Vishal Pathak Higher Technologies Trading Systems CTC-3.5 L. Prominds Consulting Pvt. Ltd. CTC- 2.7 L

Size: px
Start display at page:

Download "Vishal Pathak Higher Technologies Trading Systems CTC-3.5 L. Prominds Consulting Pvt. Ltd. CTC- 2.7 L"

Transcription

1 TM Appin Placements Placement Opportunities. appin Securing the digital age Sheik Nizamuddin Prominds Consulting Pvt. Ltd. CTC- 2.7 L 3I Infotech Innovation Insight Integrity Vishal Pathak Higher Technologies Trading Systems CTC-3.5 L Communications Anil Dhirubhai Ambani Group HCL Amit Nayan NIC CTC-1.2L osys P O W E R E D B Y I N T E L L E C T P atni Jatin Chowdhry WIPRO CTC-4.5 L D R I V E N B Y V A L U E S D LL SIEMENS Tazim Rathi IBM CTC- 5.5L MOTOROLA Honeywell C o u n t o n u s Ajay Porus Prominds Consulting Pvt. Ltd. CTC- 2.7 L Airtel Rohit Mahto HCL Technologies CTC-6.0 L Titus Thomas IBS Software Services Pvt. Ltd. CTC-3 L Formerly MBT and Axes Technologies Nishu Tyagi Higher Technologies Trading Systems CTC- 3.5 L Deepak Ayre Elecon Technologies Pvt. Ltd. CTC-3.3 L TM Sapient C& S Controls & Switchgear Group Tanmay Agarwal Appin Technologies CTC- 3.6 L A RIC E NT Communications Software amdocs Amit Kumar IBM CTC- 4.5 L Contact us : Amarpreet Singh 3 i InfoTech CTC- 2.4 L Appin Technology Lab Ritu Gupta Appin Technologies CTC- 2.4 L appin Securing the digital age Appin Masters Program Appin Masters Program

2 About us Appin Technologies is a global Information Security company focused on training, consulting and outsourcing services. Appin delivers consulting services such as ISO consulting & certification, Network audit, Website & application audit to the corporate and government sector. It also offers a complete range managed security services such as Network monitoring, Firewall Management, Log analysis, etc. via its Security operation center dashboard. Its premier list of clients include world's largest software company, second biggest airport in the world, greatest air-conditioning company in Japan, India's #one paper manufacturer, 3rd largest army in the world among others. Appin is a premier provider of hi- technology certification, courseware as well as online, computer based and instructor led training across the world. Appin is primarily an IIT Alumni company. Vision To be the Leader in Information Security and Ethical Hacking training, consulting and services. Mission To provide a complete range of Information Security solutions under one roof from Consulting to Training with securing nations and organizations across the globe. Credentials Served the world's third largest Army in terms of security needs. Rated as among the top 5 IT-Professional Course Offerings in India-The Week Magazine. An ISO 9001 and ISO certified company. Empanelled with CERT-in, CCA as Auditors-Controller of Certifying Authorities, Government of India, DDGIT (Army) and STQC. Serving security business for over five years across the globe operating Security Operations Center for India's leading international airport with R&D unit based out of IIT Delhi. Appreciated by the Dr. A.P.J Abdul Kalam during his tenure as President of India at Rashtrapati Bhawan for providing outstanding Information Security services to Govt. of India. Appin Radar, In-house Security Audit tool Best IT Implementation 2008 Nominee, PC Quest. Approved by the International Association of Distance Learning (IADL), UK Ranked 3rd by the India Today Magazine in innovative concepts. Awarded for innovative training in Ethical Hacking by the Outlook Magazine. 2

3 Appin Secures India s Modern Age Airports (Delhi, Hyderabad, Bangalore) Appin Advantage Appin Technologies offers many advantages to make your dream career in security and hacking a reality. Competing with the global top, Indian airports are set for modernization. State-of-the-art IT systems and data centers are implemented to manage their operations and to deliver world class performance. Airports also act as network service providers for third parties, such as airlines. All these steps boost efficiency and quality of service, but also increase the information security risks multifold. For Hyderabad International Airport Ltd. Appin Security Group took the challenge of complete airport security management, including security auditing, Security Operations Center (SOC) implementation and management, security incident management and people training and awareness, to ensure that the airport follows the road map of greater security. The assignment included a detailed security risk analysis with respect to people, process and technology, including vulnerability assessments, penetration testing, configurations audit. Backed by rigorous security risk analysis policies, procedures and IT security systems, the whole infrastructure is monitored from the central SOC inside the airport. The SOC monitors all IT devices, including routers, critical servers, switches, fire walls, and IDS/IPS. It also does forensics and handles all security incidents. 1. Industry Relevant curriculum Created after thorough research and a refined understanding of industry requirements and practices, the curriculum and all softwares taught, follow industry standards. 2. Holistic training An innovative concept of imparting Hi-technology training to students in niche areas empowered with an easy approach to develop theirskills that students can learn and apply 3. Certified Faculty Appin students gain the benefit of certified faculty that has undergone training by Industry Experts as well as International Appin labs % Placement Assistance Today, Appin students have carved successful career in some of the leading security and IT companies globally. Appin undertakes different placement initiatives through the year to ensure a student career gets off to a great start! 5. High end Infrastructure Information Security industry is a big, hi-tech industry. Appin ensures that its students gain the exposure to all niche technology. Students are given all the necessary high-end tools to apply what they have learnt. 3 4

4 Become A Network And Security Expert Network And Security World Wide Information security is the process of protecting availability, privacy and integrity of information. Access to stored information on computer databases has increased greatly as most of the companies store business and individual information on computer than ever before. Much of the information stored is highly confidential and not for public viewing. The academic disciplines of computer security, information security and information assurance emerged along with numerous professional organizations - all sharing the common goals of ensuring the security and reliability of information systems. Governments, military, corporate, financial institutions, hospitals, and private businesses amass a great deal of confidential information about their employees, customers, products, research, and financial status. Network Security as an upcoming technology in the field of Information security is becoming a big focus, Bigger than before. Be it social networking or network based malware exploits, this thing we call the Network is where we have to focus a large part of our security efforts. The Appin's Masters Program prepares you for numerous career opportunities. If you've ever wondered what you can become, here are some answers. Ethical Hacker Cyber security professional Network security professional Information Security Professional Information System Auditor Network Security Advisors IS Executive Network Engineer 2009 Worldwide intrusion detection and intrusion prevention system (IDS and IPS) product revenue sequentially grew 5.4% in Software developers IT specialists IT system executives IT consultants Junior Programmer 2010 The worldwide security and control market was valued at approximately $6 billion in 2005 and is forecasted to grow to $15 billion in Assistant Network Engineer Junior Network Test Engineer R&D Executive Network Security Consultant System Engineer 2012 The Network security market is expected to grow from $3.9 billion in 2008, to over $6.2 billion in Appin Masters will prepare students with a strong foundation in core IT skills. In addition, it will prepare them with skills in the area of programming, networks and IT security. Graduates will be technically-relevant and skilled and will be equipped with strong analytical, creative thinking and lifelong learning skills. With the knowledge and abilities gained from the tracks, graduates will be better placed to enter the workforce as information security specialists or network specialists with a good grounding in network security issues. 5 6

5 7 8 ppin Masters Program AAppin Masters Program is an initiative of Appin Technologies to bridge the gap between industry and academia by integration of learning and technology. Placement 100 % Job Placement Assistance is provided to all to unlock countless job opportunities in numerous sectors with some of the India's best companies through the Appin's Masters Program. A student Placement Cell dedicated for exploring job various opportunities across the world. Program Objectives To instill the current and comprehensive knowledge of Network Security. To enable students to develop and implement Information Security policies & practices and related change management. To develop students' management abilities in Information Security to be applied in organizations. To enable professionals to cope with the change management issues involved in developing and implementing information security policies in organizations. To expand the scholarly credentials of students, thereby increasing their marketability with prospective employers. Methodology The program will be conducted in a highly interactive and open environment providing opportunities of discussions and intellectual growth. The internationally certified faculties will train students to be not only an all rounded industry professional with broad based knowledge. World class content is provided to students and professionals. Eligibility Graduates from any stream/diploma holders Program The Program is spread across four Semesters of six months each and will be completed within two years. Award Successful completion of the Program entitles a candidate to receive a Post Graduate Diploma in the field of Network Security Internationally recognized and affiliated to IADL, UK.

6 1 2 Student's service Portal dedicated for each student giving current market updates, daily job openings, and general books for knowledge. Training Sessions through Experienced Faculties. 3 Study Material with world class content. Course Curriculum Appin Masters Course Duration: 2 years First Semester C/C++ Programming Second Semester DBMS Operating System Secured to Programming Networking Cryptography Introduction to Information Security Third Semester Data Security VAPT Network Securtiy Web Security 4 Practical Experience fulfilling Industry Requirements. 100% Placement assistance through Appin's dedicated placement cell. 6 Cyber Law Half Year dedicated to Internship/Project Work. Fourth Semester Project Work / Internship 5 7 Personal contact Sessions 8 High End Infrastructure Desktop and Server Security ISMS 9 10

The Information Security Specialist

The Information Security Specialist The Information Security Specialist 02 Appin Technologies Appin Technologies, with strength of 650 plus Information Security professionals in 2010, is Information Security training, consulting & outsourcing

More information

School of Engineering & Built Environment

School of Engineering & Built Environment School of Engineering & Built Environment BEng (Hons) in Digital Security, Forensics & Ethical Hacking Programme Specification Proforma (PSP) August 2015 P a g e 1 GLASGOW CALEDONIAN UNIVERSITY Programme

More information

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And

More information

Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL

Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL WHY CHOOSE QA? There are lots of apprenticeship providers out there but we think we

More information

PREPARE TO BECOME A CLOUD ARCHITECT

PREPARE TO BECOME A CLOUD ARCHITECT www.trainingbasket.in CARVED FOR : B. Tech M.Tech MCA BCA BSC(IT) MSC(IT) or Equivalent Track PREPARE TO BECOME A CLOUD ARCHITECT Learn Aws, Azure, Devops Cloud Architect Program Aims at 100% Placement

More information

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students

More information

Building the Cybersecurity Workforce. November 2017

Building the Cybersecurity Workforce. November 2017 Building the Cybersecurity Workforce November 2017 Our Global Footprint Measuring Kaplan University s Educational Impact For every career path +1MM students annually served Facilities in 30+ countries

More information

Computer Information Science xxx

Computer Information Science xxx 1 xxx The mission of the Faculty is to provide future-focused, studentcentred programmes that prepare students for the dynamic Information Systems and Information sectors of the UAE. CIS programme graduates

More information

Certificate Program in Project Management

Certificate Program in Project Management Certificate Program in Project Project Industry set to grow by $6.6 trillion by 2020 PMI s 2013 Talent Gap Report 41.5 million jobs in Project by 2020 PMIs 2015 Talent Gap Report PMP Certified Professional

More information

Bachelor Business Engineering Technology (Hons) in Networking System (BNS)

Bachelor Business Engineering Technology (Hons) in Networking System (BNS) NAME OF PROGRAMME Bachelor Business Engineering Technology (Hons) in Networking System (BNS) SHORT DESCRIPTION With embedded curriculum of professional bodies such Microsoft, COMPTIA to equip students

More information

DIS10.3:CYBER FORENSICS AND INVESTIGATION

DIS10.3:CYBER FORENSICS AND INVESTIGATION DIS10.3:CYBER FORENSICS AND INVESTIGATION ABOUT DIS Why choose Us. Data and internet security council is the worlds top most information security certification body. Our uniquely designed course for information

More information

College Of. Technological Innovation

College Of. Technological Innovation College Of Technological Innovation Contact Us 00971-2-5993111 (Abu Dhabi) 00971-4-4021111 (Dubai) 00971-4-4021408 (College of Technological Innovation) @Zayed_U zayeduniversity ZayedU www.zu.ac.ae Introduction

More information

Bachelor of Information Technology

Bachelor of Information Technology Higher Education Northern Sydney Institute Bachelor of Information Technology [ Network security ] www.nsi.tafensw.edu.au/itsecuritydegree Bachelor of Information Technology [ Network security ] Cybercrime

More information

Global Security Consulting Services, compliancy and risk asessment services

Global Security Consulting Services, compliancy and risk asessment services Global Security Consulting Services, compliancy and risk asessment services Introduced by Nadine Dereza Presented by Suheil Shahryar Director of Global Security Consulting Today s Business Environment

More information

Cyber Security School

Cyber Security School Cyber Cyber Security School FUTURE PROOF Y SECURITY TALENT "The UK needs to tackle the systemic issues at the heart of the Cyber skills shortage..." National Cyber Security Strategy 2016-2021, HM Government

More information

MSc Digital Marketing

MSc Digital Marketing MSc Digital Marketing Become a Certified Digital Marketing Master 2 YEARS PART-TIME STUDY ONLINE www.springhouse.com 610-321-3500 info@springhouse.com Validated by the Industry Advisory Council. Including

More information

you are the future CL - IBM A C A D E M Y Career Opportunities Our students are in demand in the following companies We believe * *

you are the future CL - IBM A C A D E M Y Career Opportunities Our students are in demand in the following companies We believe * * Career Opportunities Our students are in demand in the following companies Build your Foundation First! You are ready to select Specialisation You are somebody now, Stay relevant! INFOSYS IBM* WIPRO* *

More information

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research

More information

CyberVista Certify cybervista.net

CyberVista Certify cybervista.net ONLINE CYBERSECURITY CERTIFICATION TRAINING CyberVista Certify ONLINE CYBERSECURITY CERTIFICATION TRAINING CyberVista Certify CyberVista offers the industry s most comprehensive cybersecurity training

More information

MBA (Part Time) Batch Program Structure

MBA (Part Time) Batch Program Structure MBA (Part Time) 2019-21 Batch Program Structure MBA (Part Time) is a 30 months program conducted separately on Weekdays in the evening Monday to Friday and Weekends Saturdays & Sundays from morning to

More information

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018 GLOBAL ICT CAPACITY BUILDING SYMPOSIUM ITU CBS SANTO DOMINGO 2018 Digital Capacity Building: Role of the University 18 20 June 2018 Santo Domingo, Dominican Republic Dr. Nizar Ben Neji Faculty of Sciences

More information

a PennState A leader in online learning since 1998 Programs in Enterprise Architecture ~ World Campus A world of possibilities. Online.

a PennState A leader in online learning since 1998 Programs in Enterprise Architecture ~ World Campus A world of possibilities. Online. A leader in online learning since 1998 To learn more about programs in Enterprise Architecture, visit: worldcampus.psu.edu/psueabt Programs in Enterprise Architecture a PennState ~ World Campus A world

More information

Blending Information Systems Security and Forensics Curricula

Blending Information Systems Security and Forensics Curricula Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2012 Proceedings Midwest (MWAIS) 5-2012 Blending Information Systems Security and Forensics Curricula Jason Ferguson Friends University,

More information

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1 EC-Council Certified Incident Handler v2 Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1 THE CRITICAL NATURE OF INCIDENT HANDLING READINESS An organized and

More information

Curriculum Scheme. Dr. Ambedkar Institute of Technology, Bengaluru-56 (An Autonomous Institute, Affiliated to V T U, Belagavi)

Curriculum Scheme. Dr. Ambedkar Institute of Technology, Bengaluru-56 (An Autonomous Institute, Affiliated to V T U, Belagavi) Curriculum Scheme INSTITUTION VISION & MISSION VISION: To create Dynamic, Resourceful, Adept and Innovative Technical professionals to meet global challenges. MISSION: To offer state of the art undergraduate,

More information

CYBER SECURITY TRAINING

CYBER SECURITY TRAINING CYBER Security skills for the digital age. Cyber Crime has never been more predominant. The number of breaches is exponentially rising year on year leading to an ever increasing Cyber Security threat.

More information

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY The Foundation Certificate in Information Security (FCIS) course is designed to provide

More information

CESG:10 Steps to Cyber Security WORKING WITH GOVERNMENT, INDUSTRY AND ACADEMIA TO MANAGE INFORMATION RISK

CESG:10 Steps to Cyber Security WORKING WITH GOVERNMENT, INDUSTRY AND ACADEMIA TO MANAGE INFORMATION RISK CESG:10 Steps to Cyber Security WORKING WITH GOVERNMENT, INDUSTRY AND ACADEMIA TO MANAGE INFORMATION RISK Building resilience: 10 Steps to Cyber Security 1. Information Risk Management Regime 2. Secure

More information

Information Technology

Information Technology Information Technology 2017-2018 Well connected. Right here 2 Contents weltec.ac.nz/it Introductory NZ Certificate in Information Technology Essentials 6 NZ Diploma in Information Technology (Technical

More information

DIS10.1 Ethical Hacking and Countermeasures

DIS10.1 Ethical Hacking and Countermeasures DIS10.1 Ethical Hacking and Countermeasures ABOUT DIS Why choose Us. Data and internet security council is the worlds top most information security certification body. Our uniquely designed course for

More information

Internationally Recognised Courses Affordable Courses Job Guarantee

Internationally Recognised Courses Affordable Courses Job Guarantee Career prospects in Hardware & Networking courses in India. Nearly a decade ago, computer hardware and networking was not considered as a very lucrative career option in India but currently, IT, Computer

More information

BOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018

BOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018 STATE OF IOWA SEPTEMBER 12-13, 2018 REQUEST FOR NEW PROGRAM AT IOWA STATE UNIVERSITY: BACHELOR OF SCIENCE IN CYBER SECURITY ENGINEERING Contact: Rachel Boon Action Requested: Consider approval of the request

More information

Micro Focus Partner Program. For Resellers

Micro Focus Partner Program. For Resellers Micro Focus Partner Program For Resellers Contents Micro Focus Today About Micro Focus Our solutions for digital transformation Products and Solutions Program Membership Tiers Become a Portfolio Expert

More information

Major Program Selection Information. Information Systems An enriching path of study and career

Major Program Selection Information. Information Systems An enriching path of study and career Major Program Selection Information Information Systems An enriching path of study and career BBA in Information Systems BBA-IS Our IS Alumni Chris Kam BBA(IS) Class of 2007 Graduate, HKUST Senior Manager,

More information

CHARTERED INSTITUTE OF MARKETING. Strathmore Institute of Management & Technology

CHARTERED INSTITUTE OF MARKETING. Strathmore Institute of Management & Technology CHARTERED INSTITUTE OF MARKETING Strathmore Institute of Management & Technology CIM PROGRAM AT STRATHMORE UNIVERSITY The Chartered Institute of Marketing (CIM) is the largest and most successful professional

More information

CPA-CMA-CFA-ACCA. Launch your Global career with. KEYMAN EDUCATION SERVICES PVT LTD An initiative of IIMA Alumnus

CPA-CMA-CFA-ACCA. Launch your Global career with. KEYMAN EDUCATION SERVICES PVT LTD An initiative of IIMA Alumnus Launch your Global career with CPA-CMA-CFA-ACCA KEYMAN EDUCATION SERVICES PVT LTD An initiative of IIMA Alumnus Ph: 9440330395, E Mail: info@keyman.co.in www.keyman.co.in Hyderabad Mumbai Gurugram Delhi

More information

Make Your Statement. Master of Management in Library and Information Science online. Graduate Certificate in Library and Information Management online

Make Your Statement. Master of Management in Library and Information Science online. Graduate Certificate in Library and Information Management online Make Your Statement Master of Management in Library and Information Science online Graduate Certificate in Library and Information Management online Help shape the future of your field. The Master of Management

More information

STUDENT AND ACADEMIC SERVICES

STUDENT AND ACADEMIC SERVICES PROGRAMME SPECIFICATION Part 1: Information Awarding Institution Teaching Institution Delivery Location Study abroad / Exchange / Credit recognition Faculty responsible for programme Department responsible

More information

VIEW COURSE DETAILS DURATION:

VIEW COURSE DETAILS DURATION: Lab VIEW COURSE DETAILS DURATION: 45 Hours With Live Hands-on Sessions J P I N F O T E C H P U D U C H E R R Y O F F I C E : # 4 5, K a m a r a j S a l a i, T h a t t a n c h a v a d y, P u d u c h e r

More information

PROGRAMME SPECIFICATION

PROGRAMME SPECIFICATION PROGRAMME SPECIFICATION Master of Computing (Hons) in Computer Security Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool John Moores University

More information

Registered Prep provider of CFA Institute IMS PROSCHOOL

Registered Prep provider of CFA Institute IMS PROSCHOOL Registered Prep provider of CFA Institute Agenda CFA Qualification Career Prospects CFA Advantage Your pathway to CFA Qualification Training Programs IMS Proschool CFA at a glance Chartered Financial Analyst

More information

PMP & CAPM. Preparation

PMP & CAPM. Preparation PMP & CAPM User rating* Preparation Getting PMP certified has certainly helped me gain deep insight into strategic project management. Putting PMP after my name in my email signature has given me some

More information

Certified Business Analysis Professional (CBAP )

Certified Business Analysis Professional (CBAP ) Certified Business Analysis Professional (CBAP ) 3 Days Classroom Training PHILIPPINES :: MALAYSIA :: VIETNAM :: SINGAPORE :: INDIA Content Certified Business Analysis Professional - (CBAP ) Introduction

More information

BHConsulting. Your trusted cybersecurity partner

BHConsulting. Your trusted cybersecurity partner Your trusted cybersecurity partner BH Consulting Securing your business BH Consulting is an award-winning, independent provider of cybersecurity consulting and information security advisory services. Recognised

More information

Initial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020.

Initial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020. PROGRAMME SPECIFICATION Master of Computing (Hons) in Computer Forensics Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool John Moores University

More information

Course Specifications M. Tech. / PG Diploma Programme

Course Specifications M. Tech. / PG Diploma Programme Course Specifications M. Tech. / PG Diploma Programme Faculty of Engineering & Technology M. S. Ramaiah University of Applied Sciences University House, New BEL Road, MSR Nagar, Bengaluru 560 054 www.msruas.ac.in

More information

6 MILLION AVERAGE PAY. CYBER Security. How many cyber security professionals will be added in 2019? for popular indursty positions are

6 MILLION AVERAGE PAY. CYBER Security. How many cyber security professionals will be added in 2019? for popular indursty positions are PROGRAM Objective Cyber Security is the most sought after domain, and NASSCOM projects a requirment of over 1 million trained professionals by 2025. Tevel training program is an industry & employability

More information

Certification and Career Guide

Certification and Career Guide Certification and Career Guide CompTIA offers some of the most recognized entry-level certifications for IT professionals, including its A+, Network+ and Security+ certifications. This certification guide

More information

Professional certification from BCS, The Chartered Institute for IT. bcs.org/certification

Professional certification from BCS, The Chartered Institute for IT. bcs.org/certification Professional certification from BCS, The Chartered Institute for IT bcs.org/certification 02 03 INTRODUCTION BCS, The Chartered Institute for IT, is the leading institute for IT professionals around the

More information

CATALOG 2017/2018 BINUS UNIVERSITY. Cyber Security. Introduction. Vision. Mission

CATALOG 2017/2018 BINUS UNIVERSITY. Cyber Security. Introduction. Vision. Mission Cyber Security Introduction Cyber attack is raising and threaten ubiquitous world on internet today. Industry and government need cyber security expert to counter and defend from this threaten. Cyber Security

More information

Major Program Selection Information. Information Systems An enriching path of study and career

Major Program Selection Information. Information Systems An enriching path of study and career Major Program Selection Information Information Systems An enriching path of study and career BBA in Information Systems BBA-IS Our IS Alumni Benjamin Huber BBA(IS) Class of 2016 Graduate, HKUST Security

More information

PECB UNIVERSITY PECB UNIVERSITY

PECB UNIVERSITY PECB UNIVERSITY PECB UNIVERSITY In today s dynamic world a degree with no specialization can hardly yield well-rounded qualifications and serve as a substantial baggage for climbing the career ladder. Taking control over

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO/IEC 27002 Manager www.pecb.com The objective of the PECB Certified ISO/IEC 27002 Manager examination is to ensure that the candidate has

More information

Suma Soft s IT Risk & Security Management Solutions for Global Enterprises

Suma Soft s IT Risk & Security Management Solutions for Global Enterprises Suma Soft s IT Risk & Security Management Solutions for Global Enterprises Overview: For over 16 years, Suma Soft has provided IT risk management solutions for varied SMEs and MNCs and helped solve regulatory,

More information

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016

More information

SCHOOL OF APPLIED HANDS ON. HIGH VALUE. TECHNOLOGY LIVE AND ONLINE COURSES

SCHOOL OF APPLIED HANDS ON. HIGH VALUE. TECHNOLOGY LIVE AND ONLINE COURSES G R A D U A T E P R O G R A M S SCHOOL OF APPLIED TECHNOLOGY HANDS ON. HIGH VALUE. LIVE AND ONLINE COURSES At IIT School of Applied Technology (SAT) our focus is on the future. Our distinctive programs

More information

A United States Cyber Academy Program

A United States Cyber Academy Program The GIAC certifications I earned in the Academy really helped open doors for me as a cybersecurity professional. Justin Sappington, Information Security Analyst at Umpqua Bank A United States Cyber Academy

More information

A Brief Profile 2017

A Brief Profile 2017 A Brief Profile 2017 Future Netwings Solutions India s leading ISO 9001:2008 Certified IT Services Organization Over 18 Years experience in IT Infrastructure Design, Build & Support Sales & Support locations

More information

Professional Evaluation and Certification Board Frequently Asked Questions

Professional Evaluation and Certification Board Frequently Asked Questions Professional Evaluation and Certification Board Frequently Asked Questions 1. About PECB... 2 2. General... 2 3. PECB Official Training Courses... 4 4. Course Registration... 5 5. Certification... 5 6.

More information

OIL & GAS DIVISION TRAINING CONSULTING ENGINEERING IMPLEMENTING AUDITING. Reva Phoenix Engineers & Consultants India Private Limited

OIL & GAS DIVISION TRAINING CONSULTING ENGINEERING IMPLEMENTING AUDITING. Reva Phoenix Engineers & Consultants India Private Limited www.revaphoenix.com Reva Phoenix Engineers & Consultants India Private Limited OIL & GAS DIVISION TRAINING CONSULTING ENGINEERING IMPLEMENTING AUDITING 01 INTRODUCTION We at Reva Phoenix Engineers & Consultants

More information

Table of Contents. Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING

Table of Contents. Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING Table of Contents Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING Chapter 1: Significance of Internal Auditing in Enterprises Today: An Update 3 1.1 Internal Auditing History and Background

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. NO COST TO SELECTED PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO/IEC 20000 Lead Auditor www.pecb.com The objective of the Certified ISO/IEC 20000 Lead Auditor examination is to ensure that the candidate

More information

4 Days - Exam Preparation Course Classroom Training + Exam Simulator

4 Days - Exam Preparation Course Classroom Training + Exam Simulator Project Management Professional (PMP) 4 Days - Exam Preparation Course Classroom Training + Exam Simulator Your Complete PMP Exam Preparation Solution What s Included? 4 Days PMBOK Guide, Practice Exam

More information

DIS10.1:Ethical Hacking and Countermeasures

DIS10.1:Ethical Hacking and Countermeasures 1 Data and Information security Council DIS10.1:Ethical Hacking and Countermeasures HACKERS ARE NOT BORN, THEY BECOME HACKER About DIS :Data and Internet Security Council DIS is the Globally trusted Brand

More information

building for my Future 2013 Certification

building for my Future 2013 Certification I am building for my Future 2013 Certification Let ISACA help you open new doors of opportunity With more complex IT challenges arising, enterprises demand qualified professionals with proven knowledge

More information

Your Complete Project Management Professional (PMP) Exam Solution

Your Complete Project Management Professional (PMP) Exam Solution Your Complete Project Management Professional (PMP) Exam Solution Exam Preparation Course 4 Days Classroom Training + Exam Simulator Fully Aligned with PMBOK Guide 6th Edition Your Complete PMP Exam Preparation

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 37001 Lead Auditor www.pecb.com The objective of the Certified ISO 37001 Lead Auditor examination is to ensure that the candidate possesses

More information

IP Risk Assessment & Loss Prevention By Priya Kanduri Happiest Minds, Security Services Practice

IP Risk Assessment & Loss Prevention By Priya Kanduri Happiest Minds, Security Services Practice IP Risk Assessment & Loss Prevention By Priya Kanduri Happiest Minds, Security Services Practice IP Risk Assessment & Loss Prevention Often when organizations are expanding rapidly, they do not give sufficient

More information

Master degree program Technical legislation, standardization and quality management

Master degree program Technical legislation, standardization and quality management The experience of the Technical University of Sofia in education about standardization Master degree program Technical legislation, standardization and quality management Opened in 2007 at the Faculty

More information

RISK MANAGEMENT Education and Certification

RISK MANAGEMENT Education and Certification RISK MANAGEMENT Education and Certification aba.com/risked 1-800-BANKERS A new type of risk management professional is now in demand one that can demonstrate a thorough understanding of the complexities

More information

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS FAST TRACK Three steps to a cybersecurity career QUALIFY Take the qualifying exam, complete the application process, and

More information

MSc Digital Marketing

MSc Digital Marketing MSc Digital Marketing Become a 2 YEARS PART-TIME Digital Marketing Master STUDY ONLINE www.imarcomms.com Validated by the Industry Advisory Council. Including members from Content MSc Digital Marketing

More information

UNIVERSITY OF TEXAS AT DALLAS MIS 6302: Information Technology Strategy & Management SPRING 2014 Tuesday 7 to 9.45 pm

UNIVERSITY OF TEXAS AT DALLAS MIS 6302: Information Technology Strategy & Management SPRING 2014 Tuesday 7 to 9.45 pm UNIVERSITY OF TEXAS AT DALLAS MIS 6302: Information Technology Strategy & Management SPRING Tuesday 7 to 9.45 pm Course Outline Instructor: Professor Sumit Majumdar, Office: SOM 3.433, Office Phone: 972-883-4786,

More information

Security Awareness Training Courses

Security Awareness Training Courses Security Awareness Training Courses Trusted Advisor for All Your Information Security Needs ZERODAYLAB Security Awareness Training Courses 75% of large organisations were subject to a staff-related security

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 14001 Lead Auditor www.pecb.com The objective of the PECB Certified ISO 14001 Lead Auditor examination is to ensure that the candidate

More information

Developing the Next Generation Cyber Army VINCENT NESTLER, PH. D., CALIFORNIA STATE UNIVERSITY, SAN BERNARDINO

Developing the Next Generation Cyber Army VINCENT NESTLER, PH. D., CALIFORNIA STATE UNIVERSITY, SAN BERNARDINO Developing the Next Generation Cyber Army VINCENT NESTLER, PH. D., CALIFORNIA STATE UNIVERSITY, SAN BERNARDINO Bio Assistant Director, Cybersecurity Center California State University, San Bernardino Professor,

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 9001 Lead Auditor www.pecb.com The objective of the PECB Certified ISO 9001 Lead Auditor examination is to ensure that the candidate possesses

More information

Driving Global Resilience

Driving Global Resilience Driving Global Resilience Steve Mellish FBCI Chairman, The Business Continuity Institute Monday December 2nd, 2013 Business & IT Resilience Summit New Delhi, India Chairman of the Business Continuity Institute

More information

COBIT 5 Foundation Certification Training Course - Brochure

COBIT 5 Foundation Certification Training Course - Brochure COBIT 5 Foundation Certification Training Course - Brochure The Next Level of IT Security Governance Course Name : COBIT 5 Foundation Version : INVL_Cobit5_BR_02_081_1.1 Course ID : ITSG-130 www.invensislearning.com

More information

Course Information

Course Information Course Information 2018-2020 Master of Information Systems: Management and Innovation Institutt for teknologi / Department of Technology Index Index... i 1... 1 1.1 Content... 1 1.2 Name... 1 1.3 Programme

More information

PROFESSIONAL MASTER S IN

PROFESSIONAL MASTER S IN I m in a new job I love. ERIC LAFONTAINE Service Operations Manager GE Healthcare Class of 2013 PROFESSIONAL MASTER S IN APPLIED SYSTEMS ENGINEERING GAIN A COMPETITIVE EDGE WITH A GEORGIA TECH DEGREE TODAY

More information

School of Engineering & Built Environment

School of Engineering & Built Environment School of Engineering & Built Environment BSc (Hons) in Cyber Security and Networks Programme Specification Proforma (PSP) 2015/2016 Programme Specification Document 2015/2016 BSc (Hons) in Cyber Security

More information

About Us! September, 2007 Information Security or Ethical Hacking,

About Us! September, 2007 Information Security or Ethical Hacking, About Us! INNOBUZZ is privately owned Indian company based out of New Delhi, India which has been providing High Technology Training and Knowledge Based Solutions since September, 2007. Innobuzz has grown

More information

Security In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery.

Security In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery. Modular Security Services Offering - BFSI Security In A Box A new concept to Security Services Delivery. 2017 Skillmine Technology Consulting Pvt. Ltd. The information in this document is the property

More information

Welcome to the HP Institute

Welcome to the HP Institute Welcome to the HP Institute How HP is working with education to develop tomorrow s IT workforce today Capability Business need for speed The rate of business is increasing exponentially 2020 2T devices

More information

Apprenticeships CYBER SECURITY ADVANCED TO TECHNICAL MODERN APPRENTICESHIP FROM NQ-LEVEL TO SKILLED SECURITY ENGINEER

Apprenticeships CYBER SECURITY ADVANCED TO TECHNICAL MODERN APPRENTICESHIP FROM NQ-LEVEL TO SKILLED SECURITY ENGINEER Apprenticeships CYBER SECURITY ADVANCED TO TECHNICAL MODERN APPRENTICESHIP FROM NQ-LEVEL TO SKILLED SECURITY ENGINEER WHY CHOOSE QA? There are lots of apprenticeship providers out there but we think we

More information

Bsc (Hons) IT networking and Software Engineering Page 1

Bsc (Hons) IT networking and Software Engineering Page 1 Bsc (Hons) IT networking and Software Engineering Page 1 Information Technology is a key component in diversifying and growing economies around the world. Governments across the globe are using Information

More information

ACCA Certificate in Audit (RQF Level 4) Qualification specification

ACCA Certificate in Audit (RQF Level 4) Qualification specification ACCA Certificate in Audit (RQF Level 4) Qualification specification ABOUT ACCA We re the world s most forward thinking professional accountancy body. We believe that accountancy is vital for economies

More information

ITIL Intermediate Service Design (SD) Certification Boot Camp - Brochure

ITIL Intermediate Service Design (SD) Certification Boot Camp - Brochure ITIL Intermediate Service Design (SD) Certification Boot Camp - Brochure Get a Management-level overview of Service Design to advance in your Career Course Name : ITIL SD Version : INVL_ITILSD_BR_02_033_1.2

More information

Computer Information Systems

Computer Information Systems Computer Information Systems Credentials Information Technology Foundation Skills Certificate Cisco Networking Academy Skills Certificate Networking Specialist Certificate Networking Specialist AAS Degree

More information

August 18-19, 2018 (Saturday-Sunday)

August 18-19, 2018 (Saturday-Sunday) August 18-19, 2018 (Saturday-Sunday) ORGANIZED BY: HUMAN RESOURCE DEVELOPMENT CENTER & SCHOOL OF COMPUTER & SCIENCE ENGINEERING LOVELY PROFESSIONAL UNIVERSITY PHAGWARA, PUNJAB. BACK DROP AND RATIONALE

More information

School of Engineering and Built Environment

School of Engineering and Built Environment School of Engineering and Built Environment BEng(Hons) in Computer and Electronic Systems Engineering (with Pathways) Programme Specification Proforma (PSP) November 2015 GLASGOW CALEDONIAN UNIVERSITY

More information

Defining FM Excellence

Defining FM Excellence Your guide to the IFMA-RICS suite of credentials and professional development The IFMA-RICS Collaboration The most significant evolution in the history of facility management Suite of credentials Together,

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

Cybersecurity. Securely enabling transformation and change

Cybersecurity. Securely enabling transformation and change Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why

More information

Global Trade Professionals Alliance (GTPA) Creating an international standard for trade professionals, businesses & consulting services

Global Trade Professionals Alliance (GTPA) Creating an international standard for trade professionals, businesses & consulting services Global Trade Professionals Alliance (GTPA) Creating an international standard for trade professionals, businesses & consulting services Our goal is to bring people and organisations together Improve professional

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified OHSAS 18001 Lead Auditor www.pecb.com The objective of the PECB Certified OHSAS 18001 Lead Auditor examination is to ensure that the candidate

More information

ISO LEAD AUDITOR TRAINING

ISO LEAD AUDITOR TRAINING FINAL CERTIFICATION AWARDED BY PECB CANADA ISO 22301 LEAD AUDITOR TRAINING & CERTIFICATION (Business Continuity Management) Master the Audit of Business Continuity Management System (BCMS) based on ISO

More information

Secure Systems Administration and Engineering

Secure Systems Administration and Engineering Secure Systems Administration and Engineering Program Information The job outlook for careers in Cybersecurity and Information Technology continues to be very strong. Many experts predict a continued shortage

More information