Programme In Information Security Management

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Programme In Information Security Management"

Transcription

1 Programme In Information Security Management One-year programme in Information Security (IS) MIEL Academy is pleased to announce PRISM TM (Programme in Information Security Management) a one-year Fulltime Programme (FTP) in Information Security (IS) Management. PRISM TM is a one-year programme in Information Security Management. It has a four trimester structure and is designed based on the global standards of pedagogy. The prime objective of the course is to create trained IS professionals at the middle management level, through proper education to bridge the demand-supply gap of IS professionals across the globe and accelerate the careers of people desirous of entry into the IS field. How is PRISM TM unique? PRISM TM is a result of MIEL s deep insight into IS gained through Unique job-ready programme, one of its kinds in the market, globally. Consulting across all functional domains of IS in the domestic and international market. Training experience of designing and delivering IS programmes of diverse nature leading to certification. Affiliation and alliances with world-class IS certifying authorities. Highly qualified, internationally accredited and experienced team of instructors. State-of-the-art training infrastructure. Education Loan Facility. 20-day FREE orientation programme for all enrolled students to match up to the requirement of the curriculum. How does PRISM TM help? Grooms you to become a well-trained IS professional with high potential. World-Class content with scope for specializations. Rigorous and well-researched curriculum. Thorough, practical-orientation. Guidance from instructors with domain knowledge in various disciplines of IS and Best Practices. Guest lectures from industry experts. Assured placement, subject to satisfying criteria. Expert level examinations. Various options for future specialization Personality development and soft skills training Personal attention due to limited batch size

2 Who should attend PRISM TM? Full-time Programme (FTP) for Freshers & Professionals Graduates or Post Graduates in Engineering, B.Sc., M.Sc., BCA, MCA with (Information Technology or Computer Science) Diploma in Engineering from recognized Polytechnic Institutes Graduates from other Technical and Non-Technical Streams Students appearing for final semester can also apply Legal, Banking & Finance Professionals Chartered Accountants Application Programmers System, Network and Database Administrators System and Network Engineers System and Network Analysts Technical Support and Implementation Engineers This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of their organization. What is the PRISM TM training methodology? Theory/Lessons Highly informative and instructional sets with numerous hand-on activities. Cases/Snippets Security cases/snippets to effectively bridge the gap between academic and industry sectors. Extrapolation Expose to out-of-box scenarios to provide lateral thinking. Simulation Interaction with real-life security scenarios and events to sharpen the skills. Project Work Sound technical & managerial grooming which helps to equip the participants to face industry requirements. What is the PRISM TM Structure? PRISM TM is a one-year programme with: A four trimester structure The curriculum spanning over 24 IS topics along with Project Stringent selection criteria with entrance test Orientation Session to match up to the curriculum requirement Rich and exhaustive coverage of IS topics, from fundamentals to the advanced concepts like enterprise security architecture Lively yet rigorous components to deploy various pedagogy modes Modular course content with hands-on-training to facilitate a gradual absorption of security topics Expert level examinations and Project submissions after every Trimester Periodic content updates to meet the relevant industry specific security requirement of the dynamic environment

3 Career Options The various career options available after gaining IS skills are as under: Network Security Systems Manager Network Security Systems Administrator Network Security Engineer Systems/Applications Security Executive Web Security Administrator Web Security Manager Security Auditor Ethical Hacker Data Security Specialist Chief Information Security Officer Computer Forensic Investigator IT Security Consultant IT Security Manager IT Security Auditor IT Security Administrator Security Certified Programmer Assurance Professional & Risk Manager Benefits of PRISM TM The opportunities on successful completion of PRISM TM are many and quite lucrative: Joint Certification from MIEL and CSI (Computer Society of India) 100% Assured Placement* for FTP Participants Candidates are globally accepted by the IT industry and other business verticals Prepares you for high paying careers like Ethical Hacker, Information Security Officer, Assurance Professional & Risk Manager, IS Auditor, BCP & DR Manager, CISO, CTO or Specializations like Network Security Administrator, Application Security Specialist, Penetration Tester, Forensic Investigator *conditions apply Avail easy Education Loan facilities from HDFC Bank CREDILA Education Loan Services Accredited By COMPUTER SOCIETY OF INDIA (CSI)

4 PRISM TM Course Outline The Orientation Session includes the following topics: C 001 Computer Fundamentals C 002 Introduction to Networking C 003 Basics of C Programming C004 Introduction to Databases C005 Basics of Java Programming Trimester 1 : Trimester 2 : C 101 Information Security Introduction C 201 Operations Security C 102 Physical and Environmental Security (6) C 202 UNIX and LINUX Security C 103 Access Control (2-6) C 203 Windows Architecture C 104 Cryptography Fundamentals C 105 UNIX Architecture C 106 Web Application Security C 107 Network Security (4-5) (4) (5) C 204 Wireless Communications and Telephony C 205 Applied Cryptography C 206 Database Architecture and Programming (5) (2,4,5) (3) C 207 Cyber Crime Investigations and Forensics Trimester 3: Trimester 4 : C 301 Database Security (3,4) C 401 Cyber Laws C 302 Windows Security C 402 Enterprise Security Architecture C 303 Security Models, Frameworks & Guidelines C 304 Security Certifications (2,4,5) (2-6) C 403 Cloud Computing & Virtualization C 404 Computer Audit and Assurance C 305 Security Incident Management C 306 Business Continuity & Disaster Recovery C 405 Project Work : The PRISM TM course ends with a comprehensive project submitted by each student on Current Industry Security events. The student is expected to put forth his understanding and analysis, leveraging from the knowledge gained from PRISM TM. Duration: Programme Location: Programme Timings: Programme Fee: Batch Size: Course Reschedule Policy: Placement : Student Reschedule Policy: Instructor: 1 Year Full-time Programme (FTP) Pune 9.00am to 5.30pm (Monday to Friday) Rs.2,20, % Service Tax = Rs.2,42,660/- (Includes Courseware + Exam) The above mentioned fee is applicable for candidate residing and working in India only. 25 Seats Only MIEL will strive to conduct the course as planned, but reserves all the rights to reschedule or cancel the course without assigning any reason. 100% Assured Placement* The student cannot reschedule and the registration will be applicable for the current academic year. These rules are subject to change without notice MIEL Accredited Instructors Please feel free to contact: (022) /62/57/58 Mob or contact Ms. Pushpa Redkar at *conditions apply

5 Seven Layers of Security (Defence in Depth)

New-Age Master s Programme

New-Age Master s Programme New-Age Master s Programme MCA (Information Security Management Services) (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective MCA (Information Security Management Services) This unique

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time MSc Cyber Security International Students Can Apply UKPASS P052286 Code: Course 1 Year Full-Time, 2-3 Years Part-Time Length: Start Dates: September 2015, January 2016, September 2016, January 2017 Department:Department

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme BCA - Information Security & Mobile Applications (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective This unique course provides dual career options

More information

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88 Career Survey 1. In which country are you based? 88 answered question 88 skipped question 0 2. What is your job title? 88 answered question 88 skipped question 0 3. Travel budget not at all 21.0% 17 somewhat

More information

Ingenious Practice LABs

Ingenious Practice LABs Routing Switching Tigers Forum Join SAN & DR Renewed experience and content with Ingenious Practice LABs Daily Morning: 10:00am to 01:00pm Daily Evening: 07:00pm to 10:00pm Sunday Only Morning: 05:00am

More information

Work Integrated Learning Programmes

Work Integrated Learning Programmes Work Integrated Learning Programmes 01 Index Introduction 02 Overview & Salient Features 03 Degrees Offered 04 Work Integrated Learning Programmes 05 Corporate Partnerships 06 Fees Structure 07 Programmes

More information

MASTER OF INFORMATION TECHNOLOGY POSTGRADUATE DIPLOMA IN INFORMATION TECHNOLOGY

MASTER OF INFORMATION TECHNOLOGY POSTGRADUATE DIPLOMA IN INFORMATION TECHNOLOGY POSTGRADUATE DIPLOMA IN INFORMATION TECHNOLOGY Information for International applicants 2016 ENTRY Auckland Campus The Master of Information Technology and Postgraduate Diploma in Information Technology

More information

MSc Cyber Security. identity. hacker. virus. network. information

MSc Cyber Security. identity. hacker. virus. network. information identity MSc Cyber Security hacker virus QA is the foremost provider of education in the UK. We work with individuals at all stages of their careers, from our award-winning apprenticeship programmes, through

More information

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path

More information

MASTER OF INFORMATION TECHNOLOGY POSTGRADUATE DIPLOMA IN INFORMATION TECHNOLOGY

MASTER OF INFORMATION TECHNOLOGY POSTGRADUATE DIPLOMA IN INFORMATION TECHNOLOGY POSTGRADUATE DIPLOMA IN INFORMATION TECHNOLOGY Information for International applicants 2016 ENTRY Napier Campus The Master of Information Technology and Postgraduate Diploma in Information Technology

More information

New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme)

New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme) New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective The course provides dual career options for students

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme B. Tech - Cloud Technology & Information Security (4 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective B. Tech - Cloud Technology & Information Security

More information

InfoSec Academy Application & Secure Code Track

InfoSec Academy Application & Secure Code Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme B. Tech Cloud Technology & Information Security (4 Year Full Time Programme) Academic Year 2015 Page 1 Course Objective This unique B. Tech course provides dual career options

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey

More information

National Institute of Electronics and Information Technology (NIELIT)

National Institute of Electronics and Information Technology (NIELIT) National Institute of Electronics and Information Technology (NIELIT) The National Institute of Electronics and Information Technology (NIELIT), a body with the Department of Electronics and Information

More information

GYAN VIHAR SCHOOL OF ENGINEERING & TECHNOLOGY M. TECH. CSE (2 YEARS PROGRAM)

GYAN VIHAR SCHOOL OF ENGINEERING & TECHNOLOGY M. TECH. CSE (2 YEARS PROGRAM) GYAN VIHAR SCHOOL OF ENGINEERING & TECHNOLOGY M. TECH. CSE (2 YEARS PROGRAM) Need, objectives and main features of the Match. (CSE) Curriculum The main objective of the program is to develop manpower for

More information

Career Paths in Information Security v6.0

Career Paths in Information Security v6.0 Career Paths in Information Security v6.0 Have you ever considered a career in computer security but didn t know how to get started? The Information Security industry is an exciting and diverse place to

More information

OVERVIEW DEGREES & CERTIFICATES

OVERVIEW DEGREES & CERTIFICATES OVERVIEW DEGREES & CERTIFICATES 015 The best. Made better. SANS graduate programs are the ultimate expression of our 25 years dedicated to the education and development of information security professionals.

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme B. Tech Mobile Applications & Information Security (4 Year Full Time Programme) Academic Year 2015 Page 1 Course Objective This unique course provides dual career options

More information

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Fernanda Tapia Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS Apply today: strayer.edu/apply FLEXIBLE / AFFORDABLE

More information

Evaluation at the module level followed by an exam at the end of each term

Evaluation at the module level followed by an exam at the end of each term Diploma in Systems & Database Administration Course Objective In this global world nothing can be thought without computers and for connecting them we need large and dedicated network based on different

More information

Information Security Specialist Training on the Basis of ISO/IEC 27002

Information Security Specialist Training on the Basis of ISO/IEC 27002 Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu

More information

InfoSec Academy Forensics Track

InfoSec Academy Forensics Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

iventures ACADEMY OF BUSINESS AND FINANCE

iventures ACADEMY OF BUSINESS AND FINANCE IABF iventures ACADEMY OF BUSINESS AND FINANCE FUELING YOUR ASPIRATIONS Certified Financial Planner Financial Planning Standards Board Introduction The iventures Academy of Business & Finance (IABF) has

More information

Michelle Govan & Anand Philip Network & Security Engineering

Michelle Govan & Anand Philip Network & Security Engineering Michelle Govan & Anand Philip Network & Security Engineering Network & Security Engineering Suite Dr Michelle Govan Anand Philip Programme Philosophy The philosophy of the programmes is unique to others

More information

Master of Information Technology 2016

Master of Information Technology 2016 Master of Information Technology 2016 For New Zealand Citizens & Permanent Residents The Master of Information Technology (MIT) is a Level 9 one and a half year full-time programme with a minimum of 180

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS FAST TRACK Four steps to a cybersecurity career QUALIFY Earn Acceptance TRAIN Build Elite Skills CERTIFY Earn

More information

Computing. Third Level Courses Higher Diploma in Computing

Computing. Third Level Courses Higher Diploma in Computing Computing Third Level Courses Higher Diploma in Computing Certified Courses Microsoft Office Specialist (MOS) Certification CISCO IP Networking CCENT CISCO CCNA Routing and Switching CISCO IT Essentials

More information

EC-Council. Certified Ethical Hacker. Program Brochure

EC-Council. Certified Ethical Hacker. Program Brochure EC-Council C Certified E Ethical Hacker Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional

More information

MSc in Network Centred Computing. For students entering in October 2009. contributions from other EU universities Faculty of Science

MSc in Network Centred Computing. For students entering in October 2009. contributions from other EU universities Faculty of Science MSc in Network Centred Computing (NCC) For students entering in October 2009 Awarding Institution: The University of Reading Teaching Institution: The University of Reading, with contributions from other

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time

Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time Flexible Online Bachelor s Degree Completion Programs Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time Cyber Security Major The Program You ve heard about

More information

Computer Security and Investigations

Computer Security and Investigations Computer Security and Investigations Program Locations: Program Code: Coordinator: Credential: Peterborough CSI Blair Brown Ontario College Advanced Diploma Start Dates: September 06, 2016 January 09,

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Why should I follow the BSc. (Applied Accounting) degree programme at CA Sri Lanka? a. This is a degree approved by the University Grants Commission of Sri Lanka. b. It is

More information

Professional Certificate in Operational Risk Management (including Conduct Risk) 2015/2016

Professional Certificate in Operational Risk Management (including Conduct Risk) 2015/2016 Professional Certificate in Operational Risk Management (including Conduct Risk) 2015/2016 Who we are THE INSTITUTE OF BANKING The Institute of Banking is the largest professional institute in Ireland.

More information

Nottingham Trent University Course Specification

Nottingham Trent University Course Specification Nottingham Trent University Course Specification Basic Course Information 1. Awarding Institution: Nottingham Trent University 2. School/Campus: School of Science & Technology 3. Final Award, Course Title

More information

Bachelor of Information Technology

Bachelor of Information Technology Bachelor of Information Technology [ Network security] Information for International Students www.nsi.tafensw.edu.au/itsecuritydegree Bachelor of Information Technology [ Network security] Cybercrime is

More information

Cyber threats are growing.

Cyber threats are growing. Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College

More information

Document Control Information

Document Control Information Document Control Information Document Details Document Name Purpose of Document Document Version Number 3.0 Document Status Document Owner Prepared By ITIL Service Management Practices: V3 Qualifications

More information

FACULTY OF MANAGEMENT THE LEON RECANATI GRADUATE SCHOOL OF BUSINESS ADMINISTRATION

FACULTY OF MANAGEMENT THE LEON RECANATI GRADUATE SCHOOL OF BUSINESS ADMINISTRATION FACULTY OF MANAGEMENT THE LEON RECANATI GRADUATE SCHOOL OF BUSINESS ADMINISTRATION Graduate Programs http://recanati.tau.ac.il Graduate Programs Master of Business Administration (MBA) Master of Science

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Part one: Programme Specification

Part one: Programme Specification Part one: Programme Specification Course record information Name and level of final award: Name and level of intermediate awards: Awarding body/institution: Status of awarding body/institution: Location

More information

UK Permanent Salary Index - 2015

UK Permanent Salary Index - 2015 1 SYSTEM INTEGRATORS & CONSULTANCIES Job Title Guidelines 8 9 2010 2011 2012 2013 2014 Information & Risk IT Officer Project & Risk Consultant Analyst Part of a team in a large organisation responsible

More information

SANS CyberTalent VetSuccess Immersion Academy. VetSuccess

SANS CyberTalent VetSuccess Immersion Academy. VetSuccess SANS CyberTalent VetSuccess Immersion Academy P I L O T R E P O R T 2 0 1 5 VetSuccess For more than 25 years, SANS has been the leader in training and developing cybersecurity professionals. Like many

More information

PROGRAMME SPECIFICATION MSc Psychology

PROGRAMME SPECIFICATION MSc Psychology PROGRAMME SPECIFICATION MSc Psychology 1. Awarding institution/body University of Worcester 2. Teaching institution University of Worcester 3. Programme accredited by British Psychological Society 4. Final

More information

MS Information Security (MSIS)

MS Information Security (MSIS) MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in

More information

ADMISSION FOR POST GRADUATE DIPLOMA IN BANKING TECHNOLOGY (July 2016 Session)

ADMISSION FOR POST GRADUATE DIPLOMA IN BANKING TECHNOLOGY (July 2016 Session) INSTITUTE FOR DEVELOPMENT AND RESEARCH IN BANKING TECHNOLOGY (Established by Reserve Bank of India) Castle Hills, Road No. 1, Masab Tank, Hyderabad 500057, Telangana, INDIA Advertisement No. 02 / 2015

More information

Researching and Choosing a School

Researching and Choosing a School Researching and Choosing a School Updated November, 2015 This section is to help you determine what school best suits your learning style and training needs. It is your responsibility to investigate all

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

Cyber Defense Operations Graduate Certificate

Cyber Defense Operations Graduate Certificate The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide

More information

Principles of Information Assurance Syllabus

Principles of Information Assurance Syllabus Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information

More information

Plymouth University. Faculty of Science and Engineering. School of Computing Electronics and Mathematics. Programme Specification

Plymouth University. Faculty of Science and Engineering. School of Computing Electronics and Mathematics. Programme Specification Plymouth University Faculty of Science and Engineering School of Computing Electronics and Mathematics Programme Specification MSc Network Systems Engineering Programme codes: 2359 (Sept), 2938(Jan) September

More information

Plymouth University. Faculty of Science and Engineering. School of Computing Electronics and Mathematics. Programme Specification

Plymouth University. Faculty of Science and Engineering. School of Computing Electronics and Mathematics. Programme Specification Plymouth University Faculty of Science and Engineering School of Computing Electronics and Mathematics Programme Specification MSc Computer and Information Security Programme Codes: 3836 (Sept), 3837 (Jan)

More information

RESEARCHING AND CHOOSING A SCHOOL

RESEARCHING AND CHOOSING A SCHOOL RESEARCHING AND CHOOSING A SCHOOL This section is to help you determine what school best suits your learning style and training needs. It is your responsibility to investigate all of the available courses

More information

BEng/ BEng (Hons) Networked Systems Engineering, BSc/ BSc (Hons) Cyber Security and Networks BEng/ BEng (Hons) Digital Security, Forensics and

BEng/ BEng (Hons) Networked Systems Engineering, BSc/ BSc (Hons) Cyber Security and Networks BEng/ BEng (Hons) Digital Security, Forensics and BEng/ BEng (Hons) Networked Systems Engineering, BSc/ BSc (Hons) Cyber Security and Networks BEng/ BEng (Hons) Digital Security, Forensics and Ethical Hacking Programme Structure The programmes are unique

More information

Bachelor of Information Technology

Bachelor of Information Technology Bachelor of Information Technology Detailed Course Requirements The 2016 Monash University Handbook will be available from October 2015. This document contains interim 2016 course requirements information.

More information

SELECTION // ASSESSMENT // TRAINING EXAMINATION //GRADUATION

SELECTION // ASSESSMENT // TRAINING EXAMINATION //GRADUATION SELECTION // ASSESSMENT // TRAINING EXAMINATION //GRADUATION 1 Why SANS Cyber Academy? We know that the lack of cyber security skills is hardly going to be news to you. The fact that there is a solution

More information

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015 An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit

More information

Contents. Broad Contours. Who Should Attend. Unique Features of Program. Program Modules. Detailed Program Contents. AOAPx07 ver 1.

Contents. Broad Contours. Who Should Attend. Unique Features of Program. Program Modules. Detailed Program Contents. AOAPx07 ver 1. Contents Broad Contours Who Should Attend Unique Features of Program Program Modules Detailed Program Contents 2 Broad Contours Program Faculty :Priyanka Kapuria Duration : Four Months Eligibility : Graduation

More information

BACHELOR OF ENGINEERING WITH HONOURS IN INFORMATION AND COMMUNICATIONS TECHNOLOGY (INFORMATION SECURITY)

BACHELOR OF ENGINEERING WITH HONOURS IN INFORMATION AND COMMUNICATIONS TECHNOLOGY (INFORMATION SECURITY) BACHELOR OF ENGINEERING WITH HONOURS IN INFORMATION AND COMMUNICATIONS TECHNOLOGY (INFORMATION SECURITY) Bachelor of Engineering with Honours in Information and Communications Technology (Information Security)

More information

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing Faculty of Engineering and Informatics Programme Specification Programme title: MSc Cyber Security Academic Year: 2015/16 Degree Awarding Body: Partner(s), delivery organisation or support provider (if

More information

School of Informatics Department or equivalent Department of Computer Science Programme code

School of Informatics Department or equivalent Department of Computer Science Programme code PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name E-Business Systems Award MSc School School of Informatics Department or equivalent Department of Computer Science Programme code

More information

PACE: The Qualification Program for Certified General Accountants

PACE: The Qualification Program for Certified General Accountants PACE: The Qualification Program for Certified General Accountants Delivering accounting and financial knowledge, professionalism and leadership for today and tomorrow PACE: It s Synonymous with CGAs What

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO QUALIFYING PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women

More information

Master of Science in Information Technology (MSc-IT) (Autonomous) Accredited by NACC with Grade A (CGPA Score 3.41 on a 4 point scale)

Master of Science in Information Technology (MSc-IT) (Autonomous) Accredited by NACC with Grade A (CGPA Score 3.41 on a 4 point scale) Master of Science in Information Technology (MSc-IT) (Autonomous) Accredited by NACC with Grade A (CGPA Score 3.41 on a 4 point scale) The Chowgule Education Society pioneered computer education in the

More information

Notification of Request for Authorization under the Degree-Granting Institutions Act

Notification of Request for Authorization under the Degree-Granting Institutions Act Notification of Request for Authorization under the Degree-Granting Institutions Act Date posted: May 22, 2013 Institution: Current status: Nature of request: Argosy University Authorized to offer programs

More information

Management School. MSc/PG Dip/PG Cert. International Accounting & Finance. University of Stirling Management School

Management School. MSc/PG Dip/PG Cert. International Accounting & Finance. University of Stirling Management School Management School MSc/PG Dip/PG Cert International Accounting & Finance University of Stirling Management School Globalisation, growth of multinational enterprises, convergence of international accounting

More information

Australian Computer Society ANZSCO ICT Code descriptions v1.0 01.07.2011 Further updates will be issued in 2011-2012

Australian Computer Society ANZSCO ICT Code descriptions v1.0 01.07.2011 Further updates will be issued in 2011-2012 Australian Computer Society ANZSCO ICT Code descriptions v1.0 01.07.2011 Further updates will be issued in 2011-2012 The Australian Computer Society is the gazetted authority within Australia to undertake

More information

Page: Designed & Executed By: Presents Cyber Security Training

Page: Designed & Executed By: Presents Cyber Security Training Page: 1 Designed & Executed By: TM S I v8 RAINNVESTIGATOR Cyber Security Training Presents T CCE TechBharat Certified Cyber Expert TechBharat Certified Cyber Expert EC-Council Computer Hacking Forensic

More information

Forensic Certifications

Forensic Certifications Forensic Certifications Mayuri Shakamuri CS 489-02 Digital Forensics October 31, 2006 New Mexico Tech Executive Summary Digital Forensics is rapidly growing and evolving to become a scientific practice

More information

Programme Specification

Programme Specification Programme Specification Course record information Name and level of final award: MSc Cyber Security and Forensics Name and level of intermediate awards: Postgraduate Diploma in Cyber Security and Forensics

More information

Management Commerce Computers Life Sciences

Management Commerce Computers Life Sciences Management Commerce Computers Life Sciences Recognised by the Govt. of Karnataka Affiliated to Bangalore University, Karnataka, Bangalore Approved by AICTE & UGC, New Delhi Krupanidhi Degree College BCA

More information

Computer Information Science xxx

Computer Information Science xxx xxx The mission of the Faculty is to provide future-focused, studentcentred programmes that prepare students for the dynamic Information Systems and Information sectors of the UAE. CIS programme graduates

More information

MSc Computing for Business Postgraduate Diploma in Computing for Business Postgraduate Certificate in Computing for Business

MSc Computing for Business Postgraduate Diploma in Computing for Business Postgraduate Certificate in Computing for Business Computing, Engineering MSc Computing for Business Postgraduate Diploma in Computing for Business Postgraduate Certificate in Computing for Business Stoke campus Part-time: one afternoon, two evenings.

More information

MEETING THE NATION S INFORMATION SECURITY CHALLENGES

MEETING THE NATION S INFORMATION SECURITY CHALLENGES MEETING THE NATION S INFORMATION SECURITY CHALLENGES TO ADDRESS SKILLS AND WORKFORCE SHORTAGES IN THE INFORMATION SECURITY INDUSTRY, THE NATIONAL SECURITY AGENCY AND THE DEPARTMENT OF HOMELAND SECURITY

More information

Researching and Choosing a School

Researching and Choosing a School Researching and Choosing a School Updated May, 2015 This section is to help you determine what school best suits your learning style and training needs. It is your responsibility to investigate all of

More information

Researching and Choosing a School

Researching and Choosing a School Researching and Choosing a School Updated May, 2015 This section is to help you determine what school best suits your learning style and training needs. It is your responsibility to investigate all of

More information

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Library Science Award MSc/MA School Mathematics, Computer Science and Engineering Department or equivalent Department of Library

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

MSc Forensic Psychology

MSc Forensic Psychology MSc Forensic Programme Specification Faculty of Business, Law and Social Sciences May 2015 Programme Specification MSc Forensic NOTE: This specification provides a concise summary of the main features

More information

MSc Software Development E563F/E563

MSc Software Development E563F/E563 MSc Software Development E563F/E563 1. Introduction Mauritius has emerged as an international and competitive Information and Communication Technologies (ICT) destination and is steadily positioning itself

More information

Mathematics, Computer Science and Engineering Department or equivalent Computer Science

Mathematics, Computer Science and Engineering Department or equivalent Computer Science PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name MSc Health Informatics Award MSc School Mathematics, Computer Science and Engineering Department or equivalent Computer Science

More information

SYMBIOSIS INSTITUTE OF COMPUTER STUDIES AND RESEARCH BACHELOR OF COMPUTER APPLICATIONS PROGRAM STRUCTURE 2014-17

SYMBIOSIS INSTITUTE OF COMPUTER STUDIES AND RESEARCH BACHELOR OF COMPUTER APPLICATIONS PROGRAM STRUCTURE 2014-17 SYMBIOSIS INSTITUTE OF COMPUTER STUDIES AND RESEARCH BACHELOR OF COMPUTER APPLICATIONS PROGRAM STRUCTURE 2014-17 1. OBJECTIVES BCA offers the pre-qualification for professionals heading for smart career

More information

Business Information Technology Bachelor of Science in Business Information Technology

Business Information Technology Bachelor of Science in Business Information Technology Bachelor of Science in Career profile that is relevant and knowledge that is up to date are key drivers of business success. Efficient information and communication systems support innovative business

More information

Turn the skills shortage to your advantage

Turn the skills shortage to your advantage Turn the skills shortage to your advantage Make the most of the global shortage in network security skills. Join the Novice to Professional network security program to fast-track your career. Academy The

More information

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

L&T INSTITUTE OF PROJECT MANAGEMENT THE GEORGE WASHINGTON UNIVERSITY

L&T INSTITUTE OF PROJECT MANAGEMENT THE GEORGE WASHINGTON UNIVERSITY L&T INSTITUTE OF PROJECT MANAGEMENT In collaboration with THE GEORGE WASHINGTON UNIVERSITY Announces Level 3 Programme STRATEGIC PROJECT & PROGRAM MANAGEMENT Project Management program for Senior Professionals

More information

INFOCOMM & DIGITAL MEDIA (IT NETWORK AND SYSTEM ADMINISTRATION)

INFOCOMM & DIGITAL MEDIA (IT NETWORK AND SYSTEM ADMINISTRATION) PART TIME DIPLOMA IN INFOCOMM & DIGITAL MEDIA (IT NETWORK AND SYSTEM ADMINISTRATION) Introduction This Course is designed to equip students with a good working knowledge in IT networking and system administration

More information

MANCHESTER ACCA. Full-Time I Part-Time I Online. UK campuses only

MANCHESTER ACCA. Full-Time I Part-Time I Online. UK campuses only MANCHESTER ACCA Full-Time I Part-Time I Online UK campuses only 2 Our Teaching Team includes: Lisa Kiddell Chris Barlow Ian Wilson Highly Experienced Tutors Dedicated Career ServiceS Comprehensive Online

More information

Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics

Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics 1. Programme title Electronic Security and Digital Forensics 2. Awarding institution Middlesex University 3.

More information

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers

More information

Security Transcends Technology

Security Transcends Technology INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP Paul.Wang@ch.pwc.com

More information

BACHELOR OF COMPUTING SYSTEMS 2016 ENTRY. international.eit.ac.nz STUDENT PROFILE STUDY HIGHLIGHTS SUMMARY. Information for International applicants

BACHELOR OF COMPUTING SYSTEMS 2016 ENTRY. international.eit.ac.nz STUDENT PROFILE STUDY HIGHLIGHTS SUMMARY. Information for International applicants Information for International applicants 2016 ENTRY The Bachelor of Computing Systems (BCS) is a full-time, three year programme which offers you studies in a stimulating environment and provides a pathway

More information

Academic Programs INFORMATION TECHNOLOGY

Academic Programs INFORMATION TECHNOLOGY Academic Programs INFORMATION TECHNOLOGY INFORMATION TECHNOLOGY The Information Systems programs at Tidewater Community College cover the essential areas of study in information systems technology. The

More information

Placement Brochure MBA Programme 2012-14

Placement Brochure MBA Programme 2012-14 Placement Brochure MBA Programme 2012-14 Department of Business Administration and Management (DBAM) Sant Gadge Baba Amravati University (SGBAU) Amravati (M.S) - 444602 Transforming Students in to Competent

More information

POST GRADUATE PROGRAMME IN WEALTH MANAGEMENT (PGP-WM)

POST GRADUATE PROGRAMME IN WEALTH MANAGEMENT (PGP-WM) POST GRADUATE PROGRAMME IN WEALTH MANAGEMENT (PGP-WM) Duration: 11 months weekend programme An initiative under Introduction Wealth Management is an advanced form of financial planning that provides Individuals,

More information

at Cologne Business School

at Cologne Business School www.cbs.de/en MBA and EMBA Programmes at Cologne Business School Academic excellence Cologne Business School Who we are The Hallmarks of a CBS Education CBS offrers students a rigorous and forward-minded

More information