cyberfort syllabus & career

18

Upload: amit-kumar

Post on 04-Jul-2015

117 views

Category:

Education


1 download

DESCRIPTION

CYBERFORT Technologies seeks to impart quality Information Security programs that would equip Information Security professionals with the necessary tools and education to help them avert Cyber-crimes, Cyber espionage, Cyber terrorism and if the need arises, Cyber wars.

TRANSCRIPT

Page 1: Cyberfort syllabus & career
Page 2: Cyberfort syllabus & career

“Thousands of cyber-attacks […] are striking at the privatesector, strike at stock market, strike at other institutions

within our society, strike at government, strike at the

defence department, our intelligence agencies. Cyber is

now at a point where the technology is there to cripple a

country, to take down our power grid systems, to takedown our government systems, take down our financial

systems and literally paralyze the country."

In the new era, business has transformed its work-style

from reality to virtual reality.

2

Page 3: Cyberfort syllabus & career

The whole world is swiped by

this strategy for its accuracy andnon-redundancy measure.

3

Page 4: Cyberfort syllabus & career

This new sector where free flow and

accuracy has lowered down the

operational cost of big conglomerate

whereas it has bullion threat from the

remote cyber criminal on the other hand.

4

Page 5: Cyberfort syllabus & career

In recent years, cyber-crime has become

increasingly sophisticated, making it

difficult to combat, detect and mitigate.

The rise of a relatively new class of cyber-

attack is especially troubling. This new

class is referred to as an ‘Advanced

Persistent Threat’ (APT).

*Advanced Persistent Threats (APTs) are usually directed at business and political

targets for political ends. APTs involve stealth to persistently infiltrate a system over a

long period of time, without the system displaying any unusual symptoms.

5

Page 6: Cyberfort syllabus & career

Examples of cyber-attacks

Attack on South Korea’s banks and broadcasters, 2013. A suspected cyber-attack

brought down systems and computers at some of South Korea’s major banks and

broadcasters. As a result, the local equity market declined 1.0%.

The Flame virus, 2012. Thought to have been operating since 2010, the Flame virus was

detected in 2012. The virus code is seen as some of the most sophisticated and largest

malicious code to date. It infiltrated computers belonging to the Iranian Oil Ministry,

the Iranian National Oil Company and other networks in Hungary, Lebanon, Austria,

Russia, Hong Kong and the United Arab Emirates - stealing and deleting information

from the systems. Part of the functionality of the virus including turning on microphones

of computers to secretly record conversations, taking screen grabs of infected

computers and stealing credentials of high-level and administrative users.

6

Page 7: Cyberfort syllabus & career

Examples of cyber-attacks

Red October cyber-attack, 2013. Targeting governmental and diplomatic

organisations. The Red October attack was discovered in January of this year, but is

believed to have been operating undetected for a number of years. The attack

effectively stole confidential and encrypted documents (including deleted ones) from

embassies, nuclear research centres and oil and gas companies of US. Information

targeted included geopolitically sensitive data and credentials to access protected

computer systems. The malicious code was also able to detect when a USB stick was

inserted into a networked computer and undelete and steal any files on the stick. The

cyber-crime racket behind the attacks shut-down their operations after the attacks

were made public and documented.

7

Page 8: Cyberfort syllabus & career

Examples of cyber-attacks

The MiniDuke Cyber-attack on EU governmental organizations and operators of

critical infrastructure.13 The MiniDuke Cyber-attack exploited a flaw in Adobe’s

Acrobat reader to enter computer networks and gather information.

Operation Aurora, 2009. Attacks against some of the largest internet, technology and

defence companies such as Google, Adobe, Juniper, Yahoo!, Northrup Grumman.

The cyber-attack modified source code by exploiting vulnerabilities in an internet

browser.

8

Page 9: Cyberfort syllabus & career

Social ResponsibilityTo overcome this mission critical situation of cyber sabotage, the skilled man-

force of cyber expert is the solution.

After China and US, India has the highest number of internet users. Besides,

there are over 381 million mobile phone subscriptions with internet

connectivity.

“Today, there are more than 2 billion people online, who need to be protected.

Cyber attacks are already happening on a daily basis in the world and as we

grow more and more ‘connected’, the threats also become more complex and

difficult. On Facebook, there are 50 million Indian users and even if a small

fraction of them click unsuspectingly on a malevolent but seemingly ordinary

link, you have that many computers opened up to risk and infection,” – Former

Minister Shashi Tharoor stated.

9

Page 10: Cyberfort syllabus & career

Social ResponsibilityIndia will require five lakh cybersecurity professionals by 2015 to support its fast

growing internet economy as per an estimate by the union ministry of information

technology.

Every organization across verticals will require cybersecurity professionals. Therefore,

the estimate of 5 lakh looks very conservative for a strong internet economy like India.

The actual requirement for cyber security professionals would be in multiples.

University Grants Commission directed all university vice chancellors in the country to

introduce curriculum around cyber security in their respective colleges to meet this

talent demand.

Quoting a Gartner report in its letter, UGC said, "The country's information security

market is expected to grow by 18% to reach Rs 1,415 crore in 2013 on the back of

increased spending by companies to secure their information assets. Despite a

continuing economic slowdown that has been putting pressure on IT budgets around

the world, cyber security spending globally would continue on an upward trajectory,

reaching $86 billion in 2016, up from $60 billion in 2012.“

10

Page 11: Cyberfort syllabus & career

Social Responsibility

Cyber security ensures realization and controlling of security

properties of an organization’s as well as users’ intellectual and

financial assets against relevant security risks in the cyber

environment.

BUT…

Cyber expertise can be taught in the syllabus as a part of

curriculum in colleges but practically its hard to horn the skill

with expertise.

11

Page 12: Cyberfort syllabus & career

Social ResponsibilityOut of 10 buddying engineers/MCA/BCA… pass out, hardly 2-3

get placed in job. This is due to the additional and demanding

skill required by the recruiting company.

Cyber Professional is the very need of every individual company

to protect its virtual infrastructure of company asset.

Cyber Security Market worth $155.74 Billion by 2019.

Cyberfort Technolgies is the all to all solution where cyber

security is taught with complete passion and help shaping the

career of buddying young cyber professionals.

12

Page 13: Cyberfort syllabus & career

After a thorough research of world business

and political system, we have designed

few industry driven courses for

students/professionals

Diploma in Cyber Security (CEH)

Certificate in Cyber Security (CSCU)

Project Integrated Program (PIP)

13

Page 14: Cyberfort syllabus & career

Syllabus at glanceDiploma in Cyber Security

Module 01: Introduction to Ethical Hacking

Module 02: Footprinting and Reconnaissance

Module 03: Scanning Networks

Module 04: Enumeration

Module 05: System Hacking

Module 06: Trojans and Backdoors

Module 07: Viruses and Worms

Module 08: Sniffing

Module 09: Social Engineering

Module 10: Denial of Service

Module 11: Session Hijacking

Module 12: Hacking Webservers

Module 13: Hacking Web Applications

Module 14: SQL Injection

Module 15: Hacking Wireless Networks

Module 16: Hacking Mobile Platforms

Module 17: Evading IDS, Firewalls, and Honeypots

Module 18: Buffer Overflow

Module 19: Cryptography

Module 20: Penetration Testing

14

Page 15: Cyberfort syllabus & career

Syllabus at glance

Certificate in Cyber Security

Module 01: Foundations of Security

Module 02: Securing Operating Systems

Module 03: Protecting System Using Antiviruses

Module 04: Data Encryption

Module 05: Data Backup and Disaster Recovery

Module 06: Internet Security

Module 07: Securing Network Connections

Module 08: Securing Online Transactions

Module 09: Securing Email Communications

Module 10: Social Engineering and Identity Theft

Module 11: Security on Social Networking Sites

Module 12: Information Security and Legal Compliance

Module 13: Securing Mobile Devices

15

Page 16: Cyberfort syllabus & career

Syllabus at glance

Project Integrated Program

Based on Project assigned and industry defined

16

Page 17: Cyberfort syllabus & career

Career & Profile after completionCyber Security Analyst

Cyber Security Architect

Cyber Security Engineer

Consultant - Cyber Threat Management

Information Security Event Analyst

Cyber Operations Malware Analyst

Executive Manager

Ethical Hacker Cum Cyber Security Trainer

Information Security Consultant

Career in Nationalized Bank

Bank of Maharashtra (Plz see page 7 of the link)

Information Security Officers

http://www.bankofmaharashtra.in/downdocs/FINAL-BOM-

ADVERTISEMENT-BM-2014-22-04.pdf

and many more…

17

Page 18: Cyberfort syllabus & career

18