SlideShare a Scribd company logo
1 of 12
Need Of Cyber Security Courses
 Depending on the particular industry and the size and scope of the
 business, cyber security can be very complicated

  This is the course whose in depth knowledge can be applied to all types of
 organizations where computers are in use.

  Industry is in the best position to identify threats and vulnerabilities,
 articulate the need for security and protection of assets.

  It is a computer security course which will enable professionals to protect
 Internet enabled computer security systems against cyber security threats.

  It is a computer security course which will enable professionals to protect
 Internet enabled computer security systems against cyber security threats.
 All efforts will be made to ensure that all information, resources and material
 available as part of this course does not promote any sort of cyber crime
 directly or indirectly.
Types of Cyber Crimes

•   Cyber terrorism
•   Cyber pornography
•   Defamation
•   Cyber stalking (section 509 IPC)
•   Sale of illegal articles-narcotics,
    weapons, wildlife
•   Online gambling
•   Email spoofing
•   Electronic Transaction Forgery
•   Credit card frauds
Programme Ideally Suited For

The Post Graduate Diploma in Cyber Security course
is need of all IT and networking Professionals
working for
   • Banks
   • Financial Institutions
   • IT-software
   • Telecom and Networking
   • Research Company
   • Defense
   • All others widely using computers.
Recent Incidents of Cyber Crime in India

                            Non Reporting-
                             causes
      UNAUTHORISED
       ACCESS 19%           60% feared
                             negative publicity
      E-MAIL ABUSE 21%      23% did not know
                             police equipped to
       DATA THEFT 33%        handle cyber
                             crimes
                            8% had no
                             awareness of cyber
                             laws
Major Cyber Security Opportunities




All major IT Companies, banks, financial institutions now require
the best Cyber Security Experts To secure their important
database and Documents.
Cyber Security With IMT-CDL

 To meet the growing demand of Cyber Security Experts, One-Year Post-
Graduate Diploma in Cyber Security has been designed by well-known
Cyber Security Expert, Ankit Fadia.

 World renowned computer security expert Ankit Fadia will himself
personally research, develop and teach all the training modules of the
program

 Students will be awarded Post Graduate Diploma by IMT-CDL, which is
recognized by Distance Education Council, Govt. of India.

 The students can join this programme along with their jobs and/or other
programmes which will give them faster career growth.
Programme & Fee Structure

        Semester 1                          Semester 2

       Basics of Security                Security Solutions
       Network Security              Advanced Security Systems
   Different Types of Attack         Application, Internet Mobile
   Network Security Threats,             Platforms Security
    Attacks and Loopholes             Building a Secure Kernel



         Rs. 19,000/-
         Rs. 19,000/-                      Rs. 18,000/-
                                           Rs. 18,000/-


                     Eligibility Criteria
  Graduation in any discipline. No admission test is required.
Training Format of IMT-CDL Cyber Security Courses


Students will be trained with critical computer security
skills necessary to survive in the cyber security industry
with the help of a combination of the following teaching
formats

   • Live Video Lecture
   • Video-on-demand Lectures
   • Online Study Material (PowerPoint slides & text)
   • Video Workshop Demonstration
   • Interactive Question & Answer sessions
   • IMT Course Material
Course Curriculum

The course curriculum includes exhaustive modules
some of which include
For more Details
IMT – Centre for Distance Education

     IMT – Centre for Distance Education,
     A-16, Site 3, UPSIDC Industrial Area,
     Meerut Road, Ghaziabad - 201 003.
     Ph: 0120-6744744, +91-0120-3015465,
     Fax: +91-0120-2705625


     For Admission & Prospectus Contact : Raju E.J. / Ashok Rawat
     Email: admissions@imtcdl.ac.in, newadmission@imtcdl.ac.in
     Website:www.imtcdl.ac.in
IMT Center for Distance Learning


   Join the Cyber
 Security Programme
        By IMT – CDL
    With Ankit Fadia
    … and take the first step to cyber success

More Related Content

What's hot

Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesMs810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devices
rebelreg
 
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le..."Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
Dataconomy Media
 
Cyber Threat Simulation
Cyber Threat SimulationCyber Threat Simulation
Cyber Threat Simulation
Tonex
 

What's hot (20)

Cyber-Security in Education
Cyber-Security in EducationCyber-Security in Education
Cyber-Security in Education
 
Deep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsDeep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from Patents
 
NGN integrated information security v3 DetikNas
NGN integrated information security v3 DetikNasNGN integrated information security v3 DetikNas
NGN integrated information security v3 DetikNas
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
 
Cyber security
Cyber security Cyber security
Cyber security
 
AI/ML for Real-time decision-making in IT/OT
AI/ML for Real-time decision-making in IT/OTAI/ML for Real-time decision-making in IT/OT
AI/ML for Real-time decision-making in IT/OT
 
Hiring for cybersecurity
Hiring for cybersecurityHiring for cybersecurity
Hiring for cybersecurity
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesMs810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devices
 
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le..."Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
Mobile Security Research Projects Help
Mobile Security  Research Projects HelpMobile Security  Research Projects Help
Mobile Security Research Projects Help
 
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
 
Cyber Security
Cyber Security Cyber Security
Cyber Security
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
 
Cyber Threat Simulation
Cyber Threat SimulationCyber Threat Simulation
Cyber Threat Simulation
 
Cyber awareness program
Cyber awareness programCyber awareness program
Cyber awareness program
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security
Cyber security Cyber security
Cyber security
 

Similar to Cyber Law and Security

Similar to Cyber Law and Security (20)

Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybersecurity Risk from User Perspective
Cybersecurity Risk from User PerspectiveCybersecurity Risk from User Perspective
Cybersecurity Risk from User Perspective
 
Career in cyber security
Career in  cyber securityCareer in  cyber security
Career in cyber security
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
 
CYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdf
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Cyber Security Course in Pune March 2024.pptx
Cyber Security Course in Pune March 2024.pptxCyber Security Course in Pune March 2024.pptx
Cyber Security Course in Pune March 2024.pptx
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
 
Cyber security brochure(1)
Cyber security brochure(1)Cyber security brochure(1)
Cyber security brochure(1)
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptx
 
Cyber Security Course in Hyderabad April 2024
Cyber Security Course in Hyderabad April 2024Cyber Security Course in Hyderabad April 2024
Cyber Security Course in Hyderabad April 2024
 
Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024
 
Cyber Security Course in Chennai March 2024
Cyber Security Course in Chennai March 2024Cyber Security Course in Chennai March 2024
Cyber Security Course in Chennai March 2024
 
Cyber Security Course in Chennai April 2024
Cyber Security Course in Chennai April 2024Cyber Security Course in Chennai April 2024
Cyber Security Course in Chennai April 2024
 
188
188188
188
 

Cyber Law and Security

  • 1.
  • 2. Need Of Cyber Security Courses Depending on the particular industry and the size and scope of the business, cyber security can be very complicated  This is the course whose in depth knowledge can be applied to all types of organizations where computers are in use.  Industry is in the best position to identify threats and vulnerabilities, articulate the need for security and protection of assets.  It is a computer security course which will enable professionals to protect Internet enabled computer security systems against cyber security threats.  It is a computer security course which will enable professionals to protect Internet enabled computer security systems against cyber security threats. All efforts will be made to ensure that all information, resources and material available as part of this course does not promote any sort of cyber crime directly or indirectly.
  • 3. Types of Cyber Crimes • Cyber terrorism • Cyber pornography • Defamation • Cyber stalking (section 509 IPC) • Sale of illegal articles-narcotics, weapons, wildlife • Online gambling • Email spoofing • Electronic Transaction Forgery • Credit card frauds
  • 4. Programme Ideally Suited For The Post Graduate Diploma in Cyber Security course is need of all IT and networking Professionals working for • Banks • Financial Institutions • IT-software • Telecom and Networking • Research Company • Defense • All others widely using computers.
  • 5. Recent Incidents of Cyber Crime in India  Non Reporting- causes UNAUTHORISED ACCESS 19%  60% feared negative publicity E-MAIL ABUSE 21%  23% did not know police equipped to DATA THEFT 33% handle cyber crimes  8% had no awareness of cyber laws
  • 6. Major Cyber Security Opportunities All major IT Companies, banks, financial institutions now require the best Cyber Security Experts To secure their important database and Documents.
  • 7. Cyber Security With IMT-CDL  To meet the growing demand of Cyber Security Experts, One-Year Post- Graduate Diploma in Cyber Security has been designed by well-known Cyber Security Expert, Ankit Fadia.  World renowned computer security expert Ankit Fadia will himself personally research, develop and teach all the training modules of the program  Students will be awarded Post Graduate Diploma by IMT-CDL, which is recognized by Distance Education Council, Govt. of India.  The students can join this programme along with their jobs and/or other programmes which will give them faster career growth.
  • 8. Programme & Fee Structure Semester 1 Semester 2 Basics of Security Security Solutions Network Security Advanced Security Systems Different Types of Attack Application, Internet Mobile Network Security Threats, Platforms Security Attacks and Loopholes Building a Secure Kernel Rs. 19,000/- Rs. 19,000/- Rs. 18,000/- Rs. 18,000/- Eligibility Criteria Graduation in any discipline. No admission test is required.
  • 9. Training Format of IMT-CDL Cyber Security Courses Students will be trained with critical computer security skills necessary to survive in the cyber security industry with the help of a combination of the following teaching formats • Live Video Lecture • Video-on-demand Lectures • Online Study Material (PowerPoint slides & text) • Video Workshop Demonstration • Interactive Question & Answer sessions • IMT Course Material
  • 10. Course Curriculum The course curriculum includes exhaustive modules some of which include
  • 11. For more Details IMT – Centre for Distance Education IMT – Centre for Distance Education, A-16, Site 3, UPSIDC Industrial Area, Meerut Road, Ghaziabad - 201 003. Ph: 0120-6744744, +91-0120-3015465, Fax: +91-0120-2705625 For Admission & Prospectus Contact : Raju E.J. / Ashok Rawat Email: admissions@imtcdl.ac.in, newadmission@imtcdl.ac.in Website:www.imtcdl.ac.in
  • 12. IMT Center for Distance Learning Join the Cyber Security Programme By IMT – CDL With Ankit Fadia … and take the first step to cyber success