IIHT Certified Security Manager

About Security

Information is a strategic resource. IT Security gives us the state of being free from danger or threat and is
designed with an objective of identifying, classifying and structuring information. The design also
includes several security models which consists of:
· Confidentiality
· Integrity
· Availability
IT Security is the defense of digital information and IT assets against internal and external, malicious and
accidental threats. The defense includes detection, prevention and response to threats through the use of
security policies, software tools and IT services.

IT Security is necessary for the following reasons:

  • To take care of the Confidentiality, Integrity and availability of an organization.
    · To Identify, Classify and Structure the information.
    · To avoid direct threats of e-commerce, mobile based transactions, online fraud, credit card fraud,
    SIM card swiping and social engineering.
    · To prevent Cyber attacks.
    · To block unknown access to the information.
    · To prevent information leakage and loss.
    · To deliver information to the right person.

Why IIHT Certified Security Manager

IIHT Program is purely designed to fit into job role of IT Security industry. The roles are categorized as L1, L2,
L3 & L4. This particular course is designed to develop professionals for both L1 & L2 roles. However the
industry offers only ‘L1’ job to fresher’s.
The role of ‘L1’ involves majorly:
1. Security Fundamentals
2. Basic Security Administration
3. Cyber Security Incident Log
4. Use of Scanners and carry out vulnerability tests
5. Updates & Security Patches

A fresher would have generally no clue on IT security. Hence we advise a fresher to take up foundaon
program as given in this brochure.

If a student has some exposure to IT, he/she can take up IT security course directly. The student apart from
learning the skills meant to be an L1 IT security professional also learns:
Ø Securing Desktop
Ø Securing Enterprise OS
Ø Securing Servers
Ø Securing Storage
Ø Securing Data Bay
Ø Network Security (Both Hardware & Software Firewalling)
Ø Securing Data
Ø Securing Clouds & Cloud Data Centre
Ø Securing Web Application
Ø Cyber Security
Ø About Incident Management
Ø Partaking in Vulnerability Assessment & Penetration Testing (VAPT)

Thus this is world’s unique IT Security Program teaching a student job specific & comprehensive Security skills. 

Basic skills required 

  • Computer Hardware and software fundamentals
    • Knowledge on operating system, Internet and web browsers
    • Windows desktop environment – installing, configuring & managing network devices
    • Basic Linux commands
    • Network Fundamentals – implementing & troubleshooting knowledge on Ethernet
    LANs, WANs, addressing & sub netting IP versions
    • Server Infrastructure – Windows Server basics including installing & managing
    Windows Server, infrastructure services, PowerShell& Basics of Hyper-V
    • Storage administration
    • Cloud Computing Basics – understanding business & technical perspectives of Cloud Computing

Foundational subjects

  • Computer fundamentals
    • Windows Desktop
    • Linux Desktop
    • Network Fundamentals
    • Sever Infrastructure
    • Storage Essentials
    • Cloud Computing

Course Outline

  • Intrusion Detection and Prevention
    System – IDPS
  • Incident Response
  • Antivirus Management
  • Incident Log Management

Learning Support

Ÿ An integrated teaching and learning approach is followed. Learning for this program is facilitated
through multiple ways. It involves a series of class room lectures, practical /hands on at the computer
Ÿ Laboratory and project work.
Ÿ Practical/hands-on at computer laboratory helps in developing practical skills and before understanding
of the theory and concepts. In computer labs, learners can discuss with competent staff who help them
in understanding the subject and the technology.
Ÿ Learners undertake a project work which helps them to understand the use of knowledge acquired in the
subject in the real life situational in industry.
Ÿ Learners will be given with formative assessment on their work in the form of daily quizzes, classroom
discussions, practical tests. This will help them in getting more clarity on subject and the technology..

Academic Support
Ÿ Learners will be provided with a learner handbook, containing the list of reference books and internet
sites. The assessment and re-assessment procedures are explained to the learners and the relevant
procedures documents are provided to them. It is also ensured that all relevant information is accessible
to learners.

Job Roles
Intrusion Detection Security Engineer
Antivirus Security Administrator
Incident Responder
Incident Log Engineer

Learner’s Assessment

Formative Assessment
Formative assessment is the feedback given to learners against their course work. Formative assessment
may be given either orally or in written. Formative assessment decisions will not be considered for the
award of credits/marks.
Learners will be given with formative assessment during the program delivery on their course work. This is in
the form of daily quizzes, discussions and practical tests.
Summative Assessment
Summative assessment is the assessment decision given to learners on their course work against desired
learning outcomes. Summative assessment decisions will be considered for the award of credits/marks.
For this program, module test will be conducted at the end of the course

SKILLS

Course Duration: 110 Hours

Intrusion
Detection and Prevention
System – IDPS
Knowledge on IDS Configuration, Implementation, Understanding IDPS, Product Selection Analysis.

Total: 30 hours

Antivirus Management
Knowledge on Backup and Restore, Basics of Quick Clean and Shredder Qualities.

Total: 20 hours

Incident Response
Knowledge on Incident Response Process, Implemennting the preventive measures for Incident occurring, Preparing the infrastructure for Incident Response.

Total: 30 hours

Incident Log
Management
Basics of Computer Security Logs measures for Incident occurring.

Total: 30 hours

 

Ora începerii

12:00 am

July 7, 2020

Ora finalizării

12:00 am

August 31, 2020

Lasă un răspuns

Your email address will not be published.