Certificate Program in Computing and Cloud Security

Program Structure

Certificate Program in Computing and Cloud Security

Blended Learning | 6 Months (Inclusive of Project – 1 Month) | INR 59,000/-

Why Join Certificate Program in Computing and Cloud Security

Apply basic principles and practices of information security to successfully achieve the goal of cloud security

Understand, identify and formulate the cloud security issues

Skills To Be Mastered

Autopsy / Encrypted Disk Detector / Wireshark / Magnet RAM Capture / Network Miner / NMAP / Dumpzilla / Forensic Investigator / FAW

Program Structure

This Program is designed to train you in the fundamentals of Cyber Crime along with computing security. You will also learn the principles and practices of Information Security to successfully achieve the goal of Cloud security. Case- study based learning provides clear understanding of security issues in cloud. Hands-on experience with security tools like NMAP, Magnet RAM Capture and Splunk gives the experience of resolving real-time security issues. Knowledge of Cyber Laws helps to maintain professionalism within ethical boundaries.

Program Duration

6 Months (Inclusive of Project - 1 Month)

Mode Of Delivery

Blended Learning

Skillville Certificate

Certifications:

Vidyalankar and Skillville

Placements:

100% Placement assistance
Create profile, showcasing relevant skillsets
Aptitude, GD and Interview Training

Curriculum

6 Months certification program in computing and cloud security

– Introduction
– Cybercrime
– Cybercrime and information security
– Cybercriminals
– Classification of cyber crimes
– Cybercrime the legal perspective
– Cybercrime an Indian perspective

– Introduction
– How criminals plan the attack
– Social Engineering
– Cyber stalking
– Cybercafé and cybercrimes
– Botnets: The fuel for cybercrime
– Cloud computing

– Introduction
– Proxy servers and anonymizers
– Phishing
– Password checking
– Key loggers and spy waves
– Viruses and worms
– Trojan horses and balk doors
– Steganography
– DoS and DDoS attacks
– SQL injection
– Buffer overflow

– Meaning of secure
– Attacks
– Meaning of computer security
– Computer criminal ls
– Methods of defence

– Terminologies
– Substitution ciphers
– Transpositions (Permutation)
– Encryption algorithm
– Data encryption standard
– AES Encryption algorithm
– Public key encryption

– Secure programs
– Non Malicious program errors
– Viruses and other malicious codes
– Targeted malicious codes
– Controls against program threats

– Memory and address protection
– Control of access to general objects
– File protection mechanism
– User authentication

– Trusted system
– Security policies
– Models of security
– Trusted O.S. design
– Assurance in trusted O.S.

– Introduction
– Security requirement
– Reliability and integrity
– Sensitive data
– Inference
– Multilevel databases
– Proposals to multilevel security

– Essential characteristics
– Architectural influences
– Technological influences
– Operational influences
– Outsourcing
– IT service management

– Cloud information security objectives
– Confidentiality, Integrity, and availability
– Cloud security services
– Relevant cloud security design principles
– Secure cloud S/W requirements
– Secure cloud S/W testing
– Cloud computing & business continuity
– Planning disaster

– The CIA Triad
– Confidentiality
– Integrity
– Availability
– Privacy and compliances risks
– Threats to infrastructure, data, access control
– Common threats and vulnerabilities
– Cloud access control issues
– Cloud service provider risk

– Architectural consideration
– Trusted cloud computing
– Secure execution and environments and communication
– Microarchitectures
– Identity management & access control
– Autonomic security

– Overview of Security Management
– Information Classification Process
– Security Policy
– Risk Management
– Security Procedures and Guidelines
– Business Continuity and Disaster Recovery

– Security Assurance
– Security Laws
– International Standards
– Security Audit
– OCTAVE approach
– SSE-CMM

Admission Details

Eligibility

Chief Information Security Officer
Information Security Analyst
IT Security Engineer

Fees Details: INR 59,000/-

Please consult your Admission Counselor for flexi-EMI options

Contact Us

Please reach out to the admission office if you have any queries

knowmore@skillville.in

Our placement assistance program offers students one-on-one career counselling, and the chance to work with our corporate partners.

In case you drop out of the course due to a genuine reason, you will have 6 months’ time to return to it. If you fail to return to your course within this period, you will have to start afresh.

You can pay for the course of your interest on the website by clicking on the Fees tab via e-wallets, net banking, credit cards, debit cards as well as NEFT/Bank Transfer.

Refund must be claimed before the commencement of your batch. The Application form fees are non-refundable. Skillville will deduct 20% of the program fees paid till date of application for refund towards administrative charges and 80% will be refundable within 1 month from the approval of refund by a Skillville Authorized representative.

You will have an opportunity to catch up with a simultaneous batch in session or you can reach the respective Faculty to cover the missed class.

Please contact your Admission Counselor or drop an email regarding your querry to admissions@skillville.in.

Yes, Certificate will comprise following certification bodies AIMA, AICTE, SAS.Learnt tools and technologies will be enlisted on the certificate of completion along with secured grade.

Layer 1
Login Categories