Certificate Program in Computing and Cloud Security

Blended Learning | 6 Months (Inclusive of Project - 1 Month) | INR 59,000/-

Certificate Program in Computing and Cloud Security | Category : IT

Why Join Certificate Program in Computing and Cloud Security

  • Apply basic principles and practices of information security to successfully achieve the goal of cloud security
  • Understand,identify and formulate the cloud security issues


1) Autopsy 2) Encrypted Disk Detector 3) Wireshark 4) Magnet RAM Capture 5) Network Miner 6) NMAP 7) Dumpzilla 8) Forensic Investigator 9) FAW

  • Overview
  • Program Structure
  • Certificate
  • Curriculum & Learning Outcomes
  • Admission & Fee Details
  • Contact Us & FAQs
  • Download Brochure


This Program is designed to train you in the fundamentals of Cyber Crime along with computing security. You will also learn the principles and practices of Information Security to successfully achieve the goal of Cloud security. Case- study based learning provides clear understanding of security issues in cloud. Hands-on experience with security tools like NMAP, Magnet RAM Capture and Splunk gives the experience of resolving real-time security issues. Knowledge of Cyber Laws helps to maintain professionalism within ethical boundaries.

Program Duration

6 Months (Inclusive of Project - 1 Month)

Mode Of Delivery

Blended Learning



6 Months certification program in computing and cloud security
Introduction to cyber crime

- Introduction
- Cybercrime
- Cybercrime and information security
- Cybercriminals
- Classification of cyber crimes
- Cybercrime the legal perspective
- Cybercrime an Indian perspective

Cyber offences: How criminals plan them

- Introduction
- How criminals plan the attack
- Social Engineering
- Cyber stalking
- Cybercafé and cybercrimes
- Botnets: The fuel for cybercrime
- Cloud computing

Tools and methods used in Cybercrime

- Introduction
- Proxy servers and anonymizers
- Phishing
- Password checking
- Key loggers and spy waves
- Viruses and worms
- Trojan horses and balk doors
- Steganography
- DoS and DDoS attacks
- SQL injection
- Buffer overflow

Computing Security

- Meaning of secure
- Attacks
- Meaning of computer security
- Computer criminal ls
- Methods of defence


- Terminologies
- Substitution ciphers
- Transpositions (Permutation)
- Encryption algorithm
- Data encryption standard
- AES Encryption algorithm
- Public key encryption

Program Security

- Secure programs
- Non Malicious program errors
- Viruses and other malicious codes
- Targeted malicious codes
- Controls against program threats

Protection in general purpose O.S.

- Memory and address protection
- Control of access to general objects
- File protection mechanism
- User authentication

Designing trusted O.S.

- Trusted system
- Security policies
- Models of security
- Trusted O.S. design
- Assurance in trusted O.S.

Database security

- Introduction
- Security requirement
- Reliability and integrity
- Sensitive data
- Inference
- Multilevel databases
- Proposals to multilevel security

Cloud computing fundamentals

- Essential characteristics
- Architectural influences
- Technological influences
- Operational influences
- Outsourcing
- IT service management

Cloud computing architecture

- Cloud information security objectives
- Confidentiality, Integrity, and availability
- Cloud security services
- Relevant cloud security design principles
- Secure cloud S/W requirements
- Secure cloud S/W testing
- Cloud computing & business continuity
- Planning disaster

Cloud computing risk Issues

- The CIA Triad
- Confidentiality
- Integrity
- Availability
- Privacy and compliances risks
- Threats to infrastructure, data, access control
- Common threats and vulnerabilities
- Cloud access control issues
- Cloud service provider risk

Cloud computing security architecture

- Architectural consideration
- Trusted cloud computing
- Secure execution and environments and communication
- Microarchitectures
- Identity management & access control
- Autonomic security

Security Management Practices

- Overview of Security Management
- Information Classification Process
- Security Policy
- Risk Management
- Security Procedures and Guidelines
- Business Continuity and Disaster Recovery

Security Laws and Standards

- Security Assurance
- Security Laws
- International Standards
- Security Audit
- OCTAVE approach



  • Chief Information Security Officer
  • Information Security Analyst
  • IT Security Engineer


INR 59,000/-

Please consult your Admission Counselor for flexi-EMI options


Please reach out to the admission office if you have any queries
100% Placement Assistance with Leading Corporates

Our placement assistance program offers students one-on-one career counselling, and the chance to work with our corporate partners.

What if I am unable to complete the course?

In case you drop out of the course due to a genuine reason, you will have 6 months’ time to return to it. If you fail to return to your course within this period, you will have to start afresh.

How will I pay for this course?

You can pay for the course of your interest on the website by clicking on the Fees tab via e-wallets, net banking, credit cards, debit cards as well as NEFT/Bank Transfer

What is the refund policy?

Refund must be claimed before the commencement of your batch. The Application form fees are non-refundable. Skillville will deduct 20% of the program fees paid till date of application for refund towards administrative charges and 80% will be refundable within 1 month from the approval of refund by a Skillville Authorized representative

What if you miss a class?

You will have an opportunity to catch up with a simultaneous batch in session or you can reach the respective Faculty to cover the missed class.

Whom should I contact in case of any purchase related query?

Please contact your Admission Counselor or drop an email regarding your querry to admissions@skillville.in.

Do I get a certificate of participation at the end of the training program?

Yes, you will get a certificate after completing your program after you meet the attendance and evaluation criteria set for your respective program.