED SECURITY TRAINING 618 Designing and Implementing Cloud Security About EC-Council Center of Advanced Security Training () The rapidly evolving information security landscape now requires

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

New-Age Degrees for New-Age Careers!

New-Age Degrees for New-Age Careers! Admission 2015-16 www.kalasalingam.ac.in KALASALINGAM UNIVERSITY New-Age Degrees for New-Age Careers! Are you ready for the take-off? Chairman s Message To Produce Technically Competent, Socially Committed

More information

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015 An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit

More information

IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA

IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA IT TRENDS AND FUTURE CONSIDERATIONS Paul Rainbow CPA, CISA, CIA, CISSP, CTGA AGENDA BYOD Cloud Computing PCI Fraud Internet Banking Questions The Mobile Explosion Mobile traffic data in 2011 was nearly

More information

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Web Technologies

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Web Technologies Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Web Technologies PROGRAMME STRUCTURE Aims & Objectives Business and Information Management This course aims to provide

More information

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

ITU-IMPACT Training and Skills Development Course Catalogue

ITU-IMPACT Training and Skills Development Course Catalogue ITU-IMPACT Training and Skills Development Course Catalogue Management Track Technical Track Course Area Management Incident Response Digital Forensics Network Application Law Enforcement Foundation Management

More information

Introduction to Information Technology Lesson Objectives

Introduction to Information Technology Lesson Objectives Unit 1: HARDWARE AND COMMUNICATIONS TECHNOLOGY INTRODUCTION Computer Systems and Networks Compare and contrast the Industrial and Computer Revolutions Identify a computer system's major components. Identify

More information

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Information Technology Diploma in Web Technologies

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Information Technology Diploma in Web Technologies Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Information Technology Diploma in Web Technologies PROGRAMME STRUCTURE Aims & Objectives Business and Information

More information

Personal Security Practices of the CAO

Personal Security Practices of the CAO Personal Security Practices of the CAO 1. Do you forward your government email to your personal email account? 2. When is the last time you changed your Enterprise password? Within the last 60 days Within

More information

COMPUTER NETWORKS AND SECURITY A FUTURE IN

COMPUTER NETWORKS AND SECURITY A FUTURE IN COMPUTER NETWORKS AND SECURITY A FUTURE IN COMPUTER NETWORKS & SECURITY WHAT ARE CAREERS IN NETWORKS AND SECURITY ALL ABOUT? Computer networks are an inextricable part of modern life. We use computers

More information

MANAGEMENT DEVELOPMENT COURSES

MANAGEMENT DEVELOPMENT COURSES (FULL VIEW) MANAGEMENT DEVELOPMENT COURSES MANAGEMENT DEVELOPMENT COURSES LEADERSHIP DEVELOPMENT Developing Leadership Competencies 4 4 days 230,000 1-4 13-16 26-29 6-9 Critical Thinking: Tools for Problem

More information

Network Engineering Technology

Network Engineering Technology Network Engineering Technology Network Engineering Technology with Specializations in: Cisco Routing and Switching Microsoft Systems Administration Cyber Security and Digital Forensics Associate in Science

More information

BACHELOR OF ENGINEERING WITH HONOURS IN INFORMATION AND COMMUNICATIONS TECHNOLOGY (INFORMATION SECURITY)

BACHELOR OF ENGINEERING WITH HONOURS IN INFORMATION AND COMMUNICATIONS TECHNOLOGY (INFORMATION SECURITY) BACHELOR OF ENGINEERING WITH HONOURS IN INFORMATION AND COMMUNICATIONS TECHNOLOGY (INFORMATION SECURITY) Bachelor of Engineering with Honours in Information and Communications Technology (Information Security)

More information

IT AND BUSINESS CHANGE

IT AND BUSINESS CHANGE THE PANEL IT AND BUSINESS CHANGE SALARY SURVEY 2014 Table of Contents Page 3 Welcome to our IT and Business Change Salary Survey 2014! Page 4 Senior Executives Data Analytics - Business Intelligence /

More information

Computer Information Science xxx

Computer Information Science xxx xxx The mission of the Faculty is to provide future-focused, studentcentred programmes that prepare students for the dynamic Information Systems and Information sectors of the UAE. CIS programme graduates

More information

Information Technology 2015 Programmes

Information Technology 2015 Programmes Information Technology 2015 Programmes Well connected. Right here Innovation, intelligence and ingenuity. Do you have what it takes to make technology work? IT is a booming industry worth an estimated

More information

Postgraduate. eforensics. swinburne.edu.au/postgrad

Postgraduate. eforensics. swinburne.edu.au/postgrad Postgraduate eforensics swinburne.edu.au/postgrad Program details }} Graduate Certificate in eforensics The postgraduate program in eforensics aims to deliver high-quality industry-relevant education to

More information

Ten Tips for Managing Risks on Convergent Networks The Risk Management Group

Ten Tips for Managing Risks on Convergent Networks The Risk Management Group Ten Tips for Managing Risks on Convergent Networks The Risk Management Group April 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,

More information

CHFI v8(computer Hacking Forensics Investigator)

CHFI v8(computer Hacking Forensics Investigator) CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator

More information

EC-Council. Certified. Internet Marketing Practitioner. Unravel the Mystery of. Internet Marketing C IMP

EC-Council. Certified. Internet Marketing Practitioner. Unravel the Mystery of. Internet Marketing C IMP Certified Internet Marketing Practitioner Unravel the Mystery of Internet Marketing TM C IMP Certified Internet Marketing Practitioner Are You a? Our online lives are fast becoming as important and real

More information

Procurement Policy Note Use of Cyber Essentials Scheme certification

Procurement Policy Note Use of Cyber Essentials Scheme certification Procurement Policy Note Use of Cyber Essentials Scheme certification Action Note 09/14 25 September 2014 Issue 1. Government is taking steps to further reduce the levels of cyber security risk in its supply

More information

CRYPTUS DIPLOMA IN IT SECURITY

CRYPTUS DIPLOMA IN IT SECURITY CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information

More information

BEng/ BEng (Hons) Networked Systems Engineering, BSc/ BSc (Hons) Cyber Security and Networks BEng/ BEng (Hons) Digital Security, Forensics and

BEng/ BEng (Hons) Networked Systems Engineering, BSc/ BSc (Hons) Cyber Security and Networks BEng/ BEng (Hons) Digital Security, Forensics and BEng/ BEng (Hons) Networked Systems Engineering, BSc/ BSc (Hons) Cyber Security and Networks BEng/ BEng (Hons) Digital Security, Forensics and Ethical Hacking Programme Structure The programmes are unique

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

Bachelor of Information Technology

Bachelor of Information Technology Bachelor of Information Technology [ Network security] Information for International Students www.nsi.tafensw.edu.au/itsecuritydegree Bachelor of Information Technology [ Network security] Cybercrime is

More information

COURSE TITLE COURSE DESCRIPTION

COURSE TITLE COURSE DESCRIPTION COURSE TITLE COURSE DESCRIPTION CS-00X COMPUTING EXIT INTERVIEW All graduating students are required to meet with their department chairperson/program director to finalize requirements for degree completion.

More information

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.

More information

IT and Cyber Security Training Courses

IT and Cyber Security Training Courses AN FORAS RIARACHÁIN INSTITUTE OF PUBLIC ADMINISTRATION IT and Cyber Security Training s Spring 2016 Protection Through Knowledge, Skills, Practice Institute of Public Administration / 01 240 3600 IT Security

More information

Protection Through Knowledge, Skills, Practice

Protection Through Knowledge, Skills, Practice Protection Through Knowledge, Skills, Practice provide expert-led training courses for IT professionals and senior managers across Ireland. www.senseicybersecurity.ie Training Course Summary provide expert-led

More information

MassTLC Security Community Advisory Board Meeting JANUARY 15, 2016

MassTLC Security Community Advisory Board Meeting JANUARY 15, 2016 MassTLC Security Community Advisory Board Meeting JANUARY 15, 2016 Guest Speakers: Will Markow Senior Analyst, Burning Glass Lou Piazza Director, BATEC Bridging the Cybersecurity Talent Gap 2015 Burning

More information

Master of Science COMPUTER SCIENCE. Master of Science INFORMATION SYSTEMS. Master of Science SOFTWARE ENGINEERING.

Master of Science COMPUTER SCIENCE. Master of Science INFORMATION SYSTEMS. Master of Science SOFTWARE ENGINEERING. Master of Science COMPUTER SCIENCE Master of Science INFORMATION SYSTEMS Master of Science SOFTWARE ENGINEERING Graduate PROGRAMS A s technology continues to permeate every aspect of society, the demand

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY-274 Privacy, Ethics & Computer Forensics I. Basic Course Information A. Course Number & Title: CISY-274 - Privacy, Ethics, & Computer Forensics B. New

More information

EC Council Certified Ethical Hacker V8

EC Council Certified Ethical Hacker V8 Course Code: ECCEH8 Vendor: Cyber Course Overview Duration: 5 RRP: 2,445 EC Council Certified Ethical Hacker V8 Overview This class will immerse the delegates into an interactive environment where they

More information