Book Free 1 on 1 session with our counsellors

Last date of application: 18/05/2018

Book Free 1 on 1 session with our counsellors

Last date of application: 18/05/2018

Earn Certificate of Completion from IIIT Bangalore

Premier deemed university with focus on research, entrepreneurship and innovation.

Growing Demand for Cyber Security Professionals in the Job Market

According to NASSCOM, the estimated demand for security workforce to rise globally to six million by 2019.

2 Day Bootcamp & Certificate Distribution Ceremony at IIIT Bangalore Campus

Workshops with hands on exposure to tools & lab sessions on Cyber Threats and Cryptography

Gain comprehensive understanding of applicable Cyber Laws

Cyber law has emerged as a demanding career field with digital ecosystem thriving in India.

Live & Interactive Online Classes

Learn from anywhere without leaving your job.

Get exposure to contemporary & sought after topics

Cyber Insurance, Blockchain, Cryptocurrencies.

  • Security professionals who want to fill the gaps in their understanding of technical information security.
  • Managers who want to understand information security beyond simple terminology and concepts.
  • Operations personnel who do not have security as their primary job function but need an understanding of security to be effective.
  • IT engineers and supervisors who need to know how to build a defensible network against attacks.
  • Administrators responsible for building and maintaining systems that are being targeted by attackers.
  • Forensic analysts, penetration testers, and auditors who need a solid foundation of security principles so they can be as effective as possible at their jobs.
  • Anyone new to information security with some background in information systems and networking.
  • Course Fee

For Indian Residents: Rs 98,000 + taxes (Instalment option available)

For International Students: USD 2,000

  • Date of Course Commencement: 30 Sep 2018
  • Duration of the Course: 6 Months
  • Schedule of Classes: Once a week on Sundays from 10.00 a.m. to 12.30 p.m.
  • For Indian Participants – Graduates or Diploma Holders (10+2+3) from a recognized university (UGC/AICTE/DEC/AIU/State Government) in any discipline.
  • For International Participants – Graduation or equivalent degree from any recognized University or Institution in their respective country.
  • Basic understanding of technology, networks, and security, while not mandatory, will be an added advantage

The primary method of instruction will be through LIVE lectures that will be delivered online via the internet to participant desktops/laptops or classrooms. The lectures will be delivered by eminent academicians and practicing industry experts. The course will be primarily taught through a combination of lectures, discussions, exercises and labs. All enrolled students will be provided access to our SLIQ Cloud Campus through which students may access other learning aids, reference materials, assessments and assignments as appropriate. Throughout the duration of the course, students will have the flexibility to reach out to the Professors, real time during the class or offline via the SLIQ Cloud Campus to raise questions and clear their doubts.

About Course

It is a comprehensive course to learn the most effective steps to prevent attacks and detect adversaries with actionable techniques that one can directly apply when they get back to work.

As Certified Cyber Warrior, the participant will learn tips and tricks from the best of the experts from a mix of industry & academia, so that they can win the battle against the wide range of cyber adversaries that want to harm the enterprises’ IT environment.

Syllabus

Cyber Security Foundation Module:

  • Introduction & Overview of Cyber Security
  • Common Security threats and prevention/mitigation plans
  • Cryptography – fundamentals with theory of encryption keys (LMS)
  • Networking Security – fundamentals with N/w layers and various protocols (LMS)

Introduction to IT Act and Cyber Laws:

  • Cyber Laws – Overview of Cyber Civil Wrong
  • Cyber Laws – overview of Cyber Offences
  • Case studies where brand and financial loss has been reported

Introduction to Dark web and Deep Web:

  • Dark web & Deep Web
  • Anatomy of Financial Cyber Crime Organization

Network Security & Best practices for secured n/w administration

  • VPN
  • Wireless Security

 Vulnerabilities in various layers of Information Systems:

  • Overview of Multitasking and Multiprocessing
    • Assess And Mitigate Security Vulnerabilities
    • Understanding Security Capabilities of Information System
    • Virtualization
    • Memory Protection
    • Memory & Address protection
    • Protection Mechanisms

Brief Introduction to Cyber Risk and Cyber Insurance Best Practices:

  • Cyber Risk & Information Risk Management
    • Risk Management Concepts
    • Component of Risk Management – example
    • Risk Management Process
    • Common Cyber Threats
    • Framework for Cyber and IS Risk Management
  • Cyber Insurance – an Introduction
    • What is cyber insurance
    • How to assess and bargain a good policy
    • How to implement documentation for claims
    • Best practices for ‘zero’ risk policies

Introduction to Physical Security & importance to protect IT Assets:

  • Physical Security Introduction
  • Perimeter / Boundary Security
  • Building Security
  • Inside Building with back-end command & Control System
  • Overview of IoT devices Security & Concerns

Introduction to Blockchain, Cryptocurrencies, and Bitcoins

  • Introduction to Blockchain concept
  • Cryptocurrencies

Cyber Security Design and Maintaining Resilience

  • Cyber Security Designing And Maintaining Resilience
  • Designing a Resilient Enterprise
  • Maintaining Enterprise Resilience
  • Perimeter Protection with Firewall
  • Incident Response Plan
  • Cyber Risk Management process
  • Inventory Authorized and Unauthorized devices and Software

Recommended Best practices for Cyber Security: 

  • Cyber Hygiene
  • Data Security
  • Wireless networking
  • Invoke the Incident Response Plan
  • Recover
  • RTO – RPO
  • Preparedness Plan Audit
  • Test your incident response plan
  • Vendor Incident response

20 Critical Security Components – Part 1 

  • Critical Control 1: Inventory of Authorized and Unauthorized Devices
  • Critical Control 2: Inventory of Authorized and Unauthorized Software
  • Critical Control 3: Secure Configurations for Hardware and Software on Laptops, Workstations, and Servers
  • Critical Control 4: Continuous Vulnerability Assessment and Remediation
  • Critical Control 5: Controlled Use of Administrative Privileges
  • Critical Control 6: Maintenance, Monitoring, and Analysis of Audit Logs
  • Critical Control 7: Email and Web Browser Protections
  • Critical Control 8: Malware Defenses
  • Critical Control 9: Limitation and Control of Network Ports, Protocols, and Services

20 Critical Security Components – Part 2 

  • Critical Control 10: Data Recovery Capability
  • Critical Control 11: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches
  • Critical Control 12: Boundary Defense
  • Critical Control 13: Data Protection
  • Critical Control 14: Controlled Access Based On Need to Know
  • Critical Control 15: Wireless Device Control
  • Critical Control 16: Account Monitoring and Control
  • Critical Control 17: Security Skills Assessment and Appropriate Training to Fill Gaps
  • Critical Control 18: Application Software Security
  • Critical Control 19: Incident Response and Management
  • Critical Control 20: Penetration Tests and Red Team Exercises

2 Day On Campus Boot Camp at IIIT B

  • Lab Session – General Threats
  • Lab Session – Cryptography
  • Boot Camp 1
  • Boot Camp 2

About IIIT Bangalore

The International Institute of Information Technology, a Deemed University, popularly known as IIIT-B, was established in 1999 with a vision to contribute to the IT world by focusing on education and research, entrepreneurship and innovation. The Institute is a registered not-for-profit society funded jointly by the Government of Karnataka and the IT industry.

Since its inception, IIIT-B, with its unique model of education, research, and industry interaction, has grown in stature to become an institution of considerable repute in academic as well as corporate circles. The Institute works in partnership with the corporate sector while retaining the freedom of an academic institution. It is inspired by other renowned institutions, and also strives to emulate an academic culture that is on par with the best international institutions.

The incubation Centre at IIITB has done well by incubating a number of successful startups. It has incubated 50 plus startups, over 80 new products/services were brought to market, over 300 jobs have been created and over 10 startups managed to raise funds.

About FISST

Forensics Intelligence Surveillance and Security Technologies (FISST) as the name suggest works on the entire stack of Security Technologies starting from Sensors / Capturing devices to Surveillance to Intelligence and Forensics, both Physical and Cyber technologies space.

FISST has tie-ups with leading academic institutes in India like IIT-Madras, IIIT-Bangalore as well as international institutes such as Virginia Technology, USA for offering Cyber Security Education to various target groups. FISST has already trained staff from leading banks such as Canara Bank, Vijaya Bank, IDFC Bank, AXIS Bank as well as e-Gov + Treasury department of Govt. of Karnataka, L&T Shipbuilding, Dredging Corporation, Indus software etc. with tools & techniques to ‘Assess, Predict, Detect and Protect’ the IT Assets of these organisations.

FISST has started building some Cyber Security related products relevant to Indian market (as most of the tools are imported and it is expensive).  These will hit the market by end of 2019.

There is no entity across World with full suite with whole stack of FISST and FISST aims to be in Global Market in next 3 years as part of ‘Make in India’ for Security and Surveillance.

About Talentedge

Talentedge is an Ed-Tech firm. We are the first to bring ‘Live & Interactive’ anywhere learning in digital format. Talentedge offers exclusive courses jointly with world-leading institutes and corporates. Our ability to recreate classroom type interactions in the virtual world has struck a chord with over 3, 00,000 individuals and corporate learners, facilitating a social collaborative learning experience in digital space. We enable working professionals to plan their future course of action and fast track their careers. Talentedge is changing the way India learns. Talentedge is one of the first Ed-Tech organizations to be credited with an ISO: 9001-2008 certification.

Faculty

Dr. Harish Ramani

Lead Faculty, Chief Executive & Technology Officer, Tevel Cyber Corps Private Limited (formerly Internettechies)

Dr.Harish Ramani has attained CEH, CHFI, ECSA, CEI, CND, ECIH, EDRP and other Cyber Security related certifications.

Mohan Ram Chandrasekar

Program Director, CCSER

Mohan is a Mission Integrator & Innovator at Forensics, Intelligence, Surveillance and Security Technologies (FISST).

Prof. Tricha Anjali

Associate Professor & Faculty-in-charge Student Exchange & CCSER

Prof. Anjali has been with the Department of Electrical and Computer Engineering at Illinois Institute of Technology, Chicago since 2004.

Ramkumar Ramachandran

Director & CIO, Tevel Cyber Corps Private Limited (formerly Internettechies)

Ram carries 25+ years’ experience in Software Industry, with over 1000+ audits on QMS, ISMS, BCMS and ITSM to his name.

Get In Touch