|Course or Certification Name||Category||Location||Mode of learning|
|Vskills Certified Cyber Security Analyst Government Certification||Cyber Security||Offline self study|
|PG Certificate in Information and Cyber Security||Cyber Security||Classroom|
|Cyber Security For Normal People: Protect Yourself Online||Cyber Security||24/7 Anywhere||Online self study|
|Postgraduate Diploma in Cyber Security||Cyber Security||Classroom|
|K.K. Modi - Cyber Security Certification||Online Classroom|
|CISSP (Online Classroom - Flexi Pass)||cissp||Online Classroom|
|Senior Software Architect Masters - 200+ courses||Emerging Web Technologies||24/7 Anywhere||Online self study|
|Software Masters Program- 200+ courses||Emerging Web Technologies||24/7 Anywhere||Online self study|
|Executive Post Graduate Certificate in Information Technology Management & Analytics||Data Analysis||Online Classroom|
|PG Certificate in Digital Marketing and Social Media Analytics||Digital||Classroom|
|PG Diploma in IT Infrastructure, Systems and Security (PG-DITISS)||Cloud Computing||Classroom|
|Certified Information Systems Security Professional (CISSP)||cissp||Classroom|
|Certified Cloud Security Professional||Cloud Computing||24/7 Anywhere||Online self study|
|Certified Information Systems Security Professional (CISSP) - Online Self Paced||Cloud Computing||24/7 Anywhere||Online self study|
|Systems Security Certified Practitioner (SSCP)||Cloud Computing||24/7 Anywhere||Online self study|
This certification institutes & enhances awareness of aspirants as per the company need for cyber security and forensics. Knowledge acquired by the certification includes cybercrime, IT Act 2000, cyber offenses, wireless devices cybercrime, phishing, keyloggers, backdoors, SQL injection, DDoS attacks, identity theft, computer and wireless forensics, cyber terrorism, social media marketing, incident handling and privacy.
N L Dalmia Institute of Management Studies & Research offers the first of it’s kind in India –6 months post-graduation certificate in Information and Cyber Security | The course divided into three stages, gives the students a unique opportunity to develop their careers in ethical hacking and cyber security. The course is a perfect fit for students with a strong engineering/sciences background in computer sciences and information technology. The course would holistically cover everything right from the basics of penetration testing to cyber laws.
This course outlines a step-by-step roadmap that you can follow to build a tight wall of security around your digital life.
Information security can be defined as the protection of information and information systems from unauthorised access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability. Today, Information Security is becoming a function of increasing importance for the continued operation of commercial entities. The increasing level of interconnectedness of information networks and the reliance of business models on this interconnectedness has resulted in a network currently (the Internet) that has over a yottabyte of information stored, much of which is unsecured. This continuing trend is predicted to strongly increase the importance of Information Security within most multinational entities
The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever want to be in
Certified Information Systems Security Professional (CISSP) training facilitates the learning and knowledge in designing, building, and maintaining a secure business environment using globally approved Information Security standards. The aim of the course is to develop expertise in architecture, and design of security and earn the 30 CPEs required for the CISSP certification exam. IT Security professionals such as Security Consultants and Managers, IT Directors and Managers, and Security Auditors and Architects are best suited for this course enhancing their skills and knowledge on business continuity planning & disaster recovery planning vital for the smooth running of any organization
Executive Post Graduate Certificate in Information Technology Management and Analytics (EPGCITMA)is conceived with the idea of providing specialized learning in the specific business function of information technology. Information and communication technologies are driving developments in several business sectors | This provides immense opportunities for modern day managers to understand practice and innovate with these new systems and processes driving business growth. Adequate exposure to this road to success is rapidly becoming a prerequisite in modern day business management. This program is designed to equip the managers with the necessary tool set needed to seize this opportunity
The Post Graduate Certificate in Digital Marketing is a career centric course launched by the institute which will prepare students to work in the ever-growing domain | The focus of the course will be to give emphasise on areas like Search Engine Marketing (SEM, PPC) ,Website Planning & Creation, Content Marketing, Email Marketing, Online Advertising, Social Media Marketing
The theoretical and practical mix of the Post Graduate Diploma in IT Infrastructure Systems and Security (PG-DITISS) programme has the following focus: | To explore the fundamental concepts of Cyber Security | To develop in-depth knowledge and understanding of the Intrusion Detection and Prevention domain. | To learn to analyze the threats detection techniques. | To understand the Concepts of Data Centre Management. | To learn & use various techniques for Ethical Hacking and Cyber Forensics. | To understand the applications security implementation. | To analyze and solve problems conceptually and practically from diverse industries, such as government manufacturing, retail, education, banking/ finance, healthcare and pharmaceutical. | To undertake industrial research projects for the development of future solutions in the domain of Information Security to make an impact in the technological advancement.
The CISSP certification was the first credential in the field of information security, accredited by the ANSI (American National Standards Institute) to ISO (International Standards Organization) Standard 17024:2003. It is approved by the U.S. Department of Defense (DoD) in both their Information Assurance Technical (IAT) and Managerial (IAM) categories.
Cloud computing is for understanding cloud security, cloud system management and mitigation strategies. The course scouts aspects of cloud computing architectural design, cloud components, computing characteristics and cloud deployment models. Applicants will also learn problems relating to the management and protection of data assets held on cloud platform. Other topics covered in the course are auditing, legislative impact, ownership, data rights management, threat mitigation and so on. It is designed for information security professionals with three years of information security experience. A globally recognized certification in cloud security, It is perfect for those whose day to day responsibilities include managing cloud environments.
Certified Information Systems Security Professional (CISSP) is an information security certification that was developed by the International Information System Security Certification Consortium, also known as (ISC)2. This CISSP course was prepared by professional experts and has carefully-designed modules that offer comprehensive learning content covering all the topics that will help candidates in the preparation for the CISSP exam. Offering unlimited online content access for six months, the course will help candidates gain expertise in areas like security principles, security engineering, asset management and network security as per an organisation’s requirements.
The perfect credential for those who have proven technical skills and expertise in hands-on operational IT positions. It is a globally recognized certification offering the ability to monitor, implement and administer IT infrastructure according to information security policies and procedure that make sure integrity, confidentiality and data availability. In the course, you will learn about main activities like risk management process, risk treatment and maintaining monitoring systems. In addition to this, it covers how to test and analyze malicious activity encompassing malicious code and countermeasures. In the end, you will come across best practices for securing big data systems and virtual environments like attack countermeasures and appliance.