|Course or Certification Name||Category||Location||Mode of learning|
|Design and Analyze Secure Networked Systems||Online self study|
|Certified Cloud Security Professional||Cloud Computing||Online self study|
|Fundamentals of Computer Network Security Specialization||CCNP||Offline self study|
|Certified Information Systems Security Professional (CISSP) - Online Self Paced||Cloud Computing||Online self study|
|Systems Security Certified Practitioner (SSCP)||Cloud Computing||Online self study|
|Certified Information Security Manager (CISM)||Information Security||Online self study|
|Vskills Certified Software Security Professional||Information Security||Online self study|
|Certified Cyber Law Analyst Government Certification||Cyber Law||Offline self study|
|IINS 2.0: Implementing Cisco IOS Network Security||Cisco Security Certifications||Online self study|
|Certified Internet Security Auditor (CISA)||CISA||Online self study|
|Vskills Certified Network Security Professional||Routing & Network Support||Online self study|
|CCNP Security||CCNP||Noida , Delhi , Gurgaon , Chandigarh , Bangalore , Hyderabad , Chennai , Ernakulam||Online Classroom|
|Windows Server 2016 Security Features||Online self study|
|AWS: Getting Started with Cloud Security||Online self study|
|Certified Cyber Warrior From IIIT Bangalore||Cyber Law||Noida , Delhi , Gurgaon , Chandigarh , Bangalore , Hyderabad , Chennai , Ernakulam||Online Classroom|
In this MOOC, we will learn the basic cyber security concepts, how to identify vulnerabilities/threat in a network system. We will apply CIA basic security services in the triage of recent cyberattack incidents, such as OPM data breach. We will learn the risk management framework for analyzing the risks in a network system, and apply the basic security design principles to protect the data and secure computer systems. We will examine the trustworthiness of programs and data installed in our systems and show the proper way to verify their integrity and authenticity. We will apply principle of least privileges for controlling the shared access given to different groups of users and system processes. On Amazon Cloud instances, we will use GnuPG software to generate public/private key pair for signing/verifying documents and open source software, and for encrypting documents. We will learn how to publish software, the related signature and release key on web server and publish public key to PGP key server for others to retrieve. We will learn Public Key Infrastructure (PKI) and Linux utility to serve as a CA for an organization, learn how to sign certificate request for clients or servers in secure email and web applications.
Cloud computing is for understanding cloud security, cloud system management and mitigation strategies. The course scouts aspects of cloud computing architectural design, cloud components, computing characteristics and cloud deployment models. Applicants will also learn problems relating to the management and protection of data assets held on cloud platform. Other topics covered in the course are auditing, legislative impact, ownership, data rights management, threat mitigation and so on. It is designed for information security professionals with three years of information security experience. A globally recognized certification in cloud security, It is perfect for those whose day to day responsibilities include managing cloud environments.
This specialization is intended for IT professionals, computer programmers, managers, IT security professionals who like to move up ladder, who are seeking to develop network system security skills. Through four courses, we will cover the Design and Analyze Secure Networked Systems, Develop Secure Programs with Basic Cryptography and Crypto API, Hacking and Patching Web Applications, Perform Penetration Testing, and Secure Networked Systems with Firewall and IDS, which will prepare you to perform tasks as Cyber Security Engineer, IT Security Analyst, and Cyber Security Analyst.
Certified Information Systems Security Professional (CISSP) is an information security certification that was developed by the International Information System Security Certification Consortium, also known as (ISC)2. This CISSP course was prepared by professional experts and has carefully-designed modules that offer comprehensive learning content covering all the topics that will help candidates in the preparation for the CISSP exam. Offering unlimited online content access for six months, the course will help candidates gain expertise in areas like security principles, security engineering, asset management and network security as per an organisation’s requirements.
The perfect credential for those who have proven technical skills and expertise in hands-on operational IT positions. It is a globally recognized certification offering the ability to monitor, implement and administer IT infrastructure according to information security policies and procedure that make sure integrity, confidentiality and data availability. In the course, you will learn about main activities like risk management process, risk treatment and maintaining monitoring systems. In addition to this, it covers how to test and analyze malicious activity encompassing malicious code and countermeasures. In the end, you will come across best practices for securing big data systems and virtual environments like attack countermeasures and appliance.
Certified Information Security Manager (CISM) is a certification for information security managers awarded by ISACA, an international professional association focused on IT Governance. This CISM course has been designed specifically to offer candidates the best-in-the-industry training to play the role of an information security manager | Aimed at providing the requisite learning path for those preparing for the CISM certification, the course offers high-quality online learning content and study materials | The course covers a wide range of topics related to information security like security governance, risk management, compliance, program development and management, and incident management | Providing a career boost, the course follows the 2015 ISACA Candidate Information Guide and candidates will get a course completion certificate
Vskills certification for Software Security Professional assesses the candidate for a company’s secured software development needs. The certification tests the candidates on various areas in software security which includes knowledge of various types of security attacks and countermeasures on programming language (C/C++, Java and .Net), web applications, web services, SOA-based application, and mobile applications and tools used.
The certification evaluates the participant according to the need of the organization for securing against online related offenses. People who want to make their career in the legal or IT departments can make the most by taking this certification. It tests the participants on an array of areas like UNCITRAL, acknowledgement and dispatch of electronic records, IPR protection, COE, attribution, IT Act and judicial review. Candidates can outshine in their desired profiles by taking Vskills cyber law analyst certification. So, update your resume and be useful in scores of ways.
Designed to be as efficient as classroom training, Cisco IOS Network Security makes it significant for business to focus on the security of the networks. It is also challenging due to increased availability requirements and regulatory requirements. While organizations move their business to the public sector, they have to make certain that the data doesn’t come in front of wrong individuals. The course covers the development of a comprehensive security and different phases of the process and significance of a sound security policy.
The Certified Information Systems Auditor (CISA) credential demonstrates that the individual possesses a firm understanding of IS audit, control and security skills as set out in the five domains that the Information Systems Audit and Control Association (ISACA)group has created. The CISA credential it recognized worldwide as a high-level certification of proficiency in IS auditing. This learning path will aid learners to prepare for the Certified Information Systems Auditor (CISA) examination.
Vskills certification for Network Security Professional assesses the candidate for a company’s network security needs. The certification tests the candidates on various areas in network security which includes knowledge of networking, cryptography, implementation and management of network security measures.
CCNP Security certification training is a composite of four modules that a professional must qualify in order to obtain this prestigious credential. This CCNP Security training will cover in detail each of the following four modules to ensure that participants gain core understanding of implementing security for Cisco devices: SISAS (Cisco Secure Access Solutions) 1.0 SENSS (Cisco Edge Network Security Solutions) 1.0 SIMOS (Cisco Secure Mobility Solutions) 1.0 SITCS (Cisco Threat Control Solutions) 1.0
Have you had a chance to explore the new and enhanced security functionalities in Windows Server 2016? In this new course authored by Orin Thomas - who literally wrote the book on Windows Server! - you'll get a guided tour and learn to better safeguard against security breaches. Windows Server 2016 provides layers of protection that help address both known and emerging threats. You'll learn how it actively contributes to securing your infrastructure. See how protections were built to mitigate an array of attack vectors and to deal with the overall threat of ongoing attacks inside the datacenter.You'll begin with a look at the hardening of Windows Server 2016, including hardware requirements for Secure Boot and guidance on disabling system services. Explore ways to configure network security, including firewalls, and look at secure virtualization, like encryption-supported virtual machines. From there, you'll dive into secure virtualization, threat detection, privileged identity, Desired State Configuration, and more. See demos, participate in hands-on labs, and pass the final exam, as you shore up your skills for ongoing security management.
Data security is on the forefront of everyone’s mind these days, with data breaches, denial of service attacks, ransomware and malware being common news stories.|In this course two of Amazon Web Services’ Solutions Architects will provide you with a foundational understanding of cloud security, compliance and the AWS shared responsibility model. They will then discuss more technical content by looking at various security controls such as identity and access management services, directory services, network isolation and connectivity options, auditing, monitoring, encryption and managing secrets.
It is a comprehensive course to learn the most effective steps to prevent attacks and detect adversaries with actionable techniques that one can directly apply when they get back to work | As Certified Cyber Warrior, the participant will learn tips and tricks from the best of the experts from a mix of industry & academia, so that they can win the battle against the wide range of cyber adversaries that want to harm the enterprises’ IT environment.