New-Age Master s Programme MCA (Information Security Management Services) (3 Year Full-Time Programme) Academic Year 2015 Page 1
Course Objective MCA (Information Security Management Services) This unique master s programme prepares the students for exciting and rewarding career options in the fast growing technology sector of Information Security. This programme provides comprehensive knowledge, technical expertise and imparts hands-on experience. This programme provides the students an understanding of all aspects of information security. Students will have an in-depth knowledge of all practical and theoretical aspects of preventive, ethical hacking and forensic security technologies. and demonstrate functional knowledge on data centres and the concept of virtualization. At the end of this professional programme, the students will be able to demonstrate ethical hacking skills, apply basic preventive and forensic skills and implement various information security tools. Course Particulars Course Name MCA - (Information Security Management Services) Degree Awarded Master of Computer Applications (MCA) Duration of the Course 3 Year (6 semesters) Class Timing 8am 4pm Medium of Instruction & Examination English Study Campus, School of Graduate Studies #34, 1st Cross, J C Road, Bangalore - 560 027 Eligibility The minimum quali ication required to apply is a Bachelors Degree in Computer Science or Information Technology or Computer Applications or B.E from a recognized university or equivalent with a minimum of 50% aggregate marks Examinations & Assessments 1. Internal tests 4. Class tests 2. Assignments 5.Preparatory theory and Practical examination 3. Seminar presentation 6. Term end Theory and Practical examination Page 2
Curriculum* MCA (Information Security Management Services) Semester 1 Semester 2 Data Structures Object Oriented Programming Using C ++ Computer System Organization Discrete Mathematics Introduction to Linux Programming Data Structures LAB Object Oriented Programming Using C ++ LAB Introduction to Linux Programming LAB Programming in Java Database Management System Introduction to Information Security Advanced Computer Networks Operating System Programming in Java LAB Database Management System LAB Networks LAB Semester 3 Ethical Hacking Cyber Forensics Network Security Database Security Fundamentals Security Threats and trends Ethical Hacking Basics - LAB Cyber Forensics Basics - LAB Network Security Basics - LAB Semester 5 Elective II Fundamentals of ITIL Principles of RIMS Datacenter Architecture Disaster Recovery and Business Continuity Management Project/ Internship Semester 4 Virtualization and Cloud Security OSI Layer and Security Protocols Mobile Wireless and VOIP Security Elective I Android Security COBIT VALIT and Risk IT Advanced Network Security IT Governance, Risk and Information Security Management Application, Web Security and SDLC Virtualization and Cloud Security LAB Application, Web Security and SDLC LAB Mini Project/ LAB Semester 6 Final Project/Internship and Viva *Subject to changes made by the university Career Opportunities for Information Security Management Services Professionals Global Scenario Cyber Security Needs Drives IT Job Growth New research has found that job openings in the ield of cyber security have grown by more than 100 percent in the past year. Those openings are only expected to grow in the coming year, jumping an additional 30 percent in 2014. The demands for security workers points to the importance companies are placing on responding to the growth of recent attacks on businesses of all sizes. - Business News Daily Page 3
MCA (Information Security Management Services) US Federal agencies to hire more cyber defenders in 2014 The Army is building a new cyber command centre at Fort Meade to eventually house 1,500, leading a worldwide cyber corps of 21,000 soldiers and civilians. By 2017, the Air Force will add more than 1,000 uniformed cyber forces to its 6,000 experts now working at the Air Force Space Command. The Navy had 800 cyber security staffers in 2013 and will reach nearly 1,000 by 2017, working toward a mix of 80 percent uniformed personnel and 20 percent civilian employees and contractors. The Marines currently have 300 uniformed personnel, civilians and contractors at work, and plan to increase that number to just fewer than 1,000 by 2017. Indian Scenario - Capital B As per National Cyber Security Policy 2013: there will be a requirement of 500,000 professionals skilled in cyber security in the next 5 years. Also the Ministry of Communication and Information echnology will encourage all organizations, private and public to designate a member of senior management, as Chief Information Security Of icer (CISO), responsible for cyber security efforts and initiatives. Analysts said that India currently has around 22000 certi ied cyber security professionals, which is signi icantly lesser than the requirement of 77000 personnel. The current number is minuscule when compared to the nearly 25 million cyber warriors in China. According to recent data, India would need 4.7 lakh cyber security professionals by 2015 to protect its IT infrastructure. - The Times of India Even in the most dif icult of economic times, IT security is a full-employment ield. With the growing number of threats on the horizon, and the growing awareness of cyber security vulnerabilities and issues inside the enterprise, it is clear that security will be a top priority for the coming year and likely for years to come. Job opportunity for Information Security Management Professions in various departments Of different sectors: Corporate (Information Security, Compliance, IT&IS Audit, Software Development etc.) Banking, Finance and Insurance Sector (IT and Data Security, E-Commerce and Net-banking Security, Compliance, Information Risk Management, IT&IS Audit etc.) Defence and Police (R&D, Investigation and Forensics, IT Infrastructure Security etc.) Governance (E-Governance, Public Key Infrastructure Management, Forensic Science Labs etc.) Legal Department (Cyber Forensics Consultants, Cyber Law Expert, Expert witness etc.) Cyber Fraud Consultants/ Management (Ethical Hacker, Penetration Testers, Cyber Fraud Detectives) Page 4
MCA (Information Security Management Services) Career Progression Path - Information Security Management Services* Level Entry level (0-1 yrs exp.) Mid Level (3-5 yrs exp.) Advanced level (5 yrs plus Salary Range 200,000 500,000 500,000 800,000 exp.) 800,000 + Job Role Executive Information Security Senior Information Security Of icer Chief Information Security Of icer Malware Analyst Senior Malware Analyst Manager Anti-Virus Development Data Centre Technician Data Centre Engineer Data Centre Manager Junior Penetration Tester Penetration Tester Ethical Hacker Database Manager IT Security Junior Cyber Forensic Analyst Network and Database Manager IT Security Cyber Forensic Analyst Data Centre Security Engineer Cyber Forensic Investigator *Terms & Conditions Apply Page 5
MCA (Information Security Management Services) Partial List of Organizations where our IT Students Received Employment Opportunities* *Terms & Conditions Apply For Enquiry & Admission, Contact Suryakant @ Mobile: +91 9880845393 / +91 9742108821 Toll Free No.: 1800-103 9103 E-mail: enquiry@jainunivadmissions.com Page 7