|Course or Certification Name||Category||Location||Mode of learning|
|Vskills Certified Snort Professional Government Certification||Trending Server Tools||Offline self study|
|Network Security||Web Technologies||Online self study|
|Certified Internet Security Auditor (CISA)||CISA||Online self study|
|Big Data Engineering Perspectives||Big Data||Online self study|
|PG Certificate in Information and Cyber Security||Cyber Security||Classroom|
|Piping Engineering||Engineering Design||Classroom|
|Internet of Things Security Expert||Internet of Things||Noida , Delhi , Gurgaon , Chandigarh , Bangalore , Hyderabad , Chennai , Ernakulam||Online Classroom|
|Oracle Database 11g: Security||Online self study|
|Information Security||Information Security||Online self study|
|MTA IT Infrastructure - Security Fundamentals||Online self study|
|Security Operations||IPR||Online self study|
|Ethical Hacking Ultimate Course||Ethical Hacking||Online self study|
|IT Service Expert Program||ITSM||Online self study|
|Engineering Design||Engineering Design||Online self study|
|Post graduate Diploma in Financial Engineering and Risk Management||Executive MBA||Classroom|
Snort is the industry-leading open source intrusion prevention application. This Vskills Certified Snort Professional course assesses the candidate’s skills on a wide range of criteria that encompasses all the necessary open source components and the successful management and implementation of the technology. It is a government-certified course which ensures that the candidates are given the right training so that they stand up to the competition in the job market and get employment opportunities in various companies.
The summary for this course comes from the course web site at Georgia Tech. Note that watching this course on Udacity does not count for Georgia Tech credit unless you are enrolled in the Georgia Tech OMSCS program. | This course provides an introduction to computer and network security. Students successfully completing this class will be able to evaluate works in academic and commercial security, and will have rudimentary skills in security research. The course begins with a tutorial of the basic elements of cryptography, cryptanalysis, and systems security, and continues by covering a number of seminal papers and monographs in a wide range of security areas.
The Certified Information Systems Auditor (CISA) credential demonstrates that the individual possesses a firm understanding of IS audit, control and security skills as set out in the five domains that the Information Systems Audit and Control Association (ISACA)group has created. The CISA credential it recognized worldwide as a high-level certification of proficiency in IS auditing. This learning path will aid learners to prepare for the Certified Information Systems Auditor (CISA) examination.
Big data is a term for data sets so large that traditional data processing applications can not be used to perform any sort of analysis. It is often semi structured or unstructured in form. There are a number of unique challenges that arise when companies begin to use big data. The least of which are the engineering concerns. This course will introduce some of those engineering challenges and describe how some companies have come up with solutions.
N L Dalmia Institute of Management Studies & Research offers the first of it’s kind in India –6 months post-graduation certificate in Information and Cyber Security | The course divided into three stages, gives the students a unique opportunity to develop their careers in ethical hacking and cyber security. The course is a perfect fit for students with a strong engineering/sciences background in computer sciences and information technology. The course would holistically cover everything right from the basics of penetration testing to cyber laws.
Piping Engineering course is one-of-a-kind. This course is structured to raise the level of expertise in piping design and to improve the competitiveness in the global markets. This course provides various piping system designs, development skills and knowledge of current trends of plant layout. The students are given case studies to develop their professional approach
Internet of Things Security Expert is a 360° training program for professionals who seek to deepen their knowledge in the field of Internet of Things. The program is customised based on comprehensive knowledge about various IoT Security platforms. This program is designed by the industry experts to provide hands-on training with tools that are used to speed up the training process. | The program is inclusive of full-fledged training, starting from Python, advanced IoT training, to IoT security, all of which are found to be essential for IoT Security Experts. These modules put together will provide a solid foundation and give a further edge in the learning process. | Take 360° Master’s Program training in IoT Security Expert to | Gain expert level knowledge to build, test and deploy applications using Python. Learn suitability of python to use it to write device, gateway and cloud based applications and scripts. | Gain advance level knowledge to architect, build and implement IoT projects from selection of right components to securing the ecosystem using relevant tools and technologies. | Build a security plan, extend security to peripheries, and gain familiarity with fundamental cryptographic algorithms need to safeguard IoT systems.
Oracle Database is an object-relational database management system produced and marketed by Oracle Corporation. With the objective that every business should identify security threats and concerns and develop policies to protect itself, Oracle Database 11g: Security course aims at providing the candidates with detailed learning modules that will train them on standard security practices related to maintaining integrity of, protecting and controlling data. Database professionals can enhance their skills on how to configure Oracle Database 11g in a secure manner through this course. It also offers comprehensive training on a wide array of topics related to Oracle Database security like proxy authentication, database encryption, Oracle Label Security, Data Masking Pack, Firewalls, SQL*Plus Security, and other related areas. The prerequisite for this course is that learner should have working experience with Oracle Database 11g or have taken the Oracle Database 11g: Administration I and Oracle Database 11g: Administration Workshop II courses.
This course on information security establishes concepts of protecting data information assets without getting affected by the way information is formatted, processed, transmitted or stored. The program also involves modules on preventing unauthorized access, modification or destruction of data. The course fee includes INR 300 as courier charges for the study material.
Microsoft Technology Associate (MTA) is a suite of technology certification exams that validate a candidate’s fundamental knowledge needed to build a career using Microsoft technologies.| This Security Fundamentals course has been specifically designed to provide the best-in-the-industry training to the candidates on some of the main core concepts in IT security — confidentiality, integrity, and availability | Designed by expert professionals, this course has high quality online learning content and study materials | The course covers various areas like security layers, operating system security, network security, and security software | Aligned with the MTA: Security exam, the course offers a certification upon completion
How do businesses handle cyber attacks? What value does a security operations centre give to an organisation? Discover the answers to these questions on this course. You will have the opportunity to gain a deeper understanding of the processes of a SOC and how it’s operated by staff. You will also consider how it fits in within the rest of the business.
This course starts from the very beginning, making it a great resource for newbies who are just starting out in Penetration Testing or cyber security individuals that will definitely benefit from it. Intermediate and advanced hackers can also use this course as a refresher. | This comprehensive course will cover all aspects of Ethical Hacking as well as integration with Kali Linux. However, this isn’t just a normal theory based courses, but it is an extremely hands-on course, so you will not only read the fundamentals, but you will actually get to work with them using projects! Learning and getting hands-on on Ethical Hacking and Penetration Testing will opens many doors for your career. There are lot of career opportunities in Cyber Security Industry, and there is stunning and amazing opportunities coming in as IoT is becoming tomorrows future.
IT Service Expert Program is a certification course that would help you understand ITIL and how you can build specialized organisational capabilities to give superior services and deliver value to your customers. The Walt Disney Company, US Federal Government, IBM, WalMart and several other big businesses use ITIL. Understand how they have made the best use of ITIL and implement the principles to grow your organisation and yourself.
Engineering Design is the process of devising a system, component, or process to meet desired needs. The course, Engineering Design, is specially made to teach the decision making process often iterative in which the basic sciences, mathematics, and engineering sciences are applied to convert resources optimally to meet a stated objective. The course is very beneficial for engineering and management professionals or students pursuing post graduation studies.
Post Graduate Diploma in Financial Engineering and Risk Management (PGDFERM) is a specific programme by National Institute of Securities Markets (NISM). The programme aims to equip the participants with skills in treasury and risk management functions. The course is a combination of basic and advanced theory and practical, and a combination of mathematics, statistics, financial economics, computational finance financial modelling and risk management. | The course will be offered in two different Formats - | Format A: Weekend programme at Vashi. | Format B: Residential programme at Vashi.