Information is a strategic resource. IT Security give us the state of being free from danger or threat and is
designed with an objective of identifying, classifying and structuring information. The design also
includes several security models which consists of:
IT Security is the defense of digital information and IT assets against internal and external, malicious and
accidental threats. The defense includes detection, prevention and response to threats through the use of
security policies, software tools and IT services.
IT Security is necessary for the following reasons:
- To take care of the Confidentiality, Integrity and availability of an organization.
· To Identify, Classify and Structure the information.
· To avoid direct threats of e-commerce, mobile based transactions, online fraud, credit card fraud,
SIM card swiping and social engineering.
· To prevent Cyber attacks.
· To block unknown access to the information.
· To prevent information leakage and loss.
· To deliver information to the right person.
Why IIHT Certified Security Manager
IIHT Program is purely designed to fit into job role of IT Security industry. The roles are categorized as L1, L2,
L3 & L4. This particular course is designed to develop professionals for both L1 & L2 roles. However the
industry offers only ‘L1’ job to fresher’s.
The role of ‘L1’ involves majorly:
1. Security Fundamentals
2. Basic Security Administration
3. Cyber Security Incident Log
4. Use of Scanners and carry out vulnerability tests
5. Updates & Security Patches
A fresher would have generally no clue on IT security. Hence we advise a fresher to take up foundaon
program as given in this brochure.
If a student has some exposure to IT, he/she can take up IT security course directly. The student apart from
learning the skills meant to be an L1 IT security professional also learns:
Ø Securing Desktop
Ø Securing Enterprise OS
Ø Securing Servers
Ø Securing Storage
Ø Securing Data Bay
Ø Network Security (Both Hardware & Software Firewalling)
Ø Securing Data
Ø Securing Clouds & Cloud Data Centre
Ø Securing Web Application
Ø Cyber Security
Ø About Incident Management
Ø Partaking in Vulnerability Assessment & Penetration Testing (VAPT)
Thus this is world’s unique IT Security Program teaching a student job specific & comprehensive Security skills.
Basic skills required
- Computer Hardware and software fundamentals
• Knowledge on operating system, Internet and web browsers
• Windows desktop environment – installing, configuring & managing network devices
• Basic Linux commands
• Network Fundamentals – implementing & troubleshooting knowledge on Ethernet
LANs, WANs, addressing & sub netting IP versions
• Server Infrastructure – Windows Server basics including installing & managing
Windows Server, infrastructure services, PowerShell& Basics of Hyper-V
• Storage administration
• Cloud Computing Basics – understanding business & technical perspectives of Cloud Computing
- Computer fundamentals
• Windows Desktop
• Linux Desktop
• Network Fundamentals
• Sever Infrastructure
• Storage Essentials
• Cloud Computing
- Intrusion Detection and Prevention
System – IDPS
- Incident Response
- Antivirus Management
- Incident Log Management
An integrated teaching and learning approach is followed. Learning for this program is facilitated
through multiple ways. It involves a series of class room lectures, practical /hands on at the computer
Laboratory and project work.
Practical/hands-on at computer laboratory helps in developing practical skills and before understanding
of the theory and concepts. In computer labs, learners can discuss with competent staff who help them
in understanding the subject and the technology.
Learners undertake a project work which helps them to understand the use of knowledge acquired in the
subject in the real life situational in industry.
Learners will be given with formative assessment on their work in the form of daily quizzes, classroom
discussions, practical tests. This will help them in getting more clarity on subject and the technology..
Learners will be provided with a learner handbook, containing the list of reference books and internet
sites. The assessment and re-assessment procedures are explained to the learners and the relevant
procedures documents are provided to them. It is also ensured that all relevant information is accessible
Intrusion Detection Security Engineer
Antivirus Security Administrator
Incident Log Engineer
Formative assessment is the feedback given to learners against their course work. Formative assessment
may be given either orally or in written. Formative assessment decisions will not be considered for the
award of credits/marks.
Learners will be given with formative assessment during the program delivery on their course work. This is in
the form of daily quizzes, discussions and practical tests.
Summative assessment is the assessment decision given to learners on their course work against desired
learning outcomes. Summative assessment decisions will be considered for the award of credits/marks.
For this program, module test will be conducted at the end of the course
Course Duration: 110 Hours
Detection and Prevention
System – IDPS
Knowledge on IDS Configuration, Implementation, Understanding IDPS, Product Selection Analysis.
Total: 30 hours
Knowledge on Backup and Restore, Basics of Quick Clean and Shredder Qualities.
Total: 20 hours
Knowledge on Incident Response Process, Implemennting the preventive measures for Incident occurring, Preparing the infrastructure for Incident Response.
Total: 30 hours
Basics of Computer Security Logs measures for Incident occurring.
Total: 30 hours