Certificate Program in Computing and Cloud Security
Certificate Program in Computing and Cloud Security
Blended Learning | 6 Months (Inclusive of Project – 1 Month) | INR 59,000/-
Why Join Certificate Program in Computing and Cloud Security
Apply basic principles and practices of information security to successfully achieve the goal of cloud security
Understand, identify and formulate the cloud security issues
Skills To Be Mastered
Autopsy / Encrypted Disk Detector / Wireshark / Magnet RAM Capture / Network Miner / NMAP / Dumpzilla / Forensic Investigator / FAW
Program Structure
This Program is designed to train you in the fundamentals of Cyber Crime along with computing security. You will also learn the principles and practices of Information Security to successfully achieve the goal of Cloud security. Case- study based learning provides clear understanding of security issues in cloud. Hands-on experience with security tools like NMAP, Magnet RAM Capture and Splunk gives the experience of resolving real-time security issues. Knowledge of Cyber Laws helps to maintain professionalism within ethical boundaries.
Mode Of Delivery
Blended Learning
Certifications:
Vidyalankar and Skillville
Placements:
100% Placement assistance
Create profile, showcasing relevant skillsets
Aptitude, GD and Interview Training
– Introduction
– Cybercrime
– Cybercrime and information security
– Cybercriminals
– Classification of cyber crimes
– Cybercrime the legal perspective
– Cybercrime an Indian perspective
– Introduction
– How criminals plan the attack
– Social Engineering
– Cyber stalking
– Cybercafé and cybercrimes
– Botnets: The fuel for cybercrime
– Cloud computing
– Introduction
– Proxy servers and anonymizers
– Phishing
– Password checking
– Key loggers and spy waves
– Viruses and worms
– Trojan horses and balk doors
– Steganography
– DoS and DDoS attacks
– SQL injection
– Buffer overflow
– Meaning of secure
– Attacks
– Meaning of computer security
– Computer criminal ls
– Methods of defence
– Terminologies
– Substitution ciphers
– Transpositions (Permutation)
– Encryption algorithm
– Data encryption standard
– AES Encryption algorithm
– Public key encryption
– Secure programs
– Non Malicious program errors
– Viruses and other malicious codes
– Targeted malicious codes
– Controls against program threats
– Memory and address protection
– Control of access to general objects
– File protection mechanism
– User authentication
– Trusted system
– Security policies
– Models of security
– Trusted O.S. design
– Assurance in trusted O.S.
– Introduction
– Security requirement
– Reliability and integrity
– Sensitive data
– Inference
– Multilevel databases
– Proposals to multilevel security
– Essential characteristics
– Architectural influences
– Technological influences
– Operational influences
– Outsourcing
– IT service management
– Cloud information security objectives
– Confidentiality, Integrity, and availability
– Cloud security services
– Relevant cloud security design principles
– Secure cloud S/W requirements
– Secure cloud S/W testing
– Cloud computing & business continuity
– Planning disaster
– The CIA Triad
– Confidentiality
– Integrity
– Availability
– Privacy and compliances risks
– Threats to infrastructure, data, access control
– Common threats and vulnerabilities
– Cloud access control issues
– Cloud service provider risk
– Architectural consideration
– Trusted cloud computing
– Secure execution and environments and communication
– Microarchitectures
– Identity management & access control
– Autonomic security
– Overview of Security Management
– Information Classification Process
– Security Policy
– Risk Management
– Security Procedures and Guidelines
– Business Continuity and Disaster Recovery
– Security Assurance
– Security Laws
– International Standards
– Security Audit
– OCTAVE approach
– SSE-CMM
Fees Details: INR 59,000/-
Please consult your Admission Counselor for flexi-EMI options
Our placement assistance program offers students one-on-one career counselling, and the chance to work with our corporate partners.
In case you drop out of the course due to a genuine reason, you will have 6 months’ time to return to it. If you fail to return to your course within this period, you will have to start afresh.
You can pay for the course of your interest on the website by clicking on the Fees tab via e-wallets, net banking, credit cards, debit cards as well as NEFT/Bank Transfer.
Refund must be claimed before the commencement of your batch. The Application form fees are non-refundable. Skillville will deduct 20% of the program fees paid till date of application for refund towards administrative charges and 80% will be refundable within 1 month from the approval of refund by a Skillville Authorized representative.
You will have an opportunity to catch up with a simultaneous batch in session or you can reach the respective Faculty to cover the missed class.
Please contact your Admission Counselor or drop an email regarding your querry to admissions@skillville.in.
Yes, Certificate will comprise following certification bodies AIMA, AICTE, SAS.Learnt tools and technologies will be enlisted on the certificate of completion along with secured grade.