International Institute of Information Technology Bangalore
- University
- Co - Education
- ESTD 1999
- Engineering
Interested in this College?
PG Certificate Certified Cyber Warrior
Course
The program is a comprehensive Cybersecurity course to learn the steps to prevent attacks and detect adversaries with actionable techniques that can be directly applied. As Certified Cyber Warrior, the participant will learn tips and tricks which is a mix of industry & academia.
It is a comprehensive course to learn the most effective steps to prevent attacks and detect adversaries with actionable techniques that one can directly apply when they get back to work.
As Certified Cyber Warrior, the participant will learn tips and tricks from the best of the experts from a mix of industry & academia, so that they can win the battle against the wide range of cyber adversaries that want to harm the enterprises’ IT environment.
Eligibility
- For Indian Participants - Graduates or Diploma Holders (10+2+3) from a recognized university (UGC/AICTE/DEC/AIU/State Government) in any discipline.
- For International Participants - Graduation or equivalent degree from any recognized University or Institution in their respective country.
PREPARE FOR A LUCRATIVE FUTURISTIC CAREER IN CYBER SECURITY
It is comprehensive course to learn the most effective steps to prevent attacks and detect adversaries with actionable techniques that one can directly apply when they get back to work after training. Being organized in partnership with Forensics Intelligence Surveillance and Security Technologies (FISST) & Talentedge.
As Certified Cyber Warrior, the participant will learn tips and tricks from the best of the experts from a mix of industry & academia, so that they can win the battle against the wide range of cyber adversaries that want to harm the enterprises’ IT environment.
- Opportunity to earn a Certificate from IIIT Bangalore.
- Lectures imparted by eminent academicians and practicing industry experts.
- Get exposure to contemporary and sought after areas like IOT device security, Blockchain, Cryptocurrencies etc.
- Gain comprehensive understanding of applicable Cyber Laws.
- 2 days On Campus “Bootcamp” style workshop module covering hands on exposure to labs on Cyber Threats and Cryptography etc.
- Certification ceremony on campus at the completion of the programme
PROGRAMME HIGHLIGHTS / USPs
Course Benefits to Participants
Build a lucrative and futuristic career in the field of Cyber Security (on date at salaries are peaking to premium, as India / World goes Digital way). According to NASSCOM, the estimated demand for security workforce to rise globally to six million by 2019, up from 4 million in 2015, with projected shortfall of 1.5 million (https://www.gadgetsnow.com/tech-news/Cybersecurity-to-create-1million-jobs-Nasscom/articleshow/51884133.cms)
- Apply what they learned directly to their job when they get back to work
- Design and build a network architecture using VLANs, NAC, and 802.1x based on advanced persistent threat indicators of compromise
- Run Windows command line tools to analyze the system looking for high-risk items
- Run Linux command line tools (ps, ls, netstat, etc.) and basic scripting to automate the running of programs to perform continuous monitoring of various tools
- Install VMWare and create virtual machines to create a virtual lab to test and evaluate tools/security of systems
- Create an effective policy that can be enforced within an organization and design a checklist to validate security and create metrics to tie into training and awareness
- Identify visible weaknesses of a system using various tools (mostly free or minimal subscription – without large investment) and, once vulnerabilities are discovered, cover ways to configure the system to be more secure
- Build a network visibility map that can be used for hardening of a network - validating the attack surface and covering ways to reduce that surface by hardening and patching
- Sniff open protocols like telnet and ftp and determine the content, passwords, and vulnerabilities using WireShark and many more relevant tools
Career Opportunities
- Security professionals and managers
- IT engineers and Administrators.