|Course or Certification Name||Category||Location||Mode of learning|
|Google Cloud Platform Fundamentals: Core Infrastructure||Cloud Computing||Online self study|
|PG Certificate in Information and Cyber Security||Cyber Security||Classroom|
|IINS 2.0: Implementing Cisco IOS Network Security||Cisco Security Certifications||Online self study|
|Network Security Basics||Network Security||Online self study|
|Vskills Certified Cyber Security Analyst Government Certification||Cyber Security||Offline self study|
|Vskills Certified Software Security Professional||Information Security||Online self study|
|Enterprise and Infrastructure Security||Network Security||Online self study|
|Certified Information Security Manager (CISM)||Information Security||Online self study|
|Vskills Certified Network Security Professional||Routing & Network Support||Online self study|
|Certified Cloud Security Professional||Cloud Computing||Online self study|
|Windows Server 2016 Security Features||Information Security||Online self study|
|Information Security: Context and Introduction||Information Security||Online self study|
|Systems Security Certified Practitioner (SSCP)||Cloud Computing||Online self study|
|The Complete Cyber Security Course: Network Security||Cyber Security||Online self study|
|Vskills Certified Engineering Design Professional||Engineering Design||Online self study|
This course introduces you to important concepts and terminology for working with Google Cloud Platform (GCP). You learn about, and compare, many of the computing and storage services available in Google Cloud Platform, including Google App Engine, Google Compute Engine, Google Kubernetes Engine, Google Cloud Storage, Google Cloud SQL, and BigQuery. You learn about important resource and policy management tools, such as the Google Cloud Resource Manager hierarchy and Google Cloud Identity and Access Management. Hands-on labs give you foundational skills for working with GCP.
N L Dalmia Institute of Management Studies & Research offers the first of itâ€™s kind in India â€“6 months post-graduation certificate in Information and Cyber Security | The course divided into three stages, gives the students a unique opportunity to develop their careers in ethical hacking and cyber security. The course is a perfect fit for students with a strong engineering/sciences background in computer sciences and information technology. The course would holistically cover everything right from the basics of penetration testing to cyber laws.
Designed to be as efficient as classroom training, Cisco IOS Network Security makes it significant for business to focus on the security of the networks. It is also challenging due to increased availability requirements and regulatory requirements. While organizations move their business to the public sector, they have to make certain that the data doesnâ€™t come in front of wrong individuals. The course covers the development of a comprehensive security and different phases of the process and significance of a sound security policy.
Data breaches have become common place in national and world news, and because of this, engineers now find themselves in new roles in organizations, exclusively focused on securing information. In this course, Network Security Fundamentals, you will learn about the different types of attacks used to bring down networks, and/or steal data from them. First, you will examine the physical security of data centers, password creation recommendations, user account privileges, and devices to monitor network behavior. Next, you will learn about techniques for mitigating these attacks. Finally, you will learn about mechanisms for encrypting wireless traffic. By the end of this course, you will know the difference between WEP, WPA, WPA2, and how you can use multifactor authentication to prevent unauthorized account access.
This certification institutes & enhances awareness of aspirants as per the company need for cyber security and forensics. Knowledge acquired by the certification includes cybercrime, IT Act 2000, cyber offenses, wireless devices cybercrime, phishing, keyloggers, backdoors, SQL injection, DDoS attacks, identity theft, computer and wireless forensics, cyber terrorism, social media marketing, incident handling and privacy.
Vskills certification for Software Security Professional assesses the candidate for a companyâ€™s secured software development needs. The certification tests the candidates on various areas in software security which includes knowledge of various types of security attacks and countermeasures on programming language (C/C++, Java and .Net), web applications, web services, SOA-based application, and mobile applications and tools used.
This course introduces a series of advanced and current topics in cyber security, many of which are especially relevant in modern enterprise and infrastructure settings. The basics of enterprise compliance frameworks are provided with introduction to NIST and PCI. Hybrid cloud architectures are shown to provide an opportunity to fix many of the security weaknesses in modern perimeter local area networks. | Emerging security issues in blockchain, blinding algorithms, Internet of Things (IoT), and critical infrastructure protection are also described for learners in the context of cyber risk. Mobile security and cloud security hyper-resilience approaches are also introduced. The course completes with some practical advice for learners on how to plan careers in cyber security.
Certified Information Security Manager (CISM) is a certification for information security managers awarded by ISACA, an international professional association focused on IT Governance.Â This CISM course has been designed specifically to offer candidates the best-in-the-industry training to play the role of an information security manager | Aimed at providing the requisite learning path for those preparing for the CISM certification, the course offers high-quality online learning content and study materials | The course covers a wide range of topics related to information security like security governance, risk management, compliance, program development and management, and incident management | Providing a career boost, the course follows the 2015 ISACA Candidate Information Guide and candidates will get a course completion certificate
Vskills certification for Network Security Professional assesses the candidate for a companyâ€™s network security needs. The certification tests the candidates on various areas in network security which includes knowledge of networking, cryptography, implementation and management of network security measures.
Cloud computing is for understanding cloud security, cloud system management and mitigation strategies. The course scouts aspects of cloud computing architectural design, cloud components, computing characteristics and cloud deployment models. Applicants will also learn problems relating to the management and protection of data assets held on cloud platform. Other topics covered in the course are auditing, legislative impact, ownership, data rights management, threat mitigation and so on. It is designed for information security professionals with three years of information security experience. A globally recognized certification in cloud security, It is perfect for those whose day to day responsibilities include managing cloud environments.
Have you had a chance to explore the new and enhanced security functionalities in Windows Server 2016? In this new course authored by Orin Thomas - who literally wrote the book on Windows Server! - you'll get a guided tour and learn to better safeguard against security breaches. Windows Server 2016 provides layers of protection that help address both known and emerging threats. You'll learn how it actively contributes to securing your infrastructure. See how protections were built to mitigate an array of attack vectors and to deal with the overall threat of ongoing attacks inside the datacenter.You'll begin with a look at the hardening of Windows Server 2016, including hardware requirements for Secure Boot and guidance on disabling system services. Explore ways to configure network security, including firewalls, and look at secure virtualization, like encryption-supported virtual machines. From there, you'll dive into secure virtualization, threat detection, privileged identity, Desired State Configuration, and more. See demos, participate in hands-on labs, and pass the final exam, as you shore up your skills for ongoing security management.
In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. This includes a brief introduction to cryptography, security management and network and computer security that allows you to begin the journey into the study of information security and develop your appreciation of some key information security concepts. The course concludes with a discussion around a simple model of the information security industry and explores skills, knowledge and roles so that you can determine and analyse potential career opportunities in this developing profession and consider how you may need to develop personally to attain your career goals.
The perfect credential for those who have proven technical skills and expertise in hands-on operational IT positions. It is a globally recognized certification offering the ability to monitor, implement and administer IT infrastructure according to information security policies and procedure that make sure integrity, confidentiality and data availability. In the course, you will learn about main activities like risk management process, risk treatment and maintaining monitoring systems. In addition to this, it covers how to test and analyze malicious activity encompassing malicious code and countermeasures. In the end, you will come across best practices for securing big data systems and virtual environments like attack countermeasures and appliance.
After this course, you will be able to discover security vulnerabilities across an entire network, by using networkÂ hacking techniques and vulnerability scanning. You will be able to architect yourÂ network for maximum securityÂ and prevent local and remote attacks. We also cover the use of custom router firmware to provide you with better network security services. You will understand the various types of firewalls that are available and what threats each help mitigate.
Engineering Design is the process of devising a system, component, or process to meet desired needs. The course, Engineering Design, is specially made to teach the decision making process (often iterative) in which the basic sciences, mathematics, and engineering sciences are applied to convert resources optimally to meet a stated objective. The course is very beneficial for engineering and management professionals or students pursuing post graduation studies. | The certification tests the candidates on various areas in product planning, product specifications, prototyping, design for quality and reliability.