|Course or Certification Name||Category||Location||Mode of learning|
|Certified Cloud Security Professional||Cloud Computing||24/7 Anywhere||Online self study|
|Systems Security Certified Practitioner (SSCP)||Cloud Computing||24/7 Anywhere||Online self study|
|Information Security||Information Security||24/7 Anywhere||Online self study|
|Advanced AngularJS||Emerging UI & Frontend Technologies||24/7 Anywhere||Online self study|
|Certified Secure Software Lifecycle Professional (CSSLP)||24/7 Anywhere||Online self study|
|Certified Internet Security Auditor (CISA)||CISA||24/7 Anywhere||Online self study|
|Post Graduate Program in Securities Markets||MBA Full-time||Classroom|
|Oracle Database 11g: Security||24/7 Anywhere||Online self study|
|Certified Information Systems Security Professional (CISSP) - Online Self Paced||Cloud Computing||24/7 Anywhere||Online self study|
|Internet of Things Security Expert||Internet of Things||Online Classroom|
|Certified Information Security Manager (CISM)||Information Security||24/7 Anywhere||Online self study|
|Certified Information Systems Security Professional (CISSP)||cissp||Classroom|
|CompTIA Advanced Security Practitioner (CASP)||24/7 Anywhere||Online self study|
|IINS 2.0: Implementing Cisco IOS Network Security||Cisco Security Certifications||24/7 Anywhere||Online self study|
|All in one Advanced Web Development Suite||Web Technologies||24/7 Anywhere||Online self study|
Cloud computing is for understanding cloud security, cloud system management and mitigation strategies. The course scouts aspects of cloud computing architectural design, cloud components, computing characteristics and cloud deployment models. Applicants will also learn problems relating to the management and protection of data assets held on cloud platform. Other topics covered in the course are auditing, legislative impact, ownership, data rights management, threat mitigation and so on. It is designed for information security professionals with three years of information security experience. A globally recognized certification in cloud security, It is perfect for those whose day to day responsibilities include managing cloud environments.
The perfect credential for those who have proven technical skills and expertise in hands-on operational IT positions. It is a globally recognized certification offering the ability to monitor, implement and administer IT infrastructure according to information security policies and procedure that make sure integrity, confidentiality and data availability. In the course, you will learn about main activities like risk management process, risk treatment and maintaining monitoring systems. In addition to this, it covers how to test and analyze malicious activity encompassing malicious code and countermeasures. In the end, you will come across best practices for securing big data systems and virtual environments like attack countermeasures and appliance.
This course on information security establishes concepts of protecting data information assets without getting affected by the way information is formatted, processed, transmitted or stored. The program also involves modules on preventing unauthorized access, modification or destruction of data. The course fee includes INR 300 as courier charges for the study material.
AngularJS is designed to facilitate the development of rich, robust, single-page web applications. Being a client-side framework, AngularJS applications are inherently public and reveal much more implementation detail to the end user than traditional web sites. Securing an AngularJS application is a combination of using best practices on the client side to reduce vulnerability, and knowing that the lion share of security comes from making sure our server is locked down. This course covers concepts involved in securing full stack web applications using AngularJS, from Authentication and Authorization strategies, to the built-in security features AngularJS ships with. AngularJS is designed to facilitate the development of rich, robust, single-page web applications. This course will teach you how to get started building AngularJS applications with using TypeScript. This course will teach you about working with some of the categories of AngularUI, a companion framework to AngularJS, those being AngularUI Bootstrap, NG-Grid, UI-Alias, UI-Select, routing with UI-Router, two categories of AngularUI, a companion framework to AngularJS, those being AngularUI Utilities and AngularUI Modules and working with AngularJS application data in a client browser, by covering concepts such as offline detection and availability, caching, storing data in the client, and creating data models.
The course discovers functional requirements like role and user definitions, deployment environment on requirements and timing requirements. It also includes key security goals which are important to secure software development. Participants will also learn secure software design process like threat modelling, surface evaluation, control identification and prioritization. Besides this, they will be introduced to design consideration to address main security concepts and interconnectivity. Some necessary techniques like peer-based code reviews, anti-tampering techniques and versioning will also be covered. In the end, the course encompasses the best practices for securing ordinarily used structural design and technologies like database, programming and virtualization.
The Certified Information Systems Auditor (CISA) credential demonstrates that the individual possesses a firm understanding of IS audit, control and security skills as set out in the five domains that the Information Systems Audit and Control Association (ISACA)group has created. The CISA credential it recognized worldwide as a high-level certification of proficiency in IS auditing. This learning path will aid learners to prepare for the Certified Information Systems Auditor (CISA) examination.
The Post Graduate Programme in Securities Markets (PGPSM) prepares next generation securities markets professionals with holistic understanding of the markets and essential skills-sets to become Fund Managers, Financial Advisors, Investment Bankers, Analysts, Dealers, Institutional Sales Persons, Product Designers, Operations Managers, Risk Management Officers and Compliance Officers in the securities markets. | This one-year full-time post graduate programme is a unique opportunity for career aspirants in the securities markets to obtain in-depth understanding, both theoretical and practical, from an institute established by the securities markets regulator. The programme is residential to support the academic rigor and encourage peer learning through a myriad of group activities. On completion of PGPSM, the participants would have developed capability to design solutions that meet specific requirements in the securities markets.
Oracle Database is an object-relational database management system produced and marketed by Oracle Corporation. With the objective that every business should identify security threats and concerns and develop policies to protect itself, Oracle Database 11g: Security course aims at providing the candidates with detailed learning modules that will train them on standard security practices related to maintaining integrity of, protecting and controlling data. Database professionals can enhance their skills on how to configure Oracle Database 11g in a secure manner through this course. It also offers comprehensive training on a wide array of topics related to Oracle Database security like proxy authentication, database encryption, Oracle Label Security, Data Masking Pack, Firewalls, SQL*Plus Security, and other related areas. The prerequisite for this course is that learner should have working experience with Oracle Database 11g or have taken the Oracle Database 11g: Administration I and Oracle Database 11g: Administration Workshop II courses.
Certified Information Systems Security Professional (CISSP) is an information security certification that was developed by the International Information System Security Certification Consortium, also known as (ISC)2. This CISSP course was prepared by professional experts and has carefully-designed modules that offer comprehensive learning content covering all the topics that will help candidates in the preparation for the CISSP exam. Offering unlimited online content access for six months, the course will help candidates gain expertise in areas like security principles, security engineering, asset management and network security as per an organisation’s requirements.
Internet of Things Security Expert is a 360° training program for professionals who seek to deepen their knowledge in the field of Internet of Things. The program is customised based on comprehensive knowledge about various IoT Security platforms. This program is designed by the industry experts to provide hands-on training with tools that are used to speed up the training process. | The program is inclusive of full-fledged training, starting from Python, advanced IoT training, to IoT security, all of which are found to be essential for IoT Security Experts. These modules put together will provide a solid foundation and give a further edge in the learning process. | Take 360° Master’s Program training in IoT Security Expert to | Gain expert level knowledge to build, test and deploy applications using Python. Learn suitability of python to use it to write device, gateway and cloud based applications and scripts. | Gain advance level knowledge to architect, build and implement IoT projects from selection of right components to securing the ecosystem using relevant tools and technologies. | Build a security plan, extend security to peripheries, and gain familiarity with fundamental cryptographic algorithms need to safeguard IoT systems.
Certified Information Security Manager (CISM) is a certification for information security managers awarded by ISACA, an international professional association focused on IT Governance. This CISM course has been designed specifically to offer candidates the best-in-the-industry training to play the role of an information security manager | Aimed at providing the requisite learning path for those preparing for the CISM certification, the course offers high-quality online learning content and study materials | The course covers a wide range of topics related to information security like security governance, risk management, compliance, program development and management, and incident management | Providing a career boost, the course follows the 2015 ISACA Candidate Information Guide and candidates will get a course completion certificate
The CISSP certification was the first credential in the field of information security, accredited by the ANSI (American National Standards Institute) to ISO (International Standards Organization) Standard 17024:2003. It is approved by the U.S. Department of Defense (DoD) in both their Information Assurance Technical (IAT) and Managerial (IAM) categories.
This course meets the increasing demand for Advanced IT security in the business. In this course, you will cryptography concepts, tools along with discovering the security implications connected with enterprise storage. Host security also plays a great role in network security. You will learn security controls, end point security solutions and securing virtualized and cloud environments. It is significant to have procedures in place to ensure recovery happens as quickly as possible. With a high demand of information security threats, companies are eager to hire certified people with cybersecurity knowledge. You will be trained with an array of software and hardware so that you can provide the best solutions anywhere in IT.
Designed to be as efficient as classroom training, Cisco IOS Network Security makes it significant for business to focus on the security of the networks. It is also challenging due to increased availability requirements and regulatory requirements. While organizations move their business to the public sector, they have to make certain that the data doesn’t come in front of wrong individuals. The course covers the development of a comprehensive security and different phases of the process and significance of a sound security policy.
Advanced Web Development Suite is a comprehensive training program that equips candidates with the all the necessary tools and techniques of web development with extensive practice in coding of functional web applications. With the continuous advancement in the Internet the need to develop search engine friendly pages is on the rise. Employers are now seeking trained web developers who are capable of making the website accessible user friendly for a huge audience.