|Course or Certification Name||Category||Location||Mode of learning|
|Information Security: Context and Introduction||Information Security||Online self study|
|Certified Information Security Manager (CISM)||Information Security||Online self study|
|Intro to Information Security||Information Security||Online self study|
|PG Certificate in Information and Cyber Security||Cyber Security||Classroom|
|Cybersecurity Risk Management||Cyber Security||Online self study|
|Financial Technologies (FinTech) for Leadership in the Digital World||Financial modelling||Classroom|
|CISSP (Online Classroom - Flexi Pass)||cissp||Noida , Delhi , Gurgaon , Chandigarh , Bangalore , Hyderabad , Chennai , Ernakulam||Online Classroom|
|Certified Internet Security Auditor (CISA)||CISA||Online self study|
|Vskills Certified Cyber Security Analyst Government Certification||Cyber Security||Offline self study|
|Certified Information Systems Security Professional (CISSP)||cissp||Classroom|
|Cyber-Physical Systems Security||Cyber Security||Online self study|
|IT Service Expert Program||ITSM||Online self study|
|Cloud Development Professional Training||Cloud Computing||Noida , Delhi , Gurgaon , Chandigarh , Bangalore , Hyderabad , Chennai , Ernakulam||Online Classroom|
|Certified Cloud Security Professional||Cloud Computing||Online self study|
|Online M.Sc - IT||MSc IT||Online self study|
In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. This includes a brief introduction to cryptography, security management and network and computer security that allows you to begin the journey into the study of information security and develop your appreciation of some key information security concepts. The course concludes with a discussion around a simple model of the information security industry and explores skills, knowledge and roles so that you can determine and analyse potential career opportunities in this developing profession and consider how you may need to develop personally to attain your career goals.
Certified Information Security Manager (CISM) is a certification for information security managers awarded by ISACA, an international professional association focused on IT Governance.Â This CISM course has been designed specifically to offer candidates the best-in-the-industry training to play the role of an information security manager | Aimed at providing the requisite learning path for those preparing for the CISM certification, the course offers high-quality online learning content and study materials | The course covers a wide range of topics related to information security like security governance, risk management, compliance, program development and management, and incident management | Providing a career boost, the course follows the 2015 ISACA Candidate Information Guide and candidates will get a course completion certificate
This course provides a one-semester overview of information security. It is designed to help students with prior computer and programming knowledge â€” both undergraduate and graduate â€” understand this important priority in society today. The technical content of the course gives a broad overview of essential concepts and methods for providing and evaluating security in information processing systems (operating systems and applications, networks, protocols, and so on). | In addition to its technical content, the course touches on the importance of management and administration, the place information security holds in overall business risk, social issues such as individual privacy, and the role of public policy.
N L Dalmia Institute of Management Studies & Research offers the first of itâ€™s kind in India â€“6 months post-graduation certificate in Information and Cyber Security | The course divided into three stages, gives the students a unique opportunity to develop their careers in ethical hacking and cyber security. The course is a perfect fit for students with a strong engineering/sciences background in computer sciences and information technology. The course would holistically cover everything right from the basics of penetration testing to cyber laws.
In this Cybersecurity Risk Management course, candidates get to pick up important principles like risk analysis, risk assessment and risk mitigation as a part of information security through qualitative methodology and quantitative practice. | This course makes it easy for candidates to identify information security related intimidations, susceptibility, gauge risk level, define controls and safeguard and conduct cost-benefit analysis or business impact analysis. The course covers general information on security risk management framework and related best practices. It also covers ways to identify and model information security risks. It also extends the quantitative framework hand-in-hand with data mining and machine learning approaches which are applicable in risk analytics driven by data. Participants can study the interconnected nuances of information security, big data and artificial intelligence. | This course helps candidates understanding risk framework as well as enables them to express business consequences of identified information security risks. | Lastly, this course inculcates skills in candidates to become successful information security professional.
The financial world is going through an era of digital transformation. The impact of social media, mobility, Big Data and machine learning, Internet of Things, information security and blockchain, and artificial intelligence based robotics is being felt as firms strive to meet the expectations of the new-age millennial customers through digital mastery. Digital change management in the banking and financial services industry and capital markets needs new capabilities in leaders who have the vision to develop novel technological innovation for transforming the world of banking, trading, risk management, customer management and advisory, payments and fraud detection. This program aims to inspire leaders of firms with the required organizational and technological know- how for creating a novel digital vision for the financial organizations with measurable impact.
Certified Information Systems Security Professional (CISSP) training facilitates the learning and knowledge in designing, building, and maintaining a secure business environment using globally approved Information Security standards. The aim of the course is to develop expertise in architecture, and design of security and earn the 30 CPEs required for the CISSP certification exam. IT Security professionals such as Security Consultants and Managers, IT Directors and Managers, and Security Auditors and Architects are best suited for this course enhancing their skills and knowledge on business continuity planning & disaster recovery planning vital for the smooth running of any organization
The Certified Information Systems Auditor (CISA) credential demonstrates that the individual possesses a firm understanding of IS audit, control and security skills as set out in the five domains that the Information Systems Audit and Control Association (ISACA)group has created. The CISA credential it recognized worldwide as a high-level certification of proficiency in IS auditing. This learning path will aid learners to prepare for the Certified Information Systems Auditor (CISA) examination.
This certification institutes & enhances awareness of aspirants as per the company need for cyber security and forensics. Knowledge acquired by the certification includes cybercrime, IT Act 2000, cyber offenses, wireless devices cybercrime, phishing, keyloggers, backdoors, SQL injection, DDoS attacks, identity theft, computer and wireless forensics, cyber terrorism, social media marketing, incident handling and privacy.
The CISSP certification was the first credential in the field of information security, accredited by the ANSI (American National Standards Institute) to ISO (International Standards Organization) Standard 17024:2003. It is approved by the U.S. Department of Defense (DoD) in both their Information Assurance Technical (IAT) and Managerial (IAM) categories.
This course provides an introduction to security issues relating to various cyber-physical systems including industrial control systems and those considered critical infrastructure systems.
IT Service Expert Program is a certification course that would help you understand ITIL and how you can build specialized organisational capabilities to give superior services and deliver value to your customers. The Walt Disney Company, US Federal Government, IBM, WalMart and several other big businesses use ITIL. Understand how they have made the best use of ITIL and implement the principles to grow your organisation and yourself.
Cloud Development Professional is a 360Â° Training Program offered to professionals who want to deepen their knowledge and expertise in the field of AWS Cloud Computing. This program is updated regularly to comply with the latest industry standards, and is created and delivered by certified expert practitioners, with a passion for their craft. | This course is targeted towards professionals who desire to learn concepts and integrate skills relating to cloud computing and AWS into their work.
Cloud computing is for understanding cloud security, cloud system management and mitigation strategies. The course scouts aspects of cloud computing architectural design, cloud components, computing characteristics and cloud deployment models. Applicants will also learn problems relating to the management and protection of data assets held on cloud platform. Other topics covered in the course are auditing, legislative impact, ownership, data rights management, threat mitigation and so on. It is designed for information security professionals with three years of information security experience. A globally recognized certification in cloud security, It is perfect for those whose day to day responsibilities include managing cloud environments.
A rigorous two-year (4semesters) program designed to prepare graduates for varied career opportunities in Information Technology. | From database management system, software engineering, networking fundamentals, object oriented programming, and data structure using C language to routing protocols& concepts, emerging technologies, and network planning & design â€“ the course covers important concepts, practices, and trends in the subject area. | The course teaches various methodologies and life cycles involved in developing software applications and conducting scientific research. | The course provides high-quality academic and technical training in software, databases, and networking with deep focus on the mathematical and theoretical foundations of computing. | Given its scope, the program will benefit anybody (with a graduation degree) seeking to develop skills, improve competency, and build expertise in the subject.