Top Mba College In Pune

School of Management Continuing Education Programs

Essentials of Cyber Security

Duration :70 hours(12 weeks)

Eligibility : This program is best suited for aspirants having basic IT knowledge and wanting to build a career in Cyber Security.

  • Classroom Sessions – 16 Hours (4 Sessions in 2 Days; 4 Hours per Session)
  • Project – 10 Hours
  • Case Study – 5 Hours
  • Self-Learning – 30 Hours
  • Webinar (session by Industry expert) – 9 Hours (6 Sessions; 1.5 Hours per Session)
  • LMS Access – 3 Months
  • Collaboration App (Moxtra) Access – 3 Months
 

Why the Program?

The certificate course in Essentials of Cyber Security will fast track your appreciation and grasp of the intricacies of cyber security.

The learning outcomes will be:

  • Decipher and attain excellence in the essentials and fundamentals of cyber security
  • Competent and thorough appreciation of the various principles, best practices, tools and technologies in cyber security
  • Master the difference between IT Security, Information Security and Cyber Security
  • Ability to list and explain the threat landscape of today and
  • Assimilate cyber security and its myriad distinctions, its tools and technologies
The Program
 

Over 34% of the population in India has internet access. India is second largest smartphone market in the world, with over 220 million smartphone users. The penetration of smartphones along with high-speed internet creates a huge amount of data on a daily basis. Without a comprehensive and effective cyber security plan, the data on these devices and company servers is prone to vulnerabilities by viruses and cyber criminals. In the first 10 months of 2016, around 40,000 incidents of cybercrime were reported, in India alone. The global cyber security market is estimated to exceed US $170 Billion by 2020, suggests a report by Markets and Markets. The following modules will be covered

  • Introduction to Cyber Security (IT Security, Information Security, OT Security and Cyber Security)
  • Information Assurance concepts (Asset Classification, CIA Triad, Authentication and Authorization, Defense)
  • Cyber Security tools (Perimeter and Host-based Security, DNS and DHCP Security, SoC)
  • Understanding risk (Threat and Vulnerability, Calculating Risk and Its’ Lifecycle)
  • Threat landscape (Exploits, APT and Rootkits, Botnet, DDoS, Phishing and Vishing, Identity Theft)
  • Cyber Law in India (Information Technology Act, Digital Privacy in India)
  • Cyber warfare (Digital propaganda and Nation-states in cyber war)