|Course or Certification Name||Category||Location||Mode of learning|
|Certified Cloud Security Professional||Cloud Computing||24/7 Anywhere||Online self study|
|Certified Information Systems Security Professional (CISSP) - Online Self Paced||Cloud Computing||24/7 Anywhere||Online self study|
|Systems Security Certified Practitioner (SSCP)||Cloud Computing||24/7 Anywhere||Online self study|
|Certified Information Security Manager (CISM)||Information Security||24/7 Anywhere||Online self study|
|Certified Information Systems Security Professional (CISSP)||cissp||Classroom|
|IINS 2.0: Implementing Cisco IOS Network Security||Cisco Security Certifications||24/7 Anywhere||Online self study|
|Certified Internet Security Auditor (CISA)||CISA||24/7 Anywhere||Online self study|
|Information Security||Information Security||24/7 Anywhere||Online self study|
|Vskills Certified Cyber Security Analyst Government Certification||Cyber Security||Offline self study|
|PG Certificate in Information and Cyber Security||Cyber Security||Classroom|
|Internet of Things Security Expert||Internet of Things||Online Classroom|
|PG Diploma in IT Infrastructure, Systems and Security (PG-DITISS)||Cloud Computing||Classroom|
|VMware Certified Professional 6 - Network Virtualization (VCP6-NV)||Virtualization||24/7 Anywhere||Online self study|
|CompTIA Cybersecurity Analyst (CSA+)||Cyber Security||24/7 Anywhere||Online self study|
|Cyber Security Intensive Classroom Program||Cyber Security||Classroom|
Cloud computing is for understanding cloud security, cloud system management and mitigation strategies. The course scouts aspects of cloud computing architectural design, cloud components, computing characteristics and cloud deployment models. Applicants will also learn problems relating to the management and protection of data assets held on cloud platform. Other topics covered in the course are auditing, legislative impact, ownership, data rights management, threat mitigation and so on. It is designed for information security professionals with three years of information security experience. A globally recognized certification in cloud security, It is perfect for those whose day to day responsibilities include managing cloud environments.
Certified Information Systems Security Professional (CISSP) is an information security certification that was developed by the International Information System Security Certification Consortium, also known as (ISC)2. This CISSP course was prepared by professional experts and has carefully-designed modules that offer comprehensive learning content covering all the topics that will help candidates in the preparation for the CISSP exam. Offering unlimited online content access for six months, the course will help candidates gain expertise in areas like security principles, security engineering, asset management and network security as per an organisation’s requirements.
The perfect credential for those who have proven technical skills and expertise in hands-on operational IT positions. It is a globally recognized certification offering the ability to monitor, implement and administer IT infrastructure according to information security policies and procedure that make sure integrity, confidentiality and data availability. In the course, you will learn about main activities like risk management process, risk treatment and maintaining monitoring systems. In addition to this, it covers how to test and analyze malicious activity encompassing malicious code and countermeasures. In the end, you will come across best practices for securing big data systems and virtual environments like attack countermeasures and appliance.
Certified Information Security Manager (CISM) is a certification for information security managers awarded by ISACA, an international professional association focused on IT Governance. This CISM course has been designed specifically to offer candidates the best-in-the-industry training to play the role of an information security manager | Aimed at providing the requisite learning path for those preparing for the CISM certification, the course offers high-quality online learning content and study materials | The course covers a wide range of topics related to information security like security governance, risk management, compliance, program development and management, and incident management | Providing a career boost, the course follows the 2015 ISACA Candidate Information Guide and candidates will get a course completion certificate
The CISSP certification was the first credential in the field of information security, accredited by the ANSI (American National Standards Institute) to ISO (International Standards Organization) Standard 17024:2003. It is approved by the U.S. Department of Defense (DoD) in both their Information Assurance Technical (IAT) and Managerial (IAM) categories.
Designed to be as efficient as classroom training, Cisco IOS Network Security makes it significant for business to focus on the security of the networks. It is also challenging due to increased availability requirements and regulatory requirements. While organizations move their business to the public sector, they have to make certain that the data doesn’t come in front of wrong individuals. The course covers the development of a comprehensive security and different phases of the process and significance of a sound security policy.
The Certified Information Systems Auditor (CISA) credential demonstrates that the individual possesses a firm understanding of IS audit, control and security skills as set out in the five domains that the Information Systems Audit and Control Association (ISACA)group has created. The CISA credential it recognized worldwide as a high-level certification of proficiency in IS auditing. This learning path will aid learners to prepare for the Certified Information Systems Auditor (CISA) examination.
This course on information security establishes concepts of protecting data information assets without getting affected by the way information is formatted, processed, transmitted or stored. The program also involves modules on preventing unauthorized access, modification or destruction of data. The course fee includes INR 300 as courier charges for the study material.
This certification institutes & enhances awareness of aspirants as per the company need for cyber security and forensics. Knowledge acquired by the certification includes cybercrime, IT Act 2000, cyber offenses, wireless devices cybercrime, phishing, keyloggers, backdoors, SQL injection, DDoS attacks, identity theft, computer and wireless forensics, cyber terrorism, social media marketing, incident handling and privacy.
N L Dalmia Institute of Management Studies & Research offers the first of it’s kind in India –6 months post-graduation certificate in Information and Cyber Security | The course divided into three stages, gives the students a unique opportunity to develop their careers in ethical hacking and cyber security. The course is a perfect fit for students with a strong engineering/sciences background in computer sciences and information technology. The course would holistically cover everything right from the basics of penetration testing to cyber laws.
Internet of Things Security Expert is a 360° training program for professionals who seek to deepen their knowledge in the field of Internet of Things. The program is customised based on comprehensive knowledge about various IoT Security platforms. This program is designed by the industry experts to provide hands-on training with tools that are used to speed up the training process. | The program is inclusive of full-fledged training, starting from Python, advanced IoT training, to IoT security, all of which are found to be essential for IoT Security Experts. These modules put together will provide a solid foundation and give a further edge in the learning process. | Take 360° Master’s Program training in IoT Security Expert to | Gain expert level knowledge to build, test and deploy applications using Python. Learn suitability of python to use it to write device, gateway and cloud based applications and scripts. | Gain advance level knowledge to architect, build and implement IoT projects from selection of right components to securing the ecosystem using relevant tools and technologies. | Build a security plan, extend security to peripheries, and gain familiarity with fundamental cryptographic algorithms need to safeguard IoT systems.
The theoretical and practical mix of the Post Graduate Diploma in IT Infrastructure Systems and Security (PG-DITISS) programme has the following focus: | To explore the fundamental concepts of Cyber Security | To develop in-depth knowledge and understanding of the Intrusion Detection and Prevention domain. | To learn to analyze the threats detection techniques. | To understand the Concepts of Data Centre Management. | To learn & use various techniques for Ethical Hacking and Cyber Forensics. | To understand the applications security implementation. | To analyze and solve problems conceptually and practically from diverse industries, such as government manufacturing, retail, education, banking/ finance, healthcare and pharmaceutical. | To undertake industrial research projects for the development of future solutions in the domain of Information Security to make an impact in the technological advancement.
VMware, a subsidiary of Dell Technologies, provides cloud and virtualisation software and services. VMware Certified Professional tests the skills related to installing, configuring, or maintaining VMware technologies.| This VMware Certified Professional 6 Network Virtualization (VCP6-NV) course imparts the knowledge and skills to install, configure, and administer NSX virtual networking implementations, regardless of the underlying physical architecture | The course offers a comprehensive coverage on topics like installing and upgrading, configuring and maintaining NSX virtual networks, security, physical infrastructure requirements, and other related areas | The course is aligned with the VCP6-NV exam syllabus and a course completion certification is awarded to the candidates
CompTIA Cybersecurity Analyst (CSA+) is an international, vendor-neutral cybersecurity certification offered by a non-profit trade association, The Computing Technology Industry Association. This CompTIA CSA+ course will provide the requisite training to the candidates to have critical knowledge and skills that are required to prevent, detect and combat cybersecurity threats | Candidates get a boost to their career by gaining expertise in securing and analysing IT assets at the hardware and software levels | The course covers various topics like network architecture, threat identification, threat mitigation, monitoring security issues, and other related areas
CYBERSECURITY brings together technologies, algorithms and programming techniques to defend systems & information against cyber-attacks. The complex nature of these skills has made them the domain of the best minds and the supply demand gap for professionals is now unprecedented. According to CISCO, 50 billion devices would be connected to the internet by 2020. In today’s hyper-connected world, security of information on machines, in databases and online is of the highest priority. Increasingly sophisticated cyber-attacks are not just disrupting information flow and interrupting services, they are putting valuable information and precious mobile/computing assets at risk. Key applications of Cybersecurity include: Cyber Threat Management & Cybersecurity Improvement through Application Testing, Cybersecurity Incident Response & Management across Verticals, Prevention of Fraud & Financial Theft in Banks & Financial Services, Online Intellectual Property Protection & Protection of Milita