SECURITY CYBER - Apache2 Ubuntu Default Page: It Works

Transcription

Certificate inCYBERSECURITYLearn with Thebest cyber securityprofessionalsApplyIn Cyber LabsPlacementAssistance1.Access to CompTIA Cyber LABS2.Ethical Hacking- Live Penetration Testing Modules Included3.CISCO based networking Modules from BasicsAuthorized Delivery Partner

Cyber Security isbound to be one of the biggest careeropportunity of this decade!Computer NetworksApplications or MobileFinance, Energy or RetailEveryone,EverywhereNeedsRepresentative Salary RangeCyber Security Analyst20 Lacs2017 LacsSalary (in INR Lacs)CYBER SECURITY251510 Lacs106 Lacs500-2 Years3-7 Years8-12 Years 13 Years

CurriculumCyber SecurityModulesSecurity TechnologyBrief CoverageServices-switch, routers,Secure network channels, Firewall, NIDPS,VPN,SWG,Perimeter security,Cyber defense,Defensive techniques, Production security,securing production security server securityEndpoint SecurityEnd points,Types,End point attack,End pointprotection solutions,Advance end pointsecurity, End point technologyEmail Security & Data SecurityAdvance email protection,Data security basics,Data protection principles,Data securitytech,Data security standards,Mobile Security & Wireless SecurityMDM Technology,Secure enterpriseMobile device solution, Wireless Networking,RSN,Threats and vulnerabilities, Wlan securitycountermeasuresSecurity Service- IAAS PAAS SAASIntroduction to IAAS,IAAS Pros & Cons, PAASModel, Paas Coverage, Paas EnvironmentTypes, Paas types-advantages. SAASFundamentals,SAAS benefitsCyber Attacks Ethical Hacking MalwaresBackground of cyber attacks,Classfication,Malware types- Ransomware,Phising ,spoofinIndustry Breaches & OWASPTop10, SANS 25Exploitation, Identity theft,Cyber stalking,Casestudy- Industry, Applications security risk,SANSMost dangerous software errorsSecure Coding & SecureDevelopmentSecuring coding controls, Secure codingreview, secure software developmentplan, Software development strategiesIdentity, Entitlement, and AccessManagementIAM Standards , architecture. Managing usersand identities for cloud computing, entitle andaccess management, Privileged usermanagement,SOC BasicsSecurity operations centre, SIEM Technology,Design , architecture of SOC,SOC ObjectivesGRCGRC Technology, Management plane, BCP &DR,NIST, PCI-DSS, ISO,CSI Benchmarks, MITREAttack Framework, CVE, HIPAA,GDPR,SOX act,Cyber Lab & Case StudiesNetwork security hands on using Packet tracerLive Hands on experience on Vulnerabilityscanning. Demonstrative learning of Penetrationtesting or ethical hacking. Simulation on SIEMQ Radar Tool. Cloud security Hands on with AWS

FacultyProfileKapilThe NetworkExpert- 10 years of experience in Security Field- Senior Information and Network Security Analyst- Trained 5000 students for various certifications- Author for various publications including Packt*Full Names of cyber security professionals cannot be revealed due to security reasonsHarshThe SecurityArchitect- 9 Years experience in penetration testing, SOC,Architecture & Network security- Experience in Risk & Governance- Worked with leading companies like Reliance, WIPRO- Experience with new age technologies like cloud &IOT Security

FeaturesSalientIIIIIIIVVVIPrepares you for network security andcyber security analyst rolesAccess to cyber labs- Networking-VA PT CasesModules on New tech- Cloud security & SOCCertification from NSDCLearn with Cyber security specialists with morethan 10 Years experiencePlacement Assistance From Day OneCertification

sliateDesruoCDelieveryOnline ; Live Instructor Lead Training80Hrs of Blendedlearning across2 monthsStudents from any stream can pursue the program.Basic computer proficiency is desirable.ABOUT PROSCHOOLLEADING COMPANY FOR PROFESSIONAL STUDIES› Data Science programs have been consistently ranked among the top 4› Ranked among top 10 leaders in Finance and Accounting› Training partners with CFA, CIMA, ACCA and NSE› Approved training partners of National Skill Development Corporation› Trained over 50,000 students in last 10 yearsOTHER PROGRAMSAnalytics : Business Analytics PGD in Data Science Certificate in Data ScienceMarketing : Digital MarketingFinance Analyst : CFA Program Financial Modeling PGP- IBCM CFPCM CertificationManagement Accounting : CIMA PGP in Management AccountingAccounting : ACCA IFRSFor Enquiries Contact:T: 09892517572 / 07045734304E: lvc@proschoolonline.comwww.proschoolonline.comsU tuobAIMS has been ranked as one of the Most Trusted education brands in the country.IMS Proschool enjoys the same trust as it delivers practical skills and knowledge tomake students job ready. Our programs are built on three pillars: InternationalQuality; Affordable Cost and Shortest Time.

Ethical Hacking- Live Penetration Testing Modules Included Access t o CompTIA Cyber L ABS CISCO based networking Modules fr om Basics . Introduction to IAAS,IAAS Pros & Cons, PAAS Model, Paas Coverage, Paas Environment . Live Hands on experience on Vulnerability scanning. Demonstrative learning of Penetration