|Course or Certification Name||Category||Location||Mode of learning|
|Security Operations||IPR||Online self study|
|K.K. Modi - Cyber Security Certification||Noida , Delhi , Gurgaon , Chandigarh , Bangalore , Hyderabad , Chennai , Ernakulam||Online Classroom|
|CCNP SECURITY TRAINING||Noida , Delhi , Gurgaon , Chandigarh , Bangalore , Hyderabad , Chennai , Ernakulam||Online Classroom|
|Ethical Hacking Ultimate Course||Ethical Hacking||Online self study|
|DevOps Engineer Masters Program||Noida , Delhi , Gurgaon , Chandigarh , Bangalore , Hyderabad , Chennai , Ernakulam||Online Classroom|
|IT Service Expert Program||ITSM||Online self study|
|Post graduate Diploma in Financial Engineering and Risk Management||Executive Program in Business Analytics & Data Science||Classroom|
|Machine Learning Engineer||Machine Learning||Online self study|
|AWS Certified DevOps Engineer Training||Noida , Delhi , Gurgaon , Chandigarh , Bangalore , Hyderabad , Chennai , Ernakulam||Online Classroom|
|CompTIA Advanced Security Practitioner (CASP)||Online self study|
|Network Security Administration||Noida , Delhi , Gurgaon , Chandigarh , Bangalore , Hyderabad , Chennai , Ernakulam||Online Classroom|
|Cyber Security For Normal People: Protect Yourself Online||Cyber Security||Online self study|
|Financial Engineering and Risk Management Part II||Credit & Financial Risk||Online self study|
|PG Diploma in IT Infrastructure, Systems and Security (PG-DITISS)||Cloud Computing||Classroom|
|Intro to Information Security||Information Security||Online self study|
How do businesses handle cyber attacks? What value does a security operations centre give to an organisation? Discover the answers to these questions on this course. You will have the opportunity to gain a deeper understanding of the processes of a SOC and how it’s operated by staff. You will also consider how it fits in within the rest of the business.
The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever want to be in
CCNP Security is the professional level of Cisco certification, focuses on network security professionals and engineer’s daily job task. Certification validates your skills and knowledge to deploy, configure, maintain, troubleshoot firewall, security tasks on routers and switches, VPNs and IDS/IPS solutions in enterprise networks.
This course starts from the very beginning, making it a great resource for newbies who are just starting out in Penetration Testing or cyber security individuals that will definitely benefit from it. Intermediate and advanced hackers can also use this course as a refresher. | This comprehensive course will cover all aspects of Ethical Hacking as well as integration with Kali Linux. However, this isn’t just a normal theory based courses, but it is an extremely hands-on course, so you will not only read the fundamentals, but you will actually get to work with them using projects! Learning and getting hands-on on Ethical Hacking and Penetration Testing will opens many doors for your career. There are lot of career opportunities in Cyber Security Industry, and there is stunning and amazing opportunities coming in as IoT is becoming tomorrows future.
This Masters Program makes you proficient in DevOps principles like CI/CD, Continuous Monitoring and Continuous Delivery, using tools like Puppet, Nagios, Chef, Docker, Git & Jenkins. It includes training on Linux, Python, Docker, AWS DevOps Certification Training and Splunk. The curriculum has been determined by extensive research on 5000+ job descriptions across the globe.
IT Service Expert Program is a certification course that would help you understand ITIL and how you can build specialized organisational capabilities to give superior services and deliver value to your customers. The Walt Disney Company, US Federal Government, IBM, WalMart and several other big businesses use ITIL. Understand how they have made the best use of ITIL and implement the principles to grow your organisation and yourself.
Post Graduate Diploma in Financial Engineering and Risk Management (PGDFERM) is a specific programme by National Institute of Securities Markets (NISM). The programme aims to equip the participants with skills in treasury and risk management functions. The course is a combination of basic and advanced theory and practical, and a combination of mathematics, statistics, financial economics, computational finance financial modelling and risk management. | The course will be offered in two different Formats - | Format A: Weekend programme at Vashi. | Format B: Residential programme at Vashi.
As more and more companies are looking to build machine learning products, there is a growing demand for engineers who are able to deploy machine learning models to global audiences. In this program, you’ll learn how to create an end-to-end machine learning product. You’ll deploy machine learning models to a production environment, such as a web application, and evaluate and update that model according to performance metrics. This program is designed to give you the advanced skills you need to become a machine learning engineer.
The AWS Certified DevOps Engineer – Professional exam validates technical expertise in provisioning, operating and managing distributed application systems on the AWS platform. Edureka's AWS Certified DevOps Engineer training has been designed to help an individual in developing advanced technical skills on CodeCommit, Codepipeline, CloudFormation, OpsWorks, Beanstalk and many more, needed to successfully attempt the AWS Certified DevOps Engineer – Professional examination. With this AWS professional certification under your belt, you will join an elite club of AWS Certified DevOps Engineer Professionals who are in high demand by employers worldwide.
This course meets the increasing demand for Advanced IT security in the business. In this course, you will cryptography concepts, tools along with discovering the security implications connected with enterprise storage. Host security also plays a great role in network security. You will learn security controls, end point security solutions and securing virtualized and cloud environments. It is significant to have procedures in place to ensure recovery happens as quickly as possible. With a high demand of information security threats, companies are eager to hire certified people with cybersecurity knowledge. You will be trained with an array of software and hardware so that you can provide the best solutions anywhere in IT.
Network Security Administration course trains you in ensuring that a network is secured from any internal or external security threats and incidents. With this course, you will be prepared to keep an organization's network safe, up-to-date and running smoothly.
This course outlines a step-by-step roadmap that you can follow to build a tight wall of security around your digital life.
Financial Engineering is a multidisciplinary field involving finance and economics, mathematics, statistics, engineering and computational methods. The emphasis of FE & RM Part II will be on the use of simple stochastic models to (i) solve portfolio optimization problems (ii) price derivative securities in various asset classes including equities and credit and (iii) consider some advanced applications of financial engineering including algorithmic trading and the pricing of real options. We will also consider the role that financial engineering played during the financial crisis.
The theoretical and practical mix of the Post Graduate Diploma in IT Infrastructure Systems and Security (PG-DITISS) programme has the following focus: | To explore the fundamental concepts of Cyber Security | To develop in-depth knowledge and understanding of the Intrusion Detection and Prevention domain. | To learn to analyze the threats detection techniques. | To understand the Concepts of Data Centre Management. | To learn & use various techniques for Ethical Hacking and Cyber Forensics. | To understand the applications security implementation. | To analyze and solve problems conceptually and practically from diverse industries, such as government manufacturing, retail, education, banking/ finance, healthcare and pharmaceutical. | To undertake industrial research projects for the development of future solutions in the domain of Information Security to make an impact in the technological advancement.
This course provides a one-semester overview of information security. It is designed to help students with prior computer and programming knowledge — both undergraduate and graduate — understand this important priority in society today. The technical content of the course gives a broad overview of essential concepts and methods for providing and evaluating security in information processing systems (operating systems and applications, networks, protocols, and so on). | In addition to its technical content, the course touches on the importance of management and administration, the place information security holds in overall business risk, social issues such as individual privacy, and the role of public policy.