New-Age Master s Programme



Similar documents
New-Age Undergraduate Programme

New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme)

B. Tech - Computer Engineering (4 Year Full-Time Programme)

Programme In Information Security Management

New-Age IT Degrees for New-Age IT Careers!

Michelle Govan & Anand Philip Network & Security Engineering

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Bachelor of Information Technology (Network Security)

Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited

OVERVIEW DEGREES & CERTIFICATES

Cyber Defense Operations Graduate Certificate

Network Engineering Technology

Introduction to Cyber Security / Information Security

Computer Security and Investigations

InfoSec Academy Application & Secure Code Track

COMPUTER SCIENCE & INFORMATION TECHNOLOGY

GLS UNIVERSITY. Faculty of Computer Technology Master of Computer Applications (MCA) Programme

Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

Admission Procedure. The final selection is based on the performance in the qualifying examination, entrance test and interview.

Cyber Security. Vision. Mission

PROGRAMME DETAIL SPECIFICATION. Programme Summary

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Hackers are here. Where are you?

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Web Technologies

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Information Technology Diploma in Web Technologies

CYBER SECURITY TRAINING SAFE AND SECURE

Information Technology Division

MS Information Security (MSIS)

Hackers are here. Where are you?

CRIMINAL JUSTICE. Master of Arts. Master of Science HOMELAND SECURITY. Graduate PROGRAMS

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE

MET s Institute of Engineering, Department of MCA. Faculty Development Programme on Digital Forensic & Cyber Security Conducted by

MSc Cyber Security UKPASS P Course 1 Year Full-Time, 2-3 Years Part-Time

MSc Cyber Security. identity. hacker. virus. network. information

CAST Center for Advanced Security Training

Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws

BEng/ BEng (Hons) Networked Systems Engineering, BSc/ BSc (Hons) Cyber Security and Networks BEng/ BEng (Hons) Digital Security, Forensics and

Certified Cyber Security Analyst VS-1160

Management Commerce Computers Life Sciences

Bellevue University Cybersecurity Programs & Courses

CLASS FINAL REPORT UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910

GYAN VIHAR SCHOOL OF ENGINEERING & TECHNOLOGY M. TECH. CSE (2 YEARS PROGRAM)

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

ACADEMIC YEAR SCHOOL OF INFORMATION TECHNOLOGY. AS in INFORMATION TECHNOLOGY. BS in INFORMATION TECHNOLOGY

The Department of the Army Public Affairs Intern Program

Computer Information Science xxx

Bachelor of Information Technology (Incorporating Diploma in Information Technology (Levels 5 and 6)

SYMBIOSIS INSTITUTE OF COMPUTER STUDIES AND RESEARCH BACHELOR OF COMPUTER APPLICATIONS PROGRAM STRUCTURE

Software Development

MAHATMA GANDHI UNIVERSITY

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Information Technology Diploma in Web Technologies

Master of Science Degree INFORMATION SYSTEMS. Engaging Minds. Embracing the World.

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws

Bachelor of Information Technology

Information Technology 2015 Programmes

Career Paths in Information Security v6.0

BSc in Information Systems & BSc in Information Technology Degree Programs

Principles of Information Assurance Syllabus

Analyze. Secure. Defend. Do you hold ECSA credential?

COURSE TITLE COURSE DESCRIPTION

POST GRADUATE CERTIFICATE IN MANAGEMENT - INTERNATIONAL BUSINESS

New-Age Degrees for New-Age Careers!

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

CyberSecurity: Trends, Careers, & the Next Generation

Online Bachelor s Degree Completion Program. A Degree Completion Program for Working Adults. Log in to a Distinguished Tradition. Since 1819.

Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee.

Information Technology Degree Programs

C-. If these courses have not been completed satisfactorily upon enrolling at USF Sarasota-Manatee, they must be taken before the degree is granted.

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

Critical career expertise in the age of technology

Computer Science CATALOG 2014/2015 BINUS UNIVERSITY

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

How To Become A Policy Analyst

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

Computer and Information Science Division xxx

IT and Cyber Security Training Courses

UNIVERSITY OF HARGEISA

Department of Information Systems and Cyber Security

Minnesota State Community and Technical College Detroit Lakes Campus

EDUCATION FOR THE FUTURE.

Transcription:

New-Age Master s Programme MCA (Information Security Management Services) (3 Year Full-Time Programme) Academic Year 2015 Page 1

Course Objective MCA (Information Security Management Services) This unique master s programme prepares the students for exciting and rewarding career options in the fast growing technology sector of Information Security. This programme provides comprehensive knowledge, technical expertise and imparts hands-on experience. This programme provides the students an understanding of all aspects of information security. Students will have an in-depth knowledge of all practical and theoretical aspects of preventive, ethical hacking and forensic security technologies. and demonstrate functional knowledge on data centres and the concept of virtualization. At the end of this professional programme, the students will be able to demonstrate ethical hacking skills, apply basic preventive and forensic skills and implement various information security tools. Course Particulars Course Name MCA - (Information Security Management Services) Degree Awarded Master of Computer Applications (MCA) Duration of the Course 3 Year (6 semesters) Class Timing 8am 4pm Medium of Instruction & Examination English Study Campus, School of Graduate Studies #34, 1st Cross, J C Road, Bangalore - 560 027 Eligibility The minimum quali ication required to apply is a Bachelors Degree in Computer Science or Information Technology or Computer Applications or B.E from a recognized university or equivalent with a minimum of 50% aggregate marks Examinations & Assessments 1. Internal tests 4. Class tests 2. Assignments 5.Preparatory theory and Practical examination 3. Seminar presentation 6. Term end Theory and Practical examination Page 2

Curriculum* MCA (Information Security Management Services) Semester 1 Semester 2 Data Structures Object Oriented Programming Using C ++ Computer System Organization Discrete Mathematics Introduction to Linux Programming Data Structures LAB Object Oriented Programming Using C ++ LAB Introduction to Linux Programming LAB Programming in Java Database Management System Introduction to Information Security Advanced Computer Networks Operating System Programming in Java LAB Database Management System LAB Networks LAB Semester 3 Ethical Hacking Cyber Forensics Network Security Database Security Fundamentals Security Threats and trends Ethical Hacking Basics - LAB Cyber Forensics Basics - LAB Network Security Basics - LAB Semester 5 Elective II Fundamentals of ITIL Principles of RIMS Datacenter Architecture Disaster Recovery and Business Continuity Management Project/ Internship Semester 4 Virtualization and Cloud Security OSI Layer and Security Protocols Mobile Wireless and VOIP Security Elective I Android Security COBIT VALIT and Risk IT Advanced Network Security IT Governance, Risk and Information Security Management Application, Web Security and SDLC Virtualization and Cloud Security LAB Application, Web Security and SDLC LAB Mini Project/ LAB Semester 6 Final Project/Internship and Viva *Subject to changes made by the university Career Opportunities for Information Security Management Services Professionals Global Scenario Cyber Security Needs Drives IT Job Growth New research has found that job openings in the ield of cyber security have grown by more than 100 percent in the past year. Those openings are only expected to grow in the coming year, jumping an additional 30 percent in 2014. The demands for security workers points to the importance companies are placing on responding to the growth of recent attacks on businesses of all sizes. - Business News Daily Page 3

MCA (Information Security Management Services) US Federal agencies to hire more cyber defenders in 2014 The Army is building a new cyber command centre at Fort Meade to eventually house 1,500, leading a worldwide cyber corps of 21,000 soldiers and civilians. By 2017, the Air Force will add more than 1,000 uniformed cyber forces to its 6,000 experts now working at the Air Force Space Command. The Navy had 800 cyber security staffers in 2013 and will reach nearly 1,000 by 2017, working toward a mix of 80 percent uniformed personnel and 20 percent civilian employees and contractors. The Marines currently have 300 uniformed personnel, civilians and contractors at work, and plan to increase that number to just fewer than 1,000 by 2017. Indian Scenario - Capital B As per National Cyber Security Policy 2013: there will be a requirement of 500,000 professionals skilled in cyber security in the next 5 years. Also the Ministry of Communication and Information echnology will encourage all organizations, private and public to designate a member of senior management, as Chief Information Security Of icer (CISO), responsible for cyber security efforts and initiatives. Analysts said that India currently has around 22000 certi ied cyber security professionals, which is signi icantly lesser than the requirement of 77000 personnel. The current number is minuscule when compared to the nearly 25 million cyber warriors in China. According to recent data, India would need 4.7 lakh cyber security professionals by 2015 to protect its IT infrastructure. - The Times of India Even in the most dif icult of economic times, IT security is a full-employment ield. With the growing number of threats on the horizon, and the growing awareness of cyber security vulnerabilities and issues inside the enterprise, it is clear that security will be a top priority for the coming year and likely for years to come. Job opportunity for Information Security Management Professions in various departments Of different sectors: Corporate (Information Security, Compliance, IT&IS Audit, Software Development etc.) Banking, Finance and Insurance Sector (IT and Data Security, E-Commerce and Net-banking Security, Compliance, Information Risk Management, IT&IS Audit etc.) Defence and Police (R&D, Investigation and Forensics, IT Infrastructure Security etc.) Governance (E-Governance, Public Key Infrastructure Management, Forensic Science Labs etc.) Legal Department (Cyber Forensics Consultants, Cyber Law Expert, Expert witness etc.) Cyber Fraud Consultants/ Management (Ethical Hacker, Penetration Testers, Cyber Fraud Detectives) Page 4

MCA (Information Security Management Services) Career Progression Path - Information Security Management Services* Level Entry level (0-1 yrs exp.) Mid Level (3-5 yrs exp.) Advanced level (5 yrs plus Salary Range 200,000 500,000 500,000 800,000 exp.) 800,000 + Job Role Executive Information Security Senior Information Security Of icer Chief Information Security Of icer Malware Analyst Senior Malware Analyst Manager Anti-Virus Development Data Centre Technician Data Centre Engineer Data Centre Manager Junior Penetration Tester Penetration Tester Ethical Hacker Database Manager IT Security Junior Cyber Forensic Analyst Network and Database Manager IT Security Cyber Forensic Analyst Data Centre Security Engineer Cyber Forensic Investigator *Terms & Conditions Apply Page 5

MCA (Information Security Management Services) Partial List of Organizations where our IT Students Received Employment Opportunities* *Terms & Conditions Apply For Enquiry & Admission, Contact Suryakant @ Mobile: +91 9880845393 / +91 9742108821 Toll Free No.: 1800-103 9103 E-mail: enquiry@jainunivadmissions.com Page 7