|Course or Certification Name||Category||Location||Mode of learning|
|Certified Internet Security Auditor (CISA)||CISA||Online self study|
|CISSP (Online Classroom - Flexi Pass)||cissp||Noida , Delhi , Gurgaon , Chandigarh , Bangalore , Hyderabad , Chennai , Ernakulam||Online Classroom|
|Certified Ethical Hacker 9 (CEH v9)||Ethical Hacking||Classroom|
|JAIIB Combined Training & Mock Tests Combo||JAIIB||Noida , Delhi , Gurgaon , Chandigarh , Bangalore , Hyderabad , Chennai , Ernakulam||Online Classroom|
|JAIIB Training & Mock Tests for Principles and Practices of Banking||JAIIB||Noida , Delhi , Gurgaon , Chandigarh , Bangalore , Hyderabad , Chennai , Ernakulam||Online Classroom|
|Masters in Information Management||MBA Part-time||Classroom|
|Certified Information Security Manager (CISM)||Information Security||Online self study|
|Certified Cloud Security Professional||Cloud Computing||Online self study|
|Oracle Database 11g: Security||Online self study|
|Vskills Certified Network Security Professional||Routing & Network Support||Online self study|
|Vskills Certified Cyber Security Analyst Government Certification||Cyber Security||Offline self study|
|Certified Information Systems Security Professional (CISSP) - Online Self Paced||Cloud Computing||Online self study|
|Systems Security Certified Practitioner (SSCP)||Cloud Computing||Online self study|
|Vskills Certified Software Security Professional||Information Security||Online self study|
|Certified Information Systems Security Professional (CISSP)||cissp||Classroom|
The Certified Information Systems Auditor (CISA) credential demonstrates that the individual possesses a firm understanding of IS audit, control and security skills as set out in the five domains that the Information Systems Audit and Control Association (ISACA)group has created. The CISA credential it recognized worldwide as a high-level certification of proficiency in IS auditing. This learning path will aid learners to prepare for the Certified Information Systems Auditor (CISA) examination.
Certified Information Systems Security Professional (CISSP) training facilitates the learning and knowledge in designing, building, and maintaining a secure business environment using globally approved Information Security standards. The aim of the course is to develop expertise in architecture, and design of security and earn the 30 CPEs required for the CISSP certification exam. IT Security professionals such as Security Consultants and Managers, IT Directors and Managers, and Security Auditors and Architects are best suited for this course enhancing their skills and knowledge on business continuity planning & disaster recovery planning vital for the smooth running of any organization
A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.
Applicants wishing to make a career in banking and finance for career advancement, JAIIB Combined Training and Mock Tests combo are designed to take you through the various practices in finance and banking. It is useful for those working in co-operative banks, government financial institution and public sector banks. It also encompasses the JAIIB/DBF certification which is one of the famous certifications to increase value and productivity.
Junior Associate of the Indian Institute of Bankers (JAIIB) is an associated exam conducted by the Indian Institute of Banking and Finance (IIBF). JAIIB-Principles and Practices of Banking test the basic knowledge of the functioning of bank and banking technology as banking professional. | This course is aimed at providing candidates with the training required to function as a professional banker | It provides quality learning modules and mock tests developed by experts in the industry | This course covers all topics related to the JAIIB – Principles and Practices of Banking exam like Indian financial system, functioning of a bank, role of CIBIL, role and functions of Capital markets, and other related areas
The three years autonomous Masters Degree in Management Programs at our Institute are affiliated to University of Mumbai and approved by AICTE, for working professionals and conducted during weekends. | The program provides diverse learning opportunities through interactive sessions with highly qualified faculty members, experiential learning, industry interventions, international exposure, and more. The pedagogy is designed to help to leverage the student’s work life experiences and prepare the students for senior management roles in organizations.
Certified Information Security Manager (CISM) is a certification for information security managers awarded by ISACA, an international professional association focused on IT Governance. This CISM course has been designed specifically to offer candidates the best-in-the-industry training to play the role of an information security manager | Aimed at providing the requisite learning path for those preparing for the CISM certification, the course offers high-quality online learning content and study materials | The course covers a wide range of topics related to information security like security governance, risk management, compliance, program development and management, and incident management | Providing a career boost, the course follows the 2015 ISACA Candidate Information Guide and candidates will get a course completion certificate
Cloud computing is for understanding cloud security, cloud system management and mitigation strategies. The course scouts aspects of cloud computing architectural design, cloud components, computing characteristics and cloud deployment models. Applicants will also learn problems relating to the management and protection of data assets held on cloud platform. Other topics covered in the course are auditing, legislative impact, ownership, data rights management, threat mitigation and so on. It is designed for information security professionals with three years of information security experience. A globally recognized certification in cloud security, It is perfect for those whose day to day responsibilities include managing cloud environments.
Oracle Database is an object-relational database management system produced and marketed by Oracle Corporation. With the objective that every business should identify security threats and concerns and develop policies to protect itself, Oracle Database 11g: Security course aims at providing the candidates with detailed learning modules that will train them on standard security practices related to maintaining integrity of, protecting and controlling data. Database professionals can enhance their skills on how to configure Oracle Database 11g in a secure manner through this course. It also offers comprehensive training on a wide array of topics related to Oracle Database security like proxy authentication, database encryption, Oracle Label Security, Data Masking Pack, Firewalls, SQL*Plus Security, and other related areas. The prerequisite for this course is that learner should have working experience with Oracle Database 11g or have taken the Oracle Database 11g: Administration I and Oracle Database 11g: Administration Workshop II courses.
Vskills certification for Network Security Professional assesses the candidate for a company’s network security needs. The certification tests the candidates on various areas in network security which includes knowledge of networking, cryptography, implementation and management of network security measures.
This certification institutes & enhances awareness of aspirants as per the company need for cyber security and forensics. Knowledge acquired by the certification includes cybercrime, IT Act 2000, cyber offenses, wireless devices cybercrime, phishing, keyloggers, backdoors, SQL injection, DDoS attacks, identity theft, computer and wireless forensics, cyber terrorism, social media marketing, incident handling and privacy.
Certified Information Systems Security Professional (CISSP) is an information security certification that was developed by the International Information System Security Certification Consortium, also known as (ISC)2. This CISSP course was prepared by professional experts and has carefully-designed modules that offer comprehensive learning content covering all the topics that will help candidates in the preparation for the CISSP exam. Offering unlimited online content access for six months, the course will help candidates gain expertise in areas like security principles, security engineering, asset management and network security as per an organisation’s requirements.
The perfect credential for those who have proven technical skills and expertise in hands-on operational IT positions. It is a globally recognized certification offering the ability to monitor, implement and administer IT infrastructure according to information security policies and procedure that make sure integrity, confidentiality and data availability. In the course, you will learn about main activities like risk management process, risk treatment and maintaining monitoring systems. In addition to this, it covers how to test and analyze malicious activity encompassing malicious code and countermeasures. In the end, you will come across best practices for securing big data systems and virtual environments like attack countermeasures and appliance.
Vskills certification for Software Security Professional assesses the candidate for a company’s secured software development needs. The certification tests the candidates on various areas in software security which includes knowledge of various types of security attacks and countermeasures on programming language (C/C++, Java and .Net), web applications, web services, SOA-based application, and mobile applications and tools used.
The CISSP certification was the first credential in the field of information security, accredited by the ANSI (American National Standards Institute) to ISO (International Standards Organization) Standard 17024:2003. It is approved by the U.S. Department of Defense (DoD) in both their Information Assurance Technical (IAT) and Managerial (IAM) categories.