Post Graduate Program in CYBER SECURITY

11
Triple the value of your college education iibm internships Job Linked CYBER SECURITY Post Graduate Program in Placement

Transcript of Post Graduate Program in CYBER SECURITY

Triple the value of your collegeeducation

iibm internships

Job Linked

CYBER SECURITY

Post Graduate Program in

Placement

Edtech Company Since 2008

25,000+ Learners

450+ Employees

40+ Courses

1,20,000 Sq. Ft. Infrastructure

Member of AIMA, MMA,CII, D&B, FIEO

CURRICULUMEXPERIENTIAL LEARNING Engaging case studies, projects, for e�ective learning.

EMPLOYMENTASSISTANCE

CAREER SERVICES Career support through mock interviews, resume building andinterview preparation workshops.

PLACEMENT ASSURANCE Guaranteed interview oppurtunities with leading companies andstartups.

TECH- ENABLEDLEARNING

SMART CLASSROOM Learning in technologically- augmented classrooms, enhanced withlive lecture recording.

LMS Exclusive access to IIBM learning portal for additional learning andassessments.

INDUSTRYCONNECT

INDUSTRY MENTORSHIP Dedicated industry leaders to guide you through career- related queries.

ABOUT US

WHY THIS PROGRAM WITH IIBM

Awards 2019 for most ‘’Reliable OnlineEducation & Training Institute.’’

winner by ‘’BBC Knowledge’’ 2017 atTaj Lands End Mumbai.

‘’Education Leadership Award 2018’’ for Innovation by most ‘’Promising Online Education & Training Institute.’’

‘’Pride of Indian Education Awards’’ for ‘’ Best Online Institute for Management Courses 2019.’’

“Global Education Awards 2018” for ‘’Emerging Management EducationOnline Solution.’’

‘’ World Education Award 2017 ‘’ winner in ‘’Innovation by Management Institute. ‘’

‘’ Indian Education Congress Award’’ winner for ’’ Excellence in Distance Learning

Education ‘’ 2017.

“ Higher Education Review Institute of the year 2016 ”

from ‘’Higher Education Review’’ for providing excellent oppurtunity to management students.

‘’Education Leadership Award’’ ‘’National Education Excellence’’

n Google News

h�p://www.newspatrolling.com/how-much-will-make-with-iibm-ins�tute-post-graduate-

program-in-data-science/

h�ps://m.dailyhunt.in/news/india/english/news+patrolling-epaper-

h�p://www.glamourtreat.com/2020/10/how-much-will-you-make-with-iibm.html

h�ps://www.newsproject.in/this-course-can-help-anyone-land-a-plum-job-applying-data-science-to-

business-problems/

h�ps://www.newswireonline.com/the-program-aims-to-offer-the-best-learning-along-with-

amazing-career-transi�ons/

h�ps://www.madhyapradesh�mes.in/land-in-a-perfect-money-making-job-with-iibm-ins�tutes-

post-graduate-program-in-data-science/

h�p://www.southasianewsnetwork.com/iibm-ins�tute-has-been-a-pioneer-in-realising-the-poten�al-of-candidates-in-the-data-science-

domain/

h�ps://pressreleasesindia.in/index.php/2020/10/05/iibm-placement-star�ng-salary-for-freshers/

h�ps://www.newsforest.co.in/iibm-post-gradua�on-in-data-science-a-great-opportunity/

h�p://www.indiapresshub.com/iibm-offers-a-wide-range-of-courses-including-data-science/

h�ps://indianewshub.in/data-science-program-offered-by-iibm/

h�ps://www.newsplane�ndia.com/data-science-and-ai-courses-provided-by-iibm/

h�ps://24x7newsonline.in/earn-a-degree-with-iibm-in-data-science-courses/

h�ps://www.prre.in/top-training-in-data-science-provided-by-iibm/

h�ps://toptrendsnews.in/op�mised-learning-outcomes-by-iibm/

h�ps://www.bulle�npost.in/iibm-cu�ng-edge-machine-learning-program-offers-online-classes-

as-well/

h�ps://www.newsgaze�e.co.in/data-science-curriculum-by-iibm-a-great-opportunity-for-

students/

h�ps://scrolliq.com/variety-of-courses-offered-by-iibm-proves-to-be-a-great-learning-experience/

AWARDS AND ACCOLADES

MEDIA COVERAGE

Press Release Submission Report

Press Release Submission Report

Assistance

- Provide unparalled support and guidance.

MENTORSHIP

CAREER DEVELOPMENT

Our Industry mentor and a dedicated placement team will guide you with :

- Help execute in- class assignments and case studies.- Discuss & identify learning gaps and other solutions such as refresher sessions and one-on-one project feedback.

CAREER ASSISTANCE

ACADEMIC ASSISTANCE

- Maintain close interaction with students during the career assistance and placements phase of the program.

- Talk you through industry insights and best practices.- Provide you with interview tips and job search advice.

MONITOR PROGRESS - Set learning Goals.

- Discuss your progress status with trainers and other industry mentors on a regular basis to ensure consistent advancement.

CAREERASSISTANCE

Dedicated Placement Team

Career Assistance

Videos

Live Sessions

Doubt Clearing sessions

CV/Resume Preparation

Placement Portal for Job Oppurtunities

100 % JOB PLACEMENT

Placement Mentor

Experienced Learning Experts

MockInterviews

CERTIFICATION

On completion of the Post Graduate Program in Cyber Security, aspirants will receive an Industry-endorsed Certi�cate along with Internship Certi�cate.

PG PROGRAM CERTIFICATE

INTERNSHIP CERTIFICATE

Has satisfactorily and successfully completed

C E R T I F I C AT E I D M O N T H - Y E A R

IIBM Institute of Business Management

This is to certify that

G20/07/DL1234 July - 2020

Has successfully completed training program

Malay Kumar Ghosh

POST GRADUATE PROGRAM IN

P R O G R A M D I R E C T O R

Certificate of Achievement

and study requirements of the Institute and awarded

CYBER SECURITY

C E R T I F I C AT E I D M O N T H - Y E A R

IIBM Institute of Business Management

Internship Certificate

This is to certify that

G20/07/DL1234 July - 2020

inHas successfully completed six months Internship Program

Malay Kumar Ghosh

P R O G R A M D I R E C T O R

CYBER SECURITY

COURSE HIGHLIGHTS

*18 % GST Extra

Rs. 25,000Rs. 35,000

1.

2.

3.

4.

5.

6.

7.

8.

9.

14.

11.

Video Tutorials

Live Classes Teaching

In Class Capstone Projects

LMS Capstone Projects

Resume Making Facility

100% Job Placement

Doubt Clearing Sessions

Career Assistance Videos

Post Graduate Program Certi�cation Provided

Internship Certi�cate Provided

Learn From Home Any Time Yes

150 - 200 Hours

100+ Hours

Yes

Yes

Yes

Yes

20 Hours

No

No

No

No

YesNo

10. Career Assistance Live Sessions YesNo

No

No

Yes

3-5No

1 5-8

Internship + PostGraduate Program in Cyber Security

Free Internship

Yes

12. EMI Option

Free Yes

13.

15.

16. No Yes

Course Duration

2 Weeks 6 Months

Expected CTC

- 3-5 lacs

Mentorship by Expert

COURSE FEES

Placement

CYBER SECURITY

2

2

2 2

CURRICULUM -

Introduction toCyber Security

Module Cyber Security

Introduction to Ethical Hacking I Foot Printing I Scanning and Enumeration I Hacking Web Servers & Web Applications I Session Hijacking I SQL Injection I Evading Firewalls, IDS & Honeypots What is a Firewall I Bu�er Over�ow I Denial of Service I Cryptography ISystem Hacking I Sni�ers I Phishing I Malware I Wireless Hacking I Kali Linux I Testing I Counter Measure Techniques for Network level attacks I Counter Measure Techniques for Local Systems I Counter Measure Techniques for Malware Attacks

Comptia Security +Attacks, Threats, and Vulnerabilities | Architecture and Design | Implementation |Operations and Incident Response | Governance, Risk, and compliance | Technologies and Tools

Python

Command line and development environment setup I Python Basics ,opeartors &calculation I All about strings I All about Conditions and loops I List I Tuplets I Dictionary and Data Modelling I Sets I List Compension I Dictionary Compension and sets Compensions I Advanced Flexible Functions I Lambada Expression I Advanced built in function I Decorator I Generator I OOP Basics I OOP AdvanceWorking with �les I Working with csv �les I Python Modules I First project I Second Project I Gui Programming with Tkinter I Third Project Gui application I Fourth project Gui application I Web Scrapping I Fifth project Gui application I Data base in python I Sixth project Gui application I Seventh project Gui application I Workingwith pdf �les I Regular expression I Cryptography I One or more Gui appilication

Comptia Network +

Introduction to Networks I The Open Systems Interconnection Speci�cations I Networking Topologies, Connectors, and Wiring Standards I The Current Ethernet Speci�cations I Networking Devices I Introduction to the Internet Protocol I IP Addressing I IP Subnetting, Troubleshooting IP I Introduction to IP Routing I Routing Protocols I Switching and Virtual LANs I Wireless Networking I Authentication and Access Control I Network Threats and Mitigation I Physical Security and Risk I Wide Area Networks I Troubleshooting Tools I Software and Hardware Tools I Network Troubleshooting I Management, Monitoring and Optimization

Oracle SQL

DBMS Concepts I Introduction to Oracle I SQL(Standard Query Language) I SQL Commands I Writing the Basics of SQL Statement I Operators are used in select statements I Built in function I Method for converting detail data to summarized data I Constraints I Joins I Subqueries I Joins | Subqueries I Sequences I Index | views (simple view and complex view) , Metarialized views ,synornoms

Introduction I Cursors I Exceptions I Subprograms I Types used in Packages I BulkBind I Refcursor I UTL File Packages I SQL Loader I TriggersPLSQL

Introduction to Ethical Hacking | Foot Printing I Scanning and Enumeration I Hacking Web Servers & Web Applications I Session Hijacking I SQL Injection | Evading Firewalls, IDS & Honeypots What is a Firewall I Bu�er Over�ow I Denial of Service I Cryptography I System Hacking I OT Security I Sni�ers I Phishing I MalwareWireless Hacking I Kali Linux I Advance pentest I Testing I Counter Measure I Techniques for Network level attacks I Counter Measure Techniques for Local Systems I Counter Measure Techniques for Malware Attacks

CEH

TOOLS COVERED

CISM

Module Cyber Security

Information Security Governance | Information Risk Management & Compliance |Information Security Program Development & Management | Information SecurityIncident Management

CISSP DOMAIN

Introduction to Security and Risk Management | Asset Security | Security Architecture and Engineering | Communication and Network Security I Identity and Access Management (IAM) I Security Assessment and Testing | Security Operations | Software Development Security

Cloud Security

Fundamentals of Cloud Computing and Architectural Characteristics | Security Design and Architecture for Cloud Computing | Secure Isolation of Physical & Logical Infrastructure I Data Protection for Cloud Infrastructure and Services I Enforcing Access Control for Cloud Infrastructure based Services I Monitoring, Auditing and Management | Introduction to Cloud Design Patterns | Introduction to Identity Management in Cloud Computing | Cloud Computing Security Design Patterns – I | Cloud Computing Security Design Patterns – II | Policy, Compliance & Risk Management in Cloud Computing | Cloud Compliance Assessment & Reporting - Case Study | Cloud Service Providers – Technology Review | Wrap Up & Final Projects Review

CAPSTONE PROJECTS

Cyber Security Capstone Projects

WHO SHOULD ENROLL Individuals in the following roles and disciplines are ideal for this course:

Project 1 Python Project for Beginners – Alarm Clock with GUI

Uni�ed Threat Management Project

Student Database Management (DBMS) Projects using Oracle

Password Generator Python Project

User Management project(Security )

Authentication , Authorization and Integrity Project

Project 2

Project 3

Project 4

Project 5

Project 6

Hotel Management project single sign on Project 7

All levels of IT auditor/penetration testerSecurity consultants/managersIT directors/managers/consultantsSecurity auditors/architectsSecurity systems engineersChief information security o�cers (CISOs)Chief compliance/privacy/risk o�cersNetwork specialists, analysts, managers, architects, consultants or administratorsTechnical support engineersSystems analysts or administrators

DIVERSE JOB POSITIONS

PROGRAM FACULTY AND TRAINERS

MOHAMMED ZEESHAN FAROOQ

Senior IT Security Trainer & Acting Director of IT department at Value Consulting. Additionally had been training Security (Security+, Security Awareness, CEH, CASP etc.), Networking (A+,N+CCNA etc, Programming (Java,Asp.net etc) & Database(Oracle, MS SQL etc.) courses. Teaching/Training Experience – 11 years 4 months Quali�cations : B.Tech (CSIT)

Security Specialist

Security Analyst

Security Administrator

Security Auditor

Security Manager

Security Engineer

Computer Technology Instructor with extensive experience in Network Administration, Project Management and Quality Management.

Introduction to Ethical Hacking | Foot Printing I Scanning and Enumeration I Hacking Web Servers & Web Applications I Session Hijacking I SQL Injection | Evading Firewalls, IDS & Honeypots What is a Firewall I Bu�er Over�ow I Denial of Service I Cryptography I System Hacking I OT Security I Sni�ers I Phishing I MalwareWireless Hacking I Kali Linux I Advance pentest I Testing I Counter Measure I Techniques for Network level attacks I Counter Measure Techniques for Local Systems I Counter Measure Techniques for Malware Attacks

TRAINER

He has trained more than 500 teachers on Engineering Peadagogy and Digital Trasformation. He guided nearly 60 PG projects and 40 UG projects. He dealt teaching engineering to approximately 1500 students in his teaching career.

ANOOP MATHEW

Quali�cations : M.B.A(Marketing & Finance )

DEVENDRA KUMAR

PLACEMENT MENTORS

He is an extra ordinary performer in the �eld of Training & Placements from last 8 years . He has worked with many well known colleges/Universities, Has got exceptional performance award in the domain of students career counseling and mentoring. With high level of networking in corporates.

ALUMNI IN THE INDUSTRY

IIBM INSTITUTE OF BUSINESS MANAGEMENTwww.iibminternships.com

1. After enrollment, if there will be any issue with registration, within 3 days candidate can take their refund back. After 3 days, the refund will not be given.2. IIBM Institute Of Business Management reserves the right to withdraw candidate’s registration with no fee refund, If any misconduct done by the candidate.3. All programs are o�ered on a non-credit basis and are not transferable to a degree.

DISCLAIMER: