Post Graduate Program in CYBER SECURITY
Transcript of Post Graduate Program in CYBER SECURITY
Triple the value of your collegeeducation
iibm internships
Job Linked
CYBER SECURITY
Post Graduate Program in
Placement
Edtech Company Since 2008
25,000+ Learners
450+ Employees
40+ Courses
1,20,000 Sq. Ft. Infrastructure
Member of AIMA, MMA,CII, D&B, FIEO
CURRICULUMEXPERIENTIAL LEARNING Engaging case studies, projects, for e�ective learning.
EMPLOYMENTASSISTANCE
CAREER SERVICES Career support through mock interviews, resume building andinterview preparation workshops.
PLACEMENT ASSURANCE Guaranteed interview oppurtunities with leading companies andstartups.
TECH- ENABLEDLEARNING
SMART CLASSROOM Learning in technologically- augmented classrooms, enhanced withlive lecture recording.
LMS Exclusive access to IIBM learning portal for additional learning andassessments.
INDUSTRYCONNECT
INDUSTRY MENTORSHIP Dedicated industry leaders to guide you through career- related queries.
ABOUT US
WHY THIS PROGRAM WITH IIBM
Awards 2019 for most ‘’Reliable OnlineEducation & Training Institute.’’
winner by ‘’BBC Knowledge’’ 2017 atTaj Lands End Mumbai.
‘’Education Leadership Award 2018’’ for Innovation by most ‘’Promising Online Education & Training Institute.’’
‘’Pride of Indian Education Awards’’ for ‘’ Best Online Institute for Management Courses 2019.’’
“Global Education Awards 2018” for ‘’Emerging Management EducationOnline Solution.’’
‘’ World Education Award 2017 ‘’ winner in ‘’Innovation by Management Institute. ‘’
‘’ Indian Education Congress Award’’ winner for ’’ Excellence in Distance Learning
Education ‘’ 2017.
“ Higher Education Review Institute of the year 2016 ”
from ‘’Higher Education Review’’ for providing excellent oppurtunity to management students.
‘’Education Leadership Award’’ ‘’National Education Excellence’’
n Google News
h�p://www.newspatrolling.com/how-much-will-make-with-iibm-ins�tute-post-graduate-
program-in-data-science/
h�ps://m.dailyhunt.in/news/india/english/news+patrolling-epaper-
h�p://www.glamourtreat.com/2020/10/how-much-will-you-make-with-iibm.html
h�ps://www.newsproject.in/this-course-can-help-anyone-land-a-plum-job-applying-data-science-to-
business-problems/
h�ps://www.newswireonline.com/the-program-aims-to-offer-the-best-learning-along-with-
amazing-career-transi�ons/
h�ps://www.madhyapradesh�mes.in/land-in-a-perfect-money-making-job-with-iibm-ins�tutes-
post-graduate-program-in-data-science/
h�p://www.southasianewsnetwork.com/iibm-ins�tute-has-been-a-pioneer-in-realising-the-poten�al-of-candidates-in-the-data-science-
domain/
h�ps://pressreleasesindia.in/index.php/2020/10/05/iibm-placement-star�ng-salary-for-freshers/
h�ps://www.newsforest.co.in/iibm-post-gradua�on-in-data-science-a-great-opportunity/
h�p://www.indiapresshub.com/iibm-offers-a-wide-range-of-courses-including-data-science/
h�ps://indianewshub.in/data-science-program-offered-by-iibm/
h�ps://www.newsplane�ndia.com/data-science-and-ai-courses-provided-by-iibm/
h�ps://24x7newsonline.in/earn-a-degree-with-iibm-in-data-science-courses/
h�ps://www.prre.in/top-training-in-data-science-provided-by-iibm/
h�ps://toptrendsnews.in/op�mised-learning-outcomes-by-iibm/
h�ps://www.bulle�npost.in/iibm-cu�ng-edge-machine-learning-program-offers-online-classes-
as-well/
h�ps://www.newsgaze�e.co.in/data-science-curriculum-by-iibm-a-great-opportunity-for-
students/
h�ps://scrolliq.com/variety-of-courses-offered-by-iibm-proves-to-be-a-great-learning-experience/
AWARDS AND ACCOLADES
MEDIA COVERAGE
Press Release Submission Report
Press Release Submission Report
Assistance
- Provide unparalled support and guidance.
MENTORSHIP
CAREER DEVELOPMENT
Our Industry mentor and a dedicated placement team will guide you with :
- Help execute in- class assignments and case studies.- Discuss & identify learning gaps and other solutions such as refresher sessions and one-on-one project feedback.
CAREER ASSISTANCE
ACADEMIC ASSISTANCE
- Maintain close interaction with students during the career assistance and placements phase of the program.
- Talk you through industry insights and best practices.- Provide you with interview tips and job search advice.
MONITOR PROGRESS - Set learning Goals.
- Discuss your progress status with trainers and other industry mentors on a regular basis to ensure consistent advancement.
CAREERASSISTANCE
Dedicated Placement Team
Career Assistance
Videos
Live Sessions
Doubt Clearing sessions
CV/Resume Preparation
Placement Portal for Job Oppurtunities
100 % JOB PLACEMENT
Placement Mentor
Experienced Learning Experts
MockInterviews
CERTIFICATION
On completion of the Post Graduate Program in Cyber Security, aspirants will receive an Industry-endorsed Certi�cate along with Internship Certi�cate.
PG PROGRAM CERTIFICATE
INTERNSHIP CERTIFICATE
Has satisfactorily and successfully completed
C E R T I F I C AT E I D M O N T H - Y E A R
IIBM Institute of Business Management
This is to certify that
G20/07/DL1234 July - 2020
Has successfully completed training program
Malay Kumar Ghosh
POST GRADUATE PROGRAM IN
P R O G R A M D I R E C T O R
Certificate of Achievement
and study requirements of the Institute and awarded
CYBER SECURITY
C E R T I F I C AT E I D M O N T H - Y E A R
IIBM Institute of Business Management
Internship Certificate
This is to certify that
G20/07/DL1234 July - 2020
inHas successfully completed six months Internship Program
Malay Kumar Ghosh
P R O G R A M D I R E C T O R
CYBER SECURITY
COURSE HIGHLIGHTS
*18 % GST Extra
Rs. 25,000Rs. 35,000
1.
2.
3.
4.
5.
6.
7.
8.
9.
14.
11.
Video Tutorials
Live Classes Teaching
In Class Capstone Projects
LMS Capstone Projects
Resume Making Facility
100% Job Placement
Doubt Clearing Sessions
Career Assistance Videos
Post Graduate Program Certi�cation Provided
Internship Certi�cate Provided
Learn From Home Any Time Yes
150 - 200 Hours
100+ Hours
Yes
Yes
Yes
Yes
20 Hours
No
No
No
No
YesNo
10. Career Assistance Live Sessions YesNo
No
No
Yes
3-5No
1 5-8
Internship + PostGraduate Program in Cyber Security
Free Internship
Yes
12. EMI Option
Free Yes
13.
15.
16. No Yes
Course Duration
2 Weeks 6 Months
Expected CTC
- 3-5 lacs
Mentorship by Expert
COURSE FEES
Placement
CYBER SECURITY
2
2
2 2
CURRICULUM -
Introduction toCyber Security
Module Cyber Security
Introduction to Ethical Hacking I Foot Printing I Scanning and Enumeration I Hacking Web Servers & Web Applications I Session Hijacking I SQL Injection I Evading Firewalls, IDS & Honeypots What is a Firewall I Bu�er Over�ow I Denial of Service I Cryptography ISystem Hacking I Sni�ers I Phishing I Malware I Wireless Hacking I Kali Linux I Testing I Counter Measure Techniques for Network level attacks I Counter Measure Techniques for Local Systems I Counter Measure Techniques for Malware Attacks
Comptia Security +Attacks, Threats, and Vulnerabilities | Architecture and Design | Implementation |Operations and Incident Response | Governance, Risk, and compliance | Technologies and Tools
Python
Command line and development environment setup I Python Basics ,opeartors &calculation I All about strings I All about Conditions and loops I List I Tuplets I Dictionary and Data Modelling I Sets I List Compension I Dictionary Compension and sets Compensions I Advanced Flexible Functions I Lambada Expression I Advanced built in function I Decorator I Generator I OOP Basics I OOP AdvanceWorking with �les I Working with csv �les I Python Modules I First project I Second Project I Gui Programming with Tkinter I Third Project Gui application I Fourth project Gui application I Web Scrapping I Fifth project Gui application I Data base in python I Sixth project Gui application I Seventh project Gui application I Workingwith pdf �les I Regular expression I Cryptography I One or more Gui appilication
Comptia Network +
Introduction to Networks I The Open Systems Interconnection Speci�cations I Networking Topologies, Connectors, and Wiring Standards I The Current Ethernet Speci�cations I Networking Devices I Introduction to the Internet Protocol I IP Addressing I IP Subnetting, Troubleshooting IP I Introduction to IP Routing I Routing Protocols I Switching and Virtual LANs I Wireless Networking I Authentication and Access Control I Network Threats and Mitigation I Physical Security and Risk I Wide Area Networks I Troubleshooting Tools I Software and Hardware Tools I Network Troubleshooting I Management, Monitoring and Optimization
Oracle SQL
DBMS Concepts I Introduction to Oracle I SQL(Standard Query Language) I SQL Commands I Writing the Basics of SQL Statement I Operators are used in select statements I Built in function I Method for converting detail data to summarized data I Constraints I Joins I Subqueries I Joins | Subqueries I Sequences I Index | views (simple view and complex view) , Metarialized views ,synornoms
Introduction I Cursors I Exceptions I Subprograms I Types used in Packages I BulkBind I Refcursor I UTL File Packages I SQL Loader I TriggersPLSQL
Introduction to Ethical Hacking | Foot Printing I Scanning and Enumeration I Hacking Web Servers & Web Applications I Session Hijacking I SQL Injection | Evading Firewalls, IDS & Honeypots What is a Firewall I Bu�er Over�ow I Denial of Service I Cryptography I System Hacking I OT Security I Sni�ers I Phishing I MalwareWireless Hacking I Kali Linux I Advance pentest I Testing I Counter Measure I Techniques for Network level attacks I Counter Measure Techniques for Local Systems I Counter Measure Techniques for Malware Attacks
CEH
TOOLS COVERED
CISM
Module Cyber Security
Information Security Governance | Information Risk Management & Compliance |Information Security Program Development & Management | Information SecurityIncident Management
CISSP DOMAIN
Introduction to Security and Risk Management | Asset Security | Security Architecture and Engineering | Communication and Network Security I Identity and Access Management (IAM) I Security Assessment and Testing | Security Operations | Software Development Security
Cloud Security
Fundamentals of Cloud Computing and Architectural Characteristics | Security Design and Architecture for Cloud Computing | Secure Isolation of Physical & Logical Infrastructure I Data Protection for Cloud Infrastructure and Services I Enforcing Access Control for Cloud Infrastructure based Services I Monitoring, Auditing and Management | Introduction to Cloud Design Patterns | Introduction to Identity Management in Cloud Computing | Cloud Computing Security Design Patterns – I | Cloud Computing Security Design Patterns – II | Policy, Compliance & Risk Management in Cloud Computing | Cloud Compliance Assessment & Reporting - Case Study | Cloud Service Providers – Technology Review | Wrap Up & Final Projects Review
CAPSTONE PROJECTS
Cyber Security Capstone Projects
WHO SHOULD ENROLL Individuals in the following roles and disciplines are ideal for this course:
Project 1 Python Project for Beginners – Alarm Clock with GUI
Uni�ed Threat Management Project
Student Database Management (DBMS) Projects using Oracle
Password Generator Python Project
User Management project(Security )
Authentication , Authorization and Integrity Project
Project 2
Project 3
Project 4
Project 5
Project 6
Hotel Management project single sign on Project 7
All levels of IT auditor/penetration testerSecurity consultants/managersIT directors/managers/consultantsSecurity auditors/architectsSecurity systems engineersChief information security o�cers (CISOs)Chief compliance/privacy/risk o�cersNetwork specialists, analysts, managers, architects, consultants or administratorsTechnical support engineersSystems analysts or administrators
DIVERSE JOB POSITIONS
PROGRAM FACULTY AND TRAINERS
MOHAMMED ZEESHAN FAROOQ
Senior IT Security Trainer & Acting Director of IT department at Value Consulting. Additionally had been training Security (Security+, Security Awareness, CEH, CASP etc.), Networking (A+,N+CCNA etc, Programming (Java,Asp.net etc) & Database(Oracle, MS SQL etc.) courses. Teaching/Training Experience – 11 years 4 months Quali�cations : B.Tech (CSIT)
Security Specialist
Security Analyst
Security Administrator
Security Auditor
Security Manager
Security Engineer
Computer Technology Instructor with extensive experience in Network Administration, Project Management and Quality Management.
Introduction to Ethical Hacking | Foot Printing I Scanning and Enumeration I Hacking Web Servers & Web Applications I Session Hijacking I SQL Injection | Evading Firewalls, IDS & Honeypots What is a Firewall I Bu�er Over�ow I Denial of Service I Cryptography I System Hacking I OT Security I Sni�ers I Phishing I MalwareWireless Hacking I Kali Linux I Advance pentest I Testing I Counter Measure I Techniques for Network level attacks I Counter Measure Techniques for Local Systems I Counter Measure Techniques for Malware Attacks
TRAINER
He has trained more than 500 teachers on Engineering Peadagogy and Digital Trasformation. He guided nearly 60 PG projects and 40 UG projects. He dealt teaching engineering to approximately 1500 students in his teaching career.
ANOOP MATHEW
Quali�cations : M.B.A(Marketing & Finance )
DEVENDRA KUMAR
PLACEMENT MENTORS
He is an extra ordinary performer in the �eld of Training & Placements from last 8 years . He has worked with many well known colleges/Universities, Has got exceptional performance award in the domain of students career counseling and mentoring. With high level of networking in corporates.
ALUMNI IN THE INDUSTRY
IIBM INSTITUTE OF BUSINESS MANAGEMENTwww.iibminternships.com
1. After enrollment, if there will be any issue with registration, within 3 days candidate can take their refund back. After 3 days, the refund will not be given.2. IIBM Institute Of Business Management reserves the right to withdraw candidate’s registration with no fee refund, If any misconduct done by the candidate.3. All programs are o�ered on a non-credit basis and are not transferable to a degree.
DISCLAIMER: