13
Training | Consulting | Outsourcing Information Security Appin Executive Masters Program in 1 app in

Course Details

Embed Size (px)

Citation preview

Page 1: Course Details

Training | Consulting | Outsourcing

Information Security

Appin Executive Masters Program

in

1

appin

Page 2: Course Details

Appin Knowledge Solutions, is a premier provider of hi- technology certification, courseware as well as online, computer based and instructor led training across the world. Appin is primarily an IIT Alumni company. Appin has come up with the way of innovative learning concept using Computer Based Training Software (CBTS) in a highly interactive environment.

Appin Security Group(ASG) is a globally recognized Information Security Consulting body with its headquarters in New Delhi and spanning more than 15 countries. ASG is a leading information security services firm with an esteemed clientele ranging from Government Bodies (Ministries, Embassies,.) to top Corporate houses (mostly ET Top 100) spanning all major sectors viz., IT/ITES, F inanc ia l Ser v ices, Av ia t ion , Telecom/ISP, Media, Infrastructure and Manufacturing. With a strong focus on Research and Development and innovating new services and products in Information Security, Appin Security group has an R&D Centre that provides end to end Information Security Services - Security Assessment, Security Implementation and Security Management. Appin Security Group has the strongest technical backend to ensure that its clients are completely protected from any security breaches.

ABOUT US VISIONTo be the Leader in Information Security training and consulting..

MISSIONTo provide a complete range of Information Security solutions under one roof from Consulting to Training.

CREDENTIALS4Appreciated by the former President of India, Dr A.P.J Abdul Kalam.4The only security company across the globe to

have a dedicated Research and Development Centre for Information Security, inside IIT Delhi.

4CERT In empaneled company, approved by Ministry of IT, India to carry out technical audits for various critical sectors like finance, power etc.

4Official partners of various cyber crimes division in India including CBI.

4Serving more than 820 key clients across 40 countries in both private and Govt. Sector.

2

Page 3: Course Details

Competing with the global top, Indian airports are

set for modernization. State-of-the-art IT systems

and data centers are implemented to manage their

operations and to deliver world class performance.

Airports also act as network service providers for

third parties, such as airlines . All these steps boost efficiency and quality of

service, but also increase the information security

risks multi-fold.For GMR Hyderabad International Airport Ltd.

Appin Security Group took the challenge of

complete airport security management, including

security auditing, Security Operations Center

(SOC) implementation and management, security

incident management and people training and

awareness , to ensure that the airport follows the

road map of greater security. The assignment

included a detailed security risk analysis with

respect to people, process and technology

including vulnerability assessments, penetration

testing, configurations audit. Backed by rigorous

security risk analysis policies, procedures and IT

security systems, the whole infrastructure is

monitored from the central SOC inside the airport.

The SOC monitors all IT devices, including

routers, critical servers, switches, fire walls, and

IDS/IPS. It also does forensics and handles all

security incidents.An team from Appin dedicated to security training

and awareness assures that the entire airport IT

staff is aware of all security policies and complies

with them. The SOC ensures that security threats

are detected before they are exploited and the

security incidents are handled with acceptable

recovery time lines. And that translates into safety.

Safety for the airport, and for the traveler.

APP SECURES IN THE NEW HYDERABAD AIRPORT OUR CLIENTS

3DAIKIN

ESCORTS

Airports Authority of India

lqj{kk lfgr lsok

LVsV cSad vkWQ chdkusj ,.M t;iqj

State Bank of Bikaner and Jaipur

The Bank with a Vision

D OF EY FRT ES NI CNI EM

DE N

OF IE TN AC SIE NR AE GS RE A OTR NCH E& M LE OD PEV

~; ewyL a y foc Kkue

Actis

Microsoft®

Page 4: Course Details

Information Security

Information security is the process of protecting availability, privacy and integrity of information. Access to stored information on computer databases has increased greatly as most of the companies store business and individual information on computer than ever before. Much of the information stored is highly confidential and not for public viewing.

The rapid growth and widespread use of electronic data processing and electronic business conducted through the Internet, along with numerous occurrences of international terrorism, fueled the need for better methods of protecting the computers and the information they store, process and transmit. The academic disciplines of computer security, information security and information assurance emerged along with numerous professional organizations - all sharing the common goals of ensuring the security and reliability of information systems.

Governments, military, corporates, financial institutions, hospitals, and private businesses amass a great deal of confidential information about their employees, customers, products, research, and financial status.

The field of Information Security has grown and evolved significantly in recent years. As a career choice there are many ways of gaining entry into the field. It offers many areas for specialization including, securing network(s) and allied infrastructure, securing applications and databases, security testing, information systems auditing, business continuity planning and digital forensics science, to name a few.

Web security is going to be a big focus in 2009. Bigger than ever before. Be it all the social networking we're doing or Web-based malware exploits, this thing we call the Web is where we're going to have to focus a large part of our security efforts. Like it or not, it's the part of everyone's network that's open. It's also where business logic is exposed and where the system complexities and subsequent vulnerabilities are simply waiting around to be exploited.4

Page 5: Course Details

COURSE DURATION: One Year

PROGRAM OBJECTIVES

1To instil the current and comprehensive knowledge of Information Security.

1 To enable students to develop and implement Information Security policies & practices and related change management.

1 To develop students' management abilities in Information Security to be applied in organizations.

1To enable students to cope with the change management issues involved in developing and implementing information security policies in organizations.

1 To expand the scholarly credentials of students, thereby increasing their marketability with prospective employers.

METHODOLOGY

1 The program will be conducted in a highly interactive and open environment providing opportunities of discussions and intellectual growth.

PLACEMENT

1Our placement partners include our client companies among others

1A Student Placement Cell dedicated for exploring job opportunities across various sectors of the industry guided by the Admissions Team.

ELIGIBILITY

1B.E. Electronics / Computer Science / Electronics & Telecom / Electrical / MSc IT / MCA / MSc (Physics or Maths) with minimum 50% marks from a recognized university.

PROGRAM

1The Program will be spread across 4 Trimesters of 3 months each and will be completed within a year.

AWARD

1 Successful completion of the Program entitles a candidate to receive a Post Graduate Diploma in the field of Information Security.

1 Internationally recognized and affiliated to IADL, UK.

CONCEPTAppin Executive Masters Program is a joint initiative of Appin Security Group and Appin Knowledge Solutions. It envisions to bridge the gap between industry and academia by integration of learning and technology. The program will be conducted under Appin School of Niche Technology, an innovative concept designed to experiment intellectually with modes of study that over time could form the basis for new domain specific programs.

Appin Executive Masters Program

5

Page 6: Course Details

1. INTRODUCTION TO NETWORKINGq Introduction & Historyq Advantage & Disadvantageq Computer Networks Protocolq OSI Model & Physical Topologyq Network Architectureq Communication Media

2. THE INTERNET PROTOCOL (IP)q Introduction to IPq IP Packet Formatq IP Address Classesq Transmission Control Protocolq Subnetting & CIDR

3. IP ROUTINGq Introduction to hardware & software related to IP routingq Routing information Protocolq Enhanced Interior Routing Protocolq Open Shortest Path First

4. SWITCHING & BRIDGINGq Introduction of Switching & Bridgingq STP & LAN Switch Typesq VLAN - Virtual LANq Flexibility and Scalability

5. WIDE AREA NETWORKq Understanding WAN fundamentalsq Understanding Tunneling Protocol & Frame Relay

Fundamentalsq VPN - Virtual Private Networkq NAT - Network Address Translation

6. NETWORK CONFIGURATION AND TROUBLESHOOTING

q Networking Introductionq LAN Switchingq Wireless Networkingq Layer by Layer Troubleshooting with a Cisco Routerq Router Troubleshooting at OSI Layersq Managing your network connections

7. IMPLEMENTING AND TROUBLE-SHOOTING WI-FI NETWORKS

q Introduction to 802.11q Finding And Connecting To Wireless Networksq Introduction to RADIUSq EAP & Bringing EAP to the LANq Authenticating the AP to the User, and Vice Versaq Scanning and Enumerating 802.11 Networks

1. INFORMATION SECURITY & ETHICAL HACKING? Introduction? Basics of Data ? Information ? Security? Hacking ? Richard's Law of computer security ? Types of hackers? Cyber Threats? Case Studies

2. DESKTOP & SERVER SECURITY? Windows Security? Windows Vulnerability? Hacking into windows platform? Windows task manager ? Linux Security

3. NETWORK & FIREWALL SECURITY? Setting up a LAN? Threats Of LAN? Firewall? Anti-virus? Anti Spyware? Network Scanner? Introduction to Wireless Network security

4. INTERNET & CYBER SECURITYq IP Spoofing q E-Mail Trackingq Proxy Serversq E-mail Forgery and Detectionq MAC Spoofingq Microsoft Outlook Securityq Cyber Stalking

5. INFORMATION GATHERING METHODSq Daemon-Banner Grabbingq Active Finger Printingq Passive Fingerprintingq Port Scanningq Full TCP Scan Half TCP Scanq Flagq Tracert

6. WINDOWS REGISTRIESq Reshackq Registry tweaks

7. HACKING ATTACKSq Social Engineering Attack q Phishing Attack q Input Validation Attack q SqL injection q XSS attackq Attack Dos Attacks q Sniffing Attackq Session Hijacking etc.

8. EMAIL SECURITY & WEB SECURITYq Introduction to E-mail q How E-mail Worksq Mail serversq E-mail Protocolq Web Servers (introduction to web Security)

Paper 2. Information Security & Ethical Hacking BasicsPaper 1. Networking

Trimester-1

6

Page 7: Course Details

Paper 4. Network SecurityPaper 3. Programming

Trimester-2

1. PROGRAMMING IN Cq Introduction to Cq Data Typesq Basic programming conceptq If else ladderq Switch statementsq Array, simple array ,multi dimension q Function q Loops: for, do while, while q Structure, structure with function, structure array,q Pointerq Multiple return from function q Pointer to function, passing value through pointerq Introduction to file handling ,what is text file q Preprocessor compiler (#)

2. PROGRAMMING IN C++ q OOPSq Class, how to declare a classq Inheritance, Polymorphism, Operator overloading,

Abstraction q Using class with function q Exception handlingq Template, generic class

3. INTRODUCTION TO DATA STRUCTUREq Queueq Stackq Link listq Tree

1. WIRELESS & MOBILE SECURITY ? Introduction to the Wireless ? Mobile Technology ? GSM Technology ? CDMA Technology ? Different type of attacks

2. VOIP & VPN SECURITY

? Introduction to the VOIP and VPN Technology Protocol and Architecture

3. ROUTER SECURITY ? Introduction to router ? Protocols on a router and types of connection ? NAT Services ? Various types of Attacks and their Detection

4. IDS & IPS ? Introduction to IPS & IDS? IDS Overview (AIDS, HIDS, and NIDS) ? IDS system & IPS System ? Perimeter Firewall? Analysis of System Deficienciesq VoIP & Wireless

7

Page 8: Course Details

Paper 6. Information Security Management SystemsPaper 5. Vulnerability Assessment &

Advanced Ethical Hacking

Trimester-3

1. VULNERABILITY ASSESSMENT & PENETRATION TESTING? Scoping and Tools for Vulnerability Tests ? Risk Assessment? Google Hacking? Methodologyq Google Hackingq Application Auditq Network Devices

2. SECURED PROGRAMMING TECHNIQUE & ADVANCED HACKING ATTACKS

? Defining Programming methodology? Explaining Bugs? Removing Errors? Buffer over flows ? Back door? Trojans? Enumeration

1. INFORMATION SECURITY MANAGEMENT SYSTEM? ISO 27001 and other Standard? Policy & Projects? Audit & Certification ? Managing Security Awareness ? Risk Assessment? Business Continuity and Disaster Recovering ? Planning Security Management Practices

2. INFORMATION SECURITY AUDITING

? Audit Objectives & Steps? Network Controls? Network Data Standards and Data Access? Access to Network Operating Systems Software and

Facilities? Data Encryption and Filtering

3. SECURITY FRAMEWORK-COBIT? Security ? Adequate Security? Approaches for Achieving Security? Holistic View of Security? Defense in Depth? OCTAVE? Security Risk Analysis? Threats Modeling? Current Security Issues? Trends for Security8

Page 9: Course Details

Paper 8. Computer ForensicsPaper 7. Cryptography

Trimester-4

1. CRYPTOGRAPHY & ENCRYPTION? Introduction to cryptography ? SKCS ? PKCS? MD5? DES? RSA? Digital signature? Digital certificate

1. CYBER CRIME INVESTIGATION? Forensics methodology and forensic tool kit

2. INTERNATIONAL CYBER LAWS

3. COMPUTER FORENSICS? Introduction to Cyber Forensics? Cyber Crimes? Recognizing Preparation and Preservation? Documentation and reporting? Security Systems to Prevent Further Attacks? Basic Steps in Forensic Analysis of UNIX System? Crime Scene Management? Live System Data Gathering? Recovering of deleted files? Non- verbal analysis? Interpretation of common LOG files? Advanced Honey Pots

9

Page 10: Course Details

Dignitaries Associated with APPIN Group

q Dr. Dheeraj Bhardwaj featured as one of the top 50 youth on fast track by India Today, who has worked as Professor at IIT Delhi and as Director with Sun Asia Pacific Science & Technology Center, Sun Microsystems Inc.

q Mr. A.S. Chandrasekhar worked as Director with Bureau of Indian Standards and Confederation of Indian Industries.

q Mr. Ashok Sapra who has worked as the President and MD with AT&T South Asia and as CEO- GE Communications

q Prof. S.K Gupta Professor, Department of Computer Science, Indian Institute of Technology, Delhi

q Prof. K.K Chaudhary Senior Professor, Indian Institute of Technology, Delhi q Prof. S.K. Jain Associate Professor and Intellectual Property Rights Chair, Department

of Management Studies, Indian Institute of Technology, Delhi q Prof. V.B. Aggarwal Former Head of IT Department, Delhi Universityq Dr Naveen Singla Academician, University of Washington, St Louis USAq Dr Ashish Kapoor Academician, Massachusetts Institute of Technology (MIT), Boston,

USA q Mr Arvind Siotia Graduate(MBA) Kellogg School of Management, Chicago, USA

Booze-Allanq Mr Vijay Kumar General Manager, BHELq Mr. Manmohan Gupta Cofounder & Director (Operations), Nagarro Inc. q Mr. Pradeep Chopra Cofounder & Director (Marketing), Whizlabs Software q Mr Tarun Jain Graduate(MBA) International School of Business, Currently with

Microsoftq Mr Kumar Gautam Graduate (MBA), IIM Bangalore, Currently, working with Lehman

Brothersq Mr Pankaj Kant Jha Graduate (MBA), IIM Ahemdabad, Currently working with EXL

Services

Dr. A.P.J Abdul KalamFormer President of India,Known as the Missile Man of India

The former President showed interest in the work being done by Appin Knowledge Solutions in the field of Information Security and Nano-Technology. He has also advised appin with respect to future of niche technologies in india

“Youth is the most powerful resource. Ignited minds of youth is indeed the biggest force on the earth, above the earth and below the earth.”

10

Page 11: Course Details

TM

Page 12: Course Details

For office use only

Roll Number

Applicant’s Name:

Date

Surname First Name

Father’s/ Husband’s Name:

d d / m m / y y

Sex: Male Female Date of Birth Nationality

d d / m m / y y

Correspondence Address:

Permanent Address:

Educational Qualification:

Examination University/Board Institution Year Division % of Marks

Please fill in Block Letters

(Attach xerox copies of 10th ,12th or Diploma mark sheets)

Details of Experience (if any)...........................................................................................................................................................................................................................................................................................................................................

Signature of ApplicantDate: .................................... Place: ............................

Affix your passport size photograph and attach three photograph

APPLICATION FORM FOR 2009-2010

Appin Executive Masters Programin

INFORMATION SECURITYForm No.: .............................

Mobile:

Contact no.:

E-mail:

Mother’s Maiden Name:

ISD Code STD Code ISD CodeLandline No.

PriceRs. 100/-

Centre : ..........................................................................................................

Page 13: Course Details

www.appinonline.com

12appin