Programme In Information Security Management

Size: px
Start display at page:

Download "Programme In Information Security Management"

Transcription

1 Programme In Information Security Management One-year programme in Information Security (IS) MIEL Academy is pleased to announce PRISM TM (Programme in Information Security Management) a one-year Fulltime Programme (FTP) in Information Security (IS) Management. PRISM TM is a one-year programme in Information Security Management. It has a four trimester structure and is designed based on the global standards of pedagogy. The prime objective of the course is to create trained IS professionals at the middle management level, through proper education to bridge the demand-supply gap of IS professionals across the globe and accelerate the careers of people desirous of entry into the IS field. How is PRISM TM unique? PRISM TM is a result of MIEL s deep insight into IS gained through Unique job-ready programme, one of its kinds in the market, globally. Consulting across all functional domains of IS in the domestic and international market. Training experience of designing and delivering IS programmes of diverse nature leading to certification. Affiliation and alliances with world-class IS certifying authorities. Highly qualified, internationally accredited and experienced team of instructors. State-of-the-art training infrastructure. Education Loan Facility. 20-day FREE orientation programme for all enrolled students to match up to the requirement of the curriculum. How does PRISM TM help? Grooms you to become a well-trained IS professional with high potential. World-Class content with scope for specializations. Rigorous and well-researched curriculum. Thorough, practical-orientation. Guidance from instructors with domain knowledge in various disciplines of IS and Best Practices. Guest lectures from industry experts. Assured placement, subject to satisfying criteria. Expert level examinations. Various options for future specialization Personality development and soft skills training Personal attention due to limited batch size

2 Who should attend PRISM TM? Full-time Programme (FTP) for Freshers & Professionals Graduates or Post Graduates in Engineering, B.Sc., M.Sc., BCA, MCA with (Information Technology or Computer Science) Diploma in Engineering from recognized Polytechnic Institutes Graduates from other Technical and Non-Technical Streams Students appearing for final semester can also apply Legal, Banking & Finance Professionals Chartered Accountants Application Programmers System, Network and Database Administrators System and Network Engineers System and Network Analysts Technical Support and Implementation Engineers This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of their organization. What is the PRISM TM training methodology? Theory/Lessons Highly informative and instructional sets with numerous hand-on activities. Cases/Snippets Security cases/snippets to effectively bridge the gap between academic and industry sectors. Extrapolation Expose to out-of-box scenarios to provide lateral thinking. Simulation Interaction with real-life security scenarios and events to sharpen the skills. Project Work Sound technical & managerial grooming which helps to equip the participants to face industry requirements. What is the PRISM TM Structure? PRISM TM is a one-year programme with: A four trimester structure The curriculum spanning over 24 IS topics along with Project Stringent selection criteria with entrance test Orientation Session to match up to the curriculum requirement Rich and exhaustive coverage of IS topics, from fundamentals to the advanced concepts like enterprise security architecture Lively yet rigorous components to deploy various pedagogy modes Modular course content with hands-on-training to facilitate a gradual absorption of security topics Expert level examinations and Project submissions after every Trimester Periodic content updates to meet the relevant industry specific security requirement of the dynamic environment

3 Career Options The various career options available after gaining IS skills are as under: Network Security Systems Manager Network Security Systems Administrator Network Security Engineer Systems/Applications Security Executive Web Security Administrator Web Security Manager Security Auditor Ethical Hacker Data Security Specialist Chief Information Security Officer Computer Forensic Investigator IT Security Consultant IT Security Manager IT Security Auditor IT Security Administrator Security Certified Programmer Assurance Professional & Risk Manager Benefits of PRISM TM The opportunities on successful completion of PRISM TM are many and quite lucrative: Joint Certification from MIEL and CSI (Computer Society of India) 100% Assured Placement* for FTP Participants Candidates are globally accepted by the IT industry and other business verticals Prepares you for high paying careers like Ethical Hacker, Information Security Officer, Assurance Professional & Risk Manager, IS Auditor, BCP & DR Manager, CISO, CTO or Specializations like Network Security Administrator, Application Security Specialist, Penetration Tester, Forensic Investigator *conditions apply Avail easy Education Loan facilities from HDFC Bank CREDILA Education Loan Services Accredited By COMPUTER SOCIETY OF INDIA (CSI)

4 PRISM TM Course Outline The Orientation Session includes the following topics: C 001 Computer Fundamentals C 002 Introduction to Networking C 003 Basics of C Programming C004 Introduction to Databases C005 Basics of Java Programming Trimester 1 : Trimester 2 : C 101 Information Security Introduction C 201 Operations Security C 102 Physical and Environmental Security (6) C 202 UNIX and LINUX Security C 103 Access Control (2-6) C 203 Windows Architecture C 104 Cryptography Fundamentals C 105 UNIX Architecture C 106 Web Application Security C 107 Network Security (4-5) (4) (5) C 204 Wireless Communications and Telephony C 205 Applied Cryptography C 206 Database Architecture and Programming (5) (2,4,5) (3) C 207 Cyber Crime Investigations and Forensics Trimester 3: Trimester 4 : C 301 Database Security (3,4) C 401 Cyber Laws C 302 Windows Security C 402 Enterprise Security Architecture C 303 Security Models, Frameworks & Guidelines C 304 Security Certifications (2,4,5) (2-6) C 403 Cloud Computing & Virtualization C 404 Computer Audit and Assurance C 305 Security Incident Management C 306 Business Continuity & Disaster Recovery C 405 Project Work : The PRISM TM course ends with a comprehensive project submitted by each student on Current Industry Security events. The student is expected to put forth his understanding and analysis, leveraging from the knowledge gained from PRISM TM. Duration: Programme Location: Programme Timings: Programme Fee: Batch Size: Course Reschedule Policy: Placement : Student Reschedule Policy: Instructor: 1 Year Full-time Programme (FTP) Pune 9.00am to 5.30pm (Monday to Friday) Rs.2,20, % Service Tax = Rs.2,42,660/- (Includes Courseware + Exam) The above mentioned fee is applicable for candidate residing and working in India only. 25 Seats Only MIEL will strive to conduct the course as planned, but reserves all the rights to reschedule or cancel the course without assigning any reason. 100% Assured Placement* The student cannot reschedule and the registration will be applicable for the current academic year. These rules are subject to change without notice MIEL Accredited Instructors Please feel free to contact: (022) /62/57/58 Mob or contact Ms. Pushpa Redkar at *conditions apply

5 Seven Layers of Security (Defence in Depth)

New-Age Master s Programme

New-Age Master s Programme New-Age Master s Programme MCA (Information Security Management Services) (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective MCA (Information Security Management Services) This unique

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme BCA - Information Security & Mobile Applications (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective This unique course provides dual career options

More information

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time MSc Cyber Security International Students Can Apply UKPASS P052286 Code: Course 1 Year Full-Time, 2-3 Years Part-Time Length: Start Dates: September 2015, January 2016, September 2016, January 2017 Department:Department

More information

MASTER OF INFORMATION TECHNOLOGY POSTGRADUATE DIPLOMA IN INFORMATION TECHNOLOGY

MASTER OF INFORMATION TECHNOLOGY POSTGRADUATE DIPLOMA IN INFORMATION TECHNOLOGY POSTGRADUATE DIPLOMA IN INFORMATION TECHNOLOGY Information for International applicants 2016 ENTRY Auckland Campus The Master of Information Technology and Postgraduate Diploma in Information Technology

More information

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88 Career Survey 1. In which country are you based? 88 answered question 88 skipped question 0 2. What is your job title? 88 answered question 88 skipped question 0 3. Travel budget not at all 21.0% 17 somewhat

More information

Work Integrated Learning Programmes

Work Integrated Learning Programmes Work Integrated Learning Programmes 01 Index Introduction 02 Overview & Salient Features 03 Degrees Offered 04 Work Integrated Learning Programmes 05 Corporate Partnerships 06 Fees Structure 07 Programmes

More information

Ingenious Practice LABs

Ingenious Practice LABs Routing Switching Tigers Forum Join SAN & DR Renewed experience and content with Ingenious Practice LABs Daily Morning: 10:00am to 01:00pm Daily Evening: 07:00pm to 10:00pm Sunday Only Morning: 05:00am

More information

MASTER OF INFORMATION TECHNOLOGY POSTGRADUATE DIPLOMA IN INFORMATION TECHNOLOGY

MASTER OF INFORMATION TECHNOLOGY POSTGRADUATE DIPLOMA IN INFORMATION TECHNOLOGY POSTGRADUATE DIPLOMA IN INFORMATION TECHNOLOGY Information for International applicants 2016 ENTRY Napier Campus The Master of Information Technology and Postgraduate Diploma in Information Technology

More information

MSc Cyber Security. identity. hacker. virus. network. information

MSc Cyber Security. identity. hacker. virus. network. information identity MSc Cyber Security hacker virus QA is the foremost provider of education in the UK. We work with individuals at all stages of their careers, from our award-winning apprenticeship programmes, through

More information

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path

More information

National Institute of Electronics and Information Technology (NIELIT)

National Institute of Electronics and Information Technology (NIELIT) National Institute of Electronics and Information Technology (NIELIT) The National Institute of Electronics and Information Technology (NIELIT), a body with the Department of Electronics and Information

More information

New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme)

New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme) New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective The course provides dual career options for students

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme B. Tech - Cloud Technology & Information Security (4 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective B. Tech - Cloud Technology & Information Security

More information

Career Paths in Information Security v6.0

Career Paths in Information Security v6.0 Career Paths in Information Security v6.0 Have you ever considered a career in computer security but didn t know how to get started? The Information Security industry is an exciting and diverse place to

More information

InfoSec Academy Application & Secure Code Track

InfoSec Academy Application & Secure Code Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme B. Tech Mobile Applications & Information Security (4 Year Full Time Programme) Academic Year 2015 Page 1 Course Objective This unique course provides dual career options

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme B. Tech Cloud Technology & Information Security (4 Year Full Time Programme) Academic Year 2015 Page 1 Course Objective This unique B. Tech course provides dual career options

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey

More information

Evaluation at the module level followed by an exam at the end of each term

Evaluation at the module level followed by an exam at the end of each term Diploma in Systems & Database Administration Course Objective In this global world nothing can be thought without computers and for connecting them we need large and dedicated network based on different

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

Computing. Third Level Courses Higher Diploma in Computing

Computing. Third Level Courses Higher Diploma in Computing Computing Third Level Courses Higher Diploma in Computing Certified Courses Microsoft Office Specialist (MOS) Certification CISCO IP Networking CCENT CISCO CCNA Routing and Switching CISCO IT Essentials

More information

iventures ACADEMY OF BUSINESS AND FINANCE

iventures ACADEMY OF BUSINESS AND FINANCE IABF iventures ACADEMY OF BUSINESS AND FINANCE FUELING YOUR ASPIRATIONS Certified Financial Planner Financial Planning Standards Board Introduction The iventures Academy of Business & Finance (IABF) has

More information

OVERVIEW DEGREES & CERTIFICATES

OVERVIEW DEGREES & CERTIFICATES OVERVIEW DEGREES & CERTIFICATES 015 The best. Made better. SANS graduate programs are the ultimate expression of our 25 years dedicated to the education and development of information security professionals.

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Why should I follow the BSc. (Applied Accounting) degree programme at CA Sri Lanka? a. This is a degree approved by the University Grants Commission of Sri Lanka. b. It is

More information

EC-Council. Certified Ethical Hacker. Program Brochure

EC-Council. Certified Ethical Hacker. Program Brochure EC-Council C Certified E Ethical Hacker Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional

More information

Master of Information Technology 2016

Master of Information Technology 2016 Master of Information Technology 2016 For New Zealand Citizens & Permanent Residents The Master of Information Technology (MIT) is a Level 9 one and a half year full-time programme with a minimum of 180

More information

Computer Security and Investigations

Computer Security and Investigations Computer Security and Investigations Program Locations: Program Code: Coordinator: Credential: Peterborough CSI Blair Brown Ontario College Advanced Diploma Start Dates: September 06, 2016 January 09,

More information

Professional Certificate in Operational Risk Management (including Conduct Risk) 2015/2016

Professional Certificate in Operational Risk Management (including Conduct Risk) 2015/2016 Professional Certificate in Operational Risk Management (including Conduct Risk) 2015/2016 Who we are THE INSTITUTE OF BANKING The Institute of Banking is the largest professional institute in Ireland.

More information

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Fernanda Tapia Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS Apply today: strayer.edu/apply FLEXIBLE / AFFORDABLE

More information

Bachelor of Information Technology

Bachelor of Information Technology Bachelor of Information Technology [ Network security] Information for International Students www.nsi.tafensw.edu.au/itsecuritydegree Bachelor of Information Technology [ Network security] Cybercrime is

More information

InfoSec Academy Forensics Track

InfoSec Academy Forensics Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

Information Security Specialist Training on the Basis of ISO/IEC 27002

Information Security Specialist Training on the Basis of ISO/IEC 27002 Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu

More information

FACULTY OF MANAGEMENT THE LEON RECANATI GRADUATE SCHOOL OF BUSINESS ADMINISTRATION

FACULTY OF MANAGEMENT THE LEON RECANATI GRADUATE SCHOOL OF BUSINESS ADMINISTRATION FACULTY OF MANAGEMENT THE LEON RECANATI GRADUATE SCHOOL OF BUSINESS ADMINISTRATION Graduate Programs http://recanati.tau.ac.il Graduate Programs Master of Business Administration (MBA) Master of Science

More information

Michelle Govan & Anand Philip Network & Security Engineering

Michelle Govan & Anand Philip Network & Security Engineering Michelle Govan & Anand Philip Network & Security Engineering Network & Security Engineering Suite Dr Michelle Govan Anand Philip Programme Philosophy The philosophy of the programmes is unique to others

More information

MS Information Security (MSIS)

MS Information Security (MSIS) MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in

More information

GYAN VIHAR SCHOOL OF ENGINEERING & TECHNOLOGY M. TECH. CSE (2 YEARS PROGRAM)

GYAN VIHAR SCHOOL OF ENGINEERING & TECHNOLOGY M. TECH. CSE (2 YEARS PROGRAM) GYAN VIHAR SCHOOL OF ENGINEERING & TECHNOLOGY M. TECH. CSE (2 YEARS PROGRAM) Need, objectives and main features of the Match. (CSE) Curriculum The main objective of the program is to develop manpower for

More information

Part one: Programme Specification

Part one: Programme Specification Part one: Programme Specification Course record information Name and level of final award: Name and level of intermediate awards: Awarding body/institution: Status of awarding body/institution: Location

More information

Cyber threats are growing.

Cyber threats are growing. Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College

More information

Document Control Information

Document Control Information Document Control Information Document Details Document Name Purpose of Document Document Version Number 3.0 Document Status Document Owner Prepared By ITIL Service Management Practices: V3 Qualifications

More information

Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time

Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time Flexible Online Bachelor s Degree Completion Programs Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time Cyber Security Major The Program You ve heard about

More information

Contents. Broad Contours. Who Should Attend. Unique Features of Program. Program Modules. Detailed Program Contents. AOAPx07 ver 1.

Contents. Broad Contours. Who Should Attend. Unique Features of Program. Program Modules. Detailed Program Contents. AOAPx07 ver 1. Contents Broad Contours Who Should Attend Unique Features of Program Program Modules Detailed Program Contents 2 Broad Contours Program Faculty :Priyanka Kapuria Duration : Four Months Eligibility : Graduation

More information

SELECTION // ASSESSMENT // TRAINING EXAMINATION //GRADUATION

SELECTION // ASSESSMENT // TRAINING EXAMINATION //GRADUATION SELECTION // ASSESSMENT // TRAINING EXAMINATION //GRADUATION 1 Why SANS Cyber Academy? We know that the lack of cyber security skills is hardly going to be news to you. The fact that there is a solution

More information

Master of Science in Information Technology (MSc-IT) (Autonomous) Accredited by NACC with Grade A (CGPA Score 3.41 on a 4 point scale)

Master of Science in Information Technology (MSc-IT) (Autonomous) Accredited by NACC with Grade A (CGPA Score 3.41 on a 4 point scale) Master of Science in Information Technology (MSc-IT) (Autonomous) Accredited by NACC with Grade A (CGPA Score 3.41 on a 4 point scale) The Chowgule Education Society pioneered computer education in the

More information

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing Faculty of Engineering and Informatics Programme Specification Programme title: MSc Cyber Security Academic Year: 2015/16 Degree Awarding Body: Partner(s), delivery organisation or support provider (if

More information

BACHELOR OF ENGINEERING WITH HONOURS IN INFORMATION AND COMMUNICATIONS TECHNOLOGY (INFORMATION SECURITY)

BACHELOR OF ENGINEERING WITH HONOURS IN INFORMATION AND COMMUNICATIONS TECHNOLOGY (INFORMATION SECURITY) BACHELOR OF ENGINEERING WITH HONOURS IN INFORMATION AND COMMUNICATIONS TECHNOLOGY (INFORMATION SECURITY) Bachelor of Engineering with Honours in Information and Communications Technology (Information Security)

More information

MSc in Network Centred Computing. For students entering in October 2009. contributions from other EU universities Faculty of Science

MSc in Network Centred Computing. For students entering in October 2009. contributions from other EU universities Faculty of Science MSc in Network Centred Computing (NCC) For students entering in October 2009 Awarding Institution: The University of Reading Teaching Institution: The University of Reading, with contributions from other

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Management Commerce Computers Life Sciences

Management Commerce Computers Life Sciences Management Commerce Computers Life Sciences Recognised by the Govt. of Karnataka Affiliated to Bangalore University, Karnataka, Bangalore Approved by AICTE & UGC, New Delhi Krupanidhi Degree College BCA

More information

Management School. MSc/PG Dip/PG Cert. International Accounting & Finance. University of Stirling Management School

Management School. MSc/PG Dip/PG Cert. International Accounting & Finance. University of Stirling Management School Management School MSc/PG Dip/PG Cert International Accounting & Finance University of Stirling Management School Globalisation, growth of multinational enterprises, convergence of international accounting

More information

UK Permanent Salary Index - 2015

UK Permanent Salary Index - 2015 1 SYSTEM INTEGRATORS & CONSULTANCIES Job Title Guidelines 8 9 2010 2011 2012 2013 2014 Information & Risk IT Officer Project & Risk Consultant Analyst Part of a team in a large organisation responsible

More information

Researching and Choosing a School

Researching and Choosing a School Researching and Choosing a School Updated November, 2015 This section is to help you determine what school best suits your learning style and training needs. It is your responsibility to investigate all

More information

MSc Computing for Business Postgraduate Diploma in Computing for Business Postgraduate Certificate in Computing for Business

MSc Computing for Business Postgraduate Diploma in Computing for Business Postgraduate Certificate in Computing for Business Computing, Engineering MSc Computing for Business Postgraduate Diploma in Computing for Business Postgraduate Certificate in Computing for Business Stoke campus Part-time: one afternoon, two evenings.

More information

ADMISSION FOR POST GRADUATE DIPLOMA IN BANKING TECHNOLOGY (July 2016 Session)

ADMISSION FOR POST GRADUATE DIPLOMA IN BANKING TECHNOLOGY (July 2016 Session) INSTITUTE FOR DEVELOPMENT AND RESEARCH IN BANKING TECHNOLOGY (Established by Reserve Bank of India) Castle Hills, Road No. 1, Masab Tank, Hyderabad 500057, Telangana, INDIA Advertisement No. 02 / 2015

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

Plymouth University. Faculty of Science and Engineering. School of Computing Electronics and Mathematics. Programme Specification

Plymouth University. Faculty of Science and Engineering. School of Computing Electronics and Mathematics. Programme Specification Plymouth University Faculty of Science and Engineering School of Computing Electronics and Mathematics Programme Specification MSc Network Systems Engineering Programme codes: 2359 (Sept), 2938(Jan) September

More information

Principles of Information Assurance Syllabus

Principles of Information Assurance Syllabus Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information

More information

Cyber Defense Operations Graduate Certificate

Cyber Defense Operations Graduate Certificate The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS FAST TRACK Four steps to a cybersecurity career QUALIFY Earn Acceptance TRAIN Build Elite Skills CERTIFY Earn

More information

RESEARCHING AND CHOOSING A SCHOOL

RESEARCHING AND CHOOSING A SCHOOL RESEARCHING AND CHOOSING A SCHOOL This section is to help you determine what school best suits your learning style and training needs. It is your responsibility to investigate all of the available courses

More information

Plymouth University. Faculty of Science and Engineering. School of Computing Electronics and Mathematics. Programme Specification

Plymouth University. Faculty of Science and Engineering. School of Computing Electronics and Mathematics. Programme Specification Plymouth University Faculty of Science and Engineering School of Computing Electronics and Mathematics Programme Specification MSc Computer and Information Security Programme Codes: 3836 (Sept), 3837 (Jan)

More information

Nottingham Trent University Course Specification

Nottingham Trent University Course Specification Nottingham Trent University Course Specification Basic Course Information 1. Awarding Institution: Nottingham Trent University 2. School/Campus: School of Science & Technology 3. Final Award, Course Title

More information

SYMBIOSIS INSTITUTE OF COMPUTER STUDIES AND RESEARCH BACHELOR OF COMPUTER APPLICATIONS PROGRAM STRUCTURE 2014-17

SYMBIOSIS INSTITUTE OF COMPUTER STUDIES AND RESEARCH BACHELOR OF COMPUTER APPLICATIONS PROGRAM STRUCTURE 2014-17 SYMBIOSIS INSTITUTE OF COMPUTER STUDIES AND RESEARCH BACHELOR OF COMPUTER APPLICATIONS PROGRAM STRUCTURE 2014-17 1. OBJECTIVES BCA offers the pre-qualification for professionals heading for smart career

More information

Placement Brochure MBA Programme 2012-14

Placement Brochure MBA Programme 2012-14 Placement Brochure MBA Programme 2012-14 Department of Business Administration and Management (DBAM) Sant Gadge Baba Amravati University (SGBAU) Amravati (M.S) - 444602 Transforming Students in to Competent

More information

UNDERGRADUATE PROGRAMME SPECIFICATION

UNDERGRADUATE PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMME SPECIFICATION Programme Title: Awarding Body: Teaching Institution: Final Awards: Intermediate Awards: Mode of Study: UCAS Codes: QAA Subject Benchmarks: JACS Code: Forensic Investigation

More information

POST GRADUATE PROGRAMME IN WEALTH MANAGEMENT (PGP-WM)

POST GRADUATE PROGRAMME IN WEALTH MANAGEMENT (PGP-WM) POST GRADUATE PROGRAMME IN WEALTH MANAGEMENT (PGP-WM) Duration: 11 months weekend programme An initiative under Introduction Wealth Management is an advanced form of financial planning that provides Individuals,

More information

PROGRAMME SPECIFICATION MSc Psychology

PROGRAMME SPECIFICATION MSc Psychology PROGRAMME SPECIFICATION MSc Psychology 1. Awarding institution/body University of Worcester 2. Teaching institution University of Worcester 3. Programme accredited by British Psychological Society 4. Final

More information

BACHELOR OF COMPUTING SYSTEMS 2016 ENTRY. international.eit.ac.nz STUDENT PROFILE STUDY HIGHLIGHTS SUMMARY. Information for International applicants

BACHELOR OF COMPUTING SYSTEMS 2016 ENTRY. international.eit.ac.nz STUDENT PROFILE STUDY HIGHLIGHTS SUMMARY. Information for International applicants Information for International applicants 2016 ENTRY The Bachelor of Computing Systems (BCS) is a full-time, three year programme which offers you studies in a stimulating environment and provides a pathway

More information

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com Ultimate Knowledge Institute ultimateknowledge.com Social Media Security Training and Certifications Social Media Security Professional (SMSP) Social Media Engineering & Forensics Professional (SMEFP)

More information

MASTER OF TECHNOLOGY

MASTER OF TECHNOLOGY MASTER OF TECHNOLOGY IN ENTERPRISE BUSINESS ANALYTICS Learn to lead as an innovative DATA SCIENTIST CREATE effective GROWTH STRATEGIES for ENTERPRISES Scan QR code to find out more www.iss.nus.edu.sg Overview

More information

School of Informatics Department or equivalent Department of Computer Science Programme code

School of Informatics Department or equivalent Department of Computer Science Programme code PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name E-Business Systems Award MSc School School of Informatics Department or equivalent Department of Computer Science Programme code

More information

at Cologne Business School

at Cologne Business School www.cbs.de/en MBA and EMBA Programmes at Cologne Business School Academic excellence Cologne Business School Who we are The Hallmarks of a CBS Education CBS offrers students a rigorous and forward-minded

More information

City University of Hong Kong

City University of Hong Kong CIR-MAJ City University of Hong Kong Department of Computer Science Effective from Semester A 2015/16 For Students Admitted/Changed to the Major with Catalogue Term Semester A 2015/16 and thereafter Part

More information

GLS UNIVERSITY. Faculty of Computer Technology Master of Computer Applications (MCA) Programme

GLS UNIVERSITY. Faculty of Computer Technology Master of Computer Applications (MCA) Programme GLS UNIVERSITY Faculty of Computer Technology Master of Computer Applications (MCA) Programme 1. GLS University s Master of Computer Applications programme is a three-year full-time postgraduate programme

More information

Forensic Certifications

Forensic Certifications Forensic Certifications Mayuri Shakamuri CS 489-02 Digital Forensics October 31, 2006 New Mexico Tech Executive Summary Digital Forensics is rapidly growing and evolving to become a scientific practice

More information

L&T Institute of Project Management. Towards Excellence in Global Project Management. In collaboration with RICS INDIA

L&T Institute of Project Management. Towards Excellence in Global Project Management. In collaboration with RICS INDIA L&T Institute of Project Management In collaboration with RICS INDIA Through RICS SCHOOL OF BUILT ENVIRONMENT Adaptation Program in Quantity Surveying (APQS) Leading to certification Chartered Quantity

More information

FAQs Post Graduate Programme in Wealth Management (2015-16) Last Date for Registration: 28th Feb 2015 Batch Starting: 11 th April, 2015

FAQs Post Graduate Programme in Wealth Management (2015-16) Last Date for Registration: 28th Feb 2015 Batch Starting: 11 th April, 2015 FAQs Post Graduate Programme in Wealth Management (2015-16) Last Date for Registration: 28th Feb 2015 Batch Starting: 11 th April, 2015 Q1. Why a Post Graduate Programme in Wealth Management? Wealth Management

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Australian Computer Society ANZSCO ICT Code descriptions v1.0 01.07.2011 Further updates will be issued in 2011-2012

Australian Computer Society ANZSCO ICT Code descriptions v1.0 01.07.2011 Further updates will be issued in 2011-2012 Australian Computer Society ANZSCO ICT Code descriptions v1.0 01.07.2011 Further updates will be issued in 2011-2012 The Australian Computer Society is the gazetted authority within Australia to undertake

More information

Shon Harris s Newly Updated CISSP Materials

Shon Harris s Newly Updated CISSP Materials Shon Harris s Newly Updated CISSP Materials WHY PURSUE A CISSP? Many companies are beginning to regard a CISSP certification as a requirement for their technical, mid-management, and senior IT management

More information

Faculty of Engineering, the Built Environment and Information Technology Technology for tomorrow

Faculty of Engineering, the Built Environment and Information Technology Technology for tomorrow Faculty of Engineering, the Built Environment and Information Technology If you want to be at the forefront of what s happening in engineering, construction or IT, then stick around because NMMU is where

More information

BEng/ BEng (Hons) Networked Systems Engineering, BSc/ BSc (Hons) Cyber Security and Networks BEng/ BEng (Hons) Digital Security, Forensics and

BEng/ BEng (Hons) Networked Systems Engineering, BSc/ BSc (Hons) Cyber Security and Networks BEng/ BEng (Hons) Digital Security, Forensics and BEng/ BEng (Hons) Networked Systems Engineering, BSc/ BSc (Hons) Cyber Security and Networks BEng/ BEng (Hons) Digital Security, Forensics and Ethical Hacking Programme Structure The programmes are unique

More information

SANS CyberTalent VetSuccess Immersion Academy. VetSuccess

SANS CyberTalent VetSuccess Immersion Academy. VetSuccess SANS CyberTalent VetSuccess Immersion Academy P I L O T R E P O R T 2 0 1 5 VetSuccess For more than 25 years, SANS has been the leader in training and developing cybersecurity professionals. Like many

More information

CURRICULUM REVISION OF THE HIGHER NATIONAL DIPLOMA IN INFORMATION TECHNOLOGY PROGRAMME AT THE SRI LANKA INSTITUTE TECHNOLOGICAL STUDIES FOR ADVANCE

CURRICULUM REVISION OF THE HIGHER NATIONAL DIPLOMA IN INFORMATION TECHNOLOGY PROGRAMME AT THE SRI LANKA INSTITUTE TECHNOLOGICAL STUDIES FOR ADVANCE CURRICULUM REVISION OF THE HIGHER NATIONAL DIPLOMA IN INFORMATION TECHNOLOGY PROGRAMME AT THE SRI LANKA INSTITUTE FOR ADVANCE TECHNOLOGICAL STUDIES Consultant s Final Report and Curriculum, 0 TABLE OF

More information

Page: Designed & Executed By: Presents Cyber Security Training

Page: Designed & Executed By: Presents Cyber Security Training Page: 1 Designed & Executed By: TM S I v8 RAINNVESTIGATOR Cyber Security Training Presents T CCE TechBharat Certified Cyber Expert TechBharat Certified Cyber Expert EC-Council Computer Hacking Forensic

More information

PACE: The Qualification Program for Certified General Accountants

PACE: The Qualification Program for Certified General Accountants PACE: The Qualification Program for Certified General Accountants Delivering accounting and financial knowledge, professionalism and leadership for today and tomorrow PACE: It s Synonymous with CGAs What

More information

Researching and Choosing a School

Researching and Choosing a School Researching and Choosing a School Updated May, 2015 This section is to help you determine what school best suits your learning style and training needs. It is your responsibility to investigate all of

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

Researching and Choosing a School

Researching and Choosing a School Researching and Choosing a School Updated May, 2015 This section is to help you determine what school best suits your learning style and training needs. It is your responsibility to investigate all of

More information

Notification of Request for Authorization under the Degree-Granting Institutions Act

Notification of Request for Authorization under the Degree-Granting Institutions Act Notification of Request for Authorization under the Degree-Granting Institutions Act Date posted: May 22, 2013 Institution: Current status: Nature of request: Argosy University Authorized to offer programs

More information

MASTER OF ENGINEERING TECHNOLOGY & BACHELOR OF ENGINEERING WITH HONOURS IN SUSTAINABLE INFRASTRUCTURE ENGINEERING (BUILDING SERVICES)

MASTER OF ENGINEERING TECHNOLOGY & BACHELOR OF ENGINEERING WITH HONOURS IN SUSTAINABLE INFRASTRUCTURE ENGINEERING (BUILDING SERVICES) MASTER OF ENGINEERING TECHNOLOGY & BACHELOR OF ENGINEERING WITH HONOURS IN SUSTAINABLE INFRASTRUCTURE ENGINEERING (BUILDING SERVICES) ARE YOU MADE FOR AN SIT DEGREE?? PHYSICAL SCIENCE & ENGINEERING Master

More information

L&T INSTITUTE OF PROJECT MANAGEMENT THE GEORGE WASHINGTON UNIVERSITY

L&T INSTITUTE OF PROJECT MANAGEMENT THE GEORGE WASHINGTON UNIVERSITY L&T INSTITUTE OF PROJECT MANAGEMENT In collaboration with THE GEORGE WASHINGTON UNIVERSITY Announces Level 3 Programme STRATEGIC PROJECT & PROGRAM MANAGEMENT Project Management program for Senior Professionals

More information

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Library Science Award MSc/MA School Mathematics, Computer Science and Engineering Department or equivalent Department of Library

More information

Critical career expertise in the age of technology

Critical career expertise in the age of technology Critical career expertise in the age of technology Information Systems Management Professional profile for cutting-edge careers As the pace of technological innovation continues to escalate, so does the

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO QUALIFYING PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women

More information

Business Information Technology Bachelor of Science in Business Information Technology

Business Information Technology Bachelor of Science in Business Information Technology Bachelor of Science in Career profile that is relevant and knowledge that is up to date are key drivers of business success. Efficient information and communication systems support innovative business

More information

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages provided by international certifications Cyber & IT Governance

More information

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

Undergraduate 2015-16. Business & Management programmes

Undergraduate 2015-16. Business & Management programmes Undergraduate 2015-16 Business & Management programmes 1 2 3 4 5 5 reasons why You ll study at a top research-led University and gain an incisive and indepth understanding of business and how it works,

More information

Security Transcends Technology

Security Transcends Technology INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP Paul.Wang@ch.pwc.com

More information