New-Age Undergraduate Programme



Similar documents
New-Age Undergraduate Programme

New-Age Undergraduate Programme

New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme)

New-Age Master s Programme

New-Age Undergraduate Programme

B. Tech - Computer Engineering (4 Year Full-Time Programme)

New-Age Degrees for New-Age Careers! Are you ready for the take-off?

New-Age IT Degrees for New-Age IT Careers!

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

Computer Security and Investigations

Introduction to Cyber Security / Information Security

MSc Cyber Security UKPASS P Course 1 Year Full-Time, 2-3 Years Part-Time

Programme In Information Security Management

Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88

InfoSec Academy Application & Secure Code Track

Cyber Defense Operations Graduate Certificate

An enterprise grade information security & forensic technical team

Cyber threats are growing.

Bellevue University Cybersecurity Programs & Courses

Michelle Govan & Anand Philip Network & Security Engineering

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws

Cyber security Indian perspective & Collaboration With EU

National Cyber Security Policy -2013

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE

Certified Cyber Security Analyst VS-1160

Career Paths in Information Security v6.0

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0

(Funding for training support means all you pay is the apprentice s wage)

Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement

Information Systems Security Certificate Program

Bachelor of Information Technology (Network Security)

CYBER SECURITY TRAINING SAFE AND SECURE

Information Technology Cluster

Principles of Information Assurance Syllabus

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws

CYBERSTRAT IS PART OF GMTL LLP, 26 YORK STREET, LONDON, W1U 6PZ, UNITED KINGDOM

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

OVERVIEW DEGREES & CERTIFICATES

Academic Programs INFORMATION TECHNOLOGY

Hackers are here. Where are you?

(BDT) BDT/POL/CYB/Circular

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

COMPUTER SCIENCE & INFORMATION TECHNOLOGY

MSc Cyber Security. identity. hacker. virus. network. information

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

InfoSec Academy Forensics Track

Networking and Information Security

Digital Pathways. Penetration Testing

InfoSec Academy Pen Testing & Hacking Track

The Next Generation of Security Leaders

Roger s Cyber Security and Compliance Mini-Guide

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited

Certified Cyber Security Analyst VS-1160

Hackers are here. Where are you?

PROGRAMME DETAIL SPECIFICATION. Programme Summary

New-Age Degrees for New-Age Careers!

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

Introduction to Information Technology Lesson Objectives

IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Web Technologies

ITU-IMPACT Training and Skills Development Course Catalogue

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Information Technology Diploma in Web Technologies

CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST

Computer Information Science xxx

COMPUTER NETWORKS AND SECURITY A FUTURE IN

Information Technology 2015 Programmes

BACHELOR OF ENGINEERING WITH HONOURS IN INFORMATION AND COMMUNICATIONS TECHNOLOGY (INFORMATION SECURITY)

Network Engineering Technology

IT AND BUSINESS CHANGE

Postgraduate. eforensics. swinburne.edu.au/postgrad

Procurement Policy Note Use of Cyber Essentials Scheme certification

How To Get A Computer Hacking Program

EC-Council. Certified. Internet Marketing Practitioner. Unravel the Mystery of. Internet Marketing C IMP

CRYPTUS DIPLOMA IN IT SECURITY

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

BEng/ BEng (Hons) Networked Systems Engineering, BSc/ BSc (Hons) Cyber Security and Networks BEng/ BEng (Hons) Digital Security, Forensics and

COURSE TITLE COURSE DESCRIPTION

Bachelor of Information Technology

IT courses For Senior Managers

Master of Science COMPUTER SCIENCE. Master of Science INFORMATION SYSTEMS. Master of Science SOFTWARE ENGINEERING.

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

MassTLC Security Community Advisory Board Meeting JANUARY 15, 2016

IT and Cyber Security Training Courses

Personal Security Practices of the CAO

CAREER OPPORTUNITIES

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 616 Securing Windows Infrastructure. Make The Difference CAST.

Cybersecurity AAS Program

EC Council Certified Ethical Hacker V8

MANAGEMENT DEVELOPMENT COURSES

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device

CRIMINAL JUSTICE. Master of Arts. Master of Science HOMELAND SECURITY. Graduate PROGRAMS

Paul Vlissidis Group Technical Director NCC Group plc

Transcription:

New-Age Undergraduate Programme B. Tech Cloud Technology & Information Security (4 Year Full Time Programme) Academic Year 2015 Page 1

Course Objective This unique B. Tech course provides dual career options for the students in the fast growing technology sectors of Cloud Technology and Information Security. In addition to all the mandatory subjects of a traditional B. Tech, this specialized course offers in-depth practical know-how of the current trend Technology Cloud and Information Security. These Sectors have the potential to grow exponentially and they provide challenging job opportunities for young professionals with the right skill sets. On the Cloud Technology front, the course will provide students with the fundamental knowledge of all aspects of Cloud Technology. The course focuses on Virtualization Technology, Cloud Technology, Datacenters, Networking and Operating Systems. On the Information Security front, this course equips the students with the concepts and the technical skills in Information Security. The focus of the course is on the models, tools and techniques for enforcement of Security Policies, with emphasis on Cryptography, Ethical Hacking, Computer Forensics and Virtualization and Cloud Security. Course Particulars Course Name B. Tech Cloud Technology & Information Security Degree Awarded Bachelor Of Technology Duration of the Course 4 Year (8 semesters) Certifying University Medium of Instruction & Examination English Study Campus V.P.O Sahauran, Tehsil kharar, Distt. Mohali, Punjab 140104. Eligibility The minimum quali ication required to apply is a pass in the 10+2 examination from PUC / ISC / CBSE or equivalent board or a course recognised as equivalent thereto by the university. Examinations & Assessments 1. Internal test 2. Assignments 3. Seminar presentation 4. Class tests 5. Preparatory theory and Practical examination 6. Term end Theory and Practical examination Page 2

Curriculum* Semester 1 Technical English Matrices and Calculus Engineering Physics Engineering Chemistry Computer fundamentals & organization Programming in C Soft skill, Effective speaking and Analytical Skills - I Programming in C Lab Physics Laboratory Chemistry Laboratory Semester 3 Fourier Series and Transforms OSI layer & Security Network Security Basics Data structures using C Computer Networks Desktop Operating Systems Personal Effectiveness Computer Networks Lab Network Security Lab Desktop Operating Systems Lab Data structures using C- Lab Semester 2 Communication Skills Differential Equations and Complex Analysis OOPS with C++ Operating System Information Security I Web Technology I Soft Skills, Effective speaking and Analytical Skills- II Information Security I- Lab OOPS with C++ - Lab Web Technology I - Lab Semester 4 Probability and Queuing Theory Introduction to Cloud Technology Introduction to Linux Information Security II Server Operating System I RDBMS Effective Communication Introduction to Linux Lab Server Operating System - I Lab RDBMS - Lab Semester 5 Semester 6 Principles of Virtualization Fundamentals of Datacenter Cryptography Fundamentals Fundamentals of Storage Ethical Hacking Fundamentals Disaster Recovery and Business Continuity Management Life and Career Skills Principles of Virtualization Lab Ethical Hacking Fundamentals - Lab Mini Project Industrial Training Introduction to Cloud Computing Solutions Server Operating System II IT Governance, Risk and Information Security Audit Cyber Forensics Basics Fundamentals of Exchange Server Elective I Security Threats and Trends OWASP Framework Hacktivism, Cyber warfare and Cyber Terrorism ISO27001, PCIDSS and HIPAA Linux Security and Forensics Page 3

Advanced Web Technology Transition from Campus to Corporate Introduction to Cloud Computing Solutions Lab Server Operating System II Lab Cyber Forensics Basics Lab Transition from Campus to Corporate Semester 7 Server Operating System I - Advanced Virtualization and Cloud Security Security in Wireless, VOIP and Mobile Apps Android Security Elective II Introduction to VOIP E-Commerce Management Theory and Practice Industrial Organization and Management Business Communication Fundamentals of IT Infrastructure Library Server Operating System I - Advanced Lab Mini Project Android Security- Lab Semester 8 Internship/Project *Subject to changes made by the university Career Opportunities for Cloud Technology Professionals* Global Scenario Combined Market of Private and Public Cloud Services - $11 Billion in 2012 Poised to grow to $ 65 to 85$ Billion in 2015 -McKinsey Analysis: Winning in the SMB Cloud: Charting a Path to Success Growth and Forecast There are currently about 50 million enterprise users of Cloud Of ice Systems which represent only 8 percen t of overall of ice system users, excluding China and India. Predicts that a major shift toward cloud of ice systems will begin by the irst half of 2015 and reach 33 % penetration by 2017. -Gartner Report Worldwide spending on public IT cloud services will be more than $40 billion in 2014 Expected to approach $100 billion in 2016. Over the 2012 2016 forecast period, public IT cloud services will enjoy a compound annual growth rate (CAGR) of 26.4%, ive times that of the IT industry overall - IDC research Page 4

Jobs and Opportunities - Global Cloud Computing to Create 14 Million New Jobs by 2015. By 2015, business revenues from IT innovation enabled by the cloud could reach US$1.1 trillion a year. Career Progression Path for Cloud Technology* Industry Entry level (0-1 yrs exp.) Mid Level (3-5 yrs exp.) Advanced level (5 yrs plus exp.) Average Salary ` 400,000-500,000 ` 400,000-800,000 ` 800,000 + Job Role Self - employment Cloud Architect Cloud Engineer Sr. Cloud Engineer Manager Cloud Technlogies Cloud Consultant Manager Cloud Technology Datacentre Technician Datacentre Engineer Datacentre Manager Remote Desktop Engineer Cloud Provisioning Engineer Datacentre Manager Cloud Security Specialist Security Engineer Manager Cloud Security Compensation commensurate to the efforts put in Career Opportunities for Information Security Professionals* Global Scenario Cyber Security Need Drives IT Job Growth *Terms & Conditions Apply New research has found that job openings in the ield of cyber security have grown by more than 100 percent in the past year. Those openings are only expected to grow in the coming year, jumping an additional 30 percent in 2014. The demands for security workers points to the importance companies are placing on responding to the growth of recent attacks on businesses of all sizes. - Business News Daily The Army is building a new cyber command centre at Fort Meade to eventually house 1,500, leading a worldwide cyber corps of 21,000 soldiers and civilians. By 2017, the Air Force will add more than 1,000 uniformed cyber forces to its 6,000 experts now working at the Air Force Space Command. The Navy had 800 cyber security staffers in 2013 and will reach nearly 1,000 by 2017, working toward a mix of 80 percent uniformed personnel and 20 percent civilian employees and contractors. The Marines currently have 300 uniformed personnel, civilians and contractors at work, and plan to increase that number to just fewer than 1,000 by 2017. - Capital Business Page 5

Indian Scenario National Cyber Security Policy 2013: As per this Govt. of India policy document, there will be a requirement of 500,000 professionals skilled in cyber security in the next 5 years. Also the Ministry of Communication and Information Technology will encourage all organisations, private and public to designate a member of senior management, as Chief Information Security Of icer (CISO), responsible for cyber security efforts and initiatives. Analysts said that India currently has around 22000 certi ied cyber security professionals, which is signi icantly lesser than the requirement of 77000 personnel. The current number is miniscule when compared to the nearly 25 million cyber warriors in China. According to recent data, India would need 4.7 lakh cyber security professionals by 2015 to protect its IT infrastructure. - The Times of India Even in the most dif icult of economic times, IT security is a full-employment ield. With the growing number of threats on the horizon, and the growing awareness of cyber security vulnerabilities and issues inside the enterprise, it is clear that security will be a top priority for the coming year and likely for years to come Job Opportunity for Cyber Security Professionals in various departments of different sectors: Corporate (Information Security, Compliance, IT&IS Audit, Software Development etc.) Banking, Finance and Insurance Sector (IT and Data Security, E-Commerce and Net-banking Security, Compliance, Information Risk Management, IT&IS Audit etc.) Defence and Police (R&D, Investigation and Forensics, IT Infrastructure Security etc.) Governance (E-Governance, Public Key Infrastructure Management, Forensic Science Labs etc.) Legal Department (Cyber Forensics Consultants, Cyber Law Expert, Expert witness etc.) Cyber Fraud Consultants / Management (Ethical Hacker, Penetration Testers, Cyber Fraud Detectives) Career Progression Path for Information Security* Industry Entry level (0-1 yrs exp.) Mid Level (3-5 yrs exp.) Advanced level (5 yrs plus exp.) Average Salary ` 200,000-400,000 ` 400,000-800,000 ` 800,000 + Executive Information Security Sr. Information Security Officer Chief Information Security Officer Malware Analyst Sr. Malware Analyst Manager Anti Virus Development Job Role Self - employment Datacentre Technician Datacentre Engineer Datacentre Manager Junior Penetration Tester Penetration Tester Ethical Hacker Database Manager IT Security Network and Database Manager - IT Security Datacentre Security Engineer Junior Cyber Forensic Analyst Cyber Forensic Analyst Cyber Forensic Investigator Compensation commensurate to the efforts put in *Terms & Conditions Apply Page 6

Partial List of Organizations Where Our Students Received Employment Opportunities* *Terms & Conditions Apply For Enquiry & Admission, Contact Bhawan Negi Mobile : + 91 9911996559 E-mail: bhawan@inurture.co.in Page 7