New-Age Master s Programme

Size: px
Start display at page:

Download "New-Age Master s Programme"

Transcription

1 New-Age Master s Programme MCA (Information Security Management Services) (3 Year Full-Time Programme) Academic Year 2015 Page 1

2 Course Objective MCA (Information Security Management Services) This unique master s programme prepares the students for exciting and rewarding career options in the fast growing technology sector of Information Security. This programme provides comprehensive knowledge, technical expertise and imparts hands-on experience. This programme provides the students an understanding of all aspects of information security. Students will have an in-depth knowledge of all practical and theoretical aspects of preventive, ethical hacking and forensic security technologies. and demonstrate functional knowledge on data centres and the concept of virtualization. At the end of this professional programme, the students will be able to demonstrate ethical hacking skills, apply basic preventive and forensic skills and implement various information security tools. Course Particulars Course Name MCA - (Information Security Management Services) Degree Awarded Master of Computer Applications (MCA) Duration of the Course 3 Year (6 semesters) Class Timing 8am 4pm Medium of Instruction & Examination English Study Campus, School of Graduate Studies #34, 1st Cross, J C Road, Bangalore Eligibility The minimum quali ication required to apply is a Bachelors Degree in Computer Science or Information Technology or Computer Applications or B.E from a recognized university or equivalent with a minimum of 50% aggregate marks Examinations & Assessments 1. Internal tests 4. Class tests 2. Assignments 5.Preparatory theory and Practical examination 3. Seminar presentation 6. Term end Theory and Practical examination Page 2

3 Curriculum* MCA (Information Security Management Services) Semester 1 Semester 2 Data Structures Object Oriented Programming Using C ++ Computer System Organization Discrete Mathematics Introduction to Linux Programming Data Structures LAB Object Oriented Programming Using C ++ LAB Introduction to Linux Programming LAB Programming in Java Database Management System Introduction to Information Security Advanced Computer Networks Operating System Programming in Java LAB Database Management System LAB Networks LAB Semester 3 Ethical Hacking Cyber Forensics Network Security Database Security Fundamentals Security Threats and trends Ethical Hacking Basics - LAB Cyber Forensics Basics - LAB Network Security Basics - LAB Semester 5 Elective II Fundamentals of ITIL Principles of RIMS Datacenter Architecture Disaster Recovery and Business Continuity Management Project/ Internship Semester 4 Virtualization and Cloud Security OSI Layer and Security Protocols Mobile Wireless and VOIP Security Elective I Android Security COBIT VALIT and Risk IT Advanced Network Security IT Governance, Risk and Information Security Management Application, Web Security and SDLC Virtualization and Cloud Security LAB Application, Web Security and SDLC LAB Mini Project/ LAB Semester 6 Final Project/Internship and Viva *Subject to changes made by the university Career Opportunities for Information Security Management Services Professionals Global Scenario Cyber Security Needs Drives IT Job Growth New research has found that job openings in the ield of cyber security have grown by more than 100 percent in the past year. Those openings are only expected to grow in the coming year, jumping an additional 30 percent in The demands for security workers points to the importance companies are placing on responding to the growth of recent attacks on businesses of all sizes. - Business News Daily Page 3

4 MCA (Information Security Management Services) US Federal agencies to hire more cyber defenders in 2014 The Army is building a new cyber command centre at Fort Meade to eventually house 1,500, leading a worldwide cyber corps of 21,000 soldiers and civilians. By 2017, the Air Force will add more than 1,000 uniformed cyber forces to its 6,000 experts now working at the Air Force Space Command. The Navy had 800 cyber security staffers in 2013 and will reach nearly 1,000 by 2017, working toward a mix of 80 percent uniformed personnel and 20 percent civilian employees and contractors. The Marines currently have 300 uniformed personnel, civilians and contractors at work, and plan to increase that number to just fewer than 1,000 by Indian Scenario - Capital B As per National Cyber Security Policy 2013: there will be a requirement of 500,000 professionals skilled in cyber security in the next 5 years. Also the Ministry of Communication and Information echnology will encourage all organizations, private and public to designate a member of senior management, as Chief Information Security Of icer (CISO), responsible for cyber security efforts and initiatives. Analysts said that India currently has around certi ied cyber security professionals, which is signi icantly lesser than the requirement of personnel. The current number is minuscule when compared to the nearly 25 million cyber warriors in China. According to recent data, India would need 4.7 lakh cyber security professionals by 2015 to protect its IT infrastructure. - The Times of India Even in the most dif icult of economic times, IT security is a full-employment ield. With the growing number of threats on the horizon, and the growing awareness of cyber security vulnerabilities and issues inside the enterprise, it is clear that security will be a top priority for the coming year and likely for years to come. Job opportunity for Information Security Management Professions in various departments Of different sectors: Corporate (Information Security, Compliance, IT&IS Audit, Software Development etc.) Banking, Finance and Insurance Sector (IT and Data Security, E-Commerce and Net-banking Security, Compliance, Information Risk Management, IT&IS Audit etc.) Defence and Police (R&D, Investigation and Forensics, IT Infrastructure Security etc.) Governance (E-Governance, Public Key Infrastructure Management, Forensic Science Labs etc.) Legal Department (Cyber Forensics Consultants, Cyber Law Expert, Expert witness etc.) Cyber Fraud Consultants/ Management (Ethical Hacker, Penetration Testers, Cyber Fraud Detectives) Page 4

5 MCA (Information Security Management Services) Career Progression Path - Information Security Management Services* Level Entry level (0-1 yrs exp.) Mid Level (3-5 yrs exp.) Advanced level (5 yrs plus Salary Range 200, , , ,000 exp.) 800,000 + Job Role Executive Information Security Senior Information Security Of icer Chief Information Security Of icer Malware Analyst Senior Malware Analyst Manager Anti-Virus Development Data Centre Technician Data Centre Engineer Data Centre Manager Junior Penetration Tester Penetration Tester Ethical Hacker Database Manager IT Security Junior Cyber Forensic Analyst Network and Database Manager IT Security Cyber Forensic Analyst Data Centre Security Engineer Cyber Forensic Investigator *Terms & Conditions Apply Page 5

6 MCA (Information Security Management Services) Partial List of Organizations where our IT Students Received Employment Opportunities* *Terms & Conditions Apply For Enquiry & Admission, Contact Mobile: / Toll Free No.: enquiry@jainunivadmissions.com Page 7

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme B. Tech Cloud Technology & Information Security (4 Year Full Time Programme) Academic Year 2015 Page 1 Course Objective This unique B. Tech course provides dual career options

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme B. Tech Mobile Applications & Information Security (4 Year Full Time Programme) Academic Year 2015 Page 1 Course Objective This unique course provides dual career options

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme BCA - Information Security & Mobile Applications (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective This unique course provides dual career options

More information

New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme)

New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme) New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective The course provides dual career options for students

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme B. Tech - Cloud Technology & Information Security (4 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective B. Tech - Cloud Technology & Information Security

More information

B. Tech - Computer Engineering (4 Year Full-Time Programme)

B. Tech - Computer Engineering (4 Year Full-Time Programme) New-Age Undergraduate Programme B. Tech - Computer Engineering (4 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective This program provides students with an overall knowledge of the different

More information

New-Age Degrees for New-Age Careers! Are you ready for the take-off?

New-Age Degrees for New-Age Careers! Are you ready for the take-off? Admission 2015-16 www.kluniversity.in New-Age Degrees for New-Age Careers! Are you ready for the take-off? President s Message Dr. L.S.S. Reddy is an eminent Professor in Computer Science and Engineering

More information

Programme In Information Security Management

Programme In Information Security Management Programme In Information Security Management One-year programme in Information Security (IS) MIEL Academy is pleased to announce PRISM TM (Programme in Information Security Management) a one-year Fulltime

More information

New-Age IT Degrees for New-Age IT Careers!

New-Age IT Degrees for New-Age IT Careers! www.poornima.edu.in Admission 2015-16 New-Age IT Degrees for New-Age IT Careers! Are you ready for the take-off? B. Tech / BCA / BFA Cloud Technology Information Security Mobile Applications IT Infrastructure

More information

Michelle Govan & Anand Philip Network & Security Engineering

Michelle Govan & Anand Philip Network & Security Engineering Michelle Govan & Anand Philip Network & Security Engineering Network & Security Engineering Suite Dr Michelle Govan Anand Philip Programme Philosophy The philosophy of the programmes is unique to others

More information

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking

More information

Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time

Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time Flexible Online Bachelor s Degree Completion Programs Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time Cyber Security Major The Program You ve heard about

More information

Excellence Doesn t Need a Certificate. Be an. Believe in You. 2014 AMIGOSEC Consulting Private Limited

Excellence Doesn t Need a Certificate. Be an. Believe in You. 2014 AMIGOSEC Consulting Private Limited Excellence Doesn t Need a Certificate Be an 2014 AMIGOSEC Consulting Private Limited Believe in You Introduction In this age of emerging technologies where IT plays a crucial role in enabling and running

More information

Notification of Request for Authorization under the Degree-Granting Institutions Act

Notification of Request for Authorization under the Degree-Granting Institutions Act Notification of Request for Authorization under the Degree-Granting Institutions Act Date posted: May 22, 2013 Institution: Current status: Nature of request: Argosy University Authorized to offer programs

More information

OVERVIEW DEGREES & CERTIFICATES

OVERVIEW DEGREES & CERTIFICATES OVERVIEW DEGREES & CERTIFICATES 015 The best. Made better. SANS graduate programs are the ultimate expression of our 25 years dedicated to the education and development of information security professionals.

More information

Cyber Defense Operations Graduate Certificate

Cyber Defense Operations Graduate Certificate The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide

More information

Network Engineering Technology

Network Engineering Technology Network Engineering Technology Network Engineering Technology with Specializations in: Cisco Routing and Switching Microsoft Systems Administration Cyber Security and Digital Forensics Associate in Science

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

Computer Security and Investigations

Computer Security and Investigations Computer Security and Investigations Program Locations: Program Code: Coordinator: Credential: Peterborough CSI Blair Brown Ontario College Advanced Diploma Start Dates: September 06, 2016 January 09,

More information

InfoSec Academy Application & Secure Code Track

InfoSec Academy Application & Secure Code Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

COMPUTER SCIENCE & INFORMATION TECHNOLOGY

COMPUTER SCIENCE & INFORMATION TECHNOLOGY ST. JOHNS RIVER STATE COLLEGE COMPUTER SCIENCE & INFORMATION TECHNOLOGY Computer Information Technology Computer Network Engineering Technology Computer Programming and Analysis Computer Programmer Computer

More information

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88 Career Survey 1. In which country are you based? 88 answered question 88 skipped question 0 2. What is your job title? 88 answered question 88 skipped question 0 3. Travel budget not at all 21.0% 17 somewhat

More information

GLS UNIVERSITY. Faculty of Computer Technology Master of Computer Applications (MCA) Programme

GLS UNIVERSITY. Faculty of Computer Technology Master of Computer Applications (MCA) Programme GLS UNIVERSITY Faculty of Computer Technology Master of Computer Applications (MCA) Programme 1. GLS University s Master of Computer Applications programme is a three-year full-time postgraduate programme

More information

Cyber threats are growing.

Cyber threats are growing. Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College

More information

www.innobuzz.in Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0

www.innobuzz.in Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0 Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0 Innobuzz Knowledge Solutions (P) Limited is a Leading Global Firm providing Training Programs

More information

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015 An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit

More information

Admission Procedure. The final selection is based on the performance in the qualifying examination, entrance test and interview.

Admission Procedure. The final selection is based on the performance in the qualifying examination, entrance test and interview. Admission Procedure Admissions open for MA(Eng), MCA, MBA, MFA and M.Sc (Organic Chemistry) courses for the academic year 2014-2015 Students fulfilling the eligibility criteria may seek admission through

More information

Cyber Security. Vision. Mission

Cyber Security. Vision. Mission Cyber Security Introduction Cyber attack is raising and threaten ubiquitous world on internet today. Industry and government need cyber security expert to counter and defend from this threaten. Cyber Security

More information

PROGRAMME DETAIL SPECIFICATION. Programme Summary

PROGRAMME DETAIL SPECIFICATION. Programme Summary PROGRAMME DETAIL SPECIFICATION Programme Summary 1 Awarding institution Liverpool John Moores University 2 Teaching institution university Liverpool John Moores University 3a Programme accredited by: 3b

More information

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Web Technologies

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Web Technologies Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Web Technologies PROGRAMME STRUCTURE Aims & Objectives Business and Information Management This course aims to provide

More information

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Information Technology Diploma in Web Technologies

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Information Technology Diploma in Web Technologies Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Information Technology Diploma in Web Technologies PROGRAMME STRUCTURE Aims & Objectives Business and Information

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

Information Technology Division

Information Technology Division 151 xxx Introduction to IT Division The Higher Colleges of Technology offers one of UAEÕ s largest selections of Information Technology programs. Students study Diploma, Higher Diploma and Bachelor Degree

More information

MS Information Security (MSIS)

MS Information Security (MSIS) MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

CRIMINAL JUSTICE. Master of Arts. Master of Science HOMELAND SECURITY. Graduate PROGRAMS

CRIMINAL JUSTICE. Master of Arts. Master of Science HOMELAND SECURITY. Graduate PROGRAMS Master of Arts CRIMINAL JUSTICE Master of Science HOMELAND SECURITY Graduate PROGRAMS M onmouth University s Criminal Justice and Homeland Security graduate programs are designed to provide students with

More information

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Fernanda Tapia Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS Apply today: strayer.edu/apply FLEXIBLE / AFFORDABLE

More information

Academic Programs INFORMATION TECHNOLOGY

Academic Programs INFORMATION TECHNOLOGY Academic Programs INFORMATION TECHNOLOGY INFORMATION TECHNOLOGY The Information Systems programs at Tidewater Community College cover the essential areas of study in information systems technology. The

More information

MET s Institute of Engineering, Department of MCA. Faculty Development Programme on Digital Forensic & Cyber Security Conducted by

MET s Institute of Engineering, Department of MCA. Faculty Development Programme on Digital Forensic & Cyber Security Conducted by MET s Institute of Engineering, Department of MCA Faculty Development Programme on Digital Forensic & Cyber Security Conducted by Department of MCA MCA department has conducted Faculty Development Program

More information

SAM HOUSTON STATE UNIVERSITY CURRICULUM REPORT

SAM HOUSTON STATE UNIVERSITY CURRICULUM REPORT SAM HOUSTON STATE UNIVERSITY CURRICULUM REPORT Curriculum Requests Associated with New/Altered Degree Programs To Become Effective Fall 2008 (Pending Approval) SUBMITTED BY SAM HOUSTON STATE UNIVERSITY

More information

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time MSc Cyber Security International Students Can Apply UKPASS P052286 Code: Course 1 Year Full-Time, 2-3 Years Part-Time Length: Start Dates: September 2015, January 2016, September 2016, January 2017 Department:Department

More information

MSc Cyber Security. identity. hacker. virus. network. information

MSc Cyber Security. identity. hacker. virus. network. information identity MSc Cyber Security hacker virus QA is the foremost provider of education in the UK. We work with individuals at all stages of their careers, from our award-winning apprenticeship programmes, through

More information

CAST Center for Advanced Security Training

CAST Center for Advanced Security Training CAST Center for Advanced Security Training Advanced Security Training (CAST) EC-Council s Center for Advanced Security Training (CAST) was created to address the need for highly technical and Advanced

More information

Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement

Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement 2015 Burning Glass Technologies Cybersecurity has a Big Problem Attacks are rising Cyber incidents jumped

More information

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws

Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services announces

More information

MS In Forensic Computing (MSFC) Saint Joseph s College. (33 Credits, including a Practicum/Internship)

MS In Forensic Computing (MSFC) Saint Joseph s College. (33 Credits, including a Practicum/Internship) MS In Forensic Computing (MSFC) Saint Joseph s College (33 Credits, including a Practicum/Internship) The MS in Forensic Computing will be an interdisciplinary degree integrating curriculum from three

More information

BEng/ BEng (Hons) Networked Systems Engineering, BSc/ BSc (Hons) Cyber Security and Networks BEng/ BEng (Hons) Digital Security, Forensics and

BEng/ BEng (Hons) Networked Systems Engineering, BSc/ BSc (Hons) Cyber Security and Networks BEng/ BEng (Hons) Digital Security, Forensics and BEng/ BEng (Hons) Networked Systems Engineering, BSc/ BSc (Hons) Cyber Security and Networks BEng/ BEng (Hons) Digital Security, Forensics and Ethical Hacking Programme Structure The programmes are unique

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

Management Commerce Computers Life Sciences

Management Commerce Computers Life Sciences Management Commerce Computers Life Sciences Recognised by the Govt. of Karnataka Affiliated to Bangalore University, Karnataka, Bangalore Approved by AICTE & UGC, New Delhi Krupanidhi Degree College BCA

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

CLASS FINAL REPORT UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910

CLASS FINAL REPORT UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT Abstract This report brings together the final papers presented by the students in the Frontiers in Information

More information

Computer Security and Forensics

Computer Security and Forensics SCHOOL OF COMPUTING & MATHEMATICAL SCIENCESB Computer Security and Forensics BSc Hons Greenwich Campus www.gre.ac.uk/cms Why study this programme? This degree will equip you to become an ICT professional

More information

GYAN VIHAR SCHOOL OF ENGINEERING & TECHNOLOGY M. TECH. CSE (2 YEARS PROGRAM)

GYAN VIHAR SCHOOL OF ENGINEERING & TECHNOLOGY M. TECH. CSE (2 YEARS PROGRAM) GYAN VIHAR SCHOOL OF ENGINEERING & TECHNOLOGY M. TECH. CSE (2 YEARS PROGRAM) Need, objectives and main features of the Match. (CSE) Curriculum The main objective of the program is to develop manpower for

More information

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

2014-2015 ACADEMIC YEAR SCHOOL OF INFORMATION TECHNOLOGY. AS in INFORMATION TECHNOLOGY. BS in INFORMATION TECHNOLOGY

2014-2015 ACADEMIC YEAR SCHOOL OF INFORMATION TECHNOLOGY. AS in INFORMATION TECHNOLOGY. BS in INFORMATION TECHNOLOGY SCHOOL OF INFORMATION TECHNOLOGY AS in INFORMATION TECHNOLOGY BS in INFORMATION TECHNOLOGY For MINORS available to BS students majoring in INFORMATION TECHNOLOGY See the Minors for Bachelor Students Section

More information

The Department of the Army Public Affairs Intern Program

The Department of the Army Public Affairs Intern Program The Department of the Army Public Affairs Intern Program The Department of the Army Internship Program offers the Office of the Chief of Public Affairs an effective means of attracting future members of

More information

Computer Information Science xxx

Computer Information Science xxx xxx The mission of the Faculty is to provide future-focused, studentcentred programmes that prepare students for the dynamic Information Systems and Information sectors of the UAE. CIS programme graduates

More information

Information Security in Business: Issues and Solutions

Information Security in Business: Issues and Solutions Covenant University Town & Gown Seminar 2015 Information Security in Business: Issues and Solutions A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information

More information

Bachelor of Information Technology (Incorporating Diploma in Information Technology (Levels 5 and 6)

Bachelor of Information Technology (Incorporating Diploma in Information Technology (Levels 5 and 6) Bachelor of Information Technology (Incorporating Diploma in Information Technology (Levels 5 and 6) Programme Structure STAGE ONE This stage makes up the Diploma in Information Technology (Level 5) 120

More information

SYMBIOSIS INSTITUTE OF COMPUTER STUDIES AND RESEARCH BACHELOR OF COMPUTER APPLICATIONS PROGRAM STRUCTURE 2014-17

SYMBIOSIS INSTITUTE OF COMPUTER STUDIES AND RESEARCH BACHELOR OF COMPUTER APPLICATIONS PROGRAM STRUCTURE 2014-17 SYMBIOSIS INSTITUTE OF COMPUTER STUDIES AND RESEARCH BACHELOR OF COMPUTER APPLICATIONS PROGRAM STRUCTURE 2014-17 1. OBJECTIVES BCA offers the pre-qualification for professionals heading for smart career

More information

Software Development

Software Development Software Development Associate s Degree The ITT Technical Institutes offer a variety of career-focused curricula. This sheet helps describe the associate s degree program in Software Development 1 offered

More information

MAHATMA GANDHI UNIVERSITY

MAHATMA GANDHI UNIVERSITY MAHATMA GANDHI UNIVERSITY MASTER OF COMPUTER APPLICATIONS REGULATIONS and SCHEME for AFFILIATED COLLEGES and SCHOOL OF TECHNOLOGY AND APPLIED SCIENCES (From 2011 admission onwards) 1. Conditions for Admission

More information

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Information Technology Diploma in Web Technologies

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Information Technology Diploma in Web Technologies Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Information Technology Diploma in Web Technologies Full-time Programmes PROGRAMME STRUCTURE Aims & Objectives Business

More information

Master of Science Degree INFORMATION SYSTEMS. Engaging Minds. Embracing the World.

Master of Science Degree INFORMATION SYSTEMS. Engaging Minds. Embracing the World. Master of Science Degree INFORMATION SYSTEMS Engaging Minds. Embracing the World. A DEGREE THAT LEADS TO JOB SECURITY La Roche College helps you to move ahead in a global economy by offering a cutting-edge

More information

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services

More information

Bachelor of Information Technology

Bachelor of Information Technology Bachelor of Information Technology [ Network security] Information for International Students www.nsi.tafensw.edu.au/itsecuritydegree Bachelor of Information Technology [ Network security] Cybercrime is

More information

Information Technology 2015 Programmes

Information Technology 2015 Programmes Information Technology 2015 Programmes Well connected. Right here Innovation, intelligence and ingenuity. Do you have what it takes to make technology work? IT is a booming industry worth an estimated

More information

Career Paths in Information Security v6.0

Career Paths in Information Security v6.0 Career Paths in Information Security v6.0 Have you ever considered a career in computer security but didn t know how to get started? The Information Security industry is an exciting and diverse place to

More information

I, (MR. TECHIE) GOT THE CISO JOB! SHOULD I PREPARE 3 ENVELOPES?

I, (MR. TECHIE) GOT THE CISO JOB! SHOULD I PREPARE 3 ENVELOPES? I, (MR. TECHIE) GOT THE CISO JOB! SHOULD I PREPARE 3 ENVELOPES? Todd Fitzgerald Director Global Information Security Information Security Management Author ManpowerGroup, Inc. (NYSE:MAN, Fortune 500 #129)

More information

BSc in Information Systems & BSc in Information Technology Degree Programs

BSc in Information Systems & BSc in Information Technology Degree Programs BSc in Information Systems & BSc in Information Technology Degree Programs General Sir John Kotelawala Defence University is about to start the above mentioned degree programs at Hambanthota Southern Campus

More information

Principles of Information Assurance Syllabus

Principles of Information Assurance Syllabus Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information

More information

Analyze. Secure. Defend. Do you hold ECSA credential?

Analyze. Secure. Defend. Do you hold ECSA credential? 1 Analyze. Secure. Defend. Do you hold ECSA credential? TM E C S A EC-Council Certified Security Analyst 1 EC-Council Cyber Security Professional Path Threat Agent Application of Methodology So You Can

More information

COURSE TITLE COURSE DESCRIPTION

COURSE TITLE COURSE DESCRIPTION COURSE TITLE COURSE DESCRIPTION CS-00X COMPUTING EXIT INTERVIEW All graduating students are required to meet with their department chairperson/program director to finalize requirements for degree completion.

More information

POST GRADUATE CERTIFICATE IN MANAGEMENT - INTERNATIONAL BUSINESS

POST GRADUATE CERTIFICATE IN MANAGEMENT - INTERNATIONAL BUSINESS INDIAN INSTITUTE OF PLANTATION MANAGEMENT BANGALORE (An Autonomous Organization Promoted by the Ministry of Commerce & Industry, GOI) BACKGROUND Offers a uniquely designed POST GRADUATE CERTIFICATE IN

More information

New-Age Degrees for New-Age Careers!

New-Age Degrees for New-Age Careers! Admission 2015-16 www.kalasalingam.ac.in KALASALINGAM UNIVERSITY New-Age Degrees for New-Age Careers! Are you ready for the take-off? Chairman s Message To Produce Technically Competent, Socially Committed

More information

Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437. Specialist Security Training Catalogue

Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437. Specialist Security Training Catalogue Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?

More information

CyberSecurity: Trends, Careers, & the Next Generation

CyberSecurity: Trends, Careers, & the Next Generation CyberSecurity: Trends, Careers, & the Next Generation Ludwig Goon March 2-4, 2016 Disclaimer: The view and opinions expressed in the presentation are that of the presenter and is not affiliated with employers.

More information

Online Bachelor s Degree Completion Program. A Degree Completion Program for Working Adults. Log in to a Distinguished Tradition. Since 1819.

Online Bachelor s Degree Completion Program. A Degree Completion Program for Working Adults. Log in to a Distinguished Tradition. Since 1819. Online Bachelor s Degree Completion Program A Degree Completion Program for Working Adults Log in to a Distinguished Tradition. Since 1819. Proudly serving those who serve Norwich University has a proud

More information

Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee.

Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee. New Jersey Cyber Aces Academy at Brookdale: A Collaborative Public/Private Model to Secure the Nation A project funded through NSF SFS Grant DUE#1331170 Ed Skoudis Mike Qaissaunee April 30, 2014 Someone

More information

Information Technology Degree Programs

Information Technology Degree Programs Information Technology Degree Programs Undergraduate Prospectus 2014/2015 Faculty of Information Technology HORIZON COLLEGE OF BUSINESS AND TECHNOLOGY Ministry of Higher Education and University Grants

More information

(Funding for training support means all you pay is the apprentice s wage)

(Funding for training support means all you pay is the apprentice s wage) Your apprentices of today will be your skilled workers of the future. Due to the fast moving nature of the digital world, the demand for talent has never been higher and nurturing skills in-house is one

More information

C-. If these courses have not been completed satisfactorily upon enrolling at USF Sarasota-Manatee, they must be taken before the degree is granted.

C-. If these courses have not been completed satisfactorily upon enrolling at USF Sarasota-Manatee, they must be taken before the degree is granted. C-. If these courses have not been completed satisfactorily upon enrolling at USF Sarasota-Manatee, they must be taken before the degree is granted. Upper-level Course Requirements Required Courses HIS

More information

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications NETWORK ENGINEERING TRACK Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office

More information

Critical career expertise in the age of technology

Critical career expertise in the age of technology Critical career expertise in the age of technology Information Systems Management Professional profile for cutting-edge careers As the pace of technological innovation continues to escalate, so does the

More information

Computer Science CATALOG 2014/2015 BINUS UNIVERSITY

Computer Science CATALOG 2014/2015 BINUS UNIVERSITY Computer Science Vision To become a leading and world class Computer Science School that is reputable and excellent in teaching and research, in order to keep relevant with the needs of the global industry

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

Information Security and Audit

Information Security and Audit SCHOOL OF COMPUTING & MATHEMATICAL SCIENCES Information Security and Audit MSc Greenwich Campus www.gre.ac.uk/cms Why study this programme? This programme is suitable for both the newcomer to computer

More information

How To Become A Policy Analyst

How To Become A Policy Analyst University of Mumbai Department of Civics and Politics Master s in Public Policy Today s Students Tomorrow s Policy Makers. Governments are increasingly facing complex social, scientific and technological

More information

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7 1 of 7 Network Support This technical certificate program prepares the student for employment as PC Technician; Computer Support Specialist, and Network Support Technician systems and computer network

More information

Computer and Information Science Division xxx

Computer and Information Science Division xxx 59 xxx The has a mission of being committed to developing and delivering quality, student-centered programs that provide students with the core knowledge and skills to meet the needs of stakeholders in

More information

IT and Cyber Security Training Courses

IT and Cyber Security Training Courses AN FORAS RIARACHÁIN INSTITUTE OF PUBLIC ADMINISTRATION IT and Cyber Security Training s Spring 2016 Protection Through Knowledge, Skills, Practice Institute of Public Administration / 01 240 3600 IT Security

More information

UNIVERSITY OF HARGEISA

UNIVERSITY OF HARGEISA Bachelor of Science in Information Technology (BSIT) Required Core & Elective Courses: 134 semester credits Contacts: contact@huniversity.net Tel: 515900 INTRODUCTION UNIVERSITY OF HARGEISA FACULTY OF

More information

Department of Information Systems and Cyber Security

Department of Information Systems and Cyber Security The University of Texas at San Antonio 1 Department of Information Systems and Cyber Security All graduate programs in Information Systems and Cyber Security are accredited by AACSB International The Association

More information

Minnesota State Community and Technical College Detroit Lakes Campus

Minnesota State Community and Technical College Detroit Lakes Campus Computer Network Security Minnesota State Community and Technical College Detroit Lakes Campus Overview Philosophy Note on 2 year Colleges Certifications Program Courses CCDC Program Numbers Faculty Future

More information

EDUCATION FOR THE FUTURE. www.itt-tech.edu

EDUCATION FOR THE FUTURE. www.itt-tech.edu EDUCATION FOR THE FUTURE www.itt-tech.edu THE MISSION OF THE ITT TECHNICAL INSTITUTE The THE ITT MISSION Technical of ITT Educational Institute is Services, an institution Inc., and ITT of Technical higher

More information