|Course or Certification Name||Category||Location||Mode of learning|
|Vskills Certified Cyber Security Analyst Government Certification||Cyber Security||Offline self study|
|PG Certificate in Information and Cyber Security||Cyber Security||Classroom|
|Cyber Security Operations (Cisco)||Online self study|
|Cyber Security For Normal People: Protect Yourself Online||Cyber Security||Online self study|
|Postgraduate Diploma in Cyber Security||Cyber Security||Classroom|
|K.K. Modi - Cyber Security Certification||Noida , Delhi , Gurgaon , Chandigarh , Bangalore , Hyderabad , Chennai , Ernakulam||Online Classroom|
|Cyber-Physical Systems Security||Online self study|
|CISSP (Online Classroom - Flexi Pass)||cissp||Noida , Delhi , Gurgaon , Chandigarh , Bangalore , Hyderabad , Chennai , Ernakulam||Online Classroom|
|Ethical Hacking Ultimate Course||Ethical Hacking||Online self study|
|Security Operations||IPR||Online self study|
|Executive MBA in Information Technology||Executive Program in Business Analytics & Data Science||Classroom|
|Senior Software Architect Masters - 200+ courses||Emerging Web Technologies||Online self study|
|Software Masters Program- 200+ courses||Emerging Web Technologies||Online self study|
|Executive Post Graduate Certificate in Information Technology Management & Analytics||Data Analysis||Noida , Delhi , Gurgaon , Chandigarh , Bangalore , Hyderabad , Chennai , Ernakulam||Online Classroom|
|PG Certificate in Digital Marketing and Social Media Analytics||Social media marketing||Classroom|
This certification institutes & enhances awareness of aspirants as per the company need for cyber security and forensics. Knowledge acquired by the certification includes cybercrime, IT Act 2000, cyber offenses, wireless devices cybercrime, phishing, keyloggers, backdoors, SQL injection, DDoS attacks, identity theft, computer and wireless forensics, cyber terrorism, social media marketing, incident handling and privacy.
N L Dalmia Institute of Management Studies & Research offers the first of it’s kind in India –6 months post-graduation certificate in Information and Cyber Security | The course divided into three stages, gives the students a unique opportunity to develop their careers in ethical hacking and cyber security. The course is a perfect fit for students with a strong engineering/sciences background in computer sciences and information technology. The course would holistically cover everything right from the basics of penetration testing to cyber laws.
Cyber security is rapidly evolving, and professionals must keep up-to-date with the complexities of different cyber threats, as well as the different technologies under attack.On this microcredential, you’ll learn how cyber security professionals respond to an imminent, active or recent cyber threat. You’ll explore how to go about resolving attacks and how to complete legal investigations of any potential cybercrime.You’ll develop skills in this exciting area using up-to-date experience from the internationally recognised Cisco CCNA Cyber Security operations certification.
This course outlines a step-by-step roadmap that you can follow to build a tight wall of security around your digital life.
Information security can be defined as the protection of information and information systems from unauthorised access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability. Today, Information Security is becoming a function of increasing importance for the continued operation of commercial entities. The increasing level of interconnectedness of information networks and the reliance of business models on this interconnectedness has resulted in a network currently (the Internet) that has over a yottabyte of information stored, much of which is unsecured. This continuing trend is predicted to strongly increase the importance of Information Security within most multinational entities
The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever want to be in
This course provides an introduction to security issues relating to various cyber-physical systems including industrial control systems and those considered critical infrastructure systems.
Certified Information Systems Security Professional (CISSP) training facilitates the learning and knowledge in designing, building, and maintaining a secure business environment using globally approved Information Security standards. The aim of the course is to develop expertise in architecture, and design of security and earn the 30 CPEs required for the CISSP certification exam. IT Security professionals such as Security Consultants and Managers, IT Directors and Managers, and Security Auditors and Architects are best suited for this course enhancing their skills and knowledge on business continuity planning & disaster recovery planning vital for the smooth running of any organization
This course starts from the very beginning, making it a great resource for newbies who are just starting out in Penetration Testing or cyber security individuals that will definitely benefit from it. Intermediate and advanced hackers can also use this course as a refresher. | This comprehensive course will cover all aspects of Ethical Hacking as well as integration with Kali Linux. However, this isn’t just a normal theory based courses, but it is an extremely hands-on course, so you will not only read the fundamentals, but you will actually get to work with them using projects! Learning and getting hands-on on Ethical Hacking and Penetration Testing will opens many doors for your career. There are lot of career opportunities in Cyber Security Industry, and there is stunning and amazing opportunities coming in as IoT is becoming tomorrows future.
How do businesses handle cyber attacks? What value does a security operations centre give to an organisation? Discover the answers to these questions on this course. You will have the opportunity to gain a deeper understanding of the processes of a SOC and how it’s operated by staff. You will also consider how it fits in within the rest of the business.
Symbiosis Centre for Information Technology (SCIT) invites applications for its exclusive programme, MBA (Executive) – IT. The course is specifically designed for IT professionals and focuses on developing consulting and leadership skills, while focusing on project management, strategic IT management, marketing in IT domain & general management. The programme will be covered in 5 semesters, with 4 semesters of classroom learning and 1 semester of project work. Classes will be conducted on Saturdays and Sundays. | Programme Deliverables | Enhance your managerial competence for different management positions in IT | Develop a global mindset and sharpen your entrepreneurial skills | Adopt a modular approach in programme design
Executive Post Graduate Certificate in Information Technology Management and Analytics (EPGCITMA)is conceived with the idea of providing specialized learning in the specific business function of information technology. Information and communication technologies are driving developments in several business sectors | This provides immense opportunities for modern day managers to understand practice and innovate with these new systems and processes driving business growth. Adequate exposure to this road to success is rapidly becoming a prerequisite in modern day business management. This program is designed to equip the managers with the necessary tool set needed to seize this opportunity
The Post Graduate Certificate in Digital Marketing is a career centric course launched by the institute which will prepare students to work in the ever-growing domain | The focus of the course will be to give emphasise on areas like Search Engine Marketing (SEM, PPC) ,Website Planning & Creation, Content Marketing, Email Marketing, Online Advertising, Social Media Marketing