August 18-19, 2018 (Saturday-Sunday)
|
|
- Jacob Christian O’Neal’
- 5 years ago
- Views:
Transcription
1 August 18-19, 2018 (Saturday-Sunday) ORGANIZED BY: HUMAN RESOURCE DEVELOPMENT CENTER & SCHOOL OF COMPUTER & SCIENCE ENGINEERING LOVELY PROFESSIONAL UNIVERSITY PHAGWARA, PUNJAB.
2 BACK DROP AND RATIONALE In this growing world of mobile devices, cloud and social media. Information exchange plays a major role, as much as online platforms making things easier it also creates the risk of information getting stolen and the risk to our privacy and anonymity. Every day devices are Hacked and compromised by the hackers for their own personal benefits. Even though most of us own at least 2 devices on average but we are still naïve on how to secure our devices. The field of Cyber Security is of growing importance due to the increasing reliance on computer systems and the Internet, wireless networks such as Bluetooth and Wi-Fi, the growth of smart devices, including smartphones, televisions and tiny devices as part of the Internet of Things. LEARNING OUTCOMES Understand Linux operating system and its advanced commands. More refined knowledge of security and defense from cyber attacks Finding vulnerability in Network, OS and Web Applications. Methodology to mitigate Network and Web based attacks Learn how to secure yourself on social media and social networking sites. WHO CAN ATTEND Graduates and Professional seeking professional expertise in Cyber Security & hands on learning on VAPT Faculty and staff seeking professional enhancement PEDAGOGY Brief introduction of Kali Linux Live Demonstration Comprehensive hands-on Network VAPT Comprehensive hands-on Web VAPT Brief exploration of different attack vectors. Individual mentoring WORKSHOP PREREQUISITE Basic computing skills Willingness to learn new technologies Each participant should have Laptop with Kali Linux installed. CERTIFICATION Participation certificates will be awarded subject to meeting participation and assessment criteria RESOURCE PERSONS Mr. Nitin Umesh is Assistant Professor in School of Computer Science and Engineering, LPU. He has done Masters in Information Security from one of nation's top universities Indian Institute of Information Technology, Hyderabad and completed his masters from Supercomputer Education and Research Centre - Indian Institute of Science (Bangalore). A systematic educationist and an IT professional with a rich cross functional experience of over 8 years in teaching and industrial research. He is Certified Ethical Hacker and published many international papers in InfoSec field. He is active member of IEEE, Computer Society of India, Computer Science Teacher Association, National Information Security Council and EC Council..
3 Mr. Awadhesh Shukla is Assistant Professor in School of Computer Science and Engineering, LPU. He has done Masters in Network and Security from Lovely Professional University. His expertise lies in the internals of network VAPT and packet analysis. He received accolades from across the university. A professional educationist and an IT professional. He provided trainings on various domains ranging from Network administration to Ethical Hacking and Offensive Security. He has published numerous international papers in the field of InfoSec. He organized many events on Cyber Security within the university few among them are Hackinfinity CTF, Global Infosec Summit 2k17 and CyberSec v1.0 WORKSHOP SCHEDULE Day Day 1 (August 18, 2018) Day 2 (August 19, 2018) CONTENT Introduction kali Linux, Linux enumeration, Windows enumeration Active information gathering, Passive information gathering, Enumeration Subdomains and Network scanning, Web vulnerability scanning OWASP top 10 vulnerabilities, Hands on Sql- Injection, Cross-Site Scripting (XSS), Exploitation Framework (Metasploit, Burpsuite) and Hands on practice on computer forensic on volatile and nonvolatile data. FEE STRUCTURE Participant Type LPU Student/ Staff/Faculty/Alumni External (Non- Residential) Registration Fee per participant Rs. 1750/- Rs. 2050/- Registration Closes August 14, 2018 (or till seats last) Note: Online payment will be accepted up to August 14, Cash payment will be accepted for registered participants latest by August 16, 2018 upto 4 p.m., subject to the availability of seats. Fee once paid is non-refundable. Residential facilities can be arranged on request and against nominal charges HOW TO REGISTER Step 1: Go to or Step 2: As a New user enter your particulars to Register/ Create an Account Step 3: For Course Details click on View brochure in the Courses available Tab. Step 4: Login to your Account created at the time of Registration. If Already registered, you can directly Login and access your account. Step 5: Click on Register to register for the desired course available on the Home page. Step 6: Select the appropriate participant group for registration. If Research Scholar, attach proof of Registration in M.Phil. or Ph.D. Program. If student, attach student ID card. Step 7: Select the Payment mode and make payment accordingly.
4 MODE OF PAYMENT Online Payment: Net Banking/Debit Card/Credit Card Cash Payment: Step 1: Register for the FDP; Step 2: Download the Challan form; Step 3: Submit the Challan Form and Cash in Division of Accounts Block Window no. 1 from AM PM VENUE Human Resource Development Center, Block-32 Room No. 413, Lovely Professional University Campus, Jalandhar Delhi G.T. Road, National Highway, Phagwara, Punjab CERTIFICATION Participation certificates will be awarded subject to meeting participation criteria i.e.100% attendance. ORGANIZING COMMITTEE PROGRAM CONVENERS Dr. Sunaina Ahuja Associate Professor & Associate Dean, Human Resource Development Center, Lovely Professional University. Ph. No: Mr. Amandeep Nagpal Associate Professor & Associate Dean, School of Computer Science and Engineering, Lovely Professional University. Ph No: PROGRAM COORDINATORS Mr. Awadhesh Kumar Shukla, Assistant Professor, School of Computer Science and Engineering, Lovely Professional University. Ph. No: Mr. Sarabjit Singh Kwatra Asst. Director, Human Resource Development Center, Lovely Professional University, Ph. No: ABOUT THE HOST INSTITUTION Lovely Professional University has a mammoth ultra-modern high-tech campus sprawling along the National Highway No.1 at the entry of Jalandhar City. Lovely Professional University is acclaimed for academic excellence, range of programme offerings, the inspiring quality and breadth of its academic programmes and research initiatives. It has established uniqueness through its world class pedagogy, creative work, leadership skills, nurturing faculty and providing support needed in achieving career goals. Human Resource Development Center (HRDC) is an entity established under the aegis of Lovely Professional University for professional development of staff. The centre is responsible for planning, organizing, implementing, monitoring and evaluating the staff development programs as per the desired standards of quality intended to be delivered. A variety of Faculty Development Programs are conducted to enhance the quality of teaching and research. The Programs are specifically designed to master state of the art developments in course content, pedagogy and research methods. Training Programs are conducted by eminent resource persons from nationally and globally reputed institutions. LPU is the Local Chapter for National Programme on Technology Enhanced Learning (NPTEL), offered by seven premier IITs and IISC Bangalore with support from Ministry of HRD, Govt. Of India. LPU has been awarded AAA rating by
5 NPTEL. LPU has MOU with reputed institutions specializing in the area of Training and Development like National Institute of Technical teachers Training and Research (NITTTR), Chandigarh. For further clarification please contact Program Coordinators Or at: ; ; ; ;
ISDP 2018 Industry Skill Development Program In association with
ISDP 2018 Industry Skill Development Program In association with Penetration Testing What is penetration testing? Penetration testing is simply an assessment in a industry computer network to test the
More informationDIS10.1 Ethical Hacking and Countermeasures
DIS10.1 Ethical Hacking and Countermeasures ABOUT DIS Why choose Us. Data and internet security council is the worlds top most information security certification body. Our uniquely designed course for
More informationDIS10.1:Ethical Hacking and Countermeasures
1 Data and Information security Council DIS10.1:Ethical Hacking and Countermeasures HACKERS ARE NOT BORN, THEY BECOME HACKER About DIS :Data and Internet Security Council DIS is the Globally trusted Brand
More informationTraining on CREST Practitioner Security Analyst (CPSA)
1 Training on CREST Practitioner Security Analyst (CPSA) Objectives This programme introduces to you to the CPSA, CREST Practitioner Security Analyst, and certification. This instructor led course covers
More informationCRAW Security. CRAW Security
Course Description The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever want to be in. The CEH,
More informationCyber Security School
Cyber Cyber Security School FUTURE PROOF Y SECURITY TALENT "The UK needs to tackle the systemic issues at the heart of the Cyber skills shortage..." National Cyber Security Strategy 2016-2021, HM Government
More informationA Model for Penetration Testing
A Model for Penetration Testing Chuck Easttom Collin College Professional Development chuck@chuckeasttom.com Research Gate Publication Abstract Penetration testing is an increasingly integral part of cyber
More informationOklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017
Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017 ITD 3443 Network Security Students will provide Cyber Defense while understanding Cyber Threats. Their attack types
More informationCEH: CERTIFIED ETHICAL HACKER v9
CEH: CERTIFIED ETHICAL HACKER v9 SUMMARY The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever
More informationEC-Council C EH. Certified Ethical Hacker. Program Brochure
EC-Council TM C EH Program Brochure Target Audience This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the
More informationCYBER SECURITY & CYBER LAWS
NATIONAL LAW SCHOOL OF INDIA UNIVERSITY, BANGALORE ADVANCED CENTRE FOR RESEARCH, DEVELOPMENT AND TRAINING IN CYBER LAWS AND FORENSICS [ACRDTCLF] NATIONAL SEMINAR ON CYBER SECURITY & CYBER LAWS ISSUES &
More informationCSC 4992 Cyber Security Practice
CSC 4992 Cyber Security Practice Fengwei Zhang Wayne State University CSC 4992 Cyber Security Practice 1 Who Am I? Fengwei Zhang Assistant Professor of Computer Science Office: Maccabees Building, Room
More informationOnline Intensive Ethical Hacking Training
Online Intensive Ethical Hacking Training Feel the heat of Security and Learn something out of the box 0 About the Course This is a 7 Days Intensive Training Program on Ethical Hacking & Cyber Security.
More informationCommon Syllabus revised
Department of Information Sciences and Technology Volgenau School of Engineering IT 369 Data and Application Security Common revised 08.23.2018 This syllabus contains information common to all sections
More informationCross Platform Penetration Testing Suite
Cross Platform Penetration Testing Suite Ms. Shyaml Virnodkar, Rahul Gupta, Tejas Bharambe 1Asst Professor, Department of Computer Engineering, K J Somaiya Institute of Engineering and Information Technology,
More informationCYBERSECURITY: Scholarship and Job Opportunities
CYBERSECURITY: Scholarship and Job Opportunities Malware Invasion in Cyberspace Blackhole Malware Exploit Kit (2012) Shamoon Virus (2012) Stuxnet Worm (2010) Operation Aurora (2009) and many others Job
More informationCourse 831 EC-Council Certified Ethical Hacker v10 (CEH)
Course 831 EC-Council Certified Ethical Hacker v10 (CEH) Duration: 5 days What You Get: CEH v10 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class
More informationEC-Council C EH. Certified Ethical Hacker. Program Brochure
EC-Council TM H Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional will ever want to be in.
More informationMBA (Part Time) Batch Program Structure
MBA (Part Time) 2019-21 Batch Program Structure MBA (Part Time) is a 30 months program conducted separately on Weekdays in the evening Monday to Friday and Weekends Saturdays & Sundays from morning to
More informationDIS10.2. DIS10.2:Advanced Penetration Testing and Security Analyst Certification. Online Training Classroom Training Workshops Seminars
Online Training Classroom Training Workshops Seminars DIS10.2 Data and Information security Council of India DIS10.2:Advanced Penetration Testing and Security Analyst Certification HACKERS ARE NOT BORN,
More informationCertified Ethical Hacker
Certified Ethical Hacker Certified Ethical Hacker Course Objective Describe how perimeter defenses function by ethically scanning and attacking networks Conduct information systems security audits by understanding
More informationMAY. (Tue) Hong Kong. CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world
8 MAY 2018 (Tue) Hong Kong CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world CYBERSECURITY AND RISK MANAGEMENT By HKUST Business School Executive Education Office
More informationAdvanced Ethical Hacking & Penetration Testing. Ethical Hacking
Summer Training Internship Program 2017 (STIP - 2017) is a practical oriented & industrial level training program for all students who have aspiration to work in the core technical industry domain. This
More informationFaculty Profile. Educational Qualification
Mr. Mr. Subhrajit Nag HOD subhrajit.nag@gnindia.dronacharya.info Faculty Profile M.Tech in Computer Science & Engg from Indian School of Mines, Dhanbad, in 2014 B.Tech in Computer Science & Engg from Abcus
More informationCourse Specifications M. Tech. / PG Diploma Programme
Course Specifications M. Tech. / PG Diploma Programme Faculty of Engineering & Technology M. S. Ramaiah University of Applied Sciences University House, New BEL Road, MSR Nagar, Bengaluru 560 054 www.msruas.ac.in
More informationUpdated with information about the new certificate programs THE KU MSIT HANDBOOK 1
2016-2018 Updated with information about the new certificate programs THE KU MSIT HANDBOOK 1 THE KU MSIT HANDBOOK 2 MS in Information Technology (MSIT) School of Engineering The University of Kansas According
More informationEC-Council - EC-Council Certified Security Analyst (ECSA) v8
EC-Council - EC-Council Certified Security Analyst (ECSA) v8 Code: 3402 Lengt h: URL: 5 days View Online The EC-Council Certified Security Analyst (ECSA) program teaches information security professionals
More informationEducational Qualification PhD (Computer and science engineering) - pursuing from Sir Padampat Singhania University, Udaipur, Rajasthan.
Mrs. Vijaya Umesh Pinjarkar Mobile : 9757143228 Email: vkhirodkar@somaiya.edu Professional Objective To utilize my teaching skills towards a challenging career in growth oriented and leading edge that
More informationFREQUENTLY ASKED QUESTIONS (FAQ)
Version: V4.0 FREQUENTLY ASKED QUESTIONS (FAQ) Current promotion scheme In order to promote the International Day of Yoga, the stage-1 (theory) exam for both Level 1 and Level 2 will be free of cost. This
More informationVisit Website :
CITC - CHANDIGARH INSTITUTE OF TECHNOLOGY & CONSULTANCY ISO 9001:2015 Certified Visit Website : www.citcchandigarh.com # Unique Features # - CITC Govt. of India Regd. Institute - (A Venture of ETC Services
More informationMicrosoft Innovation Center Achievements
Microsoft Innovation Center Achievements Microsoft Student Partner (MSP) from our ACE - Microsoft Innovation Center (MIC) We are happy to inform you all, Our III - CSE student Mr. Gurram Vamshidhar Reddy
More informationS t a r t Y o u r O w n I n f o S e c - E d u c a t i o n B u s i n e s s
. S t a r t Y o u r O w n I n f o S e c - E d u c a t i o n B u s i n e s s . B y t e C o d e M a s t e r F r a n c h i s e P r o p o s a l - 2014 About Us Byte Code is an IT certifications and training
More informationAbout NIELIT. Demands for Courses in Computer Hardware
About NIELIT NIELIT is an autonomous scientific society under the administrative control of Department of Electronics and Information Technology (DeitY), Ministry of Communications & Information Technology,
More informationROJECT ANAGEMENT PROGRAM AND COURSE GUIDE
ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE PROJECT MANAGEMENT CERTIFICATE PROGRAM Further your career and gain an understanding of what it takes to lead a project to successful completion functional skills,
More information6 MILLION AVERAGE PAY. CYBER Security. How many cyber security professionals will be added in 2019? for popular indursty positions are
PROGRAM Objective Cyber Security is the most sought after domain, and NASSCOM projects a requirment of over 1 million trained professionals by 2025. Tevel training program is an industry & employability
More informationProfessional Excellence Summary
Mr. J.SANTHOSH B.E.,M.E., (Ph.D).,MISTE Assistant Professor Department of Computer Science & Engineering K.S.R. College of Engineering (Autonomous) Tiruchengode - 637 215, Namakkal District, TamilNadu.
More informationCertified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH) COURSE OVERVIEW: The most effective cybersecurity professionals are able to predict attacks before they happen. Training in Ethical Hacking provides professionals with the
More informationCourse 832 EC-Council Computer Hacking Forensic Investigator (CHFI)
Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Duration: 5 days You Will Learn How To Understand how perimeter defenses work Scan and attack you own networks, without actually harming
More informationComputing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS
Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS Optional for Reviews During the 2018-2019 Accreditation Cycle Mandatory for Reviews During the 2019-2020 Accreditation
More informationSite Data Protection (SDP) Program Update
Advanced Payments October 9, 2006 Site Data Protection (SDP) Program Update Agenda Security Landscape PCI Security Standards Council SDP Program October 9, 2006 SDP Program Update 2 Security Landscape
More informationFor information regarding prerequisites for this course, please refer to the Academic Course Catalog.
CSCI 632 Note: Course content may be changed, term to term, without notice. The information below is provided as a guide for course selection and is not binding in any form, and should not be used to purchase
More informationSupport: HACK (4225)
About Us Cert Store (Certification Store) Solution, a complete Online and Offline Store where you can accomplish any IT/Security certification and Training program. Cert Store is master and specialized
More informationCISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline
CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker Learn to find security vulnerabilities before the bad guys do! The Certified Ethical Hacker (CEH) class immerses students in an interactive environment
More informationSTUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences
STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students
More informationCertStore is a ISO (International Standard Organization) Certified and Approved by Govt. Of India.
CertStore (The Certification Store) A complete certification online and offline store where you can accomplish any of IT certification and Training. CertStore is master and specialized to deliver the IT
More informationC T I A CERTIFIED THREAT INTELLIGENCE ANALYST. EC-Council PROGRAM BROCHURE. Certified Threat Intelligence Analyst 1. Certified
EC-Council C T Certified I A Threat Intelligence Analyst CERTIFIED THREAT INTELLIGENCE ANALYST PROGRAM BROCHURE 1 Predictive Capabilities for Proactive Defense! Cyber threat incidents have taken a drastic
More informationRESEARCH SCHOOL OF COMPUTER SCIENCE (RSCS) CURRICULUM DEVELOPMENT COMMITTEE
RESEARCH SCHOOL OF COMPUTER SCIENCE (RSCS) CURRICULUM DEVELOPMENT COMMITTEE Meeting. 2/2017 of the will be held on Thursday 30 March 2017 at 12pm in Room R212, Ian Ross Building (31). Apologies and enquiries
More informationCourse 831 Certified Ethical Hacker v9
Course 831 Certified Ethical Hacker v9 Duration: 5 days What You Get: CEH v9 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class hours dedicated to
More informationStandard Course Outline IS 656 Information Systems Security and Assurance
Standard Course Outline IS 656 Information Systems Security and Assurance I. General Information s Course number: IS 656 s Title: Information Systems Security and Assurance s Units: 3 s Prerequisites:
More informationNEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in
NEW JERSEY INSTITUTE OF TECHNOLOGY Initiation of Cyber Defense Option for the Master of Science in Cyber Security and Privacy (MS CSP) Degree Program With the approval of the Faculty Senate (and its Committee
More informationFrequently Asked Questions (FAQs) for Trainer
Frequently Asked Questions (FAQs) for Trainer 1 What is a Training of Trainers program (ToT)? Training of Trainers (ToT) is a program for the development of training delivery skills of those who wish to
More informationGreen Building/LEED AP Building Design & Construction Exam Preparation
Green Building/LEED AP Building Design & Construction Exam Preparation Be among the first to master the new green building principles in the region February 16 17 and May 11 12, 2011 American University
More informationEthical Hacking Foundation Exam Syllabus
1 Table of contents Table of contents... 2 Exam Syllabus: Ethical Hacking Foundation... 3 Context... 3 Course objectives... 3 Target audience... 3 Prerequisites... 4 Exam information... 4 Examination details...
More informationProfessional Evaluation and Certification Board Frequently Asked Questions
Professional Evaluation and Certification Board Frequently Asked Questions 1. About PECB... 2 2. General... 2 3. PECB Official Training Courses... 4 4. Course Registration... 5 5. Certification... 5 6.
More informationSkillCert Consultancy Pvt. Ltd. Training & Consulting Solutions
Corporate www.skillcertconsultancy.com Brochure info@skillcert.in SkillCert Consultancy Pvt. Ltd. Training & Consulting Solutions Pedagogy- An art of Training Objective Improve skills Create sound understanding
More informationCRITERIA FOR ACCREDITING COMPUTING PROGRAMS
CRITERIA FOR ACCREDITING COMPUTING PROGRAMS Effective for Reviews During the 2014-2015 Accreditation Cycle Incorporates all changes approved by the ABET Board of Directors as of October 26, 2013 Computing
More informationInvitation for Continuing Professional Education Session On March 01, 2014 (Saturday)
24 February, 2014 Dear colleagues, Invitation for Continuing Professional Education Session On March 01, 2014 (Saturday) Venue : Seminar Hall No. 1, IDSA Building Institute for Defence Studies and Analyses
More informationMatt Walker s All in One Course for the CEH Exam. Course Outline. Matt Walker s All in One Course for the CEH Exam.
Course Outline Matt Walker s All in One Course for the CEH Exam 03 May 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led
More informationDumkal Institute of Engineering & Technology
Dumkal Institute of Engineering & Technology P.O- Basantapur, Dist- Murshidabad, West Bengal, Pin- 742406 Ph No. 03481-231201/230033/231144 Fax: 03481-231188 Email- dietnet@hotmail.com, jobs@besdiet.org
More informationCLOUD COMPUTING WORKSHOP
CLOUD COMPUTING WORKSHOP ABOUT US WHO WE ARE CRAW Security is a Training and Consulting Company with high industry training and consulting Standards. CRAW Security Deals with various kinds of products
More informationEthical Hacking. Content Outline: Session 1
Ethical Hacking Content Outline: Session 1 Ethics & Hacking Hacking history : How it all begin - Why is security needed? - What is ethical hacking? - Ethical Hacker Vs Malicious hacker - Types of Hackers
More informationDeveloping Career-Relevant Academic Programs
2016 USENIX Summit for Educators in System Administration Developing Career-Relevant Academic Programs A Case Study: UMUC s B.S. Program in Computer Networks & Cybersecurity S. K. Bhaskar (S.Bhaskar@umuc.edu)
More informationDIPLOMA COURSE IN INTERNAL AUDIT
DIPLOMA COURSE IN INTERNAL AUDIT Course Objective: Internal Audit is an assurance and consulting service that reviews the efficiency and effectiveness of the internal control.. It assists management at
More informationBrief Profile of Founder
Brief Profile of Founder MOHAMMAD GHUFRAN ALI SIDDIQUI To unify the entire human race through revealed & acquired knowledge. Delivery of quality education and help to bridge gaps in educational levels
More informationSEPTEMBER 24-25, 2017 Lucknow, India SPONSORSHIP KIT SPONSORSHIP KIT.
SEPTEMBER 24-25, 2017 Lucknow, India SPONSORSHIP KIT SPONSORSHIP KIT www.hackersday.org ABOUT NISS National Information Security (NISS) is an initiative of National Information Security Council which is
More informationCollege Of. Technological Innovation
College Of Technological Innovation Contact Us 00971-2-5993111 (Abu Dhabi) 00971-4-4021111 (Dubai) 00971-4-4021408 (College of Technological Innovation) @Zayed_U zayeduniversity ZayedU www.zu.ac.ae Introduction
More informationFREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS About NPTEL What is NPTEL? NPTEL is an acronym for National Programme on Technology Enhanced Learning which is an initiative by seven Indian Institutes of Technology (IIT Bombay,
More informationIntroducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security
Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And
More informationSUBJECT: Teacher Certification Assessments TEST APPROVAL AND ESTABLISHMENT OF QUALIFYING SCORE
TO: FROM: Members of the State Board of Education Karen B. Salmon, Ph.D. DATE: SUBJECT: Teacher Certification Assessments TEST APPROVAL AND ESTABLISHMENT OF QUALIFYING SCORE PURPOSE: The purpose of this
More informationASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Technology. on Technology. IT PH.D. Program.
ASSIUT UNIVERSITY Faculty of Computers and Information Department of Information Technology Informatiio on Technology PhD Program IT PH.D. Program Page 0 Assiut University Faculty of Computers & Informationn
More informationHacking Exposed Wireless: Wireless Security Secrets & Colutions Ebooks Free
Hacking Exposed Wireless: Wireless Security Secrets & Colutions Ebooks Free The latest wireless security solutions Protect your wireless systems from crippling attacks using the detailed security information
More informationDIS10.3:CYBER FORENSICS AND INVESTIGATION
DIS10.3:CYBER FORENSICS AND INVESTIGATION ABOUT DIS Why choose Us. Data and internet security council is the worlds top most information security certification body. Our uniquely designed course for information
More informationProgram Report for the Preparation of Social Studies Teachers National Council for Social Studies (NCSS) 2004 Option A
Program Report for the Preparation of Social Studies Teachers National Council for Social Studies (NCSS) 2004 Option A COVER SHEET This form includes the 2004 NCSS Standards 1. Institution Name 2. State
More informationMonthly Dinner Meeting
Newsletter Monthly Dinner Meeting Thursday, March 28, 2013 Deann Desai Georgia Institute of Technology THE CHANGES ARE COMING! The Changes are coming changes are coming. The High Level Structure and Text
More informationDeanship of Academic Development. Comprehensive eportfolio Strategy for KFU Dr. Kathryn Chang Barker Director, Department of Professional Development
Deanship of Academic Development Comprehensive eportfolio Strategy for KFU Dr. Kathryn Chang Barker Director, Department of Professional Development The new Department of Professional Development (DPD)
More informationHacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK
Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for
More informationCertified Ethical Hacker V9
Certified Ethical Hacker V9 Certificate: Certified Ethical Hacker Duration: 5 Days Course Delivery: Blended Course Description: Accreditor: EC Council Language: English This is the world s most advanced
More informationVenue : Panimalar Institute of Technology, Chennai EVENT DETAILS
Two days Zonal level workshops on IoT using RaspberryPi January 19-20,2018 Venue : Panimalar Institute of Technology, Chennai 600123 EVENT DETAILS Stages of Event Round 1: A Workshop will be organized
More informationScanning. Introduction to Hacking. Networking Concepts. Windows Hacking. Linux Hacking. Virus and Worms. Foot Printing.
I Introduction to Hacking Important Terminology Ethical Hacking vs. Hacking Effects of Hacking on Business Why Ethical Hacking Is Necessary Skills of an Ethical Hacker What Is Penetration Testing? Networking
More informationCertification. What: Who: Where:
Certification What: Certification is a process by which the Wisconsin Technical College System Office evaluates the occupational, academic, and teaching experience of district employees to determine his/her
More informationCISCO CERTIFIED INTERNETWORK EXPERT (CCIE)
CISCO CERTIFIED INTERNETWORK EXPERT (CCIE) ABOUT US WHO WE ARE CRAW Security is a Training and Consulting Company with high industry training and consulting Standards. CRAW Security Deals with various
More informationMissouri State Educator Certification Q & A
PLEASE NOTE: THIS DOCUMENT IS A GENERAL INFORMATION DOCUMENT WITH HELPFUL QUESTION AND ANSWERS ONLY - IT IS YOUR RESPONSIBILITY TO CHECK WITH THE DEPARTMENT OF ELEMENTARY AND SECONDARY EDUCATION (DESE)
More informationPart 3: Submit References
New York State Training and Technical Assistance Professional Credential Content Specialist Application Process Part 1: Join Aspire Part 2: Intent to Apply Form Part 3: Submit References Content Specialist
More informationITSY Information Technology Security Course Syllabus Spring 2018
ITSY 1342 - Information Technology Security Course Syllabus Spring 2018 Instructor Course Reference Number (CRN) Course Description: Name: Fidelis Ngang Tel: 713-718-5552 Office: Spring Branch, Room 900L
More informationGet Chartered. Peer assessed Internationally recognised
CEng Peer assessed Internationally recognised Get Chartered In increasingly competitive times, gaining professional recognition for your work is vital. Employers and clients expect substantial evidence
More informationUniversity. EC-Council ADMISSION APPLICATION.
EC-Council ADMISSION APPLICATION http://www.eccuni.us EC-Council Admission Application for the Master of Security Science Degree Program Please complete the enclosed application for the Master of Security
More informationCanadian Red Cross Instructor Transfer Pathway
Canadian Red Cross Instructor Transfer Pathway First Aid and CPR/AED Instructor Transfer Course For current Instructors of another organization and/or current Red Cross Instructors of another disaplines
More informationRobert A. Robertson Ph.D., CISSP, GCFE, GCFA, GCIA
Summary Rob began his technical career with Automatic Data Processing (ADP), in their Dealer Service Division. His position at ADP laid the foundation for his passion for finding solutions to business
More informationCompTIA Cybersecurity Analyst+
CompTIA Cybersecurity Analyst+ Course CT-04 Five days Instructor-Led, Hands-on Introduction This five-day, instructor-led course is intended for those wishing to qualify with CompTIA CSA+ Cybersecurity
More informationTraining programme. Hands-On Protection Relay School
Training programme on Hands-On Protection Relay School March 16-20, 2015 Power Systems Division Central Power Research Institute (Govt. of India Society, Ministry of Power) Prof. Sir. C.V.Raman Road, P.B.No.8066,
More informationIntroduction. Competencies. This course provides guidance to help you demonstrate the following 6 competencies:
This course supports the objective assessments for the Outside vendor certification for EC-Council Certified Ethical Hacker. The course covers 6 competencies and represents 3 competency units. Introduction
More informationVision Develop ethically sound global professionals.
FM Academy (FMA) is an educational institution located at Kaloor, Kochi. FMA provides expert coaching for CMA (Certified Management Accountant) and CPA (Certified Public Accountant), the best-known credentials
More informationCYBER SECURITY TRAINING
CYBER Security skills for the digital age. Cyber Crime has never been more predominant. The number of breaches is exponentially rising year on year leading to an ever increasing Cyber Security threat.
More informationCyber Security Day 1 Workforce Ready Graduates
Cyber Security Day 1 Workforce Ready Graduates Susan Moon Career Academy Coordinator November 6, 2014 Huntsville City Schools has implemented a that is: networked collaborative interactive personalized
More informationThis ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process.
EC Council Certified Ethical Hacker V9 This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different
More informationMaster of Cyber Security, Strategy and Risk Management. CECS PG Information Session April 17, 2018
Master of Cyber Security, Strategy and Risk Management CECS PG Information Session April 17, 2018 2 Program Purpose Provide a working understanding of information, network and software security, across
More informationEthical Hacking and Prevention
Ethical Hacking and Prevention This course is mapped to the popular Ethical Hacking and Prevention Certification Exam from US-Council. This course is meant for those professionals who are looking for comprehensive
More informationCONTENTS 1) OVERVIEW OF ICAS 2. 2) DATA WAREHOUSING 4 Connecting on to ICAS 4 Logging on to ICAS 5
CONTENTS 1) OVERVIEW OF ICAS 2 2) DATA WAREHOUSING 4 Connecting on to ICAS 4 Logging on to ICAS 5 3) THE INTEGRATED CAMPUS ADMINISTRATION SYSTEM THE MODULES 7 Applications & Enquiries Module 7 Registration
More informationApplication Procedures: Fulbright English Teaching Assistantship IMPORTANT DATES AND DEADLINES - Application Year
Application Procedures: Fulbright English Teaching Assistantship IMPORTANT DATES AND DEADLINES - Application Year 2018-19 Step Description Date Due Complete 1 Register for Fulbright Program Interest List
More informationAdvanced Diploma on Information Security
Course Name: Course Duration: Prerequisites: Course Fee: Advanced Diploma on Information Security 300 Hours; 12 Months (10 Months Training + 2 Months Project Work) Candidate should be HSC Pass & Basic
More information