New-Age Undergraduate Programme

Size: px
Start display at page:

Download "New-Age Undergraduate Programme"

Transcription

1 New-Age Undergraduate Programme BCA - Information Security & Mobile Applications (3 Year Full-Time Programme) Academic Year 2015 Page 1

2 Course Objective This unique course provides dual career options for students in the hot-favourite technology sectors of Information Security and Mobile Applications. In addition to all the mandatory subjects of a traditional BCA, this specialized course offers in-depth practical know-how of the current trend technology sectors of Information Security & Mobile Applications. These sectors have the potential to grow exponentially and will provide challenging job opportunities for young professionals with the right skill sets. On the Information Security front, this course equips students with the concepts and technical skills in Information Security. The focus of the course is on the models, tools and techniques for enforcement of Security Policies, with emphasis on Cryptography, Ethical Hacking, Computer Forensics and Virtualization and Cloud Security. On the Mobile Application front, the course provides students the fundamental knowledge of all aspects of mobile technology with emphasis on application development for Android, according to industry requirements. Course Particulars Course Name BCA Information Security & Mobile Applications Degree Awarded Bachelor of Computer Application Duration of the Course 3 years (6 semesters) Class Timing 8am 4pm Medium of Instruction & Examination English Study Campus, School of Graduate Studies #34, 1st Cross, J C Road, Bangalore Eligibility The minimum quali ication required to apply is a pass in the 10+2 examination from PUC / ISC / CBSE or equivalent board or a course recognized as equivalent thereto by the university. Examinations & Assessments 1. Internal tests 4. Class tests 2. Assignments 5. Preparatory theory and Practical examination 3. Seminar presentation 6. Term-end theory and Practical examination Page 2

3 Curriculum* Semester 1 Language English Fundamentals of Mathematics Computer Fundamentals & Organization Programming in C Introduction to Linux C Programming Lab Linux Lab Semester 3 Semester 4 Information Security Fundamentals Software Engineering RDBMS Computer Networks Programming in Java Indian Constitution RDBMS Lab Java Programming Lab Semester 5 Semester 6 Computer Forensics and Investigation Virtualization and Cloud Security IT Governance, Risk & Information Security Management Mobile Ecosystem and Business Models Advanced Android Web Technology Computer Forensics and Investigation Lab Advanced Android Lab Semester 2 Language English Operating System OOPS with C++ Data structures using c Mind Management & Human Values OOPS with C++ Lab Data Structures Lab Mobile Web and Application Development Ethical Hacking Fundamentals Cryptography Fundamentals Basic Android Mobile Device and Network Architecture Ethical Hacking Lab Basic Android Lab Environmental Science Mobile, Wireless and VOIP Security Mobile Testing Project work Project and Viva-Voce *Subject to changes made by the university Page 3

4 Career Opportunities for Information Security Professionals Global Scenario Cyber Security Needs Drive IT Job Growth New research has found that job openings in the ield of cyber security have grown by more than 100 percent in the past year. Those openings are only expected to grow in the coming year, jumping an additional 30 percent in The demand for security workers points to the importance companies are placing on responding to the growth of recent attacks on businesses of all sizes. -Business News Daily US Federal agencies to hire more cyber defenders in 2014 The Army is building a new cyber command centre at Fort Meade to eventually house 1,500 individuals, leading a worldwide cyber corps of 21,000 soldiers and civilians. By 2017, the Air Force will add more than 1,000 uniformed cyber forces to its 6,000 experts now working at the Air Force Space Command. The Navy had 800 cyber security staffers in 2013 and will reach nearly 1,000 by 2017, working toward a mix of 80 percent uniformed personnel and 20 percent civilian employees and contractors. Career Progression Path for Information Security Professionals* Level Entry level (0-1 yrs exp.) Mid Level (3-5 yrs exp.) Advanced level (5 yrs plus exp.) Salary Range 200, , , , ,000 + Job Role Executive Information Security Senior Information Security Of icer Chief Information Security Of icer Malware Analyst Senior Malware Analyst Manager Anti-Virus Development Data Centre Technician Data Centre Engineer Data Centre Manager Junior Penetration Tester Penetration Tester Ethical Hacker Database Manager IT Security Network and Database Manager IT Security Data Centre Security Engineer Junior Cyber Forensic Analyst Cyber Forensic Analyst Cyber Forensic Investigator *Terms & Conditions Apply Page 4

5 Career Opportunities for Mobile Applications Professionals* Global Scenario Mobile Applications have spawned a new industry aptly called the Mobile Apps Economy, which continues to grow at a rapid pace. Number of Apps in Android market - Google Play: 7,00,000 * Number of Apps in Apple App Store: 6,50,000 ** Estimated size of the current Mobile App Industry: $ 25 billion*** Revenue growth of Mobile Apps Industry 2011 & 2012: 197 %**** *(Source: Bloomberg Business week) ** (Source: Distimo) *** (Source: Gartner Inc) **** (Source: ScanLife Trend Report 2012) Indian Scenario Advantage India The sector s exponential growth bodes well for India. With huge investments provided for developing both consumer and enterprise apps, the sector in India will open up challenging opportunities for both outsourced and indigenous app development. The Indian app market was estimated to be Rs crore during 2012, as per a study released by Avendus Partners. The total monthly revenues earned by Google Play and Apple app store from Indian customers was Rs 27.5 crore in October 2012 or an annualized run-rate of Rs 330 crore. The Indian app market could reach Rs 2,000 crore by Google Play and Apple App store are expected to cross Rs 800 crore each by Employment Opportunities Small, medium and large Professional Services IT Companies Enterprise Application Product and Service Companies Mobile Application Product and Service Companies VAS providers e-commerce, m-commerce companies Career Progression Path for Mobile Applications Professionals* Industry Entry level (0-1 yrs exp.) Mid Level (3-5 yrs exp.) Advanced level (5 yrs plus exp.) Average Salary ` 200, ,000 ` 400, ,000 ` 800,000 + Job Role UI Engineer UI Designer UI Development Lead Software Engineer / Developer Sr. Software Engineer / Developer Technical Lead / Technical Manager / Project Manager Test Engineer Sr. Test Engineer Test Manager Mobile Application Developer Mobile Application Entrepreneur CEO *Terms & Conditions apply Page 5

6 Partial List of Organizations where our IT Students Received Employment Opportunities* *Terms & Conditions apply For Enquiry & Admission, Contact Suryakant Mobile: / Toll Free No : enquiry@jainunivadmissions.com Page 6

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme B. Tech Mobile Applications & Information Security (4 Year Full Time Programme) Academic Year 2015 Page 1 Course Objective This unique course provides dual career options

More information

New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme)

New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme) New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective The course provides dual career options for students

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme B. Tech - Cloud Technology & Information Security (4 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective B. Tech - Cloud Technology & Information Security

More information

New-Age Master s Programme

New-Age Master s Programme New-Age Master s Programme MCA (Information Security Management Services) (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective MCA (Information Security Management Services) This unique

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme B. Tech Cloud Technology & Information Security (4 Year Full Time Programme) Academic Year 2015 Page 1 Course Objective This unique B. Tech course provides dual career options

More information

B. Tech - Computer Engineering (4 Year Full-Time Programme)

B. Tech - Computer Engineering (4 Year Full-Time Programme) New-Age Undergraduate Programme B. Tech - Computer Engineering (4 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective This program provides students with an overall knowledge of the different

More information

New-Age Degrees for New-Age Careers! Are you ready for the take-off?

New-Age Degrees for New-Age Careers! Are you ready for the take-off? Admission 2015-16 www.kluniversity.in New-Age Degrees for New-Age Careers! Are you ready for the take-off? President s Message Dr. L.S.S. Reddy is an eminent Professor in Computer Science and Engineering

More information

New-Age IT Degrees for New-Age IT Careers!

New-Age IT Degrees for New-Age IT Careers! www.poornima.edu.in Admission 2015-16 New-Age IT Degrees for New-Age IT Careers! Are you ready for the take-off? B. Tech / BCA / BFA Cloud Technology Information Security Mobile Applications IT Infrastructure

More information

Programme In Information Security Management

Programme In Information Security Management Programme In Information Security Management One-year programme in Information Security (IS) MIEL Academy is pleased to announce PRISM TM (Programme in Information Security Management) a one-year Fulltime

More information

Computer Security and Investigations

Computer Security and Investigations Computer Security and Investigations Program Locations: Program Code: Coordinator: Credential: Peterborough CSI Blair Brown Ontario College Advanced Diploma Start Dates: September 06, 2016 January 09,

More information

(Funding for training support means all you pay is the apprentice s wage)

(Funding for training support means all you pay is the apprentice s wage) Your apprentices of today will be your skilled workers of the future. Due to the fast moving nature of the digital world, the demand for talent has never been higher and nurturing skills in-house is one

More information

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015 An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit

More information

Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time

Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time Flexible Online Bachelor s Degree Completion Programs Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time Cyber Security Major The Program You ve heard about

More information

New-Age Degrees for New-Age Careers!

New-Age Degrees for New-Age Careers! Admission 2015-16 www.kalasalingam.ac.in KALASALINGAM UNIVERSITY New-Age Degrees for New-Age Careers! Are you ready for the take-off? Chairman s Message To Produce Technically Competent, Socially Committed

More information

Michelle Govan & Anand Philip Network & Security Engineering

Michelle Govan & Anand Philip Network & Security Engineering Michelle Govan & Anand Philip Network & Security Engineering Network & Security Engineering Suite Dr Michelle Govan Anand Philip Programme Philosophy The philosophy of the programmes is unique to others

More information

www.innobuzz.in Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0

www.innobuzz.in Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0 Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0 Innobuzz Knowledge Solutions (P) Limited is a Leading Global Firm providing Training Programs

More information

Introduction to Information Technology Lesson Objectives

Introduction to Information Technology Lesson Objectives Unit 1: HARDWARE AND COMMUNICATIONS TECHNOLOGY INTRODUCTION Computer Systems and Networks Compare and contrast the Industrial and Computer Revolutions Identify a computer system's major components. Identify

More information

CAST Center for Advanced Security Training

CAST Center for Advanced Security Training CAST Center for Advanced Security Training Advanced Security Training (CAST) EC-Council s Center for Advanced Security Training (CAST) was created to address the need for highly technical and Advanced

More information

COMPUTER SCIENCE & INFORMATION TECHNOLOGY

COMPUTER SCIENCE & INFORMATION TECHNOLOGY ST. JOHNS RIVER STATE COLLEGE COMPUTER SCIENCE & INFORMATION TECHNOLOGY Computer Information Technology Computer Network Engineering Technology Computer Programming and Analysis Computer Programmer Computer

More information

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time MSc Cyber Security International Students Can Apply UKPASS P052286 Code: Course 1 Year Full-Time, 2-3 Years Part-Time Length: Start Dates: September 2015, January 2016, September 2016, January 2017 Department:Department

More information

Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws

Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services announces

More information

GYAN VIHAR SCHOOL OF ENGINEERING & TECHNOLOGY M. TECH. CSE (2 YEARS PROGRAM)

GYAN VIHAR SCHOOL OF ENGINEERING & TECHNOLOGY M. TECH. CSE (2 YEARS PROGRAM) GYAN VIHAR SCHOOL OF ENGINEERING & TECHNOLOGY M. TECH. CSE (2 YEARS PROGRAM) Need, objectives and main features of the Match. (CSE) Curriculum The main objective of the program is to develop manpower for

More information

Welcome to our Online Information Session! November 2014

Welcome to our Online Information Session! November 2014 Welcome to our Online Information Session! November 2014 Master of Information Systems Management (MISM) Master of Science in Information Security Policy and Management (MSISPM) Sean Beggs, Director of

More information

GLS UNIVERSITY. Faculty of Computer Technology Master of Computer Applications (MCA) Programme

GLS UNIVERSITY. Faculty of Computer Technology Master of Computer Applications (MCA) Programme GLS UNIVERSITY Faculty of Computer Technology Master of Computer Applications (MCA) Programme 1. GLS University s Master of Computer Applications programme is a three-year full-time postgraduate programme

More information

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Fernanda Tapia Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS Apply today: strayer.edu/apply FLEXIBLE / AFFORDABLE

More information

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88 Career Survey 1. In which country are you based? 88 answered question 88 skipped question 0 2. What is your job title? 88 answered question 88 skipped question 0 3. Travel budget not at all 21.0% 17 somewhat

More information

Critical career expertise in the age of technology

Critical career expertise in the age of technology Critical career expertise in the age of technology Information Systems Management Professional profile for cutting-edge careers As the pace of technological innovation continues to escalate, so does the

More information

ASSOCIATE DEGREE OF SOFTWARE DEVELOPMENT (MOBILE APPLICATIONS)

ASSOCIATE DEGREE OF SOFTWARE DEVELOPMENT (MOBILE APPLICATIONS) GOVERNMENT OF WESTERN AUSTRALIA ASSOCIATE DEGREE OF SOFTWARE DEVELOPMENT (MOBILE APPLICATIONS) COURSE OUTLINE 2015 Information correct as of December 2014. Provider CRICOS Code 00020G Higher Education

More information

Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437. Specialist Security Training Catalogue

Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437. Specialist Security Training Catalogue Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document

More information

Cyber threats are growing.

Cyber threats are growing. Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College

More information

Management Commerce Computers Life Sciences

Management Commerce Computers Life Sciences Management Commerce Computers Life Sciences Recognised by the Govt. of Karnataka Affiliated to Bangalore University, Karnataka, Bangalore Approved by AICTE & UGC, New Delhi Krupanidhi Degree College BCA

More information

Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement

Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement 2015 Burning Glass Technologies Cybersecurity has a Big Problem Attacks are rising Cyber incidents jumped

More information

Career Paths in Information Security v6.0

Career Paths in Information Security v6.0 Career Paths in Information Security v6.0 Have you ever considered a career in computer security but didn t know how to get started? The Information Security industry is an exciting and diverse place to

More information

OVERVIEW DEGREES & CERTIFICATES

OVERVIEW DEGREES & CERTIFICATES OVERVIEW DEGREES & CERTIFICATES 015 The best. Made better. SANS graduate programs are the ultimate expression of our 25 years dedicated to the education and development of information security professionals.

More information

Skill based Vocational Courses UNIVERSITY GRANTS COMMISSION. New Delhi-110002

Skill based Vocational Courses UNIVERSITY GRANTS COMMISSION. New Delhi-110002 Skill based Vocational Courses UNIVERSITY GRANTS COMMISSION New Delhi-110002 Structure of Community College/B.Voc Course C jp i mmunity Colleges: The Community College Scheme is to offer low cost high

More information

B.A. in Information Systems

B.A. in Information Systems New Jersey Institute of Technology 1 B.A. in Information Systems (129 credit) First Year Term Credits CS 100 Roadmap to Computing HUM 101 English Composition: Writing, Speaking, Thinking I MATH 18 General

More information

EC-Council. Certified. Internet Marketing Practitioner. Unravel the Mystery of. Internet Marketing C IMP

EC-Council. Certified. Internet Marketing Practitioner. Unravel the Mystery of. Internet Marketing C IMP Certified Internet Marketing Practitioner Unravel the Mystery of Internet Marketing TM C IMP Certified Internet Marketing Practitioner Are You a? Our online lives are fast becoming as important and real

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking

More information

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY RECOGNIZED MARKETABLE

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY RECOGNIZED MARKETABLE RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Bryan Rolle Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Apply today: strayer.edu/apply FLEXIBLE /

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

EDUCATION FOR THE FUTURE. www.itt-tech.edu

EDUCATION FOR THE FUTURE. www.itt-tech.edu EDUCATION FOR THE FUTURE www.itt-tech.edu THE MISSION OF THE ITT TECHNICAL INSTITUTE The THE ITT MISSION Technical of ITT Educational Institute is Services, an institution Inc., and ITT of Technical higher

More information

Cyber Security. Vision. Mission

Cyber Security. Vision. Mission Cyber Security Introduction Cyber attack is raising and threaten ubiquitous world on internet today. Industry and government need cyber security expert to counter and defend from this threaten. Cyber Security

More information

Notification of Request for Authorization under the Degree-Granting Institutions Act

Notification of Request for Authorization under the Degree-Granting Institutions Act Notification of Request for Authorization under the Degree-Granting Institutions Act Date posted: May 22, 2013 Institution: Current status: Nature of request: Argosy University Authorized to offer programs

More information

CLASS FINAL REPORT UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910

CLASS FINAL REPORT UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT Abstract This report brings together the final papers presented by the students in the Frontiers in Information

More information

MBA Financial Markets (With Dual Specialization) In collaboration with National Stock Exchange

MBA Financial Markets (With Dual Specialization) In collaboration with National Stock Exchange MBA Financial Markets (With Dual Specialization) In collaboration with National Stock Exchange Eligibility and Admission Process Details Graduate with 50% marks (45% for SC/ST) Appeared for All India entrance

More information

IT AND BUSINESS CHANGE

IT AND BUSINESS CHANGE THE PANEL IT AND BUSINESS CHANGE SALARY SURVEY 2014 Table of Contents Page 3 Welcome to our IT and Business Change Salary Survey 2014! Page 4 Senior Executives Data Analytics - Business Intelligence /

More information

Analyze. Secure. Defend. Do you hold ECSA credential?

Analyze. Secure. Defend. Do you hold ECSA credential? 1 Analyze. Secure. Defend. Do you hold ECSA credential? TM E C S A EC-Council Certified Security Analyst 1 EC-Council Cyber Security Professional Path Threat Agent Application of Methodology So You Can

More information

MSc Software Development E563F/E563

MSc Software Development E563F/E563 MSc Software Development E563F/E563 1. Introduction Mauritius has emerged as an international and competitive Information and Communication Technologies (ICT) destination and is steadily positioning itself

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

MSc Studies in Computing

MSc Studies in Computing MSc Studies in Computing presented by Department of Computing www.surrey.ac.uk/computing Why University of Surrey? Campus based university everything is in one place study and live on beautiful campus

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Cybersecurity AAS Program

Cybersecurity AAS Program Cybersecurity AAS Program New Program Proposal State Submission Steve Buchholz, Dean of Accreditation and Advancement July 2015 TABLE OF CONTENTS Executive Summary... 2 Identification and Description of

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Software Development

Software Development Software Development Associate s Degree The ITT Technical Institutes offer a variety of career-focused curricula. This sheet helps describe the associate s degree program in Software Development 1 offered

More information

Computer Science CATALOG 2014/2015 BINUS UNIVERSITY

Computer Science CATALOG 2014/2015 BINUS UNIVERSITY Computer Science Vision To become a leading and world class Computer Science School that is reputable and excellent in teaching and research, in order to keep relevant with the needs of the global industry

More information

Cyber Learning Solutions

Cyber Learning Solutions Cyber Learning Solutions 2014 Extended Course Catalog Raytheon Cyber Solutions Inc. (RCSI) cyber-training@list.app.ray.com www.raytheon.com 1 Raytheon Cyber Learning Solutions 2014 Catalog CONTENTS The

More information

Bachelor of Science in Computer Technology: B.Sc in Computer Technology Course Details

Bachelor of Science in Computer Technology: B.Sc in Computer Technology Course Details Bachelor of Science in Computer Technology: B.Sc in Computer Technology Course Details B.Sc in Computer Technology is an undergraduate course related to Computer Science. The duration of the course is

More information

BEng/ BEng (Hons) Networked Systems Engineering, BSc/ BSc (Hons) Cyber Security and Networks BEng/ BEng (Hons) Digital Security, Forensics and

BEng/ BEng (Hons) Networked Systems Engineering, BSc/ BSc (Hons) Cyber Security and Networks BEng/ BEng (Hons) Digital Security, Forensics and BEng/ BEng (Hons) Networked Systems Engineering, BSc/ BSc (Hons) Cyber Security and Networks BEng/ BEng (Hons) Digital Security, Forensics and Ethical Hacking Programme Structure The programmes are unique

More information

CURRICULUM POST GRADUATE EDUCATION FOR NORDIC COMPUTER FORENSIC INVESTIGATORS

CURRICULUM POST GRADUATE EDUCATION FOR NORDIC COMPUTER FORENSIC INVESTIGATORS CURRICULUM POST GRADUATE EDUCATION FOR NORDIC COMPUTER FORENSIC INVESTIGATORS Module 3A Forensic tool development Approved by the board at NPUC 16 th of September 2015 1. Introduction The fields of Digital

More information

Information Systems Security Certificate Program

Information Systems Security Certificate Program Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate

More information

DIPLOMA OF PROGRAMMING (APPLICATIONS)

DIPLOMA OF PROGRAMMING (APPLICATIONS) GOVERNMENT OF WESTERN AUSTRALIA DIPLOMA OF PROGRAMMING (APPLICATIONS) COURSE OUTLINE 2016 Information correct as of December 2015. Provider CRICOS Code 00020G Higher Education Provider The Administrative

More information

Cyber Defense Operations Graduate Certificate

Cyber Defense Operations Graduate Certificate The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide

More information

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor IT Audit/Security Certifications Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor Certs Anyone? There are many certifications out there

More information

INFORMATION TECHNOLOGY

INFORMATION TECHNOLOGY Celebrating 2003 2013 INFORMATION TECHNOLOGY Bachelor of Information Technology Master of Information Technology Joint Masters of Information Technology and Business Administration ABOUT JCU SINGAPORE

More information

C-. If these courses have not been completed satisfactorily upon enrolling at USF Sarasota-Manatee, they must be taken before the degree is granted.

C-. If these courses have not been completed satisfactorily upon enrolling at USF Sarasota-Manatee, they must be taken before the degree is granted. C-. If these courses have not been completed satisfactorily upon enrolling at USF Sarasota-Manatee, they must be taken before the degree is granted. Upper-level Course Requirements Required Courses HIS

More information

The institution offers career-related educational programs that integrate lifelong learning with knowledge and skills to help students:

The institution offers career-related educational programs that integrate lifelong learning with knowledge and skills to help students: OUR MISSION ITT Technical Institute is an institution of higher learning that is committed to offering quality undergraduate and continuing education locally, nationally and worldwide to students of diverse

More information

Contents. Ad Tech Big Data Creative Information Security. Marketing Media, Planning & Buying. Project Management & Client Services

Contents. Ad Tech Big Data Creative Information Security. Marketing Media, Planning & Buying. Project Management & Client Services Salary Survey 2015 Contents Ad Tech 03 Big Data 05 Creative 06 Information Security 08 IT 09 Marketing 11 Media, Planning & Buying 13 Mobile 14 Project Management & Client Services 16 Tech 18 Foreword

More information

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules IT Security Training Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules Benefits of Certification Provides Assurance to Employers Certification

More information

2014-2015 ACADEMIC YEAR SCHOOL OF INFORMATION TECHNOLOGY. AS in INFORMATION TECHNOLOGY. BS in INFORMATION TECHNOLOGY

2014-2015 ACADEMIC YEAR SCHOOL OF INFORMATION TECHNOLOGY. AS in INFORMATION TECHNOLOGY. BS in INFORMATION TECHNOLOGY SCHOOL OF INFORMATION TECHNOLOGY AS in INFORMATION TECHNOLOGY BS in INFORMATION TECHNOLOGY For MINORS available to BS students majoring in INFORMATION TECHNOLOGY See the Minors for Bachelor Students Section

More information

GIAC Certification. Enterprise Solution

GIAC Certification. Enterprise Solution E- Business & Web Solutions IT Solutions (Hardware, Software, Services) Business Process & Technology Outsourcing Enterprise Solution Professionals on Information and Network Global Information Assurance

More information

CyberSecurity: Trends, Careers, & the Next Generation

CyberSecurity: Trends, Careers, & the Next Generation CyberSecurity: Trends, Careers, & the Next Generation Ludwig Goon March 2-4, 2016 Disclaimer: The view and opinions expressed in the presentation are that of the presenter and is not affiliated with employers.

More information

Admission Procedure. The final selection is based on the performance in the qualifying examination, entrance test and interview.

Admission Procedure. The final selection is based on the performance in the qualifying examination, entrance test and interview. Admission Procedure Admissions open for MA(Eng), MCA, MBA, MFA and M.Sc (Organic Chemistry) courses for the academic year 2014-2015 Students fulfilling the eligibility criteria may seek admission through

More information

SYMBIOSIS INSTITUTE OF COMPUTER STUDIES AND RESEARCH BACHELOR OF COMPUTER APPLICATIONS PROGRAM STRUCTURE 2014-17

SYMBIOSIS INSTITUTE OF COMPUTER STUDIES AND RESEARCH BACHELOR OF COMPUTER APPLICATIONS PROGRAM STRUCTURE 2014-17 SYMBIOSIS INSTITUTE OF COMPUTER STUDIES AND RESEARCH BACHELOR OF COMPUTER APPLICATIONS PROGRAM STRUCTURE 2014-17 1. OBJECTIVES BCA offers the pre-qualification for professionals heading for smart career

More information

We Transform IDEA into Business with Right Blend of Talent, Technology & Techniques

We Transform IDEA into Business with Right Blend of Talent, Technology & Techniques We Transform IDEA into Business with Right Blend of Talent, Technology & Techniques About Us Fibsologic Pvt. Ltd. is an Offshore IT & Software company offers End-to-End Web Application & Mobile Apps Solutions

More information

Addendum to the 2015-2016 School of Accelerated Degree Programs Catalog. Published September 2015

Addendum to the 2015-2016 School of Accelerated Degree Programs Catalog. Published September 2015 Addendum to the 2015-2016 School of Accelerated Degree Programs Catalog Published September 2015 Throughout the catalog, the course number for Basic Statistics should be corrected as shown in red below:

More information

How To Get A Computer Science Degree At Coastal Carolina University

How To Get A Computer Science Degree At Coastal Carolina University New Degree Program in Information Technology Mike Murphy, Ph.D., Assistant Professor, Department of Computing Sciences Will Jones, Ph.D., Associate Professor and Chair, Department of Computing Sciences

More information

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services

More information

Section B. FACULTY OF COMPUTER APPLICATIONS SPECIFIC REGULATIONS APPLICABLE TO THE DEGREES OF B.C.A., M.C.A. and M.Phil. (COMPUTER APPLICATIONS)

Section B. FACULTY OF COMPUTER APPLICATIONS SPECIFIC REGULATIONS APPLICABLE TO THE DEGREES OF B.C.A., M.C.A. and M.Phil. (COMPUTER APPLICATIONS) Section B FACULTY OF COMPUTER APPLICATIONS SPECIFIC REGULATIONS APPLICABLE TO THE DEGREES OF B.C.A., M.C.A. and M.Phil. (COMPUTER APPLICATIONS) 30.0 PROGRAMMES OFFERED, CODE AND DURATION S. No Faculty

More information

The Department of the Army Public Affairs Intern Program

The Department of the Army Public Affairs Intern Program The Department of the Army Public Affairs Intern Program The Department of the Army Internship Program offers the Office of the Chief of Public Affairs an effective means of attracting future members of

More information

Online Bachelor s Degree Completion Program. A Degree Completion Program for Working Adults. Log in to a Distinguished Tradition. Since 1819.

Online Bachelor s Degree Completion Program. A Degree Completion Program for Working Adults. Log in to a Distinguished Tradition. Since 1819. Online Bachelor s Degree Completion Program A Degree Completion Program for Working Adults Log in to a Distinguished Tradition. Since 1819. Proudly serving those who serve Norwich University has a proud

More information

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing Faculty of Engineering and Informatics Programme Specification Programme title: MSc Cyber Security Academic Year: 2015/16 Degree Awarding Body: Partner(s), delivery organisation or support provider (if

More information

CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST

CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST CENTER FOR ADVANCED SECURITY TRAINING 618 Designing and Implementing Cloud Security About EC-Council Center of Advanced Security Training () The rapidly evolving information security landscape now requires

More information

MASTER OF TECHNOLOGY

MASTER OF TECHNOLOGY MASTER OF TECHNOLOGY IN ENTERPRISE BUSINESS ANALYTICS Learn to lead as an innovative DATA SCIENTIST CREATE effective GROWTH STRATEGIES for ENTERPRISES Scan QR code to find out more www.iss.nus.edu.sg Overview

More information

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Leann Atoigue Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION SYSTEMS Apply today: strayer.edu/apply FLEXIBLE / AFFORDABLE

More information

MASTER OF INFORMATION TECHNOLOGY POSTGRADUATE DIPLOMA IN INFORMATION TECHNOLOGY

MASTER OF INFORMATION TECHNOLOGY POSTGRADUATE DIPLOMA IN INFORMATION TECHNOLOGY POSTGRADUATE DIPLOMA IN INFORMATION TECHNOLOGY Information for International applicants 2016 ENTRY Napier Campus The Master of Information Technology and Postgraduate Diploma in Information Technology

More information

Crosscheck Web Services Patent Pending Automated SOA Compliance and Security Assessment

Crosscheck Web Services Patent Pending Automated SOA Compliance and Security Assessment Pagina 1 di 5 Hacking News Malwares Cyber Attack Vulnerabilities Hacking Groups Spying e.g. Hacking Facebook +1,310,745 163,900 392,600 +10m Follow Firing Range Open Source Web App Vulnerability Scanning

More information

CAREER OPPORTUNITIES

CAREER OPPORTUNITIES CAREER OPPORTUNITIES After the graduation, students can select three different paths. Students should have at least GPA 2.7 to get into the first two types of job. To apply for academic positions in the

More information

Cyber Security Overview Madison County Career Technical Center February 17, 2014. Timothy Mullican Cyber Defense Analyst, Aleta Technologies

Cyber Security Overview Madison County Career Technical Center February 17, 2014. Timothy Mullican Cyber Defense Analyst, Aleta Technologies Cyber Security Overview Madison County Career Technical Center February 17, 2014 Timothy Mullican Cyber Defense Analyst, Aleta Technologies #whoami Timothy Mullican, 17 years old Cyber Defense Analyst

More information

MAHATMA GANDHI UNIVERSITY

MAHATMA GANDHI UNIVERSITY MAHATMA GANDHI UNIVERSITY MASTER OF COMPUTER APPLICATIONS REGULATIONS and SCHEME for AFFILIATED COLLEGES and SCHOOL OF TECHNOLOGY AND APPLIED SCIENCES (From 2011 admission onwards) 1. Conditions for Admission

More information

Cyber security Indian perspective & Collaboration With EU

Cyber security Indian perspective & Collaboration With EU Cyber security Indian perspective & Collaboration With EU Abhishek Sharma, BIC IAG member, On behalf of Dr. A.S.A Krishnan, Sr. Director, Department of Electronics & Information Technology Government of

More information

The institution offers career-related educational programs that integrate lifelong learning with knowledge and skills to help students:

The institution offers career-related educational programs that integrate lifelong learning with knowledge and skills to help students: OUR MISSION ITT Technical Institute is an institution of higher learning that is committed to offering quality undergraduate and continuing education locally, nationally and worldwide to students of diverse

More information

MASTER OF INFORMATION TECHNOLOGY POSTGRADUATE DIPLOMA IN INFORMATION TECHNOLOGY

MASTER OF INFORMATION TECHNOLOGY POSTGRADUATE DIPLOMA IN INFORMATION TECHNOLOGY POSTGRADUATE DIPLOMA IN INFORMATION TECHNOLOGY Information for International applicants 2016 ENTRY Auckland Campus The Master of Information Technology and Postgraduate Diploma in Information Technology

More information

Master of Science Degree In Cyber Law and Information Security

Master of Science Degree In Cyber Law and Information Security Master of Science Degree In Cyber Law and Information Security Collaborative Programme Jointly offered by The National Law Institute University, Bhopal And Rajiv Gandhi Proudyogiki Vishwavidyalay, Bhopal

More information

FULL-TIME SALARY SCHEDULE FOR FY 15-16

FULL-TIME SALARY SCHEDULE FOR FY 15-16 FULL-TIME SALARY SCHEDULE FOR FY 15-16 3 MIN MID MAX High School Diploma or GED Non Exempt $ 10.52 $ 12.83 $ 15.14 4 Auxiliary Service Clerk MIN MID MAX High School Diploma or GED and Non Exempt $ 11.82

More information

PROGRAM STRUCTURE & REGULATIONS. Bachelor of Business Studies BBS

PROGRAM STRUCTURE & REGULATIONS. Bachelor of Business Studies BBS PROGRAM STRUCTURE & REGULATIONS Bachelor of Business Studies BBS INDEX 1 Introduction 2 Special Features 3 Program Specification & Proforma 4 Eligibility Criteria 5 s 6 Learning Objectives of the Program

More information

MassTLC Security Community Advisory Board Meeting JANUARY 15, 2016

MassTLC Security Community Advisory Board Meeting JANUARY 15, 2016 MassTLC Security Community Advisory Board Meeting JANUARY 15, 2016 Guest Speakers: Will Markow Senior Analyst, Burning Glass Lou Piazza Director, BATEC Bridging the Cybersecurity Talent Gap 2015 Burning

More information

UNM Information Assurance Scholarship for Service (SFS) Program

UNM Information Assurance Scholarship for Service (SFS) Program UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and

More information