scorecardresearchcyber security Courses - cyber security Tutorials - cyber security Certification
Browse Category
0
Naukri Learning > cyber security

Refine Results

Course Level

Mode of learning

Category

Banking, Finance & Analytics

Leadership & Management

BPO, Operations & Engineering

IT & Telecom

Marketing

Others

Design

Human Resources & Administration

"cyber security" courses, certification and training

  1. Vskills Certified Cyber Security Analyst Government Certification

    This certification institutes & enhances awareness of aspirants as per the company need for cyber security and forensics. Knowledge acquired by the certification includes cybercrime, IT Act 2000, cyber offenses, wireless devices cybercrime, phishing, keyloggers, backdoors, SQL injection, DDoS attacks, identity theft, computer and wireless forensics, cyber terrorism, social media marketing, incident handling and privacy.

    Course Selling Partner
  2. PG Certificate in Information and Cyber Security

    N L Dalmia Institute of Management Studies & Research offers the first of it’s kind in India –6 months post-graduation certificate in Information and Cyber Security | The course divided into three stages, gives the students a unique opportunity to develop their careers in ethical hacking and cyber security. The course is a perfect fit for students with a strong engineering/sciences background in computer sciences and information technology. The course would holistically cover everything right from the basics of penetration testing to cyber laws.

    Brochure Course Provider
  3. Cyber Security Intensive Classroom Program

    CYBERSECURITY brings together technologies, algorithms and programming techniques to defend systems & information against cyber-attacks. The complex nature of these skills has made them the domain of the best minds and the supply demand gap for professionals is now unprecedented. According to CISCO, 50 billion devices would be connected to the internet by 2020. In today’s hyper-connected world, security of information on machines, in databases and online is of the highest priority. Increasingly sophisticated cyber-attacks are not just disrupting information flow and interrupting services, they are putting valuable information and precious mobile/computing assets at risk. Key applications of Cybersecurity include: Cyber Threat Management & Cybersecurity Improvement through Application Testing, Cybersecurity Incident Response & Management across Verticals, Prevention of Fraud & Financial Theft in Banks & Financial Services, Online Intellectual Property Protection & Protection of Milita

    Brochure Course Provider
  4. Certified Cyber Warrior From IIIT Bangalore

    It is a comprehensive course to learn the most effective steps to prevent attacks and detect adversaries with actionable techniques that one can directly apply when they get back to work | As Certified Cyber Warrior, the participant will learn tips and tricks from the best of the experts from a mix of industry & academia, so that they can win the battle against the wide range of cyber adversaries that want to harm the enterprises’ IT environment.

    Course Provider
  5. K.K. Modi - Cyber Security Certification

    The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever want to be in

  6. CISSP (Online Classroom - Flexi Pass)

    Certified Information Systems Security Professional (CISSP) training facilitates the learning and knowledge in designing, building, and maintaining a secure business environment using globally approved Information Security standards. The aim of the course is to develop expertise in architecture, and design of security and earn the 30 CPEs required for the CISSP certification exam. IT Security professionals such as Security Consultants and Managers, IT Directors and Managers, and Security Auditors and Architects are best suited for this course enhancing their skills and knowledge on business continuity planning & disaster recovery planning vital for the smooth running of any organization

    5558 Students
    Course Selling Partner
  7. PGP in Digital Marketing and Social Media Analytics

    The Post Graduate Certificate in Digital Marketing is a career centric course launched by the institute which will prepare students to work in the ever-growing domain | The focus of the course will be to give emphasise on areas like Search Engine Marketing (SEM, PPC) ,Website Planning & Creation, Content Marketing, Email Marketing, Online Advertising, Social Media Marketing

    Brochure Course Provider
  8. Machine Learning PG Certification Program

    MACHINE LEARNING (ML) is the construction of algorithms that one can learn from and respond to large data sets faster and make effective predictions. It instructs computers to find patterns in data without being explicitly programmed. As data grows in volume and becomes more complex, the applications of ML are becoming widespread. Key applications of ML include: Trading Patterns & Efficiencies in Global Financial Markets, Fraud Prediction & Detection for Banks, Recommender & Predictor Systems for Retail & E-Commerce, Transportation Management & Traffic Shaping for Smart Cities and Predictive Techniques for Autonomous Vehicles. This course is number 1 in-demand skill globally among programmers. Machine Learning specialists usually get a substantial hike in earnings depending on their experience and capabilities.

    Brochure Course Provider
  9. Certified Information Systems Security Professional (CISSP)

    The CISSP certification was the first credential in the field of information security, accredited by the ANSI (American National Standards Institute) to ISO (International Standards Organization) Standard 17024:2003. It is approved by the U.S. Department of Defense (DoD) in both their Information Assurance Technical (IAT) and Managerial (IAM) categories.

    10000 Students
    Course Selling Partner
  10. Certified Cloud Security Professional

    Cloud computing is for understanding cloud security, cloud system management and mitigation strategies. The course scouts aspects of cloud computing architectural design, cloud components, computing characteristics and cloud deployment models. Applicants will also learn problems relating to the management and protection of data assets held on cloud platform. Other topics covered in the course are auditing, legislative impact, ownership, data rights management, threat mitigation and so on. It is designed for information security professionals with three years of information security experience. A globally recognized certification in cloud security, It is perfect for those whose day to day responsibilities include managing cloud environments.

    Course Selling Partner
  11. Certified Information Systems Security Professional (CISSP) - Online Self Paced

    Certified Information Systems Security Professional (CISSP) is an information security certification that was developed by the International Information System Security Certification Consortium, also known as (ISC)2. This CISSP course was prepared by professional experts and has carefully-designed modules that offer comprehensive learning content covering all the topics that will help candidates in the preparation for the CISSP exam. Offering unlimited online content access for six months, the course will help candidates gain expertise in areas like security principles, security engineering, asset management and network security as per an organisation’s requirements.

    Course Selling Partner
  12. Systems Security Certified Practitioner (SSCP)

    The perfect credential for those who have proven technical skills and expertise in hands-on operational IT positions. It is a globally recognized certification offering the ability to monitor, implement and administer IT infrastructure according to information security policies and procedure that make sure integrity, confidentiality and data availability. In the course, you will learn about main activities like risk management process, risk treatment and maintaining monitoring systems. In addition to this, it covers how to test and analyze malicious activity encompassing malicious code and countermeasures. In the end, you will come across best practices for securing big data systems and virtual environments like attack countermeasures and appliance.

    9 HoursOnline self studyIntermediate
    $ 171 Enquire Now

    Big Data, Information Security, Administration, Operations

    Course Selling Partner
  13. Certified Information Security Manager (CISM)

    Certified Information Security Manager (CISM) is a certification for information security managers awarded by ISACA, an international professional association focused on IT Governance. This CISM course has been designed specifically to offer candidates the best-in-the-industry training to play the role of an information security manager | Aimed at providing the requisite learning path for those preparing for the CISM certification, the course offers high-quality online learning content and study materials | The course covers a wide range of topics related to information security like security governance, risk management, compliance, program development and management, and incident management | Providing a career boost, the course follows the 2015 ISACA Candidate Information Guide and candidates will get a course completion certificate

    28 HoursOnline self studyIntermediate
    $ 233 Enquire Now

    Information Security

    Course Selling Partner
  14. Certified Cyber Law Analyst Government Certification

    The certification evaluates the participant according to the need of the organization for securing against online related offenses. People who want to make their career in the legal or IT departments can make the most by taking this certification. It tests the participants on an array of areas like UNCITRAL, acknowledgement and dispatch of electronic records, IPR protection, COE, attribution, IT Act and judicial review. Candidates can outshine in their desired profiles by taking Vskills cyber law analyst certification. So, update your resume and be useful in scores of ways.

    100 HoursOffline self studyIntermediate
    $ 121 Enquire Now

    Cyber Law, IPR, Law

    Course Selling Partner
  15. IINS 2.0: Implementing Cisco IOS Network Security

    Designed to be as efficient as classroom training, Cisco IOS Network Security makes it significant for business to focus on the security of the networks. It is also challenging due to increased availability requirements and regulatory requirements. While organizations move their business to the public sector, they have to make certain that the data doesn’t come in front of wrong individuals. The course covers the development of a comprehensive security and different phases of the process and significance of a sound security policy.

    19.5 HoursOnline self studyIntermediate
    $ 262 Enquire Now

    Network Security

    Course Selling Partner
Show Courses in Table

Buy Safely with Naukri.com
We support secure payment methods

Disclaimer

While Naukri FastForward services have helped many customers over the years, we do not guarantee any interview calls or assure any job offers with any of our services.
The services associated with NaukriFastforward are only provided through the website Naukri.com. You are advised to be cautious of calls/emails asking for payment from other web sites that claim to offer similar services under the name of Naukri.com. We have no associates/agents other than the partner sites that have been specifically named on the homepage of the website Naukri.com. We also recommend that you Security Guidelines and Terms and Conditions