New-Age Undergraduate Programme

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "New-Age Undergraduate Programme"

Transcription

1 New-Age Undergraduate Programme B. Tech - Cloud Technology & Information Security (4 Year Full-Time Programme) Academic Year 2015 Page 1

2 Course Objective B. Tech - Cloud Technology & Information Security This unique B. Tech course provides dual career options for students in the fast growing technology sectors of Cloud Technology and Information Security. In addition to all the mandatory subjects of a traditional B. Tech, this specialized course offers in-depth practical know-how of the current trend Technology Cloud and Information Security. These Sectors have the potential to grow exponentially and they provide challenging job opportunities for young professionals with the right skill sets. On the Cloud Technology front, the course will provide students with the fundamental knowledge of all aspects of Cloud Technology. The course focuses on Virtualization Technology, Cloud Technology, Datacenters, Networking and Operating Systems. On the Information Security front, this course equips the students with the concepts and the technical skills in Information Security. The focus of the course is on the models, tools and techniques for enforcement of Security Policies, with emphasis on Cryptography, Ethical Hacking, Computer Forensics and Virtualization and Cloud Security. Course Particulars Course Name B. Tech. Cloud Technology & Information Security Degree Awarded Bachelor Of Technology Duration of the Course 4 Years (8 semesters) Certifying University Medium of Instruction & Examination English Study Campus Plot No. IS-2027 To 2031, Ramchandrapura, P.O. Vidhani Vatika, Sitapura Extension, Jaipur (Rajasthan) Eligibility The minimum quali ication required to apply is a pass in the 10+2 examination from PUC / ISC / CBSE or equivalent board or a course recognised as equivalent thereto by the university. Examinations & Assessments 1. Internal test 2. Assignments 3. Seminar presentation 4. Class tests 5. Preparatory theory and Practical examination 6. Term end theory and Practical examination Page 2

3 Curriculum* Semester 1 Technical English Matrices and Calculus Engineering Physics Engineering Chemistry Computer Fundamentals and Organization Programming in C Computer Aided Drafting Programming in C - Lab Physics and Chemistry - Lab Soft Skills-I Semester 2 Communication Skills Differential Equations and Complex Analysis OOPs with C++Industrial Chemistry Operating System Building Blocks Information Security - I OOPS with C++ - Lab Information Security I - Lab Physics and Chemistry - Lab Soft Skills - II Semester 3 Semester 4 OSI Layer and Security Introduction to Cloud Technology Network Security Basics Probability and Queuing Theory Data Structures using C Introduction to Linux Computer Networks Server Operating System I Fundamentals of Operating Systems (Windows) Ethical Hacking Fundamentals Open Electives (Theory) Any One Departmental Elective (Theory) Any One Fourier Series and Transforms Information Security II Basics of Engineering Applications Security Threats and Trends Industrial Psychology and Sociology Introduction to Linux Lab Computer Networks Lab Server Operating System I Lab Network Security Lab Ethical Hacking Fundamentals - Lab Fundamentals of Operating Systems (Windows) - Lab Soft Skills - III Semester 6 Introduction to Windows Azure Server Operating System II IT Governance, Risk and Information Security Semester 5 Principles of Virtualization Fundamentals of Datacenter Cryptography Fundamentals Fundamentals of Storage Introduction to Web Technology Open Electives (Theory) Any One Nano Science and Technology Mobile Computing Organizational Behavior and Cyber Law Principles of Virtualization Lab Web Technology Fundamentals - Lab Soft Skills - IV Audit Cyber Forensics Basics Fundamentals of Exchange Server Departmental Elective (Theory) Any One Disaster Recovery and Business Continuity OWASP Framework Introduction to Windows Azure Lab Server Operating System II Lab Cyber Forensics Basics - Lab Page 3

4 Semester 7 Semester 8 Server Operating System I Advanced Business Communication Virtualization and Cloud Security Security in Wireless, VoIP and Mobile Apps Android Security Departmental Electives (Theory): ANY ONE Hacktivism, Cyber Warfare and Cyber Terrorism Linux Security and Forensics Open Elective (Theory) : ANY ONE E-Commerce Logistics and Supply Chain Management Entrepreneurship Server Operating System I Advanced Lab Android Security - Lab Soft Skills - V Departmental Elective (Theory) Fundamentals of IT Infrastructure Library Introduction to VoIP *Subject to changes made by the university Career Opportunities for Cloud Technology Professionals* Global Scenario Combined market of private and public cloud services: $11 billion in 2012 Cloud industry poised to grow to $65 to $85 billion in 2015 (McKinsey Analysis: Winning in the SMB Cloud: Charting a Path to Success Growth and Forecast) There are currently about 50 million enterprise users of Cloud Of ice Systems, which represents only 8 percent of overall of ice system users, excluding China and India. A major shift toward cloud of ice systems will begin by the irst half of 2015 and reach 33 % penetration by 2017 (Gartner Report). Worldwide spending on public IT cloud services will be more than $40 billion in 2014 and is expected to approach $100 billion in Over the forecast period, public IT cloud services will enjoy a compound annual growth rate (CAGR) of 26.4%, ive times that of the IT industry overall - IDC research Jobs and Opportunities - Global Cloud Computing to create 14 million new jobs by 2015 By 2015, business revenues from IT innovation enabled by the cloud could will reach US$1.1 trillion a year Page 4

5 Indian Scenario Market Size - India The public cloud services market in India is forecast to grow 36 percent in 2014 to total $443 million, up from $326 million in 2013, according to Gartner, Inc. Infrastructure as a service (IaaS), including cloud compute, storage and print services, continues as the fastest-growing segment of the market in India, growing 22.7 percent in 2013 to $43.1 million, and it is expected to grow 39.6 percent in 2014 to $60.2 million. Infrastructure as a service (IaaS), including cloud compute, storage and print services continued as the fastest-growing segment of the market, growing 42.4 percent in 2012 to $6.1 billion and is expected to grow 47.3 percent in 2013 to $9 billion. Jobs and Opportunities India India will create over 2 million jobs in Cloud sector, predicts a study commissioned by Microsoft and conducted by International Data Corporation (IDC). Career Progression Path for Cloud Technology Professionals* Industry Entry level (0-1 yrs exp.) Mid Level (3-5 yrs exp.) Advanced level (5 yrs plus exp.) Salary Range 200, , , , ,000 + Cloud Architect Cloud Consultant Job Role Cloud Engineer Senior Cloud Engineer Manager Cloud Technologies Data Centre Technician Data Centre Engineer Data Centre Manager Remote Desktop Engineer Cloud Security Specialist Cloud Provisioning Engineer Security Engineer Data Centre Manager Manager Cloud Security Career Opportunities for Information Security Professionals Global Scenario Cyber Security Needs Drive IT Job Growth New research has found that job openings in the ield of cyber security have grown by more than 100 percent in the past year. Those openings are only expected to grow in the coming year, jumping an additional 30 percent in The demand for security workers points to the importance companies are placing on responding to the growth of recent attacks on businesses of all sizes. - Business News Daily Page 5

6 US Federal agencies to hire more cyber defenders in 2014 The Army is building a new cyber command centre at Fort Meade to eventually house 1,500 individuals, leading a worldwide cyber corps of 21,000 soldiers and civilians. By 2017, the Air Force will add more than 1,000 uniformed cyber forces to its 6,000 experts now working at the Air Force Space Command. The Navy had 800 cyber security staffers in 2013 and will reach nearly 1,000 by 2017, working toward a mix of 80 percent uniformed personnel and 20 percent civilian employees and contractors. The Marines currently have 300 uniformed personnel, civilians and contractors at work, and plan to increase that number to just fewer than 1,000 by Career Progression Path for Information Security Professionals* Level Entry level (0-1 yrs exp.) Mid Level (3-5 yrs exp.) Advanced level (5 yrs plus exp.) Salary Range 200, , , , ,000 + Job Role Executive Information Security Senior Information Security Of icer Chief Information Security Of icer Malware Analyst Senior Malware Analyst Manager Anti-Virus Development Data Centre Technician Data Centre Engineer Data Centre Manager Junior Penetration Tester Penetration Tester Ethical Hacker Database Manager IT Security Network and Database Manager IT Data Centre Security Engineer Security Junior Cyber Forensic Analyst Cyber Forensic Analyst Cyber Forensic Investigator Page 6

7 Partial List of Organizations Where Our Students Received Employment Opportunities* For Enquiries & Admission Contact Arpit Solanki Page 7

New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme)

New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme) New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective The course provides dual career options for students

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme B. Tech Cloud Technology & Information Security (4 Year Full Time Programme) Academic Year 2015 Page 1 Course Objective This unique B. Tech course provides dual career options

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme BCA - Information Security & Mobile Applications (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective This unique course provides dual career options

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme B. Tech Mobile Applications & Information Security (4 Year Full Time Programme) Academic Year 2015 Page 1 Course Objective This unique course provides dual career options

More information

New-Age Master s Programme

New-Age Master s Programme New-Age Master s Programme MCA (Information Security Management Services) (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective MCA (Information Security Management Services) This unique

More information

B. Tech - Computer Engineering (4 Year Full-Time Programme)

B. Tech - Computer Engineering (4 Year Full-Time Programme) New-Age Undergraduate Programme B. Tech - Computer Engineering (4 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective This program provides students with an overall knowledge of the different

More information

New-Age Degrees for New-Age Careers! Are you ready for the take-off?

New-Age Degrees for New-Age Careers! Are you ready for the take-off? Admission 2015-16 www.kluniversity.in New-Age Degrees for New-Age Careers! Are you ready for the take-off? President s Message Dr. L.S.S. Reddy is an eminent Professor in Computer Science and Engineering

More information

New-Age IT Degrees for New-Age IT Careers!

New-Age IT Degrees for New-Age IT Careers! www.poornima.edu.in Admission 2015-16 New-Age IT Degrees for New-Age IT Careers! Are you ready for the take-off? B. Tech / BCA / BFA Cloud Technology Information Security Mobile Applications IT Infrastructure

More information

Computer Security and Investigations

Computer Security and Investigations Computer Security and Investigations Program Locations: Program Code: Coordinator: Credential: Peterborough CSI Blair Brown Ontario College Advanced Diploma Start Dates: September 06, 2016 January 09,

More information

Cyber threats are growing.

Cyber threats are growing. Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Fernanda Tapia Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS Apply today: strayer.edu/apply FLEXIBLE / AFFORDABLE

More information

Programme In Information Security Management

Programme In Information Security Management Programme In Information Security Management One-year programme in Information Security (IS) MIEL Academy is pleased to announce PRISM TM (Programme in Information Security Management) a one-year Fulltime

More information

Career Paths in Information Security v6.0

Career Paths in Information Security v6.0 Career Paths in Information Security v6.0 Have you ever considered a career in computer security but didn t know how to get started? The Information Security industry is an exciting and diverse place to

More information

Michelle Govan & Anand Philip Network & Security Engineering

Michelle Govan & Anand Philip Network & Security Engineering Michelle Govan & Anand Philip Network & Security Engineering Network & Security Engineering Suite Dr Michelle Govan Anand Philip Programme Philosophy The philosophy of the programmes is unique to others

More information

State of IT Skills Gap

State of IT Skills Gap State of IT Skills Gap 2014 Summary Copyright (c) 2014 CompTIA Properties, LLC. All Rights Reserved. CompTIA.org IT Industry Overview Copyright (c) 2014 CompTIA Properties, LLC. All Rights Reserved. CompTIA.org

More information

Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement

Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement 2015 Burning Glass Technologies Cybersecurity has a Big Problem Attacks are rising Cyber incidents jumped

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

OVERVIEW DEGREES & CERTIFICATES

OVERVIEW DEGREES & CERTIFICATES OVERVIEW DEGREES & CERTIFICATES 015 The best. Made better. SANS graduate programs are the ultimate expression of our 25 years dedicated to the education and development of information security professionals.

More information

Cloud Focused Cloud Services Partner Dashboard aka.ms/profittool aka.ms/cpplearningpath rofitabilityscenarios aka.ms/businessplan Microsoft Azure Enterprise Scenarios Microsoft Azure Enterprise

More information

Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time

Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time Flexible Online Bachelor s Degree Completion Programs Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time Cyber Security Major The Program You ve heard about

More information

Introduction to Information Technology Lesson Objectives

Introduction to Information Technology Lesson Objectives Unit 1: HARDWARE AND COMMUNICATIONS TECHNOLOGY INTRODUCTION Computer Systems and Networks Compare and contrast the Industrial and Computer Revolutions Identify a computer system's major components. Identify

More information

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY RECOGNIZED MARKETABLE

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY RECOGNIZED MARKETABLE RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Bryan Rolle Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Apply today: strayer.edu/apply FLEXIBLE /

More information

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

Leveraging the Cloud for your Business

Leveraging the Cloud for your Business Leveraging the Cloud for your Business Save money and time by moving to the cloud Learn how Moving to the Cloud 3 from small and mid-sized businesses (SMBs) to Enterprise Companies. What problems can cloud

More information

Network Engineering Technology

Network Engineering Technology Network Engineering Technology Network Engineering Technology with Specializations in: Cisco Routing and Switching Microsoft Systems Administration Cyber Security and Digital Forensics Associate in Science

More information

(Funding for training support means all you pay is the apprentice s wage)

(Funding for training support means all you pay is the apprentice s wage) Your apprentices of today will be your skilled workers of the future. Due to the fast moving nature of the digital world, the demand for talent has never been higher and nurturing skills in-house is one

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

Notification of Request for Authorization under the Degree-Granting Institutions Act

Notification of Request for Authorization under the Degree-Granting Institutions Act Notification of Request for Authorization under the Degree-Granting Institutions Act Date posted: May 22, 2013 Institution: Current status: Nature of request: Argosy University Authorized to offer programs

More information

Academic Programs INFORMATION TECHNOLOGY

Academic Programs INFORMATION TECHNOLOGY Academic Programs INFORMATION TECHNOLOGY INFORMATION TECHNOLOGY The Information Systems programs at Tidewater Community College cover the essential areas of study in information systems technology. The

More information

COMPUTER SCIENCE & INFORMATION TECHNOLOGY

COMPUTER SCIENCE & INFORMATION TECHNOLOGY ST. JOHNS RIVER STATE COLLEGE COMPUTER SCIENCE & INFORMATION TECHNOLOGY Computer Information Technology Computer Network Engineering Technology Computer Programming and Analysis Computer Programmer Computer

More information

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time MSc Cyber Security International Students Can Apply UKPASS P052286 Code: Course 1 Year Full-Time, 2-3 Years Part-Time Length: Start Dates: September 2015, January 2016, September 2016, January 2017 Department:Department

More information

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7 1 of 7 Network Support This technical certificate program prepares the student for employment as PC Technician; Computer Support Specialist, and Network Support Technician systems and computer network

More information

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437. Specialist Security Training Catalogue

Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437. Specialist Security Training Catalogue Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?

More information

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015 An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit

More information

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Leann Atoigue Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION SYSTEMS Apply today: strayer.edu/apply FLEXIBLE / AFFORDABLE

More information

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88 Career Survey 1. In which country are you based? 88 answered question 88 skipped question 0 2. What is your job title? 88 answered question 88 skipped question 0 3. Travel budget not at all 21.0% 17 somewhat

More information

Leveraging the Cloud for Your Business

Leveraging the Cloud for Your Business Leveraging the Cloud for Your Business by CornerStone Telephone Company 2 Third Street Troy, NY 12180 As consumers, we enjoy the benefits of cloud services from companies like Amazon, Google, Apple and

More information

Information Technology Cluster

Information Technology Cluster Network Systems Pathway Information Technology Cluster Assistant Network Technician -- This major prepares students to install, configure, operate, and connections to remote sites in a wide area network

More information

Brandman University. School of CCNA

Brandman University. School of CCNA Information Technology Certifications CCNA The Cisco CCNA Training Package (ICND: Parts 1 and 2) includes expert instructor-led training modules with customized presentations, practice exam simulators

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Networking and Information Security

Networking and Information Security Networking and Information Security College of Engineering & Information Sciences Careers That Fit You Build a career around your interests and talents Do you like figuring out how things work? Solving

More information

Computer Forensics and Incident Response in the Cloud. Stephen Coty AlertLogic, Inc. @Twitter AlertLogic_ACID

Computer Forensics and Incident Response in the Cloud. Stephen Coty AlertLogic, Inc. @Twitter AlertLogic_ACID Computer Forensics and Incident Response in the Cloud SESSION ID: ANF-T07A Stephen Coty AlertLogic, Inc. @Twitter AlertLogic_ACID Why forensics in the cloud? Cloud market revenue will increase at a 36%

More information

Server & Cloud Management

Server & Cloud Management Technical Bootcamp: The Cloud-enabled Datacenter with Windows Server 2012 and System Center 2012 This 3-day, instructor-led course will help you understand how to evolve a traditional datacenter configuration

More information

MassTLC Security Community Advisory Board Meeting JANUARY 15, 2016

MassTLC Security Community Advisory Board Meeting JANUARY 15, 2016 MassTLC Security Community Advisory Board Meeting JANUARY 15, 2016 Guest Speakers: Will Markow Senior Analyst, Burning Glass Lou Piazza Director, BATEC Bridging the Cybersecurity Talent Gap 2015 Burning

More information

Cybersecurity AAS Program

Cybersecurity AAS Program Cybersecurity AAS Program New Program Proposal State Submission Steve Buchholz, Dean of Accreditation and Advancement July 2015 TABLE OF CONTENTS Executive Summary... 2 Identification and Description of

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

Information Systems Security Certificate Program

Information Systems Security Certificate Program Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate

More information

Minnesota State Community and Technical College Detroit Lakes Campus

Minnesota State Community and Technical College Detroit Lakes Campus Computer Network Security Minnesota State Community and Technical College Detroit Lakes Campus Overview Philosophy Note on 2 year Colleges Certifications Program Courses CCDC Program Numbers Faculty Future

More information

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.

More information

Cyber Defense Operations Graduate Certificate

Cyber Defense Operations Graduate Certificate The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide

More information

Principles of Information Assurance Syllabus

Principles of Information Assurance Syllabus Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information

More information

Information Technology

Information Technology Information Technology Bachelor of Information Technology Master of Information Technology Joint Degree: Master of Information Technology - Master of Business Administration 1 university 2 countries 3

More information

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path

More information

(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int

(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int 2011 15 (BDT) BDT/POL/CYB/Circular-002 +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int 2008 2010 2010 International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland Tel: +41

More information

www.innobuzz.in Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0

www.innobuzz.in Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0 Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0 Innobuzz Knowledge Solutions (P) Limited is a Leading Global Firm providing Training Programs

More information

Full-Speed Ahead: The Demand for Security Certification by James R. Wade

Full-Speed Ahead: The Demand for Security Certification by James R. Wade Full-Speed Ahead: The Demand for Security Certification by James R. Wade It s no secret that technology is creating a more connected world every day. But as new technologies are released and adopted, the

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 229 Information Security Fundamentals I. Basic Course Information A. Course Number & Title: CISY-229 Information Security Fundamentals B. New or Modified

More information

UNDERGRADUATE NEW PROGRAM MAJOR OR MINOR OR CONCENTRATION Within an Existing Degree Program*

UNDERGRADUATE NEW PROGRAM MAJOR OR MINOR OR CONCENTRATION Within an Existing Degree Program* UNDERGRADUATE NEW PROGRAM MAJOR OR MINOR OR CONCENTRATION Within an Existing Degree Program* *For a new degree program or new CIP code designation, in addition to EPC program and course forms you must

More information

InfoSec Academy Application & Secure Code Track

InfoSec Academy Application & Secure Code Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

Cloud Computing Security: Public vs. Private Cloud Computing

Cloud Computing Security: Public vs. Private Cloud Computing Cloud Computing Security: Public vs. Private Cloud Computing White paper Parallels Cloud Computing Security Overview Over the last few years, cloud computing has become a buzzword on the Internet. In simple

More information

Computer Information Science xxx

Computer Information Science xxx xxx The mission of the Faculty is to provide future-focused, studentcentred programmes that prepare students for the dynamic Information Systems and Information sectors of the UAE. CIS programme graduates

More information

B.A. in Information Systems

B.A. in Information Systems New Jersey Institute of Technology 1 B.A. in Information Systems (129 credit) First Year Term Credits CS 100 Roadmap to Computing HUM 101 English Composition: Writing, Speaking, Thinking I MATH 18 General

More information

INFORMATION TECHNOLOGY

INFORMATION TECHNOLOGY INFORMATION TECHNOLOGY START HERE. More than 70,000 futures have started at Kirkwood... Yours can be one of them! Get a great start here in an information technology-related field, then go straight into

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

BEng/ BEng (Hons) Networked Systems Engineering, BSc/ BSc (Hons) Cyber Security and Networks BEng/ BEng (Hons) Digital Security, Forensics and

BEng/ BEng (Hons) Networked Systems Engineering, BSc/ BSc (Hons) Cyber Security and Networks BEng/ BEng (Hons) Digital Security, Forensics and BEng/ BEng (Hons) Networked Systems Engineering, BSc/ BSc (Hons) Cyber Security and Networks BEng/ BEng (Hons) Digital Security, Forensics and Ethical Hacking Programme Structure The programmes are unique

More information

Enterprise mobility market expected to reach $340 billion by 2017 MASTER PROGRAM IN ENTERPRISE MOBILITY

Enterprise mobility market expected to reach $340 billion by 2017 MASTER PROGRAM IN ENTERPRISE MOBILITY Enterprise mobility market expected to reach $340 billion by 2017 MASTER PROGRAM IN ENTERPRISE MOBILITY Enterprise mobility enables a workforce to have instant access to information through mobile applications

More information

CAST Center for Advanced Security Training

CAST Center for Advanced Security Training CAST Center for Advanced Security Training Advanced Security Training (CAST) EC-Council s Center for Advanced Security Training (CAST) was created to address the need for highly technical and Advanced

More information

Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs)

Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs) Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted

More information

MANAGEMENT DEVELOPMENT COURSES

MANAGEMENT DEVELOPMENT COURSES (FULL VIEW) MANAGEMENT DEVELOPMENT COURSES MANAGEMENT DEVELOPMENT COURSES LEADERSHIP DEVELOPMENT Developing Leadership Competencies 4 4 days 230,000 1-4 13-16 26-29 6-9 Critical Thinking: Tools for Problem

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

T H E U N I V E R S I T Y O F T E X A S A T E L P A S O. College of Business Administration. Information Systems

T H E U N I V E R S I T Y O F T E X A S A T E L P A S O. College of Business Administration. Information Systems T H E U N I V E R S I T Y O F T E X A S A T E L P A S O College of Business Administration Information Systems What is Computer Information Systems? A field of studying computers and algorithmic processes.

More information

EC-Council. Certified. Internet Marketing Practitioner. Unravel the Mystery of. Internet Marketing C IMP

EC-Council. Certified. Internet Marketing Practitioner. Unravel the Mystery of. Internet Marketing C IMP Certified Internet Marketing Practitioner Unravel the Mystery of Internet Marketing TM C IMP Certified Internet Marketing Practitioner Are You a? Our online lives are fast becoming as important and real

More information

Information Technology Networking Specialist Microsoft Enterprise Administrator

Information Technology Networking Specialist Microsoft Enterprise Administrator Information Technology Networking Specialist Microsoft Enterprise Administrator INDIVIDUAL PROGRAM INFORMATION 2015 2016 866.Macomb1 (866.622.6621) www.macomb.edu Information Technology Networking Specialist

More information

COURSE TITLE COURSE DESCRIPTION

COURSE TITLE COURSE DESCRIPTION COURSE TITLE COURSE DESCRIPTION CS-00X COMPUTING EXIT INTERVIEW All graduating students are required to meet with their department chairperson/program director to finalize requirements for degree completion.

More information

COURSE CATALOG 2014-2015

COURSE CATALOG 2014-2015 COURSE CATALOG 2014-2015 Programs and policies described here pertain to the College of Professional Studies. For a more complete description of the university s offerings and policies, please consult

More information

COMPUTER NETWORKS AND SECURITY A FUTURE IN

COMPUTER NETWORKS AND SECURITY A FUTURE IN COMPUTER NETWORKS AND SECURITY A FUTURE IN COMPUTER NETWORKS & SECURITY WHAT ARE CAREERS IN NETWORKS AND SECURITY ALL ABOUT? Computer networks are an inextricable part of modern life. We use computers

More information

Evening MBA Program. Leading through innovation.

Evening MBA Program. Leading through innovation. Evening MBA Program Leading through innovation. The primary goal of the Graduate Business Evening MBA Program at Ursuline is to prepare students to become socially responsible managers and leaders from

More information

C-. If these courses have not been completed satisfactorily upon enrolling at USF Sarasota-Manatee, they must be taken before the degree is granted.

C-. If these courses have not been completed satisfactorily upon enrolling at USF Sarasota-Manatee, they must be taken before the degree is granted. C-. If these courses have not been completed satisfactorily upon enrolling at USF Sarasota-Manatee, they must be taken before the degree is granted. Upper-level Course Requirements Required Courses HIS

More information

MSc Studies in Computing

MSc Studies in Computing MSc Studies in Computing presented by Department of Computing www.surrey.ac.uk/computing Why University of Surrey? Campus based university everything is in one place study and live on beautiful campus

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking

More information

Mark Wilson, President January 2014

Mark Wilson, President January 2014 Criminal Justice Program Expansion State Submission Mark Wilson, President January 2014 TABLE OF CONTENTS Executive Summary... 2 Identification and Description of the Program... 2 Objectives and Purpose

More information

Recommended Programs Per School

Recommended Programs Per School Recommended Programs Per School Note: Some courses are appropriate for teaching students at various ages, therefore some courses may be listed below as recommended offerings at multiple school age levels.

More information

EDUCATION FOR THE FUTURE. www.itt-tech.edu

EDUCATION FOR THE FUTURE. www.itt-tech.edu EDUCATION FOR THE FUTURE www.itt-tech.edu THE MISSION OF THE ITT TECHNICAL INSTITUTE The THE ITT MISSION Technical of ITT Educational Institute is Services, an institution Inc., and ITT of Technical higher

More information

Roger s Cyber Security and Compliance Mini-Guide

Roger s Cyber Security and Compliance Mini-Guide Roger s Cyber Security and Compliance Mini-Guide A Mini Guide for Small and Medium Business and not for profit organisations. By Roger Smith Managed Service Provider and Cyber Security Coach R & I ICT

More information

Analyze. Secure. Defend. Do you hold ECSA credential?

Analyze. Secure. Defend. Do you hold ECSA credential? 1 Analyze. Secure. Defend. Do you hold ECSA credential? TM E C S A EC-Council Certified Security Analyst 1 EC-Council Cyber Security Professional Path Threat Agent Application of Methodology So You Can

More information

OVERVIEW. Enterprise Security Solutions

OVERVIEW. Enterprise Security Solutions Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

SENIOR SYSTEMS ANALYST

SENIOR SYSTEMS ANALYST CITY OF MONTEBELLO 109 DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and

More information

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com SURVEY Impact of Training: Functional Excellence Leads to Operational Productivity Cushing Anderson IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015

More information

Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws

Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services announces

More information

Course overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft)

Course overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft) Overview This 5-day course is intended for those wishing to qualify with. A+ is a foundation-level certification designed for IT professionals with around 1 year's experience whose job role is focused

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer

More information

ISACA S CYBERSECURITY NEXUS (CSX) October 2015

ISACA S CYBERSECURITY NEXUS (CSX) October 2015 ISACA S CYBERSECURITY NEXUS (CSX) October 2015 DO2 EXECUTIVE OVERVIEW Will you be a Cyber defender? ISACA launched the Cybersecurity Nexus (CSX) program earlier this year. CSX, developed in collaboration

More information

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Trends

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Trends Quarterly Cybersecurity BILT Meeting October 10, 2012 Meeting Minutes ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Trends Stephen

More information

National Cyber League (NCL) Syllabus

National Cyber League (NCL) Syllabus Note to Faculty The NCL Syllabus is intended as a supplement to a CompTIA Security+ class, or related Network Security course. A primary goal of the NCL is to integrate exercises and competitions into

More information

Software Development

Software Development Software Development Associate s Degree The ITT Technical Institutes offer a variety of career-focused curricula. This sheet helps describe the associate s degree program in Software Development 1 offered

More information