SlideShare une entreprise Scribd logo
1  sur  18
“Thousands of cyber-attacks […] are striking at the private
sector, strike at stock market, strike at other institutions
within our society, strike at government, strike at the
defence department, our intelligence agencies. Cyber is
now at a point where the technology is there to cripple a
country, to take down our power grid systems, to take
down our government systems, take down our financial
systems and literally paralyze the country."
In the new era, business has transformed its work-style
from reality to virtual reality.
2
The whole world is swiped by
this strategy for its accuracy and
non-redundancy measure.
3
This new sector where free flow and
accuracy has lowered down the
operational cost of big conglomerate
whereas it has bullion threat from the
remote cyber criminal on the other hand.
4
In recent years, cyber-crime has become
increasingly sophisticated, making it
difficult to combat, detect and mitigate.
The rise of a relatively new class of cyber-
attack is especially troubling. This new
class is referred to as an ‘Advanced
Persistent Threat’ (APT).
*Advanced Persistent Threats (APTs) are usually directed at business and political
targets for political ends. APTs involve stealth to persistently infiltrate a system over a
long period of time, without the system displaying any unusual symptoms.
5
Examples of cyber-attacks
Attack on South Korea’s banks and broadcasters, 2013. A suspected cyber-attack
brought down systems and computers at some of South Korea’s major banks and
broadcasters. As a result, the local equity market declined 1.0%.
The Flame virus, 2012. Thought to have been operating since 2010, the Flame virus was
detected in 2012. The virus code is seen as some of the most sophisticated and largest
malicious code to date. It infiltrated computers belonging to the Iranian Oil Ministry,
the Iranian National Oil Company and other networks in Hungary, Lebanon, Austria,
Russia, Hong Kong and the United Arab Emirates - stealing and deleting information
from the systems. Part of the functionality of the virus including turning on microphones
of computers to secretly record conversations, taking screen grabs of infected
computers and stealing credentials of high-level and administrative users.
6
Examples of cyber-attacks
Red October cyber-attack, 2013. Targeting governmental and diplomatic
organisations. The Red October attack was discovered in January of this year, but is
believed to have been operating undetected for a number of years. The attack
effectively stole confidential and encrypted documents (including deleted ones) from
embassies, nuclear research centres and oil and gas companies of US. Information
targeted included geopolitically sensitive data and credentials to access protected
computer systems. The malicious code was also able to detect when a USB stick was
inserted into a networked computer and undelete and steal any files on the stick. The
cyber-crime racket behind the attacks shut-down their operations after the attacks
were made public and documented.
7
Examples of cyber-attacks
The MiniDuke Cyber-attack on EU governmental organizations and operators of
critical infrastructure.13 The MiniDuke Cyber-attack exploited a flaw in Adobe’s
Acrobat reader to enter computer networks and gather information.
Operation Aurora, 2009. Attacks against some of the largest internet, technology and
defence companies such as Google, Adobe, Juniper, Yahoo!, Northrup Grumman.
The cyber-attack modified source code by exploiting vulnerabilities in an internet
browser.
8
Social Responsibility
To overcome this mission critical situation of cyber sabotage, the skilled man-
force of cyber expert is the solution.
After China and US, India has the highest number of internet users. Besides,
there are over 381 million mobile phone subscriptions with internet
connectivity.
“Today, there are more than 2 billion people online, who need to be protected.
Cyber attacks are already happening on a daily basis in the world and as we
grow more and more ‘connected’, the threats also become more complex and
difficult. On Facebook, there are 50 million Indian users and even if a small
fraction of them click unsuspectingly on a malevolent but seemingly ordinary
link, you have that many computers opened up to risk and infection,” – Former
Minister Shashi Tharoor stated.
9
Social Responsibility
India will require five lakh cybersecurity professionals by 2015 to support its fast
growing internet economy as per an estimate by the union ministry of information
technology.
Every organization across verticals will require cybersecurity professionals. Therefore,
the estimate of 5 lakh looks very conservative for a strong internet economy like India.
The actual requirement for cyber security professionals would be in multiples.
University Grants Commission directed all university vice chancellors in the country to
introduce curriculum around cyber security in their respective colleges to meet this
talent demand.
Quoting a Gartner report in its letter, UGC said, "The country's information security
market is expected to grow by 18% to reach Rs 1,415 crore in 2013 on the back of
increased spending by companies to secure their information assets. Despite a
continuing economic slowdown that has been putting pressure on IT budgets around
the world, cyber security spending globally would continue on an upward trajectory,
reaching $86 billion in 2016, up from $60 billion in 2012.“
10
Social Responsibility
Cyber security ensures realization and controlling of security
properties of an organization’s as well as users’ intellectual and
financial assets against relevant security risks in the cyber
environment.
BUT…
Cyber expertise can be taught in the syllabus as a part of
curriculum in colleges but practically its hard to horn the skill
with expertise.
11
Social Responsibility
Out of 10 buddying engineers/MCA/BCA… pass out, hardly 2-3
get placed in job. This is due to the additional and demanding
skill required by the recruiting company.
Cyber Professional is the very need of every individual company
to protect its virtual infrastructure of company asset.
Cyber Security Market worth $155.74 Billion by 2019.
Cyberfort Technolgies is the all to all solution where cyber
security is taught with complete passion and help shaping the
career of buddying young cyber professionals.
12
After a thorough research of world business
and political system, we have designed
few industry driven courses for
students/professionals
 Diploma in Cyber Security (CEH)
 Certificate in Cyber Security (CSCU)
 Project Integrated Program (PIP)
13
Syllabus at glance
Diploma in Cyber Security
 Module 01: Introduction to Ethical Hacking
 Module 02: Footprinting and Reconnaissance
 Module 03: Scanning Networks
 Module 04: Enumeration
 Module 05: System Hacking
 Module 06: Trojans and Backdoors
 Module 07: Viruses and Worms
 Module 08: Sniffing
 Module 09: Social Engineering
 Module 10: Denial of Service
 Module 11: Session Hijacking
 Module 12: Hacking Webservers
 Module 13: Hacking Web Applications
 Module 14: SQL Injection
 Module 15: Hacking Wireless Networks
 Module 16: Hacking Mobile Platforms
 Module 17: Evading IDS, Firewalls, and Honeypots
 Module 18: Buffer Overflow
 Module 19: Cryptography
 Module 20: Penetration Testing
14
Syllabus at glance
Certificate in Cyber Security
 Module 01: Foundations of Security
 Module 02: Securing Operating Systems
 Module 03: Protecting System Using Antiviruses
 Module 04: Data Encryption
 Module 05: Data Backup and Disaster Recovery
 Module 06: Internet Security
 Module 07: Securing Network Connections
 Module 08: Securing Online Transactions
 Module 09: Securing Email Communications
 Module 10: Social Engineering and Identity Theft
 Module 11: Security on Social Networking Sites
 Module 12: Information Security and Legal Compliance
 Module 13: Securing Mobile Devices
15
Syllabus at glance
Project Integrated Program
 Based on Project assigned and industry defined
16
Career & Profile after completion
Cyber Security Analyst
Cyber Security Architect
Cyber Security Engineer
Consultant - Cyber Threat Management
Information Security Event Analyst
Cyber Operations Malware Analyst
Executive Manager
Ethical Hacker Cum Cyber Security Trainer
Information Security Consultant
Career in Nationalized Bank
Bank of Maharashtra (Plz see page 7 of the link)
Information Security Officers
http://www.bankofmaharashtra.in/downdocs/FINAL-BOM-
ADVERTISEMENT-BM-2014-22-04.pdf
and many more…
17
18

Contenu connexe

Tendances

Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh Webinar
Arrow ECS UK
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
Symantec
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
IAEME Publication
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
 

Tendances (20)

Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh Webinar
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
Cyber attacks in 2021
Cyber attacks in 2021Cyber attacks in 2021
Cyber attacks in 2021
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
 
Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
 
188
188188
188
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Security weekly september 28 october 4, 2021
Security weekly september 28   october 4, 2021 Security weekly september 28   october 4, 2021
Security weekly september 28 october 4, 2021
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 

En vedette

Rm presentation apple
Rm presentation appleRm presentation apple
Rm presentation apple
Arpit Goel
 
Alexis mortonthe magna carta (1) 2
Alexis mortonthe magna carta (1) 2Alexis mortonthe magna carta (1) 2
Alexis mortonthe magna carta (1) 2
Norm Nichols
 
Social studies 10 horizons chapter caph reform and rebellion companion readings
Social studies 10 horizons chapter caph reform and rebellion companion readingsSocial studies 10 horizons chapter caph reform and rebellion companion readings
Social studies 10 horizons chapter caph reform and rebellion companion readings
Norm Nichols
 
Rebellions of 1837 1838 power point
Rebellions of 1837 1838 power pointRebellions of 1837 1838 power point
Rebellions of 1837 1838 power point
Norm Nichols
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
Amit Kumar
 
Aidan janzthe magna carta
Aidan janzthe  magna cartaAidan janzthe  magna carta
Aidan janzthe magna carta
Norm Nichols
 
Securities exchange board of india final
Securities exchange board of india finalSecurities exchange board of india final
Securities exchange board of india final
Arpit Goel
 
Foreign Exposure and Risk Management
Foreign Exposure and Risk ManagementForeign Exposure and Risk Management
Foreign Exposure and Risk Management
Arpit Goel
 
Tata n jaguar n land rover2
Tata n jaguar n land rover2Tata n jaguar n land rover2
Tata n jaguar n land rover2
Arpit Goel
 

En vedette (18)

Ofimatica guia 2 yair armando jojoa pinta
Ofimatica guia 2 yair armando jojoa pintaOfimatica guia 2 yair armando jojoa pinta
Ofimatica guia 2 yair armando jojoa pinta
 
Rm presentation apple
Rm presentation appleRm presentation apple
Rm presentation apple
 
Alexis mortonthe magna carta (1) 2
Alexis mortonthe magna carta (1) 2Alexis mortonthe magna carta (1) 2
Alexis mortonthe magna carta (1) 2
 
Geospatially knowing the fire
Geospatially knowing the fireGeospatially knowing the fire
Geospatially knowing the fire
 
CT Images
CT ImagesCT Images
CT Images
 
Power point nº4
Power point nº4Power point nº4
Power point nº4
 
Organigrama
OrganigramaOrganigrama
Organigrama
 
Mahindra kinetic
Mahindra kineticMahindra kinetic
Mahindra kinetic
 
Wildfire Modelling in the age of megafires
Wildfire Modelling in the age of megafiresWildfire Modelling in the age of megafires
Wildfire Modelling in the age of megafires
 
Social studies 10 horizons chapter caph reform and rebellion companion readings
Social studies 10 horizons chapter caph reform and rebellion companion readingsSocial studies 10 horizons chapter caph reform and rebellion companion readings
Social studies 10 horizons chapter caph reform and rebellion companion readings
 
Rebellions of 1837 1838 power point
Rebellions of 1837 1838 power pointRebellions of 1837 1838 power point
Rebellions of 1837 1838 power point
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
Aidan janzthe magna carta
Aidan janzthe  magna cartaAidan janzthe  magna carta
Aidan janzthe magna carta
 
Securities exchange board of india final
Securities exchange board of india finalSecurities exchange board of india final
Securities exchange board of india final
 
Rbi final 3
Rbi final 3Rbi final 3
Rbi final 3
 
Foreign Exposure and Risk Management
Foreign Exposure and Risk ManagementForeign Exposure and Risk Management
Foreign Exposure and Risk Management
 
Tata n jaguar n land rover2
Tata n jaguar n land rover2Tata n jaguar n land rover2
Tata n jaguar n land rover2
 
King john 1
King john 1King john 1
King john 1
 

Similaire à Cyberfort syllabus & career

MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
varun4110
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet
superintendingengine17
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
RakeshPatel583282
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
AnastaciaShadelb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
ChantellPantoja184
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
Adela Cocic
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
ijtsrd
 

Similaire à Cyberfort syllabus & career (20)

Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
Cyber security
Cyber security Cyber security
Cyber security
 
CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdf
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 

Dernier

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Dernier (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 

Cyberfort syllabus & career

  • 1.
  • 2. “Thousands of cyber-attacks […] are striking at the private sector, strike at stock market, strike at other institutions within our society, strike at government, strike at the defence department, our intelligence agencies. Cyber is now at a point where the technology is there to cripple a country, to take down our power grid systems, to take down our government systems, take down our financial systems and literally paralyze the country." In the new era, business has transformed its work-style from reality to virtual reality. 2
  • 3. The whole world is swiped by this strategy for its accuracy and non-redundancy measure. 3
  • 4. This new sector where free flow and accuracy has lowered down the operational cost of big conglomerate whereas it has bullion threat from the remote cyber criminal on the other hand. 4
  • 5. In recent years, cyber-crime has become increasingly sophisticated, making it difficult to combat, detect and mitigate. The rise of a relatively new class of cyber- attack is especially troubling. This new class is referred to as an ‘Advanced Persistent Threat’ (APT). *Advanced Persistent Threats (APTs) are usually directed at business and political targets for political ends. APTs involve stealth to persistently infiltrate a system over a long period of time, without the system displaying any unusual symptoms. 5
  • 6. Examples of cyber-attacks Attack on South Korea’s banks and broadcasters, 2013. A suspected cyber-attack brought down systems and computers at some of South Korea’s major banks and broadcasters. As a result, the local equity market declined 1.0%. The Flame virus, 2012. Thought to have been operating since 2010, the Flame virus was detected in 2012. The virus code is seen as some of the most sophisticated and largest malicious code to date. It infiltrated computers belonging to the Iranian Oil Ministry, the Iranian National Oil Company and other networks in Hungary, Lebanon, Austria, Russia, Hong Kong and the United Arab Emirates - stealing and deleting information from the systems. Part of the functionality of the virus including turning on microphones of computers to secretly record conversations, taking screen grabs of infected computers and stealing credentials of high-level and administrative users. 6
  • 7. Examples of cyber-attacks Red October cyber-attack, 2013. Targeting governmental and diplomatic organisations. The Red October attack was discovered in January of this year, but is believed to have been operating undetected for a number of years. The attack effectively stole confidential and encrypted documents (including deleted ones) from embassies, nuclear research centres and oil and gas companies of US. Information targeted included geopolitically sensitive data and credentials to access protected computer systems. The malicious code was also able to detect when a USB stick was inserted into a networked computer and undelete and steal any files on the stick. The cyber-crime racket behind the attacks shut-down their operations after the attacks were made public and documented. 7
  • 8. Examples of cyber-attacks The MiniDuke Cyber-attack on EU governmental organizations and operators of critical infrastructure.13 The MiniDuke Cyber-attack exploited a flaw in Adobe’s Acrobat reader to enter computer networks and gather information. Operation Aurora, 2009. Attacks against some of the largest internet, technology and defence companies such as Google, Adobe, Juniper, Yahoo!, Northrup Grumman. The cyber-attack modified source code by exploiting vulnerabilities in an internet browser. 8
  • 9. Social Responsibility To overcome this mission critical situation of cyber sabotage, the skilled man- force of cyber expert is the solution. After China and US, India has the highest number of internet users. Besides, there are over 381 million mobile phone subscriptions with internet connectivity. “Today, there are more than 2 billion people online, who need to be protected. Cyber attacks are already happening on a daily basis in the world and as we grow more and more ‘connected’, the threats also become more complex and difficult. On Facebook, there are 50 million Indian users and even if a small fraction of them click unsuspectingly on a malevolent but seemingly ordinary link, you have that many computers opened up to risk and infection,” – Former Minister Shashi Tharoor stated. 9
  • 10. Social Responsibility India will require five lakh cybersecurity professionals by 2015 to support its fast growing internet economy as per an estimate by the union ministry of information technology. Every organization across verticals will require cybersecurity professionals. Therefore, the estimate of 5 lakh looks very conservative for a strong internet economy like India. The actual requirement for cyber security professionals would be in multiples. University Grants Commission directed all university vice chancellors in the country to introduce curriculum around cyber security in their respective colleges to meet this talent demand. Quoting a Gartner report in its letter, UGC said, "The country's information security market is expected to grow by 18% to reach Rs 1,415 crore in 2013 on the back of increased spending by companies to secure their information assets. Despite a continuing economic slowdown that has been putting pressure on IT budgets around the world, cyber security spending globally would continue on an upward trajectory, reaching $86 billion in 2016, up from $60 billion in 2012.“ 10
  • 11. Social Responsibility Cyber security ensures realization and controlling of security properties of an organization’s as well as users’ intellectual and financial assets against relevant security risks in the cyber environment. BUT… Cyber expertise can be taught in the syllabus as a part of curriculum in colleges but practically its hard to horn the skill with expertise. 11
  • 12. Social Responsibility Out of 10 buddying engineers/MCA/BCA… pass out, hardly 2-3 get placed in job. This is due to the additional and demanding skill required by the recruiting company. Cyber Professional is the very need of every individual company to protect its virtual infrastructure of company asset. Cyber Security Market worth $155.74 Billion by 2019. Cyberfort Technolgies is the all to all solution where cyber security is taught with complete passion and help shaping the career of buddying young cyber professionals. 12
  • 13. After a thorough research of world business and political system, we have designed few industry driven courses for students/professionals  Diploma in Cyber Security (CEH)  Certificate in Cyber Security (CSCU)  Project Integrated Program (PIP) 13
  • 14. Syllabus at glance Diploma in Cyber Security  Module 01: Introduction to Ethical Hacking  Module 02: Footprinting and Reconnaissance  Module 03: Scanning Networks  Module 04: Enumeration  Module 05: System Hacking  Module 06: Trojans and Backdoors  Module 07: Viruses and Worms  Module 08: Sniffing  Module 09: Social Engineering  Module 10: Denial of Service  Module 11: Session Hijacking  Module 12: Hacking Webservers  Module 13: Hacking Web Applications  Module 14: SQL Injection  Module 15: Hacking Wireless Networks  Module 16: Hacking Mobile Platforms  Module 17: Evading IDS, Firewalls, and Honeypots  Module 18: Buffer Overflow  Module 19: Cryptography  Module 20: Penetration Testing 14
  • 15. Syllabus at glance Certificate in Cyber Security  Module 01: Foundations of Security  Module 02: Securing Operating Systems  Module 03: Protecting System Using Antiviruses  Module 04: Data Encryption  Module 05: Data Backup and Disaster Recovery  Module 06: Internet Security  Module 07: Securing Network Connections  Module 08: Securing Online Transactions  Module 09: Securing Email Communications  Module 10: Social Engineering and Identity Theft  Module 11: Security on Social Networking Sites  Module 12: Information Security and Legal Compliance  Module 13: Securing Mobile Devices 15
  • 16. Syllabus at glance Project Integrated Program  Based on Project assigned and industry defined 16
  • 17. Career & Profile after completion Cyber Security Analyst Cyber Security Architect Cyber Security Engineer Consultant - Cyber Threat Management Information Security Event Analyst Cyber Operations Malware Analyst Executive Manager Ethical Hacker Cum Cyber Security Trainer Information Security Consultant Career in Nationalized Bank Bank of Maharashtra (Plz see page 7 of the link) Information Security Officers http://www.bankofmaharashtra.in/downdocs/FINAL-BOM- ADVERTISEMENT-BM-2014-22-04.pdf and many more… 17
  • 18. 18