riphah institute of systems engineering

Size: px
Start display at page:

Download "riphah institute of systems engineering"

Transcription

1 riphah institute of systems engineering Prospectus

2 riphah institute of systems engineering

3 Our Mission Riphah Institute of Systems Engineering (RISE) To create a center of excellence for Information Security. Facilitate the market with the best talent in information security and positively contribute to the academic, public and private sectors. Ingrain the spirit of national competitiveness and be a catalyst for change in the field of Information Security. 01 Riphah International University RISE is a special initiative by Riphah International University to impart quality in education, professional trainings & consultancy in the field of Information Security. With a unique construct this institute out shines all the other educational institutes as it is the first institute that has academia, R&D, training & consulting specializing in information security technology solutions and dedicated to providing information security professionals & delivering cost affective services that span Information Security Management for all industries.

4 Dr. Saad Naeem Zafar (CISA, CISM, CRISC, CGEIT) Director, Riphah Institute of Systems Engineering Chief Information Officer (CIO) 02 Riphah Institute of Systems Engineering Dr. Saad Zafar is currently working as Director, Riphah Institute of Systems Engineering and Dean, Faculty of Computing at Riphah International University (RIU), Islamabad, Pakistan. He has been affiliated with the field of Information Technology for more than twenty years. His area of specialization is Information Security. At Riphah, he is leading a Secure and Dependable Systems research group. He has been teaching Information Security Management, Security Engineering and Application Security, both at the undergraduate and postgraduate level. He has been Director of Information Technology at Riphah International University and has provided Information Technology consultancy to a number of organizations. Dr. Zafar started his career working as a Software Engineer at Phoenix Technologies and Polysar Incorporated in the USA. Since then he has been involved in many projects related to software acquisition, development and implementation as software engineer, project manager and chief information officer. He has received his PhD from Griffith University, Australia. His research is in the area of Information Security. He was affiliated with the Dependable Complex Computer-based System (DCCS) research group which was funded by the Australian Research Council. He was also associated with the Software Quality Institute and the Institute of Integrated and Intelligent Systems at Griffith University. He has received Masters in Software Engineering from Griffith University, Australia. He was awarded Academic Excellence Award for his educational performance at the Griffith University. Khurram Javed (CEI, CEH, CHFI, ECSA, LPT, CCAI) Assistant Director, Riphah Institute of Systems Engineering Master Trainer, Information Security Trainings, PDC Information Security Consultant/Penetration Tester Khurram Javed is currently serving as Assistant Director, Riphah Institute of Systems Engineering (RISE) and Assistant Professor in the Faculty of Computing at Riphah International University. He is primarily responsible for strategic development, planning, analysis and execution of projects under the Professional Trainings and Consultancy wings. He has been attached with academia for over a decade and has served as permanent faculty in many prestigious universities in Pakistan. His areas of specialization are Social Engineering, Wireless and Offensive Security. Beside academic responsibilities, Khurram has been delivering as an Information Security Consultant / Penetration Tester & Master Trainer, Information Security Certification trainings, under the Professional Development Center at Riphah Institute of Systems Engineering (RISE). He is a prolific information security trainer/consultant and has conducted numerous security trainings across Pakistan. He is a Certified EC-Council Instructor (CEI), Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI), EC-Council Certified Security Analyst (ECSA) and a Licensed Penetration Tester (LPT) from EC-Council Academy, Kuala Lumpur, Malaysia. He leads the Penetration Testing and Digital Forensics teams at RISE.Khurram is also an active speaker at Information Security conferences and seminars and has professional memberships with EC-Council, IEEE, Cisco Network Academy, ISOC, CSTA-ACM and Pakistan Information Security Association (PISA).

5 Creating Knowledge Beyond Chronology RISE Research The objective of research initiatives is to educate future leaders which will enable them to unveil knowledge and generate fresh ideas. Our research groups work in liaison with varied international research consortiums. The key areas of research are : Secure and Dependable Systems Research Group: This research group is led by Dr. Saad Naeem Zafar. Active research areas of this group are: Secure Software Engineering, Information Security Management, Information Security Policies, IT Governance. 03 Riphah International University Offensive Security Research Group: This research group is led by Mr. Khurram Javed. Active Research areas of the group are: Wireless Security, Ethical Hacking, Social Engineering, Penetration Testing, Offensive Security, Digital Forensics etc. Network Security Research Group: This research group is led by Dr. Muhammad Yousaf. Active research areas of this group are: Network Security, Network Forensics, Network Traffic Analysis, Security Protocols Design, etc. Distributed and Cloud Computing Research Group: This research group is led by Dr. Sheheryar Malik. Active research areas of this group are: Cloud Computing, Cloud Scheduling, Cloud Security, Cloud Federation, Cloud Interoperability, Virtual Machine Management and Cost-aware Resource Acquisition.

6 Programs Offered Master of Science in Information Security (MSIS) The MS Information Security program is designed to fulfill the needs of two distinct classes of individuals: (1) professionals wishing to pursue a professional career in the field of information security, and (2) candidates wishing to prepare themselves for doctoral level study and embark on a research based career. 04 Riphah Institute of Systems Engineering Students enrolled in the MS (Information Security) program are required to complete minimum 33 credit hours of course/research work. Students are recommended to take 12 credit hours (typically 4 courses) of basic courses. Basic courses are carefully designed to cover the breadth of information security theory and practice. Furthermore, students are recommended to take another 12 credit hours (typically 4 courses) of advanced courses. These courses can be selected based on the student s interest and the area of specialization they wish to follow. Additionally, students are required to either complete an industrial project or complete a research thesis of 9 credit hours (typically spanning over two semesters). Generally, students complete their MS (IS) degree requirements in 2 years. However, in some rare cases this duration can last up to maximum 4 years. Students failing to complete their MS (IS) degree requirements in 4 years will be disqualified from the MS (IS) program. Available Seats 25 per semester Duration 2 years Salient Features: Highly skilled faculty members Course work designed to fulfill industry requirements Virtual Learning Environment Recorded Video Lectures Online Discussion Forums Both on-campus as well as off-campus learning facility Course exemptions for relevant information security professional certifications like CEH, CHFI, ECSA, CISSP, CISA, CISM, etc. Eligibility Criteria 16-years of education in science / engineering discipline preferably with 4 years degree program of BS (SE/CS/IT/EE) or equivalent from HEC recognized university or degree awarding institute. (NOTE: candidates may have to complete the deficiency coursework as determined by the admissions committee) Two years of relevant work experience is preferred. Admission Criteria: A valid NTS-GAT (General) score of 50% is required. (optional) Interview Intake Timings Spring & Fall (Twice a year) Monday - Friday (5:30pm - 8:30pm) PROGRAM STRUCTURE Basic Courses Information Systems Security Information Security Management Systems Applied Cryptography Network Security Advanced Information Systems Auditing Risk Management Business Continuity Planning and Disaster Recovery IT Governance Cyber Security Policies Ethical Hacking Penetration Testing Intrusion Detection Systems Wireless Networks Security Network Forensics Distributed and Cloud Computing Secure Software Development Security Requirements Engineering Formal Methods in Information Security Malware Analysis Project Management Data Security and Encryption Advanced Cryptology Data Privacy and Legal Issues Digital Forensics Computer Security Operating System Security Research / Project Thesis: All students enrolled in the MS (IS) program are required to complete either a research or project thesis of 9 credit hours. Students typically complete this requirement in 2 phases. In phase 1, student completes the literature survey / related work and defends his / her synopsis / proposal defense. And in phase 2, student completes his / her research / implementation / performance evaluation and defends his final thesis / defense.

7 PhD Computing (Information Security) Students enrolled in the PhD Computing (Information Security) program are required to complete minimum 48 credit hours of course/research work. Students are required to take minimum 18 credit hours (typically 6 courses) as part of their course work. Objective of these 6 courses is to cover the breadth as well as depth of the knowledge of their interest area. At the completion of these 6 courses, students are expected to cover the issues, best practices, standards, research gaps and challenges of their interest area. On the completion of the course work, students are required to pass the comprehensive / doctoral qualifying exam as well. Furthermore, students are required to take minimum of 30 credit hours as part of their research work. During this phase, students initially are required to defend their PhD synopsis / proposal defense. Students are required to publish their research work in ISI indexed impact factor journals. Minimum of 1 ISI indexed impact factor journal paper and 2 conference papers in high quality international research conferences are required as part of the PhD degree program. However, this number can be increased by the concerned research supervisor. Later on, student is required to defend his/her PhD pre-final defense. Student s research thesis is also evaluated by 2 foreign experts from technologically developed countries. Finally, student is required to defend his/her PhD final public defense. Generally, students complete their PhD (IS) degree requirements in 3 years. However, in some rare cases this duration can last up to maximum 6 years. Students failing to complete their PhD (IS) degree requirements in 6 years will be disqualified. 05 Riphah International University Eligibility Criteria 18 years of education in science / engineering discipline preferably with MS/MPhil (IS/SE/CS/IT/EE) or equivalent from HEC recognized university or degree awarding institute. (NOTE: candidates may have to complete the deficiency coursework as determined by the admissions committee.) CGPA of 3.0/4.0 or above in MS/MPhill degree. Research Thesis in MS/MPhill degree. Two years of relevant work experience is recommended. Intake Spring & Fall (Twice a year) Timings Evening Classes Active Research Areas: Cyber Security Policies Penetration Testing Network Forensics Network Security Malware Analysis Biometric Devices Duration 4 years Admission Criteria: A valid NTS-GAT (Subject) score of 60% is required. (optional) Interview Program Compliance and Accreditation The program is structured to meet the requirements of Higher Education Commission (HEC), Pakistan for Master of Science (MS) degree program. The program is offered by Riphah International University, which is a Federally Chartered University based in Islamabad, Pakistan. The program is approved by the relevant university authorities.

8 Services 06 Riphah Institute of Systems Engineering Penetration Testing (Pen Testing) Penetration testing (aka pen testing) and timely identification of network vulnerabilities is something every organization needs done before hackers or disgruntled insiders exploit the weaknesses. The process of identifying vulnerabilities, evaluating the risk, remediation, and reporting is called vulnerability management. By running penetration tests, organizations are able to more efficiently find and fix security vulnerabilities within their network. Digital Forensics What would you do if you find out that a hacker has invaded your company's application or system without detection and has been stealing information or money from you? Pure Hacking's on-demand forensic and incident response team should be your first port of call in this kind of emergency. If you find you have been hacked, or are in the process of being hacked, we will move immediately to provide you with the following services: ISM Audit The objective of information security management audit/assurance review will: Provide management with an assessment of the effectiveness of the information security management function Evaluate the scope of the information security management organization and determine whether essential security functions are being addressed effectively GAP Analysis A gap analysis can be broken down into four major areas: policy and procedure, auditing, technical review and findings / prioritization summary. Each of those four phases is reviewed below. Information Security Gap Analysis Step 1 : Policy and procedure Step 2 : Auditing Step 3 : Technical review Step 4 : Findings and a prioritization summary Social Engineering Businesses use security policies and network device configurations to protect against malicious attacks, the contribution of other factors such as physical security and employees' personal security awareness are often overlooked when the risk and vulnerability of IT systems are assessed. Pure Hacking can expose vulnerabilities in your system using baiting, phishing and other social engineering techniques to determine whether crucial security information can or has been obtained. Network Profiling Network Profiling and Analysis We use the most innovative, state-of-the-art tools to analyze your complete network and profile short-term or long-term usage, to enable you to: determine top error sources, top talkers, and a traffic matrix; maintain peak performance and avoid costly network downtime; map the network for planning purposes; use statistics as a basis for accounting and billing; Network Planning and Design Once deficiencies in your network installation have been determined, GTI recommends the most effective and cost efficient solutions to successfully handle anticipated requirements: topologies (Ethernet, Token Ring, FDDI) protocols (TCP/IP, IPX, NetBEUI) interconnecting equipment (hubs, routers, bridges, switches) WAN interconnection (Frame Relay, X.25, PPP, SLIP, ISDN)

9 Trainings World's most advanced trainings delivered by Professional Certified Instructors. Certified Ethical Hacker CEHv8 provides a comprehensive ethical hacking and network security hands-on training program to meet the standards of highly skilled security professionals. Hundreds of SMEs and authors have contributed towards the content presented in the CEHv8 courseware. Our researchers have invested thousands of man hours researching the latest trends and uncovering the covert techniques used by the underground community. Computer Hacking Forensic INVESTIGATOR Computer forensics include the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. CHFIv8 enables trainees to acquire necessary hands-on experience on various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation leading to prosecution of perpetrators. E C S A EC-Council Certified Security Analyst Introduction to the Premier Pen Testing Information Security Certification (Advanced Ethical Hacking) EC Council Certified Security Analyst, ECSA is an advanced ethical hacking training certification that complements the Certified Ethical Hacker, CEH certification by exploring the analytical phase of ethical hacking and latest tools & technologies. C S C U Certified Secure Computer User In addition to protect the information assets, computer and network security threats such as identity theft, credit card & online banking frauds, virus and backdoors, s hoaxes, loss of information, hacking attacks and social engineering are covered in this program. CISMs understand the business. Its assists to know how to manage and adapt technology to the enterprise and industry. The uniquely management - focused CISM certification promotes international security practices and recognizes the individual who manages designs, and oversees and assesses an enterprise s Information Security. This course is designed to prepare the participants for the CISA examination. It covers the unique aspects of managing an audit and the knowledge necessary to complete the task. The course focuses on the design and implementation of general computer control, application level control auditing as well as introducing the risk based management approach. While disseminating information about Information Systems auditing standards, this course enables the trainee to perform Information System audits. EUCS End-User Computer Security training is to provide the End-User with the essential awareness and skills to protect their information assets. It is the basic need of this era to aware every user of the organization about InfoSec, attacks and their countermeasures as humans are the weakest links in an organization`s security. The course is an ONLINE training comprising of 10 Modules, giving the trainee a complete 360 overview of secure usage of their systems. EUCS user will have a clear understanding about the security threats such as Viruses, Worms, Malwares, Social Engineering, Identity theft, Phishing scams, Malicious s and Cyber Bullying. There is an option of custom module which can be tailored to the organization s business type, policies/procedures and any other needs. 07 Riphah International University

10 Team Members 08 Riphah Institute of Systems Engineering Names Dr. Saad Naeem Zafar PhD - Software Engineering (Griffith University, Australia) Specialization in Information Security Management. MS - Software Engineering (Griffith University, Australia) Certified Information Systems Auditing (CISA) Certified Information Security Management Systems (CISM) Certified in Risk and Information Systems Control (CRISC) Member IEEE, ISACA Leader: Secure and Dependable Systems Research Group saad.zafar@riphah.edu.pk Mr. Khurram Javed PhD Scholar - Wireless Security (UTM, Malaysia) MS - Computer Networks (IIUI, Islamabad) Certified EC-Council Instructor (CEI) Certified Ethical Hacker (CEH) Certified Hacking Forensics Investigator (CHFI) EC-Council Certified Security Analyst (ECSA) Licensed Penetration Tester (LPT) Virtualization Security Network Analysis & Forensics CCAI & CCNA 4.0 discovery Leader: Offensive Security Research Group khurram.javed@riphah.edu.pk Dr. Muhammad Yousaf PhD - Computer Engineering (CASE, Islamabad) MS - Computer Engineering (CASE, Islamabad) Member IEEE, ISOC Leader: Network Security Research Group muhammad.yousaf@riphah.edu.pk Dr. Naveed Ikram PhD - Computer Science (University of Salford, UK) M.Sc - Computer Science (University of Salford, UK) Chartered IT Professional Senior Member ACM, Member IEEE, AIS, CSP Leader: Empirical Software Engineering Research Group naveed.ikram@riphah.edu.pk Dr. Sheheryar Malik PhD (CS) - Distributed & Cloud Computing (INRIA / University of Nice Sophia Antipolis, France) MS (CS) - Software Systems & Engineering (MAJU) MSc - Computer Science (MAJU, Islamabad) Professional Member ACM, Member IEEE, ACF, ISOC, CSA Leader: Center for Research in Distributed & Supercomputing sheheryar.malik@riphah.edu.pk Designation Director, RISE Dean, Faculty of Computing HEC Approved Supervisor Assistant Director, RISE Assistant Professor Information Security Consultant/Analyst Academic Advisor, RISE Assistant Professor Associate Dean, Graduate Program Associate Professor Assistant Professor HEC Approved Supervisor

11 Dr. Rizwan Bin Faiz PhD - Computer Science (Loughborough University, UK) MSc - Computer Science (MAJU, Islamabad) Leader: Automated Software Engineering Research Group rizwan.faiz@riphah.edu.pk Assistant Professor HEC Approved Supervisor Dr. Mahmood Niazi PhD Software Engineering (University of Technology Sydney, Australia) MPhil Software Engineering (The University of Manchester, UK) mkniazi@kfupm.edu.sa Dr. Zeeshan-ul-Hassan Usmani PhD - Computer Science (Florida Institute of Technology, USA) MS - Computer Science (Florida Institute of Technology, USA) zeeshan.usmani@riphah.edu.pk Mr. Musharif Ahmed PhD Scholar - Computing (RIU, Islamabad) MS - Systems and Software Engineering (MAJU) musharif.ahmed@riphah.edu.pk Associate Professor Adjunct Faculty Member Industrial Professor HEC Approved Supervisor Assistant Professor 09 Riphah International University Mr. Umair Sadiq MBA - IT and Finance (Minnesota State University, USA) BES - Accounting and Information Systems (Minnesota State University, USA) Management and IS Consultant/Auditor Certified Information System Auditor (CISA) Certified Internal Auditor (CIA) Certified Project Management Professional (PMP) Certified Public Accountant (CPA) umair.sadiq@riphah.edu.pk Dr. Muhammad Hassan Islam PhD - Computer Engineering (CASE, Islamabad) Certified Information System Auditor (CISA) Certified Information Security Management Systems (CISM) Dr. Imran Baig PhD - Electrical and Electronic Engineering (University Teknologi PETRONAS, Malaysia) MSc - Computer Engineering (UET, Taxila) Dr. Muhammad Saleem PhD - Computer Engineering (CASE, Islamabad) MS - Computer Engineering (CASE, Islamabad) Mr. Obaid ur Rehman Certified Ethical Hacker (CEH) CSOC - SIEM Installation, Configuration and Administration CCNA, VMWare 3.5 ESX, ITIL v3 Foundation PANDA GateDefender Performa V3.02 & Panda Security for Business PANDA GateDefender Intergartion obaid.rehman@riphah.edu.pk Assistant Professor Associate Professor Visiting Faculty Associate Professor Visiting Faculty Associate Professor Visiting Faculty Manager Security and Compliance

12 10 Mr. Sohaib Saleem MS - Engineering Management CASE, Islamabad BS - Computer Science sohaib.saleem@riphah.edu.pk Mr. Muhammad Babar Tiwana MS In-Progress - Information Security (Riphah International University, Islamabad) BS - Software Engineering muhammad.babar@riphah.edu.pk Business Development Manager Research Associate Riphah Institute of Systems Engineering Mr. Ahmed Iftikhar BS - Computer Engineering (COMSATS, Wah Cantt) (CCNA, CCNP, MCSE, MCSA, MTA) ahmed.iftikhar@riphah.edu.pk RISE National & International Events CSP 2013: CEO Outlook 2013, Cyber Security Trends, Challenges, and Possible Solutions, Cyber Secure Pakistan, March 2013, Islamabad, Pakistan. GISEC 2013: Dr. Saad Naeem Zafar and Khurram Javed from RISE visited U.A.E for GISEC 2013 (Gulf Information Security Expo and Conference) in June, ICME 2013: A Systematic Review, International Conference on Medical Education (ICME 2013), Oct , Balaclava, Mauritius. ICET 2013: International Conference on Emerging Technologies (ICET 2013), 9-10 December, 2013, Islamabad, Pakistan. CISO Summit ME 2014: Anatomy of Botnets, 6th Annual Summit & Roundtable Chief Information Security Officer Middle East, February, 2014, Dubai, United Arab Emirates. NISC 2014: RISE and Pakistan Navy Engineering College PNEC- NUST jointly organized the first ever National Information Security Conference (NISC-2014) on 28th March 2014 at PNS Karachi. Online Seminar 2014: Attended Enterprise Architecture online seminar organized on 14th April, The resource person was Dr. Asif Gill; a TOGAF 9 Certified Enterprise Architect and Lecturer at the School of Software at the University of Technology, Sydney. CIACS 2014: Role of Academia in Information Security, Conference on Information Assurance and Cyber Security 2014, Military College of Signals, National University of Science and Technology, Rawalpindi, June, Support Instructor Abdulla FayazChattha, Regional Manager (PERN) HEC, Islamabad Pakistan (CEH Trainee) "Its a very productive effort and will be considered as a gigantic contribution to information security in the region. The training revealed that our defense policies and strategies are always towards more sophisticated attacks but the fact is that the hackers usually not rather attacking exploits users minors mistakes / kiddies code weaknesses and get the control of system." NughmmanMasud Butt, Manager DSS/NMS, Warid Telecom, Lahore Pakistan (CEH Trainee) "I experienced firsthand just how dangerous the Cyber world is. If the labs don t scare you, nothing will. Coupled with the excellent and knowledgeable instructor and class interaction, the course exceeded my expectations and has armed me with a wealth of knowledge that I can use to improve the security posture of my organization."

13 RISE Above The Rest Evacuee Trust Complex, Agha Khan Road, Sector F-5/1, Near Marriott Hotel, Islamabad.

14 Rawalpindi Campus: Al-Mizan IIMCT Complex, 274-Peshawar Road, Rawalpindi. UAN: Tel: Islamabad Main Campus: Sector I-14, Islamabad. Tel: Islamabad City Campus-I: IIMC, 7th Avenue, G-7/4, Islamabad. Tel: Islamabad City Campus-II: Ground Floor, Evacuee Trust Complex, Agha Khan Road, Sector F-5/1, Near Marriott Hotel, Islamabad. Tel:

Graduate Programs Computing MS/PhD Program Guide 2013 14

Graduate Programs Computing MS/PhD Program Guide 2013 14 Graduate Programs Computing MS/PhD Program Guide 2013 14 Graduate School Faculty of Computing Riphah International University, Islamabad, Pakistan 1 Graduate Programs Computing MS/PhD Program Guide 2013

More information

MS Information Security (MSIS)

MS Information Security (MSIS) MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in

More information

EC-Council. Certified Ethical Hacker. Program Brochure

EC-Council. Certified Ethical Hacker. Program Brochure EC-Council C Certified E Ethical Hacker Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com Ultimate Knowledge Institute ultimateknowledge.com Social Media Security Training and Certifications Social Media Security Professional (SMSP) Social Media Engineering & Forensics Professional (SMEFP)

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

Information Systems Security Certificate Program

Information Systems Security Certificate Program Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate

More information

State of South Carolina InfoSec and Privacy Career Path Model

State of South Carolina InfoSec and Privacy Career Path Model State of South Carolina InfoSec and Privacy Career Path Model Start Introduction This Career Path Model for the State of South Carolina (State) is designed to help define the various career options available

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

InfoSec Academy Application & Secure Code Track

InfoSec Academy Application & Secure Code Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

Programme In Information Security Management

Programme In Information Security Management Programme In Information Security Management One-year programme in Information Security (IS) MIEL Academy is pleased to announce PRISM TM (Programme in Information Security Management) a one-year Fulltime

More information

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker EC-Council Hacking Technology C Certified E Ethical Hacker Certified Ethical Hacker v8 Certified Ethical Hacker Course Description CEHv8 is a comprehensive Ethical Hacking and Information Systems Security

More information

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path

More information

EC Council Certified Ethical Hacker V8

EC Council Certified Ethical Hacker V8 Course Code: ECCEH8 Vendor: Cyber Course Overview Duration: 5 RRP: 2,445 EC Council Certified Ethical Hacker V8 Overview This class will immerse the delegates into an interactive environment where they

More information

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88 Career Survey 1. In which country are you based? 88 answered question 88 skipped question 0 2. What is your job title? 88 answered question 88 skipped question 0 3. Travel budget not at all 21.0% 17 somewhat

More information

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

InfoSec Academy Pen Testing & Hacking Track

InfoSec Academy Pen Testing & Hacking Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

Analyze. Secure. Defend. Do you hold ECSA credential?

Analyze. Secure. Defend. Do you hold ECSA credential? 1 Analyze. Secure. Defend. Do you hold ECSA credential? TM E C S A EC-Council Certified Security Analyst 1 EC-Council Cyber Security Professional Path Threat Agent Application of Methodology So You Can

More information

EC-Council Certified Security Analyst (ECSA)

EC-Council Certified Security Analyst (ECSA) EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for

More information

Field of Study Area of Expertise Certification Vendor Course

Field of Study Area of Expertise Certification Vendor Course Field of Study Area of Expertise Certification Vendor Course Advanced Security Certified Information Systems Security Professional (CISSP) ISC2 CISSP Advanced Security CompTIA Advanced Security Practitioner

More information

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time MSc Cyber Security International Students Can Apply UKPASS P052286 Code: Course 1 Year Full-Time, 2-3 Years Part-Time Length: Start Dates: September 2015, January 2016, September 2016, January 2017 Department:Department

More information

Presented by Frederick J. Santarsiere

Presented by Frederick J. Santarsiere http://cinoltd.com/ Presented by Frederick J. Santarsiere CHFI, CISSP, CISM, CISA, CEH, CEI, CAP, SSCP Sec+, Net+, A+, MCSA, MCSE, MCITP, MCT CCENT, CCNA, CCNA Wireless, CCNA Voice CISCO SMBEN, SMBAM,

More information

Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning

Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning Val-EdTM Valiant Technologies Education & Training Services 2-day Workshop on Business Continuity & Disaster Recovery Planning All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies.

More information

Admissions Fall 2016 MPM / MS(PM) Project Management. SZABIST Islamabad. Discover Yourself. Discover Yourself

Admissions Fall 2016 MPM / MS(PM) Project Management. SZABIST Islamabad. Discover Yourself. Discover Yourself Admissions Fall 2016 MPM / MS(PM) Project Management SZABIST Islamabad A Message From Project Management Institute Islamabad Pakistan Chapter Naeem Iqbal (PMP ) President PMI Islamabad Chapter Project

More information

Security Transcends Technology

Security Transcends Technology INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP Paul.Wang@ch.pwc.com

More information

InfoSec Academy Forensics Track

InfoSec Academy Forensics Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

Computer Network Engineering

Computer Network Engineering 226 Computer Network Engineering Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Computer Network Engineering Certificate of Achievement: Computer Network Engineering

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

The enemies ashore Vulnerabilities & hackers: A relationship that works

The enemies ashore Vulnerabilities & hackers: A relationship that works The enemies ashore Vulnerabilities & hackers: A relationship that works Alexandros Charvalias, Manager CISSP, CISA, ACDA Assurance & Enterprise Risk Services Cyber security maturity model How effectively

More information

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the

More information

Cyber Defense Operations Graduate Certificate

Cyber Defense Operations Graduate Certificate The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide

More information

Access FedVTE online at: fedvte.usalearning.gov

Access FedVTE online at: fedvte.usalearning.gov FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at support@usalearning.net. To speak with a Help Desk

More information

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

Application Security Audit Fault Injection Model, Fuzz Generators & Static Code Analysis. Training Brochure

Application Security Audit Fault Injection Model, Fuzz Generators & Static Code Analysis. Training Brochure Application Security Audit Fault Injection Model, Fuzz Generators & Static Code Analysis Training Brochure Synopsis This Four-day practical training is designed for Information Systems auditors, application

More information

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015 An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit

More information

Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User

Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User Valarie Burks Deputy Chief Information Officer, IT Security Division National Aeronautics and Space Administration (NASA) Agenda

More information

Faculty of Health Sciences PhD Programme

Faculty of Health Sciences PhD Programme Faculty of Health Sciences PhD Programme Admission Information 2015 2016 1 THE UNIVERSITY Chartered in 1983, the Aga Khan University (AKU) is an international private university that currently operates

More information

Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE

Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE 2016 Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE Instructional Design Boost elearning Interactive IT Training Boost elearning's Interactive IT Training provides

More information

Computer Network Engineering

Computer Network Engineering 208 Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Certificate of Achievement: Skills Competency Award: Cisco Networking Associate Program Description The field of

More information

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

COMPUTER NETWORKS AND SECURITY A FUTURE IN

COMPUTER NETWORKS AND SECURITY A FUTURE IN COMPUTER NETWORKS AND SECURITY A FUTURE IN COMPUTER NETWORKS & SECURITY WHAT ARE CAREERS IN NETWORKS AND SECURITY ALL ABOUT? Computer networks are an inextricable part of modern life. We use computers

More information

faculty of management sciences

faculty of management sciences faculty of management sciences Islamabad Main Campus Sector I-14, Islamabad Tel: 051-8446000-8 Fax: 051-8313141 Rawalpindi Campus Al-Mizan IIMCT Complex, Old Supreme Court Building, 274-Peshawar Road,

More information

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

If you know the enemy and know yourself, you need not fear the result of a hundred battles. Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group ruiper@wavefrontcg.com 1 (604) 961-0701 If you know the enemy and know yourself, you

More information

The Future Is SECURITY THAT MAKES A DIFFERENCE. Overview of the 20 Critical Controls. Dr. Eric Cole

The Future Is SECURITY THAT MAKES A DIFFERENCE. Overview of the 20 Critical Controls. Dr. Eric Cole The Future Is SECURITY THAT MAKES A DIFFERENCE Overview of the 20 Critical Controls Dr. Eric Cole Introduction Security is an evolution! Understanding the benefit and know how to implement the 20 critical

More information

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the

More information

About Our 2015 WTA Cyber Security Speakers and Sessions

About Our 2015 WTA Cyber Security Speakers and Sessions About Our 2015 WTA Cyber Security Speakers and Sessions The constant threat of cyber security attacks is the number one concern for most businesses today. Weaknesses in networks and data security can expose

More information

ITU-IMPACT Training and Skills Development Course Catalogue

ITU-IMPACT Training and Skills Development Course Catalogue ITU-IMPACT Training and Skills Development Course Catalogue Management Track Technical Track Course Area Management Incident Response Digital Forensics Network Application Law Enforcement Foundation Management

More information

EC-Council. Program Brochure. EC-Council. Page 1

EC-Council. Program Brochure. EC-Council. Page 1 Program Brochure Page 1 Certified Ethical Hacker Version 7 Revolutionary Product releases the most advanced ethical hacking program in the world. This much anticipated version was designed by hackers and

More information

Information Security Specialist Training on the Basis of ISO/IEC 27002

Information Security Specialist Training on the Basis of ISO/IEC 27002 Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu

More information

New-Age Master s Programme

New-Age Master s Programme New-Age Master s Programme MCA (Information Security Management Services) (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective MCA (Information Security Management Services) This unique

More information

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages provided by international certifications Cyber & IT Governance

More information

Strategic Plan On-Demand Services April 2, 2015

Strategic Plan On-Demand Services April 2, 2015 Strategic Plan On-Demand Services April 2, 2015 1 GDCS eliminates the fears and delays that accompany trying to run an organization in an unsecured environment, and ensures that our customers focus on

More information

Department of Information Systems and Cyber Security

Department of Information Systems and Cyber Security The University of Texas at San Antonio 1 Department of Information Systems and Cyber Security All graduate programs in Information Systems and Cyber Security are accredited by AACSB International The Association

More information

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics Developing and Enhancing Cyber Security Capabilities in the Region Khaled Gamo Technology Advisor Ministry of communication and informatics 1 Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts

More information

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules IT Security Training Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules Benefits of Certification Provides Assurance to Employers Certification

More information

How To Get A Computer Hacking Program

How To Get A Computer Hacking Program CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator

More information

SECURITY CONSIDERATIONS FOR LAW FIRMS

SECURITY CONSIDERATIONS FOR LAW FIRMS SECURITY CONSIDERATIONS FOR LAW FIRMS Enterprise Risk Management Professional consulting firm that specializes in cyber security Founded in 1998 in Miami, Florida Serves more than 150 clients, locally,

More information

CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs)

CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs) CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted

More information

SECURING PAYMENTS IN THE CYBER WORLD

SECURING PAYMENTS IN THE CYBER WORLD The Central Bank of Kuwait Presents An Information Security Forum on SECURING PAYMENTS IN THE CYBER WORLD 16th NOVEMBER 2014 JUMEIRAH MESSILAH BEACH HOTEL, KUWAIT WELCOME In the last few years, the usages

More information

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute Wasting Money on the Tools? Automating the Most Critical Security Controls Bonus: Gaining Support From Top Managers for Security Investments Mason Brown Director, The SANS Institute The Most Trusted Name

More information

Network Engineering Technology

Network Engineering Technology Network Engineering Technology Network Engineering Technology with Specializations in: Cisco Routing and Switching Microsoft Systems Administration Cyber Security and Digital Forensics Associate in Science

More information

Security-as-a-Service (Sec-aaS) Framework. Service Introduction

Security-as-a-Service (Sec-aaS) Framework. Service Introduction Security-as-a-Service (Sec-aaS) Framework Service Introduction Need of Information Security Program In current high-tech environment, we are getting more dependent on information systems. This dependency

More information

Technology Courses. The following chart outlines the required courses in each of these three categories for the Ph.D. curriculum:

Technology Courses. The following chart outlines the required courses in each of these three categories for the Ph.D. curriculum: ITP PH.D. PROGRAM CONTENTS Overview... 2 Course Requirements... 3 Core Course Requirement... 4 Technology Course Requirement... 5 Business/Economic/Policy Course Requirement... 6 Preliminary Exam... 7

More information

DELTA TECH COMPANY PROFILE LOCATIONS: Tel: +92(0)51-486-4414 Tel: +92(0)42-516-0186. Tel: +92(0)51-486-4415 Tel: +92(0)42-516-4287

DELTA TECH COMPANY PROFILE LOCATIONS: Tel: +92(0)51-486-4414 Tel: +92(0)42-516-0186. Tel: +92(0)51-486-4415 Tel: +92(0)42-516-4287 DELTA TECH COMPANY PROFILE LOCATIONS: Islamabad Office: House No. 823, Street 11 Sector I-8/2, Islamabad Lahore Office: 555-A, Maulana Shaukat Ali Road, Faisal Town, Lahore Tel: +92(0)51-486-4414 Tel:

More information

Technical Manager / Fortinet Product Owner at Space Data Systems - Jordan (SDS) alzard_m@hotmail.com

Technical Manager / Fortinet Product Owner at Space Data Systems - Jordan (SDS) alzard_m@hotmail.com Mohammad Al-Zard alzard_m@hotmail.com Summary Hands-on experience in security consultation, measuring possible security vulnerabilities, implementing and customizing distributed IDPS systems. Planning

More information

Minnesota State Community and Technical College Detroit Lakes Campus

Minnesota State Community and Technical College Detroit Lakes Campus Computer Network Security Minnesota State Community and Technical College Detroit Lakes Campus Overview Philosophy Note on 2 year Colleges Certifications Program Courses CCDC Program Numbers Faculty Future

More information

I n t r o d u c t i o n

I n t r o d u c t i o n and Mission Information technology is a dynamic discipline that addresses the use of computing and I n t r o d u c t i o n information technology in business, education, government, and other organizations.

More information

Critical Controls for Cyber Security. www.infogistic.com

Critical Controls for Cyber Security. www.infogistic.com Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Copyright Elevate Consult LLC. All Rights Reserved 1 Presenter Ray Guzman MBA, CISSP, CGEIT, CRISC, CISA Over 25

More information

Director, IT Security District Office Kern Community College District JOB DESCRIPTION

Director, IT Security District Office Kern Community College District JOB DESCRIPTION Director, IT Security District Office Kern Community College District JOB DESCRIPTION Definition Reporting to the Chief Information Officer, the Director of IT Security develops and implements procedures,

More information

ISO 27002 Information Security Management Systems [ISMS] Training Program

ISO 27002 Information Security Management Systems [ISMS] Training Program ISO 27002 Information Security Management Systems [ISMS] Training Program The ISO 27002 standard is the rename of the ISO 17799 standard, and is a code of practice for information security. It basically

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

MS in Information Systems & Assurance (MS-ISA)

MS in Information Systems & Assurance (MS-ISA) MS in Information Systems & Assurance (MS-ISA) Stephen D. Burd Anderson School of Management & UNM Center for Information Assurance Research and Education burd@unm.edu Last Revised: 9/24/2014 What is Information

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

Certification and Training

Certification and Training Certification and Training CSE 4471: Information Security Instructor: Adam C. Champion Autumn Semester 2013 Based on slides by a former student (CSE 551) Outline Organizational information security personnel

More information

Computer Science SZABIST Islamabad

Computer Science SZABIST Islamabad Admissions Fall 2016 Computer Science SZABIST Islamabad BS Computer Science Recognition BS Computer Science S T ZABIST offers a 4-year (8-semester) BS Computer Science degree, covering a wide range of

More information

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

Cyber Security. A professional qualification awarded in association with University of Manchester Business School ICA Advanced Certificate in Cyber Security A professional qualification awarded in association with University of Manchester Business School An Introduction to the ICA Advanced Certificate In Cyber Security

More information

EC-Council. Certified. Internet Marketing Practitioner. Unravel the Mystery of. Internet Marketing C IMP

EC-Council. Certified. Internet Marketing Practitioner. Unravel the Mystery of. Internet Marketing C IMP Certified Internet Marketing Practitioner Unravel the Mystery of Internet Marketing TM C IMP Certified Internet Marketing Practitioner Are You a? Our online lives are fast becoming as important and real

More information

Database Security and Auditing

Database Security and Auditing Database Security and Auditing COURSE DESCRIPTION: This seminar aims to provide the Database Administrators, System Administrators, Auditors and IT Security Officers an overview on how to secure and audit

More information

Guideline & Policies for Ph.D in Engineering Management at CASE

Guideline & Policies for Ph.D in Engineering Management at CASE Guideline & Policies for Ph.D in Engineering Management at CASE PhD Cycles, Requirement, Policies, List of Majors, Subjects, Course Load, Core Courses, Required and Elective Courses, Categories, and Academic

More information

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's: Security.01 Penetration Testing.02 Compliance Review.03 Application Security Audit.04 Social Engineering.05 Security Outsourcing.06 Security Consulting.07 Security Policy and Program.08 Training Services

More information

Brandman University. School of CCNA

Brandman University. School of CCNA Information Technology Certifications CCNA The Cisco CCNA Training Package (ICND: Parts 1 and 2) includes expert instructor-led training modules with customized presentations, practice exam simulators

More information

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

Intel Security Certified Product Specialist Security Information Event Management (SIEM) Intel Security Certified Product Specialist Security Information Event Management (SIEM) Why Get Intel Security Certified? As technology and security threats continue to evolve, organizations are looking

More information

A TOP-RATED UNIVERSITY FOR EMPLOYABILITY. MSc Information and Network Security. T: 01224 262787 h.ahriz@rgu.ac.uk

A TOP-RATED UNIVERSITY FOR EMPLOYABILITY. MSc Information and Network Security. T: 01224 262787 h.ahriz@rgu.ac.uk A TOP-RATED UNIVERSITY FOR EMPLOYABILITY MSc Information and Network Security T: 01224 262787 h.ahriz@rgu.ac.uk PROGRAMME OVERVIEW Most modern organisations face security risks that threaten their valuable

More information

Master of Science in Computer Science Degree Requirements, Policies, and Procedures

Master of Science in Computer Science Degree Requirements, Policies, and Procedures Master of Science in Computer Science Degree Requirements, Policies, and Procedures Summary of Procedures for M.S. Students Complete every deficiency course with a B or higher within the first two terms

More information

ASK PC Certified Information Systems Security Expert - CISSE

ASK PC Certified Information Systems Security Expert - CISSE Course Description As part of our mission to spread the awareness of IT security in the Middle East, we understand that an Arabic course will be valuable for native speakers. This is a comprehensive course

More information

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs)

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs) CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training

More information

Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and

Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and Cybersecurity comes to Allegany College of Maryland 107 Intro to Cybersecurity Offered fall and spring semesters. This course provides a broad overview of computer security, ethical issues and information

More information

Certified Associate Project Management (CAPM) Training Program

Certified Associate Project Management (CAPM) Training Program Certified Associate Project Management (CAPM) Training Program This highly specialized and concentrated Program is ideally suited to following individuals who are: Fresh University Graduates and like to

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking

More information

Loophole+ with Ethical Hacking and Penetration Testing

Loophole+ with Ethical Hacking and Penetration Testing Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,

More information

Terms of Reference for an IT Audit of

Terms of Reference for an IT Audit of National Maritime Safety Authority (NMSA) TASK DESCRIPTION PROJECT/TASK TITLE: EXECUTING AGENT: IMPLEMENTING AGENT: PROJECT SPONSOR: PROJECT LOCATION: To engage a professional and qualified IT Auditor

More information

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013 Cyber Security and Information Assurance Controls Prevention and Reaction 1 About Enterprise Risk Management Capabilities Cyber Security Risk Management Information Assurance Strategic Governance Regulatory

More information

INFORMATION SECURITY & GOVERNANCE SYSTEMS AND IT INFRASTRUCTURE INFOSEC & TECHNOLOGY TRAINING. forebrook

INFORMATION SECURITY & GOVERNANCE SYSTEMS AND IT INFRASTRUCTURE INFOSEC & TECHNOLOGY TRAINING. forebrook INFORMATION SECURITY & GOVERNANCE SYSTEMS AND IT INFRASTRUCTURE INFOSEC & TECHNOLOGY TRAINING forebrook Forebrook offers a range of information security, governance, IT systems and infrastructure related

More information

What We Do. security. outsourcing. policy and program. application. security. training & awareness. security solutions

What We Do. security. outsourcing. policy and program. application. security. training & awareness. security solutions What We Do Whether you need a quick check-up, in-depth testing and analysis or constant care; at Rewterz we have cure for the common techache. At Rewterz, our consultants work with your IT management team

More information

Bachelor of Information Technology

Bachelor of Information Technology Bachelor of Information Technology [ Network security] Information for International Students www.nsi.tafensw.edu.au/itsecuritydegree Bachelor of Information Technology [ Network security] Cybercrime is

More information