New-Age Undergraduate Programme

Size: px
Start display at page:

Download "New-Age Undergraduate Programme"

Transcription

1 New-Age Undergraduate Programme B. Tech Mobile Applications & Information Security (4 Year Full Time Programme) Academic Year 2015 Page 1

2 Course Objective This unique course provides dual career options for the students in the hot-favourite technology sectors of Information Security and Mobile Applications. This specialized course offers in-depth practical know-how of the current trend Technology. These sectors have the potential to grow exponentially and will provide challenging job opportunities for young professionals with the right skill sets. Course Particulars Course Name B. Tech Mobile Applications & Information Security Degree Awarded Bachelor Of Technology Duration of the Course 4 Year (8 semesters) Medium of Instruction & Examination English Study Campus V.P.O Sahauran, Tehsil kharar, Distt. Mohali, Punjab Eligibility The minimum quali ication required to apply is a pass in the 10+2 examination from PUC / ISC / CBSE or equivalent board or a course recognised as equivalent thereto by the university. Examinations & Assessments 1. Internal tests 2. Assignments 3. Seminar presentation Curriculum* Semester 1 Technical English Matrices and Calculus Engineering Physics Engineering Chemistry Computer fundamentals & organization Programming in C Soft skill, Effective speaking and Analytical Skills - I Programming in C Lab Physics Laboratory Chemistry Laboratory 4. Class tests 5.Preparatory theory and Practical examination 6. Term end Theory and Practical examination Semester 2 Communication Skills Differential Equations and Complex Analysis OOPS with C++ Operating System Information Security I Web Technology I Soft Skills, Effective speaking and Analytical Skills- II Information Security I- Lab OOPS with C++ - Lab Web Technology I - Lab Page 2

3 Semester 3 Fourier Series and Transforms Software Engineering Introduction to Linux Object-oriented programming in Java Computer Networks Mobile Web and Application Development Personal Effectiveness Mobile Web and Application Development Lab Object-oriented programming in Java Lab Introduction to Linux- Lab Computer Networks - Lab Semester 5 Ethical Hacking Fundamentals Network Security Basics Disaster Recovery and Business Continuity Management Mobile Ecosystem and Business Models Basic Android Programming Mobile Device and Network Architecture Life and Career Skills Ethical Hacking Fundamentals - Lab Basic Android Programming Lab Network Security Basics Lab Industrial Training Semester 7 IT Governance, Risk and Information Security Audit Security in Wireless, VOIP and Mobile Apps E-commerce Cross-Platform Applications Advanced Web Technology Elective II Introduction to Mobile UI/UX Introduction to Mobile Gaming Mobile Testing Fundamentals Cross-Platform Applications Lab Advanced Web Technology Lab Mini Project II Semester 4 OSI Layer and Security Information Security - II Cryptography Fundamentals Enterprise Application Development Introduction to RDBMS Data Structures using C Effective Communication Mini Project I Data Structures using C Lab Enterprise Application Development Lab Introduction to RDBMS Lab Semester 6 Cyber Forensics Basics Security Threats and Trends Introduction to UI/UX Advanced Android Programming Web Technology II Elective I Linux Security and Forensics OWASP Framework Hacktivism, Cyber warfare and Cyber Terrorism Transition from Campus to Corporate Cyber Forensics Basics Lab Advanced Android Programming - Lab Web Technology - II Lab Introduction to UI/UX-Lab Semester 8 Internship/Project *Subject to changes made by university Page 3

4 Career Opportunities for Mobile App Developers Global Scenario Mobile Applications have spawned a new industry aptly called the Mobile Apps Economy which continues to grow at a rapid pace. Number of Apps in Android market - Google Play: 7,00,000 * Number of Apps in Apple App Store: 6,50,000 ** Estimated size of the current Mobile App Industry: $ 25 billion*** Revenue growth of Mobile Apps Industry 2011 & 2012: 197 %**** The boom is set to create about 3 million Mobile Application Development related jobs worldwide. *(Source: Bloomberg Business week) ** (Source: Distimo) *** (Source: Gartner Inc) **** (Source: ScanLife Trend Report 2012) Indian Scenario Advantage India The sector s exponential growth bodes well for India. With huge investments provided for developing both consumer and enterprise apps, the sector in India will open up challenging opportunities for both outsourced and indigenous app development. Indian App market estimated to be around Rs Cr; could grow up to Rs 2,000Cr by 2016: Avendus Report The Indian app market was estimated to be Rs crore during 2012, as per a study released by Avendus Partners.The total monthly revenues earned by Google Play and Apple app store from Indian customers was Rs 27.5 crore in October 2012 or an annualized run-rate of Rs 330 crore. Based on these estimates, the market size for 2012 has been pegged to be somewhere Rs crore. As per the study, the Indian app market could reach Rs 2,000 crore by As per the estimates, Google Play and Apple App store are expected to cross Rs 800 crore each by Employment Opportunities Small, Medium and Large Professional Services IT Companies Enterprise Application Product and Service Companies Mobile Application Product and Service Companies VAS providers e-commerce, m-commerce companies Internet companies Page 4

5 Career Progression Path for Mobile Applications* *Terms & Conditions Apply Career Opportunities for Information Security Professionals Global Scenario Cyber Security Need Drives IT Job Growth New research has found that job openings in the ield of cyber security have grown by more than 100 percent in the past year. Those openings are only expected to grow in the coming year, jumping an additional 30 percent in The demands for security workers points to the importance companies are placing on responding to the growth of recent attacks on businesses of all sizes. - Business News Daily The Army is building a new cyber command centre at Fort Meade to eventually house 1,500, leading a worldwide cyber corps of 21,000 soldiers and civilians. By 2017, the Air Force will add more than 1,000 uniformed cyber forces to its 6,000 experts now working at the Air Force Space Command. The Navy had 800 cyber security staffers in 2013 and will reach nearly 1,000 by 2017, working toward a mix of 80 percent uniformed personnel and 20 percent civilian employees and contractors. The Marines currently have 300 uniformed personnel, civilians and contractors at work, and plan to increase that number to just fewer than 1,000 by Capital Business Indian Scenario National Cyber Security Policy 2013: As per this Govt. of India policy document, there will be a requirement of 500,000 professionals skilled in cyber security in the next 5 years. Also the Ministry of Communication and Information Technology will encourage all organisations, private and public to designate a member of senior management, as Chief Information Security Of icer (CISO), responsible for cyber security efforts and initiatives. Analysts said that India currently has around certi ied cyber security professionals, which is signi icantly lesser than the requirement of personnel. The current number is miniscule when compared to the nearly 25 million cyber warriors in China. According to recent data, India would need 4.7 lakh cyber security professionals by 2015 to protect its IT infrastructure. - The Times of India Page 5

6 Even in the most dif icult of economic times, IT security is a full-employment ield. With the growing number of threats on the horizon, and the growing awareness of cyber security vulnerabilities and issues. inside the enterprise, it is clear that security will be a top priority for the coming year and likely for years to come Job Opportunity for Cyber Security Professionals in various departments of different sectors: Corporate (Information Security, Compliance, IT&IS Audit, Software Development etc.) Banking, Finance and Insurance Sector (IT and Data Security, E-Commerce and Net-banking Security, Compliance, Information Risk Management, IT&IS Audit etc.) Defence and Police (R&D, Investigation and Forensics, IT Infrastructure Security etc.) Governance (E-Governance, Public Key Infrastructure Management, Forensic Science Labs etc.) Legal Department (Cyber Forensics Consultants, Cyber Law Expert, Expert witness etc.) Cyber Fraud Consultants / Management (Ethical Hacker, Penetration Testers, Cyber Fraud Detectives) Career Progression Path for Information Security* Industry Entry level (0-1 yrs exp.) Mid Level (3-5 yrs exp.) Advanced level (5 yrs plus exp.) Average Salary ` 200, ,000 ` 400, ,000 ` 800,000 + Executive Information Security Sr. Information Security Officer Chief Information Security Officer Malware Analyst Sr. Malware Analyst Manager Anti Virus Development Job Role Self - employment Datacentre Technician Datacentre Engineer Datacentre Manager Junior Penetration Tester Penetration Tester Ethical Hacker Database Manager IT Security Network and Database Manager - IT Security Datacentre Security Engineer Junior Cyber Forensic Analyst Cyber Forensic Analyst Cyber Forensic Investigator Compensation commensurate to the efforts put in *Terms & Conditions Apply Page 6

7 Partial List of Organizations Where Our Students Received Employment Opportunities* *Terms & Conditions Apply For Enquiry & Admission, Contact Bhawan Negi Mobile : bhawan@inurture.co.in Page 7

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme B. Tech Cloud Technology & Information Security (4 Year Full Time Programme) Academic Year 2015 Page 1 Course Objective This unique B. Tech course provides dual career options

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme BCA - Information Security & Mobile Applications (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective This unique course provides dual career options

More information

New-Age Master s Programme

New-Age Master s Programme New-Age Master s Programme MCA (Information Security Management Services) (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective MCA (Information Security Management Services) This unique

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme B. Tech - Cloud Technology & Information Security (4 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective B. Tech - Cloud Technology & Information Security

More information

New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme)

New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme) New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective The course provides dual career options for students

More information

New-Age Degrees for New-Age Careers! Are you ready for the take-off?

New-Age Degrees for New-Age Careers! Are you ready for the take-off? Admission 2015-16 www.kluniversity.in New-Age Degrees for New-Age Careers! Are you ready for the take-off? President s Message Dr. L.S.S. Reddy is an eminent Professor in Computer Science and Engineering

More information

B. Tech - Computer Engineering (4 Year Full-Time Programme)

B. Tech - Computer Engineering (4 Year Full-Time Programme) New-Age Undergraduate Programme B. Tech - Computer Engineering (4 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective This program provides students with an overall knowledge of the different

More information

New-Age IT Degrees for New-Age IT Careers!

New-Age IT Degrees for New-Age IT Careers! www.poornima.edu.in Admission 2015-16 New-Age IT Degrees for New-Age IT Careers! Are you ready for the take-off? B. Tech / BCA / BFA Cloud Technology Information Security Mobile Applications IT Infrastructure

More information

Programme In Information Security Management

Programme In Information Security Management Programme In Information Security Management One-year programme in Information Security (IS) MIEL Academy is pleased to announce PRISM TM (Programme in Information Security Management) a one-year Fulltime

More information

Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time

Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time Flexible Online Bachelor s Degree Completion Programs Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time Cyber Security Major The Program You ve heard about

More information

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time MSc Cyber Security International Students Can Apply UKPASS P052286 Code: Course 1 Year Full-Time, 2-3 Years Part-Time Length: Start Dates: September 2015, January 2016, September 2016, January 2017 Department:Department

More information

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking

More information

(Funding for training support means all you pay is the apprentice s wage)

(Funding for training support means all you pay is the apprentice s wage) Your apprentices of today will be your skilled workers of the future. Due to the fast moving nature of the digital world, the demand for talent has never been higher and nurturing skills in-house is one

More information

Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws

Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services announces

More information

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services

More information

Excellence Doesn t Need a Certificate. Be an. Believe in You. 2014 AMIGOSEC Consulting Private Limited

Excellence Doesn t Need a Certificate. Be an. Believe in You. 2014 AMIGOSEC Consulting Private Limited Excellence Doesn t Need a Certificate Be an 2014 AMIGOSEC Consulting Private Limited Believe in You Introduction In this age of emerging technologies where IT plays a crucial role in enabling and running

More information

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88 Career Survey 1. In which country are you based? 88 answered question 88 skipped question 0 2. What is your job title? 88 answered question 88 skipped question 0 3. Travel budget not at all 21.0% 17 somewhat

More information

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information

Cyber threats are growing.

Cyber threats are growing. Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College

More information

MSc Cyber Security. identity. hacker. virus. network. information

MSc Cyber Security. identity. hacker. virus. network. information identity MSc Cyber Security hacker virus QA is the foremost provider of education in the UK. We work with individuals at all stages of their careers, from our award-winning apprenticeship programmes, through

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

Cyber Defense Operations Graduate Certificate

Cyber Defense Operations Graduate Certificate The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide

More information

InfoSec Academy Application & Secure Code Track

InfoSec Academy Application & Secure Code Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

PROGRAMME DETAIL SPECIFICATION. Programme Summary

PROGRAMME DETAIL SPECIFICATION. Programme Summary PROGRAMME DETAIL SPECIFICATION Programme Summary 1 Awarding institution Liverpool John Moores University 2 Teaching institution university Liverpool John Moores University 3a Programme accredited by: 3b

More information

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Fernanda Tapia Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS Apply today: strayer.edu/apply FLEXIBLE / AFFORDABLE

More information

Cyber security Indian perspective & Collaboration With EU

Cyber security Indian perspective & Collaboration With EU Cyber security Indian perspective & Collaboration With EU Abhishek Sharma, BIC IAG member, On behalf of Dr. A.S.A Krishnan, Sr. Director, Department of Electronics & Information Technology Government of

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

www.innobuzz.in Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0

www.innobuzz.in Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0 Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0 Innobuzz Knowledge Solutions (P) Limited is a Leading Global Firm providing Training Programs

More information

COMPUTER SCIENCE & INFORMATION TECHNOLOGY

COMPUTER SCIENCE & INFORMATION TECHNOLOGY ST. JOHNS RIVER STATE COLLEGE COMPUTER SCIENCE & INFORMATION TECHNOLOGY Computer Information Technology Computer Network Engineering Technology Computer Programming and Analysis Computer Programmer Computer

More information

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services announces Training

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

GYAN VIHAR SCHOOL OF ENGINEERING & TECHNOLOGY M. TECH. CSE (2 YEARS PROGRAM)

GYAN VIHAR SCHOOL OF ENGINEERING & TECHNOLOGY M. TECH. CSE (2 YEARS PROGRAM) GYAN VIHAR SCHOOL OF ENGINEERING & TECHNOLOGY M. TECH. CSE (2 YEARS PROGRAM) Need, objectives and main features of the Match. (CSE) Curriculum The main objective of the program is to develop manpower for

More information

Computer Security and Investigations

Computer Security and Investigations Computer Security and Investigations Program Locations: Program Code: Coordinator: Credential: Peterborough CSI Blair Brown Ontario College Advanced Diploma Start Dates: September 06, 2016 January 09,

More information

OVERVIEW DEGREES & CERTIFICATES

OVERVIEW DEGREES & CERTIFICATES OVERVIEW DEGREES & CERTIFICATES 015 The best. Made better. SANS graduate programs are the ultimate expression of our 25 years dedicated to the education and development of information security professionals.

More information

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations

More information

B.A. in Information Systems

B.A. in Information Systems New Jersey Institute of Technology 1 B.A. in Information Systems (129 credit) First Year Term Credits CS 100 Roadmap to Computing HUM 101 English Composition: Writing, Speaking, Thinking I MATH 18 General

More information

CRYPTUS DIPLOMA IN IT SECURITY

CRYPTUS DIPLOMA IN IT SECURITY CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

Information Systems Security Certificate Program

Information Systems Security Certificate Program Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate

More information

Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement

Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement 2015 Burning Glass Technologies Cybersecurity has a Big Problem Attacks are rising Cyber incidents jumped

More information

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.

More information

Career Paths in Information Security v6.0

Career Paths in Information Security v6.0 Career Paths in Information Security v6.0 Have you ever considered a career in computer security but didn t know how to get started? The Information Security industry is an exciting and diverse place to

More information

Critical career expertise in the age of technology

Critical career expertise in the age of technology Critical career expertise in the age of technology Information Systems Management Professional profile for cutting-edge careers As the pace of technological innovation continues to escalate, so does the

More information

New-Age Degrees for New-Age Careers!

New-Age Degrees for New-Age Careers! Admission 2015-16 www.kalasalingam.ac.in KALASALINGAM UNIVERSITY New-Age Degrees for New-Age Careers! Are you ready for the take-off? Chairman s Message To Produce Technically Competent, Socially Committed

More information

Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437. Specialist Security Training Catalogue

Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437. Specialist Security Training Catalogue Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?

More information

COURSE TITLE COURSE DESCRIPTION

COURSE TITLE COURSE DESCRIPTION COURSE TITLE COURSE DESCRIPTION CS-00X COMPUTING EXIT INTERVIEW All graduating students are required to meet with their department chairperson/program director to finalize requirements for degree completion.

More information

FORBIDDEN - Ethical Hacking Workshop Duration

FORBIDDEN - Ethical Hacking Workshop Duration Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once

More information

FACULTY OF ECONOMICS AND MANAGEMENT PROGRAMME ADMISSION QUALIFICATION LIST OF COURSES

FACULTY OF ECONOMICS AND MANAGEMENT PROGRAMME ADMISSION QUALIFICATION LIST OF COURSES FACULTY OF ECONOMICS AND MANAGEMENT PROGRAMME ADMISSION QUALIFICATION LIST OF COURSES Accounting 6 Semesters Kuala Lumpur Islamic Economy Possess Bachelor Degree of Accounting with a high cumulative grade

More information

Academic Programs INFORMATION TECHNOLOGY

Academic Programs INFORMATION TECHNOLOGY Academic Programs INFORMATION TECHNOLOGY INFORMATION TECHNOLOGY The Information Systems programs at Tidewater Community College cover the essential areas of study in information systems technology. The

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 229 Information Security Fundamentals I. Basic Course Information A. Course Number & Title: CISY-229 Information Security Fundamentals B. New or Modified

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

MBA Financial Markets (With Dual Specialization) In collaboration with National Stock Exchange

MBA Financial Markets (With Dual Specialization) In collaboration with National Stock Exchange MBA Financial Markets (With Dual Specialization) In collaboration with National Stock Exchange Eligibility and Admission Process Details Graduate with 50% marks (45% for SC/ST) Appeared for All India entrance

More information

ASSOCIATE DEGREE OF SOFTWARE DEVELOPMENT (MOBILE APPLICATIONS)

ASSOCIATE DEGREE OF SOFTWARE DEVELOPMENT (MOBILE APPLICATIONS) GOVERNMENT OF WESTERN AUSTRALIA ASSOCIATE DEGREE OF SOFTWARE DEVELOPMENT (MOBILE APPLICATIONS) COURSE OUTLINE 2015 Information correct as of December 2014. Provider CRICOS Code 00020G Higher Education

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

IT AND BUSINESS CHANGE

IT AND BUSINESS CHANGE THE PANEL IT AND BUSINESS CHANGE SALARY SURVEY 2014 Table of Contents Page 3 Welcome to our IT and Business Change Salary Survey 2014! Page 4 Senior Executives Data Analytics - Business Intelligence /

More information

Information Technology Division

Information Technology Division 151 xxx Introduction to IT Division The Higher Colleges of Technology offers one of UAEÕ s largest selections of Information Technology programs. Students study Diploma, Higher Diploma and Bachelor Degree

More information

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Web Technologies

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Web Technologies Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Web Technologies PROGRAMME STRUCTURE Aims & Objectives Business and Information Management This course aims to provide

More information

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Information Technology Diploma in Web Technologies

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Information Technology Diploma in Web Technologies Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Information Technology Diploma in Web Technologies PROGRAMME STRUCTURE Aims & Objectives Business and Information

More information

C-. If these courses have not been completed satisfactorily upon enrolling at USF Sarasota-Manatee, they must be taken before the degree is granted.

C-. If these courses have not been completed satisfactorily upon enrolling at USF Sarasota-Manatee, they must be taken before the degree is granted. C-. If these courses have not been completed satisfactorily upon enrolling at USF Sarasota-Manatee, they must be taken before the degree is granted. Upper-level Course Requirements Required Courses HIS

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

Admission Procedure. The final selection is based on the performance in the qualifying examination, entrance test and interview.

Admission Procedure. The final selection is based on the performance in the qualifying examination, entrance test and interview. Admission Procedure Admissions open for MA(Eng), MCA, MBA, MFA and M.Sc (Organic Chemistry) courses for the academic year 2014-2015 Students fulfilling the eligibility criteria may seek admission through

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

InfoSec Academy Forensics Track

InfoSec Academy Forensics Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

CYBERSTRAT IS PART OF GMTL LLP, 26 YORK STREET, LONDON, W1U 6PZ, UNITED KINGDOM WWW.CYBERSTRAT.CO INFO@CYBERSTRAT.CO

CYBERSTRAT IS PART OF GMTL LLP, 26 YORK STREET, LONDON, W1U 6PZ, UNITED KINGDOM WWW.CYBERSTRAT.CO INFO@CYBERSTRAT.CO CYBERSTRAT IS PART OF GMTL LLP, 26 YORK STREET, LONDON, W1U 6PZ, UNITED KINGDOM WWW.CYBERSTRAT.CO INFO@CYBERSTRAT.CO CYBER, INFORMATION SECURITY - OVERVIEW A cyber security breach is no longer just an

More information

Ethical Hacking & Cyber Security Workshop

Ethical Hacking & Cyber Security Workshop Ethical Hacking & Cyber Security Workshop i3indya Technologies (A unit of ithree Infotech Pvt. Ltd.) Delhi Office: 37, First Floor, Defence Enclave, Preet Vihar, New Delhi-110092 Contact us: Email: info@i3indya.com

More information

Principles of Information Assurance Syllabus

Principles of Information Assurance Syllabus Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information

More information

EC Council Certified Ethical Hacker V8

EC Council Certified Ethical Hacker V8 Course Code: ECCEH8 Vendor: Cyber Course Overview Duration: 5 RRP: 2,445 EC Council Certified Ethical Hacker V8 Overview This class will immerse the delegates into an interactive environment where they

More information

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:

More information

DIPLOMA OF PROGRAMMING (APPLICATIONS)

DIPLOMA OF PROGRAMMING (APPLICATIONS) GOVERNMENT OF WESTERN AUSTRALIA DIPLOMA OF PROGRAMMING (APPLICATIONS) COURSE OUTLINE 2016 Information correct as of December 2015. Provider CRICOS Code 00020G Higher Education Provider The Administrative

More information

Loophole+ with Ethical Hacking and Penetration Testing

Loophole+ with Ethical Hacking and Penetration Testing Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,

More information

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril. Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing

More information

BACHELOR OF ENGINEERING WITH HONOURS IN INFORMATION AND COMMUNICATIONS TECHNOLOGY (INFORMATION SECURITY)

BACHELOR OF ENGINEERING WITH HONOURS IN INFORMATION AND COMMUNICATIONS TECHNOLOGY (INFORMATION SECURITY) BACHELOR OF ENGINEERING WITH HONOURS IN INFORMATION AND COMMUNICATIONS TECHNOLOGY (INFORMATION SECURITY) Bachelor of Engineering with Honours in Information and Communications Technology (Information Security)

More information

MET s Institute of Engineering, Department of MCA. Faculty Development Programme on Digital Forensic & Cyber Security Conducted by

MET s Institute of Engineering, Department of MCA. Faculty Development Programme on Digital Forensic & Cyber Security Conducted by MET s Institute of Engineering, Department of MCA Faculty Development Programme on Digital Forensic & Cyber Security Conducted by Department of MCA MCA department has conducted Faculty Development Program

More information

Management Commerce Computers Life Sciences

Management Commerce Computers Life Sciences Management Commerce Computers Life Sciences Recognised by the Govt. of Karnataka Affiliated to Bangalore University, Karnataka, Bangalore Approved by AICTE & UGC, New Delhi Krupanidhi Degree College BCA

More information

Information Technology 2015 Programmes

Information Technology 2015 Programmes Information Technology 2015 Programmes Well connected. Right here Innovation, intelligence and ingenuity. Do you have what it takes to make technology work? IT is a booming industry worth an estimated

More information

THE HACKERS NEXT TARGET

THE HACKERS NEXT TARGET Governance and Risk Management THE HACKERS NEXT TARGET YOUR WEB AND SOFTWARE Anthony Lim MBA CISSP CSSLP FCITIL Director, Security, Asia Pacific Rational Software ISC2 CyberSecurity Conference 09 Kuala

More information

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor IT Audit/Security Certifications Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor Certs Anyone? There are many certifications out there

More information

Your Web and Applications

Your Web and Applications Governance and Risk Management Your Web and Applications The Hacker s New Target Anthony Lim MBA CISSP CSSLP FCITIL Director, Security, Asia Pacific Rational Software Social Engineering in the Business

More information

Erik Jonsson School of Engineering and Computer Science

Erik Jonsson School of Engineering and Computer Science Erik Jonsson School of Engineering and Computer Science Bachelor of Science in Computer Science (B.S.C.S.) Goals for the Computer Science Program The undergraduate Computer Science program is committed

More information

Information Science & Technology, B.S.

Information Science & Technology, B.S. Information Science & Technology, B.S. 1 Information Science & Technology, B.S. Dr. Jie Wu, Chair Science Education and Research Center, Room 304 215-204-8450 Ms. Wendy Urban, Faculty Advisor Science Education

More information

Penn State Harrisburg Computer Science

Penn State Harrisburg Computer Science Penn State Harrisburg Computer Science Integrated Undergraduate-Graduate (IUG) Degree Student Handbook 201-2014 Computer Science Program School of Science, Engineering, and Technology Penn State Harrisburg

More information

Postgraduate. eforensics. swinburne.edu.au/postgrad

Postgraduate. eforensics. swinburne.edu.au/postgrad Postgraduate eforensics swinburne.edu.au/postgrad Program details }} Graduate Certificate in eforensics The postgraduate program in eforensics aims to deliver high-quality industry-relevant education to

More information

Software Development

Software Development Software Development Associate s Degree The ITT Technical Institutes offer a variety of career-focused curricula. This sheet helps describe the associate s degree program in Software Development 1 offered

More information

Computer Information Science xxx

Computer Information Science xxx xxx The mission of the Faculty is to provide future-focused, studentcentred programmes that prepare students for the dynamic Information Systems and Information sectors of the UAE. CIS programme graduates

More information

CURRICULUM POST GRADUATE EDUCATION FOR NORDIC COMPUTER FORENSIC INVESTIGATORS

CURRICULUM POST GRADUATE EDUCATION FOR NORDIC COMPUTER FORENSIC INVESTIGATORS CURRICULUM POST GRADUATE EDUCATION FOR NORDIC COMPUTER FORENSIC INVESTIGATORS Module 3A Forensic tool development Approved by the board at NPUC 16 th of September 2015 1. Introduction The fields of Digital

More information

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015 An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit

More information

Bachelor of Information Technology

Bachelor of Information Technology Bachelor of Information Technology [ Network security] Information for International Students www.nsi.tafensw.edu.au/itsecuritydegree Bachelor of Information Technology [ Network security] Cybercrime is

More information

CYBERSECURITY. Global cybersecurity capabilities for a digital transformation with confidence. Delivering Transformation. Together.

CYBERSECURITY. Global cybersecurity capabilities for a digital transformation with confidence. Delivering Transformation. Together. CYBERSECURITY Global cybersecurity capabilities for a digital transformation with confidence Delivering Transformation. Together. Sopra Steria, a European leader in digital transformation, has one of the

More information

Welcome to our Online Information Session! November 2014

Welcome to our Online Information Session! November 2014 Welcome to our Online Information Session! November 2014 Master of Information Systems Management (MISM) Master of Science in Information Security Policy and Management (MSISPM) Sean Beggs, Director of

More information

CURRICULUM MASTER OF SCIENCE IN ELECTRICAL ENGINEERING GENERAL SIR JOHN KOTELAWALA DEFENCE UNIVERSITY

CURRICULUM MASTER OF SCIENCE IN ELECTRICAL ENGINEERING GENERAL SIR JOHN KOTELAWALA DEFENCE UNIVERSITY CURRICULUM MASTER OF SCIENCE IN ELECTRICAL ENGINEERING GENERAL SIR JOHN KOTELAWALA DEFENCE UNIVERSITY (MEMBER OF THE ASSOCIATION OF COMMONWEALTH UNIVERSITIES AND INTERNATIONAL ASSOCIATION OF UNIVERSITIES)

More information

Work Integrated Learning Programmes

Work Integrated Learning Programmes Work Integrated Learning Programmes 01 Index Introduction 02 Overview & Salient Features 03 Degrees Offered 04 Work Integrated Learning Programmes 05 Corporate Partnerships 06 Fees Structure 07 Programmes

More information

IT courses For Senior Managers

IT courses For Senior Managers Protection Through Knowledge, Skills, Practice provide expert-led training courses for IT professionals and senior managers across Ireland. www.senseicybersecurity.ie Training Course Summary provide expert-led

More information

Protecting critical infrastructure from Cyber-attack

Protecting critical infrastructure from Cyber-attack Protecting critical infrastructure from Cyber-attack ACI-NA BIT Workshop, Session 6 (Cybersecurity) Long Beach, California October 4, 2015 Ben Trethowan Aviation Systems & Security Architect The scale

More information

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average

More information

Michelle Govan & Anand Philip Network & Security Engineering

Michelle Govan & Anand Philip Network & Security Engineering Michelle Govan & Anand Philip Network & Security Engineering Network & Security Engineering Suite Dr Michelle Govan Anand Philip Programme Philosophy The philosophy of the programmes is unique to others

More information

Bachelor of Science in Computer Technology: B.Sc in Computer Technology Course Details

Bachelor of Science in Computer Technology: B.Sc in Computer Technology Course Details Bachelor of Science in Computer Technology: B.Sc in Computer Technology Course Details B.Sc in Computer Technology is an undergraduate course related to Computer Science. The duration of the course is

More information

CURRICULUM MASTER OF SCIENCE IN SECURITY AND STRATEGIC STUDIES GENERAL SIR JOHN KOTELAWALA DEFENCE UNIVERSITY

CURRICULUM MASTER OF SCIENCE IN SECURITY AND STRATEGIC STUDIES GENERAL SIR JOHN KOTELAWALA DEFENCE UNIVERSITY CURRICULUM MASTER OF SCIENCE IN SECURITY AND STRATEGIC STUDIES GENERAL SIR JOHN KOTELAWALA DEFENCE UNIVERSITY (MEMBER OF THE ASSOCIATION OF COMMONWEALTH UNIVERSITIES AND INTERNATIONAL ASSOCIATION OF UNIVERSITIES)

More information

UNO COLLEGE OF INFORMATION SCIENCE & TECHNOLOGY

UNO COLLEGE OF INFORMATION SCIENCE & TECHNOLOGY UNO COLLEGE OF INFORMATION SCIENCE & TECHNOLOGY 1110 S 67th St Omaha, NE 68182 402.554.3819 www.ist.unomaha.edu Requirements Correspond to Catalog TABLE OF CONTENTS & GENERAL INFORMATION The College of

More information