IIHT Certified Security Professional

About Security

Information is a strategic resource. IT Security give us the state of being free from danger or threat and is
designed with an objective of identifying, classifying and structuring information. The design also
includes several security models which consists of:
· Confidentiality
· Integrity
· Availability
IT Security is the defense of digital information and IT assets against internal and external, malicious and
accidental threats. The defense includes detection, prevention and response to threats through the use of
security policies, software tools and IT services.

IT Security is necessary for the following reasons:

  • To take care of the Confidentiality, Integrity and availability of an organization.
    · To Identify, Classify and Structure the information.
    · To avoid direct threats of e-commerce, mobile based transactions, online fraud, credit card fraud,
    SIM card swiping and social engineering.
    · To prevent Cyber attacks.
    · To block unknown access to the information.
    · To prevent information leakage and loss.
    · To deliver information to the right person.

Why IIHT Certified Security Professional

IIHT Program is purely designed to fit into job role of IT Security industry. The roles are categorized as L1, L2,
L3 & L4. This parcular course is designed to develop professionals for both L1 & L2 roles. However the industry offers only ‘L1’ job to fresher’s.
The role of ‘L1’ involves majorly:
1. Security Fundamentals
2. Basic Security Administraon
3. Cyber Security Incident Log
4. Use of Scanners and carry out vulnerability tests
5. Updates & Security Patches

Rationale for the IIHT Certified Security Professional

 IT security is the defence of digital informaon on IT assets against internal and external, malicious and
accidental threats.
 The program IIHT Certified Security Professional is designed to take care of the Confidentiality,
Integrity and availability of an organization.
 The program will enable learners in responding to idenfied incidents, performing tesng & validaon as
 The program is designed to equip learner’s with program specific skills in the following domains –,
Incident Response, Incident Log Management, Intrusion Detecon & Prevenon System.
 The program is designed to equip learners with program specific skills in the following domains –
Soware firewall, Ethical Hacking, Penetraon Tesng, Storage security, Database Security, Web
Applicaon Security & Cloud Security.
 The program is designed to enrich learners with the following technical skills required of IT security:
creang & changing administrator accounts, configuring default expiraon for administrators, revising
database, managing gateways, use of ICA tool.
 The program will enrich learner’s knowledge on wring vulnerability assessment summary, backup
methods, backup architecture and informaon life cycle.
 The program will enable learners to implement RAID for data protecon, secure storage infrastructure.


A fresher would have generally no clue on IT security. Hence we advise a fresher to take up foundaon
program as given in this brochure.
The student apart from learning the skills meant to be an L1 IT security professional also learns:
 Securing Desktop
 Securing Enterprise OS
 Securing Servers
 Network Security (Both Hardware & Soware Firewalling)
 Securing Data
 Intrusion Detecon & Prevetunon
 Antivirus Management
Thus this is world’s unique IT Security Program teaching a student job specific & comprehensive Security
To understand IIHT Certified Security Professional Program, learners should have completed
Professional Diploma in IT Security Program.

Course Outline

Incident Response
Incident Log Management
Software Firewall
Ethical Hacking and Penetration Testing
Storage Security
Database Security
Web Application Security
Cloud Security

Learning Support

Ÿ An integrated teaching and learning approach is followed. Learning for this program is facilitated
through multiple ways. It involves a series of class room lectures, practical /hands on at the computer
Ÿ Laboratory and project work.
Ÿ Practical/hands-on at computer laboratory helps in developing practical skills and before understanding
of the theory and concepts. In computer labs, learners can discuss with competent staff who help them
in understanding the subject and the technology.
Ÿ Learners undertake a project work which helps them to understand the use of knowledge acquired in the
subject in the real life situational in industry.
Ÿ Learners will be given with formative assessment on their work in the form of daily quizzes, classroom
discussions, practical tests. This will help them in getting more clarity on subject and the technology..

Academic Support
Ÿ Learners will be provided with a learner handbook, containing the list of reference books and internet
sites. The assessment and re-assessment procedures are explained to the learners and the relevant
procedures documents are provided to them. It is also ensured that all relevant information is accessible
to learners.

Job Roles

Incident Responder
Incident Log Engineer
Firewall Engineer
Ethical Hacker
Storage Security Engineer
Security Test Engineer
Web Service Engineer
Cloud Engineer

Formative Assessment
Formative assessment is the feedback given to learners against their course work. Formative assessment
may be given either orally or in written. Formative assessment decisions will not be considered for the
award of credits/marks.
Learners will be given with formative assessment during the program delivery on their course work. This is in
the form of daily quizzes, discussions and practical tests.
Summative Assessment
Summative assessment is the assessment decision given to learners on their course work against desired
learning outcomes. Summative assessment decisions will be considered for the award of credits/marks.
For this program, module test will be conducted at the end of the course.


Course Duration: 195 Hours

Incident response: Knowledge on Incident Response Process, Implementing the preventive measures for Incident occurring, Preparing the infrastructure for Incident Response.

Concept class: 30 hours

Incident Log Management: Basics of Computer Security Logs measures for Incident occurring.

Concept: 30 hours

Software Firewall: Knowledge on Smart Console and Search Engines, Authorization for Monitoring, Logging, Events, and Reports, Users Account Management.

Concept: 30 hours

Ethical Hacking and Penetration Testing: Basic knowledge on Hacking, Knowledge on Penetration Testing, Assessment of Risk-associated factors.

Concept: 20 hours

Storage Security: Basics of Information Storage and Management, Knowledge on RAID Data Protection and Virtualization, Basic knowledge on Backup and Recovery, Detailed knowledge on Business Continuity Planning.

Concept: 20 hours

Database Security: Detailed knowledge on Backup and Recovery, Restoring process of Database Backups.

Concept: 15 hours

Web Application Security: Basic knowledge on Web Application components, Basics on Website Defacement, Knowledge on Countermeasures and Preventive measures.

Concept: 20 hours

Cloud Security: Overview of Data Security in Cloud computing, Knowledge on Cryptographic Techniques, Basics of Cloud Data Storage, Understand the Cloud Security criteria.

Concept: 30 hours

Start Time

12:00 am

July 7, 2020

Finish Time

12:00 am

August 31, 2020

Leave A Reply

Your email address will not be published.