SlideShare a Scribd company logo
1 of 18
“Thousands of cyber-attacks […] are striking at the private
sector, strike at stock market, strike at other institutions
within our society, strike at government, strike at the
defence department, our intelligence agencies. Cyber is
now at a point where the technology is there to cripple a
country, to take down our power grid systems, to take
down our government systems, take down our financial
systems and literally paralyze the country."
In the new era, business has transformed its work-style
from reality to virtual reality.
2
The whole world is swiped by
this strategy for its accuracy and
non-redundancy measure.
3
This new sector where free flow and
accuracy has lowered down the
operational cost of big conglomerate
whereas it has bullion threat from the
remote cyber criminal on the other hand.
4
In recent years, cyber-crime has become
increasingly sophisticated, making it
difficult to combat, detect and mitigate.
The rise of a relatively new class of cyber-
attack is especially troubling. This new
class is referred to as an ‘Advanced
Persistent Threat’ (APT).
*Advanced Persistent Threats (APTs) are usually directed at business and political
targets for political ends. APTs involve stealth to persistently infiltrate a system over a
long period of time, without the system displaying any unusual symptoms.
5
Examples of cyber-attacks
Attack on South Korea’s banks and broadcasters, 2013. A suspected cyber-attack
brought down systems and computers at some of South Korea’s major banks and
broadcasters. As a result, the local equity market declined 1.0%.
The Flame virus, 2012. Thought to have been operating since 2010, the Flame virus was
detected in 2012. The virus code is seen as some of the most sophisticated and largest
malicious code to date. It infiltrated computers belonging to the Iranian Oil Ministry,
the Iranian National Oil Company and other networks in Hungary, Lebanon, Austria,
Russia, Hong Kong and the United Arab Emirates - stealing and deleting information
from the systems. Part of the functionality of the virus including turning on microphones
of computers to secretly record conversations, taking screen grabs of infected
computers and stealing credentials of high-level and administrative users.
6
Examples of cyber-attacks
Red October cyber-attack, 2013. Targeting governmental and diplomatic
organisations. The Red October attack was discovered in January of this year, but is
believed to have been operating undetected for a number of years. The attack
effectively stole confidential and encrypted documents (including deleted ones) from
embassies, nuclear research centres and oil and gas companies of US. Information
targeted included geopolitically sensitive data and credentials to access protected
computer systems. The malicious code was also able to detect when a USB stick was
inserted into a networked computer and undelete and steal any files on the stick. The
cyber-crime racket behind the attacks shut-down their operations after the attacks
were made public and documented.
7
Examples of cyber-attacks
The MiniDuke Cyber-attack on EU governmental organizations and operators of
critical infrastructure.13 The MiniDuke Cyber-attack exploited a flaw in Adobe’s
Acrobat reader to enter computer networks and gather information.
Operation Aurora, 2009. Attacks against some of the largest internet, technology and
defence companies such as Google, Adobe, Juniper, Yahoo!, Northrup Grumman.
The cyber-attack modified source code by exploiting vulnerabilities in an internet
browser.
8
Social Responsibility
To overcome this mission critical situation of cyber sabotage, the skilled man-
force of cyber expert is the solution.
After China and US, India has the highest number of internet users. Besides,
there are over 381 million mobile phone subscriptions with internet
connectivity.
“Today, there are more than 2 billion people online, who need to be protected.
Cyber attacks are already happening on a daily basis in the world and as we
grow more and more ‘connected’, the threats also become more complex and
difficult. On Facebook, there are 50 million Indian users and even if a small
fraction of them click unsuspectingly on a malevolent but seemingly ordinary
link, you have that many computers opened up to risk and infection,” – Former
Minister Shashi Tharoor stated.
9
Social Responsibility
India will require five lakh cybersecurity professionals by 2015 to support its fast
growing internet economy as per an estimate by the union ministry of information
technology.
Every organization across verticals will require cybersecurity professionals. Therefore,
the estimate of 5 lakh looks very conservative for a strong internet economy like India.
The actual requirement for cyber security professionals would be in multiples.
University Grants Commission directed all university vice chancellors in the country to
introduce curriculum around cyber security in their respective colleges to meet this
talent demand.
Quoting a Gartner report in its letter, UGC said, "The country's information security
market is expected to grow by 18% to reach Rs 1,415 crore in 2013 on the back of
increased spending by companies to secure their information assets. Despite a
continuing economic slowdown that has been putting pressure on IT budgets around
the world, cyber security spending globally would continue on an upward trajectory,
reaching $86 billion in 2016, up from $60 billion in 2012.“
10
Social Responsibility
Cyber security ensures realization and controlling of security
properties of an organization’s as well as users’ intellectual and
financial assets against relevant security risks in the cyber
environment.
BUT…
Cyber expertise can be taught in the syllabus as a part of
curriculum in colleges but practically its hard to horn the skill
with expertise.
11
Social Responsibility
Out of 10 buddying engineers/MCA/BCA… pass out, hardly 2-3
get placed in job. This is due to the additional and demanding
skill required by the recruiting company.
Cyber Professional is the very need of every individual company
to protect its virtual infrastructure of company asset.
Cyber Security Market worth $155.74 Billion by 2019.
Cyberfort Technolgies is the all to all solution where cyber
security is taught with complete passion and help shaping the
career of buddying young cyber professionals.
12
After a thorough research of world business
and political system, we have designed
few industry driven courses for
students/professionals
 Diploma in Cyber Security (CEH)
 Certificate in Cyber Security (CSCU)
 Project Integrated Program (PIP)
13
Syllabus at glance
Diploma in Cyber Security
 Module 01: Introduction to Ethical Hacking
 Module 02: Footprinting and Reconnaissance
 Module 03: Scanning Networks
 Module 04: Enumeration
 Module 05: System Hacking
 Module 06: Trojans and Backdoors
 Module 07: Viruses and Worms
 Module 08: Sniffing
 Module 09: Social Engineering
 Module 10: Denial of Service
 Module 11: Session Hijacking
 Module 12: Hacking Webservers
 Module 13: Hacking Web Applications
 Module 14: SQL Injection
 Module 15: Hacking Wireless Networks
 Module 16: Hacking Mobile Platforms
 Module 17: Evading IDS, Firewalls, and Honeypots
 Module 18: Buffer Overflow
 Module 19: Cryptography
 Module 20: Penetration Testing
14
Syllabus at glance
Certificate in Cyber Security
 Module 01: Foundations of Security
 Module 02: Securing Operating Systems
 Module 03: Protecting System Using Antiviruses
 Module 04: Data Encryption
 Module 05: Data Backup and Disaster Recovery
 Module 06: Internet Security
 Module 07: Securing Network Connections
 Module 08: Securing Online Transactions
 Module 09: Securing Email Communications
 Module 10: Social Engineering and Identity Theft
 Module 11: Security on Social Networking Sites
 Module 12: Information Security and Legal Compliance
 Module 13: Securing Mobile Devices
15
Syllabus at glance
Project Integrated Program
 Based on Project assigned and industry defined
16
Career & Profile after completion
Cyber Security Analyst
Cyber Security Architect
Cyber Security Engineer
Consultant - Cyber Threat Management
Information Security Event Analyst
Cyber Operations Malware Analyst
Executive Manager
Ethical Hacker Cum Cyber Security Trainer
Information Security Consultant
Career in Nationalized Bank
Bank of Maharashtra (Plz see page 7 of the link)
Information Security Officers
http://www.bankofmaharashtra.in/downdocs/FINAL-BOM-
ADVERTISEMENT-BM-2014-22-04.pdf
and many more…
17
18

More Related Content

What's hot

Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh WebinarArrow ECS UK
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the worldSeqrite
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec
 
Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Ainsha Noordin (Umie)
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shiftsmalvvv
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shiftsmalvvv
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-statusRama Reddy
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android applicationIAEME Publication
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security ProtectionShawn Crimson
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudITDogadjaji.com
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
Security weekly september 28 october 4, 2021
Security weekly september 28   october 4, 2021 Security weekly september 28   october 4, 2021
Security weekly september 28 october 4, 2021 Roen Branham
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistMatthew Rosenquist
 

What's hot (20)

Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh Webinar
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
Cyber attacks in 2021
Cyber attacks in 2021Cyber attacks in 2021
Cyber attacks in 2021
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
 
Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
 
188
188188
188
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Security weekly september 28 october 4, 2021
Security weekly september 28   october 4, 2021 Security weekly september 28   october 4, 2021
Security weekly september 28 october 4, 2021
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 

Similar to Cyberfort syllabus & career

CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfJayaMalaR6
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0varun4110
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Vertex Holdings
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internetsuperintendingengine17
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022ManviShukla4
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdfRakeshPatel583282
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookMargarete McGrath
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCybAnastaciaShadelb
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019Omar Bshara
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineRapidSSLOnline.com
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...ijtsrd
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistMatthew Rosenquist
 

Similar to Cyberfort syllabus & career (20)

Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
Cyber security
Cyber security Cyber security
Cyber security
 
CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdf
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 

Recently uploaded

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 

Recently uploaded (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 

Cyberfort syllabus & career

  • 1.
  • 2. “Thousands of cyber-attacks […] are striking at the private sector, strike at stock market, strike at other institutions within our society, strike at government, strike at the defence department, our intelligence agencies. Cyber is now at a point where the technology is there to cripple a country, to take down our power grid systems, to take down our government systems, take down our financial systems and literally paralyze the country." In the new era, business has transformed its work-style from reality to virtual reality. 2
  • 3. The whole world is swiped by this strategy for its accuracy and non-redundancy measure. 3
  • 4. This new sector where free flow and accuracy has lowered down the operational cost of big conglomerate whereas it has bullion threat from the remote cyber criminal on the other hand. 4
  • 5. In recent years, cyber-crime has become increasingly sophisticated, making it difficult to combat, detect and mitigate. The rise of a relatively new class of cyber- attack is especially troubling. This new class is referred to as an ‘Advanced Persistent Threat’ (APT). *Advanced Persistent Threats (APTs) are usually directed at business and political targets for political ends. APTs involve stealth to persistently infiltrate a system over a long period of time, without the system displaying any unusual symptoms. 5
  • 6. Examples of cyber-attacks Attack on South Korea’s banks and broadcasters, 2013. A suspected cyber-attack brought down systems and computers at some of South Korea’s major banks and broadcasters. As a result, the local equity market declined 1.0%. The Flame virus, 2012. Thought to have been operating since 2010, the Flame virus was detected in 2012. The virus code is seen as some of the most sophisticated and largest malicious code to date. It infiltrated computers belonging to the Iranian Oil Ministry, the Iranian National Oil Company and other networks in Hungary, Lebanon, Austria, Russia, Hong Kong and the United Arab Emirates - stealing and deleting information from the systems. Part of the functionality of the virus including turning on microphones of computers to secretly record conversations, taking screen grabs of infected computers and stealing credentials of high-level and administrative users. 6
  • 7. Examples of cyber-attacks Red October cyber-attack, 2013. Targeting governmental and diplomatic organisations. The Red October attack was discovered in January of this year, but is believed to have been operating undetected for a number of years. The attack effectively stole confidential and encrypted documents (including deleted ones) from embassies, nuclear research centres and oil and gas companies of US. Information targeted included geopolitically sensitive data and credentials to access protected computer systems. The malicious code was also able to detect when a USB stick was inserted into a networked computer and undelete and steal any files on the stick. The cyber-crime racket behind the attacks shut-down their operations after the attacks were made public and documented. 7
  • 8. Examples of cyber-attacks The MiniDuke Cyber-attack on EU governmental organizations and operators of critical infrastructure.13 The MiniDuke Cyber-attack exploited a flaw in Adobe’s Acrobat reader to enter computer networks and gather information. Operation Aurora, 2009. Attacks against some of the largest internet, technology and defence companies such as Google, Adobe, Juniper, Yahoo!, Northrup Grumman. The cyber-attack modified source code by exploiting vulnerabilities in an internet browser. 8
  • 9. Social Responsibility To overcome this mission critical situation of cyber sabotage, the skilled man- force of cyber expert is the solution. After China and US, India has the highest number of internet users. Besides, there are over 381 million mobile phone subscriptions with internet connectivity. “Today, there are more than 2 billion people online, who need to be protected. Cyber attacks are already happening on a daily basis in the world and as we grow more and more ‘connected’, the threats also become more complex and difficult. On Facebook, there are 50 million Indian users and even if a small fraction of them click unsuspectingly on a malevolent but seemingly ordinary link, you have that many computers opened up to risk and infection,” – Former Minister Shashi Tharoor stated. 9
  • 10. Social Responsibility India will require five lakh cybersecurity professionals by 2015 to support its fast growing internet economy as per an estimate by the union ministry of information technology. Every organization across verticals will require cybersecurity professionals. Therefore, the estimate of 5 lakh looks very conservative for a strong internet economy like India. The actual requirement for cyber security professionals would be in multiples. University Grants Commission directed all university vice chancellors in the country to introduce curriculum around cyber security in their respective colleges to meet this talent demand. Quoting a Gartner report in its letter, UGC said, "The country's information security market is expected to grow by 18% to reach Rs 1,415 crore in 2013 on the back of increased spending by companies to secure their information assets. Despite a continuing economic slowdown that has been putting pressure on IT budgets around the world, cyber security spending globally would continue on an upward trajectory, reaching $86 billion in 2016, up from $60 billion in 2012.“ 10
  • 11. Social Responsibility Cyber security ensures realization and controlling of security properties of an organization’s as well as users’ intellectual and financial assets against relevant security risks in the cyber environment. BUT… Cyber expertise can be taught in the syllabus as a part of curriculum in colleges but practically its hard to horn the skill with expertise. 11
  • 12. Social Responsibility Out of 10 buddying engineers/MCA/BCA… pass out, hardly 2-3 get placed in job. This is due to the additional and demanding skill required by the recruiting company. Cyber Professional is the very need of every individual company to protect its virtual infrastructure of company asset. Cyber Security Market worth $155.74 Billion by 2019. Cyberfort Technolgies is the all to all solution where cyber security is taught with complete passion and help shaping the career of buddying young cyber professionals. 12
  • 13. After a thorough research of world business and political system, we have designed few industry driven courses for students/professionals  Diploma in Cyber Security (CEH)  Certificate in Cyber Security (CSCU)  Project Integrated Program (PIP) 13
  • 14. Syllabus at glance Diploma in Cyber Security  Module 01: Introduction to Ethical Hacking  Module 02: Footprinting and Reconnaissance  Module 03: Scanning Networks  Module 04: Enumeration  Module 05: System Hacking  Module 06: Trojans and Backdoors  Module 07: Viruses and Worms  Module 08: Sniffing  Module 09: Social Engineering  Module 10: Denial of Service  Module 11: Session Hijacking  Module 12: Hacking Webservers  Module 13: Hacking Web Applications  Module 14: SQL Injection  Module 15: Hacking Wireless Networks  Module 16: Hacking Mobile Platforms  Module 17: Evading IDS, Firewalls, and Honeypots  Module 18: Buffer Overflow  Module 19: Cryptography  Module 20: Penetration Testing 14
  • 15. Syllabus at glance Certificate in Cyber Security  Module 01: Foundations of Security  Module 02: Securing Operating Systems  Module 03: Protecting System Using Antiviruses  Module 04: Data Encryption  Module 05: Data Backup and Disaster Recovery  Module 06: Internet Security  Module 07: Securing Network Connections  Module 08: Securing Online Transactions  Module 09: Securing Email Communications  Module 10: Social Engineering and Identity Theft  Module 11: Security on Social Networking Sites  Module 12: Information Security and Legal Compliance  Module 13: Securing Mobile Devices 15
  • 16. Syllabus at glance Project Integrated Program  Based on Project assigned and industry defined 16
  • 17. Career & Profile after completion Cyber Security Analyst Cyber Security Architect Cyber Security Engineer Consultant - Cyber Threat Management Information Security Event Analyst Cyber Operations Malware Analyst Executive Manager Ethical Hacker Cum Cyber Security Trainer Information Security Consultant Career in Nationalized Bank Bank of Maharashtra (Plz see page 7 of the link) Information Security Officers http://www.bankofmaharashtra.in/downdocs/FINAL-BOM- ADVERTISEMENT-BM-2014-22-04.pdf and many more… 17
  • 18. 18