IIHT Certified Security Associate

About Security

Information is a strategic resource. IT Security give us the state of being free from danger or threat and is
designed with an objective of identifying, classifying and structuring information. The design also
includes several security models which consists of:
· Confidentiality
· Integrity
· Availability
IT Security is the defense of digital information and IT assets against internal and external, malicious and
accidental threats. The defense includes detection, prevention and response to threats through the use of
security policies, software tools and IT services.

IT Security is necessary for the following reasons:

· To take care of the Confidentiality, Integrity and availability of an organization.
· To Identify, Classify and Structure the information.
· To avoid direct threats of e-commerce, mobile based transactions, online fraud, credit card fraud,
SIM card swiping and social engineering.
· To prevent Cyber attacks.
· To block unknown access to the information.
· To prevent information leakage and loss.
· To deliver information to the right person.

Why IIHT Certified Security Associate

IIHT Program is purely designed to fit into job role of IT Security industry. The roles are categorized as L1, L2,
L3 & L4. This particular course is designed to develop professionals for both L1 & L2 roles. However the
industry offers only ‘L1’ job to fresher’s.
The role of ‘L1’ involves majorly:
1. Security Fundamentals
2. Basic Security Administration
3. Cyber Security Incident Log
4. Use of Scanners and carry out vulnerability tests
5. Updates & Security Patches


Rationale for the IIHT Certified Security Associate

 IT security is the defense of digital information on IT assets against internal and external, malicious and
accidental threats.

 The program IIHT Certified Security Associate is designed to take care of the Confidentiality, Integrity
and availability of an organization.

 The program is designed to equip learners with program specific skills in the following domains –
Network Fundamentals, Server Infrastructure, Operating System, Desktop Security, Network Security,
Intrusion Detection & Prevention System and Antivirus Management.

 The program is designed to enrich learner’s knowledge on the evolution, importance, security concepts,
identifying information security devices.

 The program will facilitate learners in enriching not only the technical skills such as installing, configuring
& troubleshooting information security devices, but also so skills required of working environment for
Information Security.

 The program is designed to teach learners how to secure desktop environment , server environment,
data plane protection & networks. It also explains about Firewall auditing tools & Encryption

 The program is designed to equip learners with the following technical skills: configuring, deploying,
implementing & managing IDS.

 The program helps learners in developing knowledge on IPS technologies, IDPS Product Selection
Analysis, performing virus scan, configuring log sources, log generation, log storage & disposal.

A fresher would have generally no clue on IT security. Hence we advise a fresher to take up foundation
program as given in this brochure.

The student apart from learning the skills meant to be an L1 IT security professional also learns:
 Securing Desktop
 Securing Enterprise OS
 Securing Servers
 Network Security (Both Hardware & Software Firewalling)
 Securing Data
 Intrusion Detection & Prevention
 Antivirus Management

Thus this is world’s unique IT Security Program teaching a student job specific & comprehensive Security

Basic skills required
 Computer Hardware and software fundamentals
 Knowledge on operating system, Internet and web browsers
 Windows desktop environment – installing, configuring & managing network devices
 Basic Linux commands
 Network Fundamentals – implemenntig & troubleshooting knowledge on Ethernet
LANs, WANs, addressing & sub netting IP versions
 Server Infrastructure – Windows Server basics including installing & managing
Windows Server, infrastructure services, PowerShell& Basics of Hyper-V
 Storage administration
 Cloud Computing Basics – understanding business & technical perspectives of Cloud Computing

Foundational subjects
 Computer fundamentals
 Windows Desktop
 Linux Desktop
 Network Fundamentals
 Sever Infrastructure
 Storage Essentials
 Cloud Computing

Course Outline

Information Security Studies
Managing Desktop Security
Intrusion Detection & Prevention
System – IDPS
Managing Server Security
Network Security Management
Antivirus Management

Job Roles

Information System Security Professional
Desktop Support Engineer
Intrusion Detection Security Engineer
Network Security Engineer
Network Security Analyst
Antivirus Security Administrator

Learning Support

 An integrated teaching and learning approach is followed. Learning for this program is facilitated
through multiple ways. It involves a series of class room lectures, practical /hands on at the computer
 Laboratory and project work.
 Practical/hands-on at computer laboratory helps in developing practical skills and before understanding
of the theory and concepts. In computer labs, learners can discuss with competent staff who help them
in understanding the subject and the technology.
 Learners undertake a project work which helps them to understand the use of knowledge acquired in the
subject in the real life situational in industry.
 Learners will be given with formative assessment on their work in the form of daily quizzes, classroom
discussions, practical tests. This will help them in getting more clarity on subject and the technology..

Academic Support
 Learners will be provided with a learner handbook, containing the list of reference books and internet
sites. The assessment and re-assessment procedures are explained to the learners and the relevant
procedures documents are provided to them. It is also ensured that all relevant information is accessible
to learners.

Learner’s Assessment

Formative Assessment
Formative assessment is the feedback given to learners against their course work. Formative assessment
may be given either orally or in written. Formative assessment decisions will not be considered for the
award of credits/marks.
Learners will be given with formative assessment during the program delivery on their course work. This is in
the form of daily quizzes, discussions and practical tests.
Summative Assessment
Summative assessment is the assessment decision given to learners on their course work against desired
learning outcomes. Summative assessment decisions will be considered for the award of credits/marks.
For this program, module test will be conducted at the end of the course

Course duration: 180 hours

Information Security Studies: Knowledge on Installation, Configuration and Troubleshooting Security devices, Basics of Information Security concepts, Security Incidents – Roles and Responsibilities.

Concept class: 20 hours

Managing Desktop Security: Basics of Windows Defender Antivirus, Knowledge on Preventive and Precautionary Security Measures, Maintenance of File history, Backup, Data Restore and Sync, Basics on Linux Desktop Security.

Concept class: 40 hours

Managing Server Security: Knowledge on Windows Server 2016 Security, Installation and Disabling Processes of Windows Defender Antivirus, Basics of Firewall settings with Advanced Security, Knowledge on technologies related to Encryption.

Concept class: 40 hours

Network Security Management: Measures for Traffic Securing Management, Configuring IPv6 Routing and Development.

Concept class: 30 hours

Intrusion Detection and Prevention System – IDPS: Knowledge on IDS Configuration, Implementation, Understanding IDPS
Product Selection Analysis.

Concept class: 30 hours

Antivirus Management: Knowledge on Backup and Restore, Basics of Quick Clean and Shredder Qualities.

Concept class: 20 hours

Start Time

12:00 am

July 7, 2020

Finish Time

12:00 am

March 8, 2020

Leave A Reply

Your email address will not be published.