EN

Translate:

Career Nourishers
Career Nourishers
  • Home
  • Online
    • Applications of IOT
    • Art of WinWin Negotiation
    • Cloud Native Computing
    • Cyber Security
    • Emotional Intelligence
    • Story Telling for Leaders
    • SMART Time Management
    • Cloud Computing with AWS
    • Apps of Design Thinking
    • Apps of Data Analytics
    • Python Programming
    • OOPS in Java
    • QMS Agile Lean Six Sigma
    • Recasting D Captain
    • Enlightenment through EI
  • Classroom
    • Career Assure
    • Career Enrich
  • Blog
  • Career Boost
    • Get FREE eBook
    • Career Guidance
  • Explore
    • About us
    • e-Learn
    • Digital Academy
    • Check Credentials
    • Student FAQ
    • Media Coverage
    • Contact Us
  • Attend
  • More
    • Home
    • Online
      • Applications of IOT
      • Art of WinWin Negotiation
      • Cloud Native Computing
      • Cyber Security
      • Emotional Intelligence
      • Story Telling for Leaders
      • SMART Time Management
      • Cloud Computing with AWS
      • Apps of Design Thinking
      • Apps of Data Analytics
      • Python Programming
      • OOPS in Java
      • QMS Agile Lean Six Sigma
      • Recasting D Captain
      • Enlightenment through EI
    • Classroom
      • Career Assure
      • Career Enrich
    • Blog
    • Career Boost
      • Get FREE eBook
      • Career Guidance
    • Explore
      • About us
      • e-Learn
      • Digital Academy
      • Check Credentials
      • Student FAQ
      • Media Coverage
      • Contact Us
    • Attend
  • Sign In
  • Create Account

  • My Account
  • Signed in as:

  • filler@godaddy.com


  • My Account
  • Sign out


EN

Signed in as:

filler@godaddy.com

  • Home
  • Online
  • Classroom
  • Blog
  • Career Boost
  • Explore
  • Attend

Account


  • My Account
  • Sign out


  • Sign In
  • My Account

Cyber Security

With organizations having to secure an increasing amount of sensitive data, cyber security is becoming relevant and essential for businesses of all sizes. As the scale and scope of threats continue to rise at a fast pace, fresh opportunities are opening up for qualified data professionals in diverse sectors.

Introduction

Cyber Security is the process and techniques involved in protecting sensitive data, computer systems, networks and software applications from cyber attacks. The cyber attacks are general terminology which covers a large number of topics, but some of the popular are:  

  • Tampering systems and data stored within
  • Exploitation of resources
  • Unauthorized access to the targeted system and accessing sensitive information
  • Disrupting normal functioning of the business and its processes
  • Using ransomware attacks to encrypt data and extort money from victims

The Growing Challenge

The attacks are now becoming more innovative and sophisticated that is capable of disrupting the security and hacking the systems. So it’s very challenging for every business and security analyst to overcome this challenge and fight back with these attack.

Need of the hour

Cyber Security has become critical to the fabric of any modern business. As breach after breach hits the headlines, it's clear to everyone that organizations need more professionals focused on cyber security. Certainly it is a growth area that will remain critical for any business.

Limited Offer

Register Now

 Join us for a FREE masterclass to learn the criticality of Cyber Security and the Technologies involved to build it. The session will be conducted by an Industry specialist with deep expertise in this area. 

About the Certificate Course

Introduction

The purpose of this course is to equip one with the technologies involved in Cyber Security. The knowledge of these technologies helps in building an appreciation of possible threats, taking preventive measures and taking corrective actions when need be.

Course Coverage

  1. Basic Concepts
  2. Cryptography, Cryptographic Protocols & IPSec
  3. OS Security - Access Control, Rootkit
  4. Hacking (Ethical & Malicious)
  5. DDOS & Ransomware
  6. HTTP - DNS Filtering
  7. Malaware & Worms
  8. Firewalls
  9. Intrusion Detection & Prevention
  10. OWASP10
  11. Vulnerability Testing
  12. API Security
  13. SQL Injection & Cross site scripting
  14. Incident Response Plan & Attack planning
  15. Tools & Methods

  • a) Proxy Servers and Anonymizers.
  • b) Phishing.
  • c) Password Cracking.
  • d) Keyloggers and Spywares.
  • e) Virus and Worms
  • f) DoS and DDoS Attacks.
  • g) Attacks on Wireless Networks.
  • h) Identity Theft (ID Theft).

  1. Understanding Computer Forensics

  • a) Cyber forensics and Digital Evidence.
  • b) Forensics Analysis of Email.

Course Design

This is an on-line instructor-lead course that'll be covered over 6 sessions of two hours each. There will be typically two sessions in a week so that the participants get time to practice what is covered and complete practical assignments. The course is focused more on practice.

Next batch to be announced soon!

Course Fee

Regular Price: Rs 9999

Register Now

Why Join this course?

  • Instructor lead course
  • Lead by SME with vast industrial experience
  • Practice based Learning
  • Course Structure allowing space between classes to give time for self study and practice
  • Value for money

Register Now

About Jagdish - the Lead Instructor for the course

Jagdish is a Cyber Security consultant at 3SR Consultacy. He is an IT professional (having worked with TCS and HCL Tech) and specializes in Cyber Security, Machine Learning, Cloud Computing and Big Data. He has over 30 years of industry experience.


Jagdish has worked with large global organizations including HSBC, TCS, HCL Technology and Diebold. He has lead large engagements for Fortune 500 (HSBC, Citibank, Deutsche Bank, RBS, Stanchart, P&O Nedlloyd, Royal Mail etc) companies across the Globe.


Jagdish consults and provides advisory services in the area of Cyber Security, Machine Learning, Cloud Architecture and IT strategy. He is passionate about teaching and he is a guest faculty at BITS PIlani. He teaches Cyber Security and Machine Learning to MTech  (WILP) classes.

Register Now

Testimonials

  • Online Interactive
  • Classroom Learning
  • Career Guidance
  • About us
  • Contact Us

Career Nourishers

Copyright © 2020 3SR Consultancy - All Rights Reserved.

Individual Learning solutions from 3SR Consultancy