August 18-19, 2018 (Saturday-Sunday)

Size: px
Start display at page:

Download "August 18-19, 2018 (Saturday-Sunday)"

Transcription

1 August 18-19, 2018 (Saturday-Sunday) ORGANIZED BY: HUMAN RESOURCE DEVELOPMENT CENTER & SCHOOL OF COMPUTER & SCIENCE ENGINEERING LOVELY PROFESSIONAL UNIVERSITY PHAGWARA, PUNJAB.

2 BACK DROP AND RATIONALE In this growing world of mobile devices, cloud and social media. Information exchange plays a major role, as much as online platforms making things easier it also creates the risk of information getting stolen and the risk to our privacy and anonymity. Every day devices are Hacked and compromised by the hackers for their own personal benefits. Even though most of us own at least 2 devices on average but we are still naïve on how to secure our devices. The field of Cyber Security is of growing importance due to the increasing reliance on computer systems and the Internet, wireless networks such as Bluetooth and Wi-Fi, the growth of smart devices, including smartphones, televisions and tiny devices as part of the Internet of Things. LEARNING OUTCOMES Understand Linux operating system and its advanced commands. More refined knowledge of security and defense from cyber attacks Finding vulnerability in Network, OS and Web Applications. Methodology to mitigate Network and Web based attacks Learn how to secure yourself on social media and social networking sites. WHO CAN ATTEND Graduates and Professional seeking professional expertise in Cyber Security & hands on learning on VAPT Faculty and staff seeking professional enhancement PEDAGOGY Brief introduction of Kali Linux Live Demonstration Comprehensive hands-on Network VAPT Comprehensive hands-on Web VAPT Brief exploration of different attack vectors. Individual mentoring WORKSHOP PREREQUISITE Basic computing skills Willingness to learn new technologies Each participant should have Laptop with Kali Linux installed. CERTIFICATION Participation certificates will be awarded subject to meeting participation and assessment criteria RESOURCE PERSONS Mr. Nitin Umesh is Assistant Professor in School of Computer Science and Engineering, LPU. He has done Masters in Information Security from one of nation's top universities Indian Institute of Information Technology, Hyderabad and completed his masters from Supercomputer Education and Research Centre - Indian Institute of Science (Bangalore). A systematic educationist and an IT professional with a rich cross functional experience of over 8 years in teaching and industrial research. He is Certified Ethical Hacker and published many international papers in InfoSec field. He is active member of IEEE, Computer Society of India, Computer Science Teacher Association, National Information Security Council and EC Council..

3 Mr. Awadhesh Shukla is Assistant Professor in School of Computer Science and Engineering, LPU. He has done Masters in Network and Security from Lovely Professional University. His expertise lies in the internals of network VAPT and packet analysis. He received accolades from across the university. A professional educationist and an IT professional. He provided trainings on various domains ranging from Network administration to Ethical Hacking and Offensive Security. He has published numerous international papers in the field of InfoSec. He organized many events on Cyber Security within the university few among them are Hackinfinity CTF, Global Infosec Summit 2k17 and CyberSec v1.0 WORKSHOP SCHEDULE Day Day 1 (August 18, 2018) Day 2 (August 19, 2018) CONTENT Introduction kali Linux, Linux enumeration, Windows enumeration Active information gathering, Passive information gathering, Enumeration Subdomains and Network scanning, Web vulnerability scanning OWASP top 10 vulnerabilities, Hands on Sql- Injection, Cross-Site Scripting (XSS), Exploitation Framework (Metasploit, Burpsuite) and Hands on practice on computer forensic on volatile and nonvolatile data. FEE STRUCTURE Participant Type LPU Student/ Staff/Faculty/Alumni External (Non- Residential) Registration Fee per participant Rs. 1750/- Rs. 2050/- Registration Closes August 14, 2018 (or till seats last) Note: Online payment will be accepted up to August 14, Cash payment will be accepted for registered participants latest by August 16, 2018 upto 4 p.m., subject to the availability of seats. Fee once paid is non-refundable. Residential facilities can be arranged on request and against nominal charges HOW TO REGISTER Step 1: Go to or Step 2: As a New user enter your particulars to Register/ Create an Account Step 3: For Course Details click on View brochure in the Courses available Tab. Step 4: Login to your Account created at the time of Registration. If Already registered, you can directly Login and access your account. Step 5: Click on Register to register for the desired course available on the Home page. Step 6: Select the appropriate participant group for registration. If Research Scholar, attach proof of Registration in M.Phil. or Ph.D. Program. If student, attach student ID card. Step 7: Select the Payment mode and make payment accordingly.

4 MODE OF PAYMENT Online Payment: Net Banking/Debit Card/Credit Card Cash Payment: Step 1: Register for the FDP; Step 2: Download the Challan form; Step 3: Submit the Challan Form and Cash in Division of Accounts Block Window no. 1 from AM PM VENUE Human Resource Development Center, Block-32 Room No. 413, Lovely Professional University Campus, Jalandhar Delhi G.T. Road, National Highway, Phagwara, Punjab CERTIFICATION Participation certificates will be awarded subject to meeting participation criteria i.e.100% attendance. ORGANIZING COMMITTEE PROGRAM CONVENERS Dr. Sunaina Ahuja Associate Professor & Associate Dean, Human Resource Development Center, Lovely Professional University. Ph. No: Mr. Amandeep Nagpal Associate Professor & Associate Dean, School of Computer Science and Engineering, Lovely Professional University. Ph No: PROGRAM COORDINATORS Mr. Awadhesh Kumar Shukla, Assistant Professor, School of Computer Science and Engineering, Lovely Professional University. Ph. No: Mr. Sarabjit Singh Kwatra Asst. Director, Human Resource Development Center, Lovely Professional University, Ph. No: ABOUT THE HOST INSTITUTION Lovely Professional University has a mammoth ultra-modern high-tech campus sprawling along the National Highway No.1 at the entry of Jalandhar City. Lovely Professional University is acclaimed for academic excellence, range of programme offerings, the inspiring quality and breadth of its academic programmes and research initiatives. It has established uniqueness through its world class pedagogy, creative work, leadership skills, nurturing faculty and providing support needed in achieving career goals. Human Resource Development Center (HRDC) is an entity established under the aegis of Lovely Professional University for professional development of staff. The centre is responsible for planning, organizing, implementing, monitoring and evaluating the staff development programs as per the desired standards of quality intended to be delivered. A variety of Faculty Development Programs are conducted to enhance the quality of teaching and research. The Programs are specifically designed to master state of the art developments in course content, pedagogy and research methods. Training Programs are conducted by eminent resource persons from nationally and globally reputed institutions. LPU is the Local Chapter for National Programme on Technology Enhanced Learning (NPTEL), offered by seven premier IITs and IISC Bangalore with support from Ministry of HRD, Govt. Of India. LPU has been awarded AAA rating by

5 NPTEL. LPU has MOU with reputed institutions specializing in the area of Training and Development like National Institute of Technical teachers Training and Research (NITTTR), Chandigarh. For further clarification please contact Program Coordinators Or at: ; ; ; ;

ISDP 2018 Industry Skill Development Program In association with

ISDP 2018 Industry Skill Development Program In association with ISDP 2018 Industry Skill Development Program In association with Penetration Testing What is penetration testing? Penetration testing is simply an assessment in a industry computer network to test the

More information

DIS10.1 Ethical Hacking and Countermeasures

DIS10.1 Ethical Hacking and Countermeasures DIS10.1 Ethical Hacking and Countermeasures ABOUT DIS Why choose Us. Data and internet security council is the worlds top most information security certification body. Our uniquely designed course for

More information

DIS10.1:Ethical Hacking and Countermeasures

DIS10.1:Ethical Hacking and Countermeasures 1 Data and Information security Council DIS10.1:Ethical Hacking and Countermeasures HACKERS ARE NOT BORN, THEY BECOME HACKER About DIS :Data and Internet Security Council DIS is the Globally trusted Brand

More information

Training on CREST Practitioner Security Analyst (CPSA)

Training on CREST Practitioner Security Analyst (CPSA) 1 Training on CREST Practitioner Security Analyst (CPSA) Objectives This programme introduces to you to the CPSA, CREST Practitioner Security Analyst, and certification. This instructor led course covers

More information

CRAW Security. CRAW Security

CRAW Security. CRAW Security Course Description The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever want to be in. The CEH,

More information

Cyber Security School

Cyber Security School Cyber Cyber Security School FUTURE PROOF Y SECURITY TALENT "The UK needs to tackle the systemic issues at the heart of the Cyber skills shortage..." National Cyber Security Strategy 2016-2021, HM Government

More information

A Model for Penetration Testing

A Model for Penetration Testing A Model for Penetration Testing Chuck Easttom Collin College Professional Development chuck@chuckeasttom.com Research Gate Publication Abstract Penetration testing is an increasingly integral part of cyber

More information

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017 Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017 ITD 3443 Network Security Students will provide Cyber Defense while understanding Cyber Threats. Their attack types

More information

CEH: CERTIFIED ETHICAL HACKER v9

CEH: CERTIFIED ETHICAL HACKER v9 CEH: CERTIFIED ETHICAL HACKER v9 SUMMARY The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever

More information

EC-Council C EH. Certified Ethical Hacker. Program Brochure

EC-Council C EH. Certified Ethical Hacker. Program Brochure EC-Council TM C EH Program Brochure Target Audience This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the

More information

CYBER SECURITY & CYBER LAWS

CYBER SECURITY & CYBER LAWS NATIONAL LAW SCHOOL OF INDIA UNIVERSITY, BANGALORE ADVANCED CENTRE FOR RESEARCH, DEVELOPMENT AND TRAINING IN CYBER LAWS AND FORENSICS [ACRDTCLF] NATIONAL SEMINAR ON CYBER SECURITY & CYBER LAWS ISSUES &

More information

CSC 4992 Cyber Security Practice

CSC 4992 Cyber Security Practice CSC 4992 Cyber Security Practice Fengwei Zhang Wayne State University CSC 4992 Cyber Security Practice 1 Who Am I? Fengwei Zhang Assistant Professor of Computer Science Office: Maccabees Building, Room

More information

Online Intensive Ethical Hacking Training

Online Intensive Ethical Hacking Training Online Intensive Ethical Hacking Training Feel the heat of Security and Learn something out of the box 0 About the Course This is a 7 Days Intensive Training Program on Ethical Hacking & Cyber Security.

More information

Common Syllabus revised

Common Syllabus revised Department of Information Sciences and Technology Volgenau School of Engineering IT 369 Data and Application Security Common revised 08.23.2018 This syllabus contains information common to all sections

More information

Cross Platform Penetration Testing Suite

Cross Platform Penetration Testing Suite Cross Platform Penetration Testing Suite Ms. Shyaml Virnodkar, Rahul Gupta, Tejas Bharambe 1Asst Professor, Department of Computer Engineering, K J Somaiya Institute of Engineering and Information Technology,

More information

CYBERSECURITY: Scholarship and Job Opportunities

CYBERSECURITY: Scholarship and Job Opportunities CYBERSECURITY: Scholarship and Job Opportunities Malware Invasion in Cyberspace Blackhole Malware Exploit Kit (2012) Shamoon Virus (2012) Stuxnet Worm (2010) Operation Aurora (2009) and many others Job

More information

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

Course 831 EC-Council Certified Ethical Hacker v10 (CEH) Course 831 EC-Council Certified Ethical Hacker v10 (CEH) Duration: 5 days What You Get: CEH v10 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class

More information

EC-Council C EH. Certified Ethical Hacker. Program Brochure

EC-Council C EH. Certified Ethical Hacker. Program Brochure EC-Council TM H Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional will ever want to be in.

More information

MBA (Part Time) Batch Program Structure

MBA (Part Time) Batch Program Structure MBA (Part Time) 2019-21 Batch Program Structure MBA (Part Time) is a 30 months program conducted separately on Weekdays in the evening Monday to Friday and Weekends Saturdays & Sundays from morning to

More information

DIS10.2. DIS10.2:Advanced Penetration Testing and Security Analyst Certification. Online Training Classroom Training Workshops Seminars

DIS10.2. DIS10.2:Advanced Penetration Testing and Security Analyst Certification. Online Training Classroom Training Workshops Seminars Online Training Classroom Training Workshops Seminars DIS10.2 Data and Information security Council of India DIS10.2:Advanced Penetration Testing and Security Analyst Certification HACKERS ARE NOT BORN,

More information

Certified Ethical Hacker

Certified Ethical Hacker Certified Ethical Hacker Certified Ethical Hacker Course Objective Describe how perimeter defenses function by ethically scanning and attacking networks Conduct information systems security audits by understanding

More information

MAY. (Tue) Hong Kong. CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world

MAY. (Tue) Hong Kong. CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world 8 MAY 2018 (Tue) Hong Kong CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world CYBERSECURITY AND RISK MANAGEMENT By HKUST Business School Executive Education Office

More information

Advanced Ethical Hacking & Penetration Testing. Ethical Hacking

Advanced Ethical Hacking & Penetration Testing. Ethical Hacking Summer Training Internship Program 2017 (STIP - 2017) is a practical oriented & industrial level training program for all students who have aspiration to work in the core technical industry domain. This

More information

Faculty Profile. Educational Qualification

Faculty Profile. Educational Qualification Mr. Mr. Subhrajit Nag HOD subhrajit.nag@gnindia.dronacharya.info Faculty Profile M.Tech in Computer Science & Engg from Indian School of Mines, Dhanbad, in 2014 B.Tech in Computer Science & Engg from Abcus

More information

Course Specifications M. Tech. / PG Diploma Programme

Course Specifications M. Tech. / PG Diploma Programme Course Specifications M. Tech. / PG Diploma Programme Faculty of Engineering & Technology M. S. Ramaiah University of Applied Sciences University House, New BEL Road, MSR Nagar, Bengaluru 560 054 www.msruas.ac.in

More information

Updated with information about the new certificate programs THE KU MSIT HANDBOOK 1

Updated with information about the new certificate programs THE KU MSIT HANDBOOK 1 2016-2018 Updated with information about the new certificate programs THE KU MSIT HANDBOOK 1 THE KU MSIT HANDBOOK 2 MS in Information Technology (MSIT) School of Engineering The University of Kansas According

More information

EC-Council - EC-Council Certified Security Analyst (ECSA) v8

EC-Council - EC-Council Certified Security Analyst (ECSA) v8 EC-Council - EC-Council Certified Security Analyst (ECSA) v8 Code: 3402 Lengt h: URL: 5 days View Online The EC-Council Certified Security Analyst (ECSA) program teaches information security professionals

More information

Educational Qualification PhD (Computer and science engineering) - pursuing from Sir Padampat Singhania University, Udaipur, Rajasthan.

Educational Qualification PhD (Computer and science engineering) - pursuing from Sir Padampat Singhania University, Udaipur, Rajasthan. Mrs. Vijaya Umesh Pinjarkar Mobile : 9757143228 Email: vkhirodkar@somaiya.edu Professional Objective To utilize my teaching skills towards a challenging career in growth oriented and leading edge that

More information

FREQUENTLY ASKED QUESTIONS (FAQ)

FREQUENTLY ASKED QUESTIONS (FAQ) Version: V4.0 FREQUENTLY ASKED QUESTIONS (FAQ) Current promotion scheme In order to promote the International Day of Yoga, the stage-1 (theory) exam for both Level 1 and Level 2 will be free of cost. This

More information

Visit Website :

Visit Website : CITC - CHANDIGARH INSTITUTE OF TECHNOLOGY & CONSULTANCY ISO 9001:2015 Certified Visit Website : www.citcchandigarh.com # Unique Features # - CITC Govt. of India Regd. Institute - (A Venture of ETC Services

More information

Microsoft Innovation Center Achievements

Microsoft Innovation Center Achievements Microsoft Innovation Center Achievements Microsoft Student Partner (MSP) from our ACE - Microsoft Innovation Center (MIC) We are happy to inform you all, Our III - CSE student Mr. Gurram Vamshidhar Reddy

More information

S t a r t Y o u r O w n I n f o S e c - E d u c a t i o n B u s i n e s s

S t a r t Y o u r O w n I n f o S e c - E d u c a t i o n B u s i n e s s . S t a r t Y o u r O w n I n f o S e c - E d u c a t i o n B u s i n e s s . B y t e C o d e M a s t e r F r a n c h i s e P r o p o s a l - 2014 About Us Byte Code is an IT certifications and training

More information

About NIELIT. Demands for Courses in Computer Hardware

About NIELIT. Demands for Courses in Computer Hardware About NIELIT NIELIT is an autonomous scientific society under the administrative control of Department of Electronics and Information Technology (DeitY), Ministry of Communications & Information Technology,

More information

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE PROJECT MANAGEMENT CERTIFICATE PROGRAM Further your career and gain an understanding of what it takes to lead a project to successful completion functional skills,

More information

6 MILLION AVERAGE PAY. CYBER Security. How many cyber security professionals will be added in 2019? for popular indursty positions are

6 MILLION AVERAGE PAY. CYBER Security. How many cyber security professionals will be added in 2019? for popular indursty positions are PROGRAM Objective Cyber Security is the most sought after domain, and NASSCOM projects a requirment of over 1 million trained professionals by 2025. Tevel training program is an industry & employability

More information

Professional Excellence Summary

Professional Excellence Summary Mr. J.SANTHOSH B.E.,M.E., (Ph.D).,MISTE Assistant Professor Department of Computer Science & Engineering K.S.R. College of Engineering (Autonomous) Tiruchengode - 637 215, Namakkal District, TamilNadu.

More information

Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) Certified Ethical Hacker (CEH) COURSE OVERVIEW: The most effective cybersecurity professionals are able to predict attacks before they happen. Training in Ethical Hacking provides professionals with the

More information

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Duration: 5 days You Will Learn How To Understand how perimeter defenses work Scan and attack you own networks, without actually harming

More information

Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS

Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS Optional for Reviews During the 2018-2019 Accreditation Cycle Mandatory for Reviews During the 2019-2020 Accreditation

More information

Site Data Protection (SDP) Program Update

Site Data Protection (SDP) Program Update Advanced Payments October 9, 2006 Site Data Protection (SDP) Program Update Agenda Security Landscape PCI Security Standards Council SDP Program October 9, 2006 SDP Program Update 2 Security Landscape

More information

For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

For information regarding prerequisites for this course, please refer to the Academic Course Catalog. CSCI 632 Note: Course content may be changed, term to term, without notice. The information below is provided as a guide for course selection and is not binding in any form, and should not be used to purchase

More information

Support: HACK (4225)

Support: HACK (4225) About Us Cert Store (Certification Store) Solution, a complete Online and Offline Store where you can accomplish any IT/Security certification and Training program. Cert Store is master and specialized

More information

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker Learn to find security vulnerabilities before the bad guys do! The Certified Ethical Hacker (CEH) class immerses students in an interactive environment

More information

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students

More information

CertStore is a ISO (International Standard Organization) Certified and Approved by Govt. Of India.

CertStore is a ISO (International Standard Organization) Certified and Approved by Govt. Of India. CertStore (The Certification Store) A complete certification online and offline store where you can accomplish any of IT certification and Training. CertStore is master and specialized to deliver the IT

More information

C T I A CERTIFIED THREAT INTELLIGENCE ANALYST. EC-Council PROGRAM BROCHURE. Certified Threat Intelligence Analyst 1. Certified

C T I A CERTIFIED THREAT INTELLIGENCE ANALYST. EC-Council PROGRAM BROCHURE. Certified Threat Intelligence Analyst 1. Certified EC-Council C T Certified I A Threat Intelligence Analyst CERTIFIED THREAT INTELLIGENCE ANALYST PROGRAM BROCHURE 1 Predictive Capabilities for Proactive Defense! Cyber threat incidents have taken a drastic

More information

RESEARCH SCHOOL OF COMPUTER SCIENCE (RSCS) CURRICULUM DEVELOPMENT COMMITTEE

RESEARCH SCHOOL OF COMPUTER SCIENCE (RSCS) CURRICULUM DEVELOPMENT COMMITTEE RESEARCH SCHOOL OF COMPUTER SCIENCE (RSCS) CURRICULUM DEVELOPMENT COMMITTEE Meeting. 2/2017 of the will be held on Thursday 30 March 2017 at 12pm in Room R212, Ian Ross Building (31). Apologies and enquiries

More information

Course 831 Certified Ethical Hacker v9

Course 831 Certified Ethical Hacker v9 Course 831 Certified Ethical Hacker v9 Duration: 5 days What You Get: CEH v9 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class hours dedicated to

More information

Standard Course Outline IS 656 Information Systems Security and Assurance

Standard Course Outline IS 656 Information Systems Security and Assurance Standard Course Outline IS 656 Information Systems Security and Assurance I. General Information s Course number: IS 656 s Title: Information Systems Security and Assurance s Units: 3 s Prerequisites:

More information

NEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in

NEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in NEW JERSEY INSTITUTE OF TECHNOLOGY Initiation of Cyber Defense Option for the Master of Science in Cyber Security and Privacy (MS CSP) Degree Program With the approval of the Faculty Senate (and its Committee

More information

Frequently Asked Questions (FAQs) for Trainer

Frequently Asked Questions (FAQs) for Trainer Frequently Asked Questions (FAQs) for Trainer 1 What is a Training of Trainers program (ToT)? Training of Trainers (ToT) is a program for the development of training delivery skills of those who wish to

More information

Green Building/LEED AP Building Design & Construction Exam Preparation

Green Building/LEED AP Building Design & Construction Exam Preparation Green Building/LEED AP Building Design & Construction Exam Preparation Be among the first to master the new green building principles in the region February 16 17 and May 11 12, 2011 American University

More information

Ethical Hacking Foundation Exam Syllabus

Ethical Hacking Foundation Exam Syllabus 1 Table of contents Table of contents... 2 Exam Syllabus: Ethical Hacking Foundation... 3 Context... 3 Course objectives... 3 Target audience... 3 Prerequisites... 4 Exam information... 4 Examination details...

More information

Professional Evaluation and Certification Board Frequently Asked Questions

Professional Evaluation and Certification Board Frequently Asked Questions Professional Evaluation and Certification Board Frequently Asked Questions 1. About PECB... 2 2. General... 2 3. PECB Official Training Courses... 4 4. Course Registration... 5 5. Certification... 5 6.

More information

SkillCert Consultancy Pvt. Ltd. Training & Consulting Solutions

SkillCert Consultancy Pvt. Ltd. Training & Consulting Solutions Corporate www.skillcertconsultancy.com Brochure info@skillcert.in SkillCert Consultancy Pvt. Ltd. Training & Consulting Solutions Pedagogy- An art of Training Objective Improve skills Create sound understanding

More information

CRITERIA FOR ACCREDITING COMPUTING PROGRAMS

CRITERIA FOR ACCREDITING COMPUTING PROGRAMS CRITERIA FOR ACCREDITING COMPUTING PROGRAMS Effective for Reviews During the 2014-2015 Accreditation Cycle Incorporates all changes approved by the ABET Board of Directors as of October 26, 2013 Computing

More information

Invitation for Continuing Professional Education Session On March 01, 2014 (Saturday)

Invitation for Continuing Professional Education Session On March 01, 2014 (Saturday) 24 February, 2014 Dear colleagues, Invitation for Continuing Professional Education Session On March 01, 2014 (Saturday) Venue : Seminar Hall No. 1, IDSA Building Institute for Defence Studies and Analyses

More information

Matt Walker s All in One Course for the CEH Exam. Course Outline. Matt Walker s All in One Course for the CEH Exam.

Matt Walker s All in One Course for the CEH Exam. Course Outline. Matt Walker s All in One Course for the CEH Exam. Course Outline Matt Walker s All in One Course for the CEH Exam 03 May 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

Dumkal Institute of Engineering & Technology

Dumkal Institute of Engineering & Technology Dumkal Institute of Engineering & Technology P.O- Basantapur, Dist- Murshidabad, West Bengal, Pin- 742406 Ph No. 03481-231201/230033/231144 Fax: 03481-231188 Email- dietnet@hotmail.com, jobs@besdiet.org

More information

CLOUD COMPUTING WORKSHOP

CLOUD COMPUTING WORKSHOP CLOUD COMPUTING WORKSHOP ABOUT US WHO WE ARE CRAW Security is a Training and Consulting Company with high industry training and consulting Standards. CRAW Security Deals with various kinds of products

More information

Ethical Hacking. Content Outline: Session 1

Ethical Hacking. Content Outline: Session 1 Ethical Hacking Content Outline: Session 1 Ethics & Hacking Hacking history : How it all begin - Why is security needed? - What is ethical hacking? - Ethical Hacker Vs Malicious hacker - Types of Hackers

More information

Developing Career-Relevant Academic Programs

Developing Career-Relevant Academic Programs 2016 USENIX Summit for Educators in System Administration Developing Career-Relevant Academic Programs A Case Study: UMUC s B.S. Program in Computer Networks & Cybersecurity S. K. Bhaskar (S.Bhaskar@umuc.edu)

More information

DIPLOMA COURSE IN INTERNAL AUDIT

DIPLOMA COURSE IN INTERNAL AUDIT DIPLOMA COURSE IN INTERNAL AUDIT Course Objective: Internal Audit is an assurance and consulting service that reviews the efficiency and effectiveness of the internal control.. It assists management at

More information

Brief Profile of Founder

Brief Profile of Founder Brief Profile of Founder MOHAMMAD GHUFRAN ALI SIDDIQUI To unify the entire human race through revealed & acquired knowledge. Delivery of quality education and help to bridge gaps in educational levels

More information

SEPTEMBER 24-25, 2017 Lucknow, India SPONSORSHIP KIT SPONSORSHIP KIT.

SEPTEMBER 24-25, 2017 Lucknow, India SPONSORSHIP KIT SPONSORSHIP KIT. SEPTEMBER 24-25, 2017 Lucknow, India SPONSORSHIP KIT SPONSORSHIP KIT www.hackersday.org ABOUT NISS National Information Security (NISS) is an initiative of National Information Security Council which is

More information

College Of. Technological Innovation

College Of. Technological Innovation College Of Technological Innovation Contact Us 00971-2-5993111 (Abu Dhabi) 00971-4-4021111 (Dubai) 00971-4-4021408 (College of Technological Innovation) @Zayed_U zayeduniversity ZayedU www.zu.ac.ae Introduction

More information

FREQUENTLY ASKED QUESTIONS

FREQUENTLY ASKED QUESTIONS FREQUENTLY ASKED QUESTIONS About NPTEL What is NPTEL? NPTEL is an acronym for National Programme on Technology Enhanced Learning which is an initiative by seven Indian Institutes of Technology (IIT Bombay,

More information

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And

More information

SUBJECT: Teacher Certification Assessments TEST APPROVAL AND ESTABLISHMENT OF QUALIFYING SCORE

SUBJECT: Teacher Certification Assessments TEST APPROVAL AND ESTABLISHMENT OF QUALIFYING SCORE TO: FROM: Members of the State Board of Education Karen B. Salmon, Ph.D. DATE: SUBJECT: Teacher Certification Assessments TEST APPROVAL AND ESTABLISHMENT OF QUALIFYING SCORE PURPOSE: The purpose of this

More information

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Technology. on Technology. IT PH.D. Program.

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Technology. on Technology. IT PH.D. Program. ASSIUT UNIVERSITY Faculty of Computers and Information Department of Information Technology Informatiio on Technology PhD Program IT PH.D. Program Page 0 Assiut University Faculty of Computers & Informationn

More information

Hacking Exposed Wireless: Wireless Security Secrets & Colutions Ebooks Free

Hacking Exposed Wireless: Wireless Security Secrets & Colutions Ebooks Free Hacking Exposed Wireless: Wireless Security Secrets & Colutions Ebooks Free The latest wireless security solutions Protect your wireless systems from crippling attacks using the detailed security information

More information

DIS10.3:CYBER FORENSICS AND INVESTIGATION

DIS10.3:CYBER FORENSICS AND INVESTIGATION DIS10.3:CYBER FORENSICS AND INVESTIGATION ABOUT DIS Why choose Us. Data and internet security council is the worlds top most information security certification body. Our uniquely designed course for information

More information

Program Report for the Preparation of Social Studies Teachers National Council for Social Studies (NCSS) 2004 Option A

Program Report for the Preparation of Social Studies Teachers National Council for Social Studies (NCSS) 2004 Option A Program Report for the Preparation of Social Studies Teachers National Council for Social Studies (NCSS) 2004 Option A COVER SHEET This form includes the 2004 NCSS Standards 1. Institution Name 2. State

More information

Monthly Dinner Meeting

Monthly Dinner Meeting Newsletter Monthly Dinner Meeting Thursday, March 28, 2013 Deann Desai Georgia Institute of Technology THE CHANGES ARE COMING! The Changes are coming changes are coming. The High Level Structure and Text

More information

Deanship of Academic Development. Comprehensive eportfolio Strategy for KFU Dr. Kathryn Chang Barker Director, Department of Professional Development

Deanship of Academic Development. Comprehensive eportfolio Strategy for KFU Dr. Kathryn Chang Barker Director, Department of Professional Development Deanship of Academic Development Comprehensive eportfolio Strategy for KFU Dr. Kathryn Chang Barker Director, Department of Professional Development The new Department of Professional Development (DPD)

More information

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for

More information

Certified Ethical Hacker V9

Certified Ethical Hacker V9 Certified Ethical Hacker V9 Certificate: Certified Ethical Hacker Duration: 5 Days Course Delivery: Blended Course Description: Accreditor: EC Council Language: English This is the world s most advanced

More information

Venue : Panimalar Institute of Technology, Chennai EVENT DETAILS

Venue : Panimalar Institute of Technology, Chennai EVENT DETAILS Two days Zonal level workshops on IoT using RaspberryPi January 19-20,2018 Venue : Panimalar Institute of Technology, Chennai 600123 EVENT DETAILS Stages of Event Round 1: A Workshop will be organized

More information

Scanning. Introduction to Hacking. Networking Concepts. Windows Hacking. Linux Hacking. Virus and Worms. Foot Printing.

Scanning. Introduction to Hacking. Networking Concepts. Windows Hacking. Linux Hacking. Virus and Worms. Foot Printing. I Introduction to Hacking Important Terminology Ethical Hacking vs. Hacking Effects of Hacking on Business Why Ethical Hacking Is Necessary Skills of an Ethical Hacker What Is Penetration Testing? Networking

More information

Certification. What: Who: Where:

Certification. What: Who: Where: Certification What: Certification is a process by which the Wisconsin Technical College System Office evaluates the occupational, academic, and teaching experience of district employees to determine his/her

More information

CISCO CERTIFIED INTERNETWORK EXPERT (CCIE)

CISCO CERTIFIED INTERNETWORK EXPERT (CCIE) CISCO CERTIFIED INTERNETWORK EXPERT (CCIE) ABOUT US WHO WE ARE CRAW Security is a Training and Consulting Company with high industry training and consulting Standards. CRAW Security Deals with various

More information

Missouri State Educator Certification Q & A

Missouri State Educator Certification Q & A PLEASE NOTE: THIS DOCUMENT IS A GENERAL INFORMATION DOCUMENT WITH HELPFUL QUESTION AND ANSWERS ONLY - IT IS YOUR RESPONSIBILITY TO CHECK WITH THE DEPARTMENT OF ELEMENTARY AND SECONDARY EDUCATION (DESE)

More information

Part 3: Submit References

Part 3: Submit References New York State Training and Technical Assistance Professional Credential Content Specialist Application Process Part 1: Join Aspire Part 2: Intent to Apply Form Part 3: Submit References Content Specialist

More information

ITSY Information Technology Security Course Syllabus Spring 2018

ITSY Information Technology Security Course Syllabus Spring 2018 ITSY 1342 - Information Technology Security Course Syllabus Spring 2018 Instructor Course Reference Number (CRN) Course Description: Name: Fidelis Ngang Tel: 713-718-5552 Office: Spring Branch, Room 900L

More information

Get Chartered. Peer assessed Internationally recognised

Get Chartered. Peer assessed Internationally recognised CEng Peer assessed Internationally recognised Get Chartered In increasingly competitive times, gaining professional recognition for your work is vital. Employers and clients expect substantial evidence

More information

University. EC-Council ADMISSION APPLICATION.

University. EC-Council ADMISSION APPLICATION. EC-Council ADMISSION APPLICATION http://www.eccuni.us EC-Council Admission Application for the Master of Security Science Degree Program Please complete the enclosed application for the Master of Security

More information

Canadian Red Cross Instructor Transfer Pathway

Canadian Red Cross Instructor Transfer Pathway Canadian Red Cross Instructor Transfer Pathway First Aid and CPR/AED Instructor Transfer Course For current Instructors of another organization and/or current Red Cross Instructors of another disaplines

More information

Robert A. Robertson Ph.D., CISSP, GCFE, GCFA, GCIA

Robert A. Robertson Ph.D., CISSP, GCFE, GCFA, GCIA Summary Rob began his technical career with Automatic Data Processing (ADP), in their Dealer Service Division. His position at ADP laid the foundation for his passion for finding solutions to business

More information

CompTIA Cybersecurity Analyst+

CompTIA Cybersecurity Analyst+ CompTIA Cybersecurity Analyst+ Course CT-04 Five days Instructor-Led, Hands-on Introduction This five-day, instructor-led course is intended for those wishing to qualify with CompTIA CSA+ Cybersecurity

More information

Training programme. Hands-On Protection Relay School

Training programme. Hands-On Protection Relay School Training programme on Hands-On Protection Relay School March 16-20, 2015 Power Systems Division Central Power Research Institute (Govt. of India Society, Ministry of Power) Prof. Sir. C.V.Raman Road, P.B.No.8066,

More information

Introduction. Competencies. This course provides guidance to help you demonstrate the following 6 competencies:

Introduction. Competencies. This course provides guidance to help you demonstrate the following 6 competencies: This course supports the objective assessments for the Outside vendor certification for EC-Council Certified Ethical Hacker. The course covers 6 competencies and represents 3 competency units. Introduction

More information

Vision Develop ethically sound global professionals.

Vision Develop ethically sound global professionals. FM Academy (FMA) is an educational institution located at Kaloor, Kochi. FMA provides expert coaching for CMA (Certified Management Accountant) and CPA (Certified Public Accountant), the best-known credentials

More information

CYBER SECURITY TRAINING

CYBER SECURITY TRAINING CYBER Security skills for the digital age. Cyber Crime has never been more predominant. The number of breaches is exponentially rising year on year leading to an ever increasing Cyber Security threat.

More information

Cyber Security Day 1 Workforce Ready Graduates

Cyber Security Day 1 Workforce Ready Graduates Cyber Security Day 1 Workforce Ready Graduates Susan Moon Career Academy Coordinator November 6, 2014 Huntsville City Schools has implemented a that is: networked collaborative interactive personalized

More information

This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process.

This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process. EC Council Certified Ethical Hacker V9 This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different

More information

Master of Cyber Security, Strategy and Risk Management. CECS PG Information Session April 17, 2018

Master of Cyber Security, Strategy and Risk Management. CECS PG Information Session April 17, 2018 Master of Cyber Security, Strategy and Risk Management CECS PG Information Session April 17, 2018 2 Program Purpose Provide a working understanding of information, network and software security, across

More information

Ethical Hacking and Prevention

Ethical Hacking and Prevention Ethical Hacking and Prevention This course is mapped to the popular Ethical Hacking and Prevention Certification Exam from US-Council. This course is meant for those professionals who are looking for comprehensive

More information

CONTENTS 1) OVERVIEW OF ICAS 2. 2) DATA WAREHOUSING 4 Connecting on to ICAS 4 Logging on to ICAS 5

CONTENTS 1) OVERVIEW OF ICAS 2. 2) DATA WAREHOUSING 4 Connecting on to ICAS 4 Logging on to ICAS 5 CONTENTS 1) OVERVIEW OF ICAS 2 2) DATA WAREHOUSING 4 Connecting on to ICAS 4 Logging on to ICAS 5 3) THE INTEGRATED CAMPUS ADMINISTRATION SYSTEM THE MODULES 7 Applications & Enquiries Module 7 Registration

More information

Application Procedures: Fulbright English Teaching Assistantship IMPORTANT DATES AND DEADLINES - Application Year

Application Procedures: Fulbright English Teaching Assistantship IMPORTANT DATES AND DEADLINES - Application Year Application Procedures: Fulbright English Teaching Assistantship IMPORTANT DATES AND DEADLINES - Application Year 2018-19 Step Description Date Due Complete 1 Register for Fulbright Program Interest List

More information

Advanced Diploma on Information Security

Advanced Diploma on Information Security Course Name: Course Duration: Prerequisites: Course Fee: Advanced Diploma on Information Security 300 Hours; 12 Months (10 Months Training + 2 Months Project Work) Candidate should be HSC Pass & Basic

More information