SlideShare a Scribd company logo
1 of 8
Download to read offline
Post Graduate Program in
Cyber Security
in association with IBM
SCHOOL OF CYBER SECURITY
SCHOOL OF CYBER SECURITY
mUni Campus is oļ¬€ering Aegis world class digital infra, MOOC platform, learning management system, learning app and
online course delivery platform on cloud. This enables Aegis to improve learning outcome and oļ¬€er high quality live interactive.
courses online worldwide. Check Aegis MOOC courses at www.mUniversity.mobi/Aegis
The emerging need of Techno
Management & Cross Functional skills
will be mandate for Future Leadership
in the organizations. Leadership in
Organizations will urge for creation of
synergy between Technological
Developments with new age
managerial skills.
Dr. Abhijit Gangopadhyay
Dean, Aegis
Professor, XLRI
Founding Dean, IIM Indore
Former Dean, TISS
s
Aegis was started in 2002 with the
support of ā€œAirtel Bhartiā€ for developing
cross functional telecom leaders.
.
Accepting Scores
The old models of producing general managers and functional specialists are no longer adequate in today's fast changing environment.
Organizations need leaders who are able to harness the power of innovation and lead them through a rebirth; they need 'Renaissance
Leaders'. ā€œHow do we create a Renaissance Leader? Are they born or are they made?ā€ Aegis was founded to answer these questions in
2002 with support from Bharti, Airtel and to develop cross functional technology leaders. In 2015 Aegis and IBM collaborated to launch,
India's ļ¬rst Post Graduate Program (PGP) in Data Science, Business Analytics and Big Data and again in 2017 IBM joined hands with Aegis
to launch PGP in Cyber Security. These programs are jointly certiļ¬ed and delivered by Aegis in association with IBM. IBM has set up high
end Business Analytics, Cloud Computing and Cyber Security Lab at Campus.
SCHOOL OF CYBER SECURITY
In 2017 NVIDIA and Aegis partnered to develop skills
for applied AI and Deep Learning in India.
Aegis initiated Data Science Congress, an independent platform for sharing knowledge among data scientist,
practitioners, users, tech vendors, academia and Government for developing eco-system to bring India at the
forefront of world map and for growth of disruptive technologies like Data Science, Analytics, Big Data,
Block Chain, AI, Machine Learning, Cyber Security etc.
ā€œVaidyanathan R Iyer
The course content will be
dynamic. IBM with its technology
of Watson, Cognitive, Big Data
technologies behind it and our
analytics skills will look forward to
support this course in the best
way we can by pulling in along
with our Research and
Development resources
Business Unit Excecutive
IBM Security-Asia Paciļ¬c
IBM
ā€œCYBERCRIME IS THE
GREATEST THREAT TO EVERY
COMPANY IN THE WORLD.ā€
Gini Rometty, IBMā€™S Chairman, President & CEO
And she was right. During the next ļ¬ve years, cybercrime might become the greatest threat to every person, place, and thing.
With the vast amount of sensitive data now stored in the digital universe - everything from social security numbers to ļ¬nancial records and
matters of national security - itā€™s critical that we secure and protect it from malicious interests. For vital computer networks and electronic
infrastructures, cyber security experts stands as the last and most eļ¬€ective line of defence against such attacks.
Looking at the huge gap in skills for Cyber Security, Aegis has launched Post Graduate Program (PGP) in Cyber Security in association with IBM.
This PGP in Cyber Security is an interdisciplinary program that prepares students with both the academic and practical training to be
competitive in the ever-changing technical landscape of Cyber Security.
There has never been a better time to specialize your skills. Elevate your technical abilities in booming areas like cloud security, wireless
network security, and mobile device hacking.
The cyber security ļ¬eld is expected to generate many new jobs over the next decade as industry and government continue to emphasize safe
data and information system. As a graduate of the Cyber Security Post Graduate Program youā€™ll be ready for a career as a developer of security
products, security application programmer, security analyst, and penetration tester. You can also pursue work as a security researcher,
vulnerability analyst or security architect or continue your studies toward a doctorate.
Post Graduate Program In Cyber Security In Association With IBM
SCHOOL OF CYBER SECURITY
MOU signing ceremony by Aegis - IBM
Program Delivery Models
Total Program: 36 Credit Units
Full Time PGP
On-Campus Classroom
Program Duration: 11 months
9 months of Class room training
(3 terms each of 3 months) + 2
months of Internships
Total Program: 36 Credit Units
Core courses: 30 Credit Units
Units Elective courses:
6 Credit Units
Program Duration: 11 months
Weekend Executive PGP
On-Campus Classroom Model
Total Program: 36 Credit Units
Core courses: 30 Credit Units
Units Elective courses:
6 Credit Units
Program Duration: 11 months
Executive Weekend PGP
Live Online Interactive
ā€¢ Post Graduate Program in Cyber Security in association
with IBM
ā€¢ Final PGP certiļ¬cation by IBM
ā€¢ Program will be taught by IBM experts and top faculties
ā€¢ Exposure to IBM Cyber Security Lab and software
ā€¢ Career Management Center to facilitate you with career
opportunities
ā€¢ Globally accepted credit structure
program duration 11 months
ā€¢ On campus Full Time Program is 11 months
ā€¢ Executive Weekend Program is 11 months duration both
on campus as well as Online
Certification from IBMProgram Highlights
Registration No.
Registration No.
Dean
Aegis School of Business
School of Telecommunication
This is to certify that
Name of Student
has fulfilled the requirements for
SAMPLE CERTIFICATE
Course Details : Post Graduate Program in CyberSecurity in association with IBM
Program Duration : January 2017 ā€“ May 2018
Tools Used : IBM Security Access Manager , IBM Security Identity Manager ,
IBM Security AppScan
Specialization Areas : Cybersecurity
Specialization in Post Graduate Program in
CyberSecurity in association with IBM
Country Manager - Software Services
IBM Software Group
Jagadisha Bhat
Biggest Ransomware
attack in history
The attack began on Friday, 12 May 2017, and within a day was reportes to have infected more than
230,000 computers in over 150countries.
Last Year, U.S. News & Report
Ranked Cyber Security eighth on a list of the 100 best jobs.
Cyber crime damage costs to hit $6 trillion annually by 2021.
Cyber Security spending to exceed $1 trillion from 2017 to 2021.
Unfilled Cyber Security Jobs will reach
1.5 million by 2019.
Human attack surface to reach
4 billion people by 2020.
Up to 200 billion IoT
devices will need
securing by 2020.
The Ponemon Institute reported that the average cost of a cyber breach has reached $3.8 million.
The rising tide of cyber crime has pushed Cyber Security
spending on products and services to more than $80 billion in 2016, according to Gartner.
* According to forbes magazine, the Cyber Security job market is expected to grow to more than
$170 billion in just four years, making it not only one of the fastest growing employment segments
in IT, but one that also comes with six-ļ¬gure salaries, security and plenty of room for upward
As the world goes digital, humans have moved ahead
of machines as the top target for Cyber Criminals.
Microsoft estimates that by 2020, 4 billion people will
be online twice the number that are online now. The
hackers smell blood now, not silicon.
This year, analysts and the media concluded there is a
severe shortage of Cyber Security talent globally.
There were 1 million Cyber Security Job openings in
2016, and that is expected to reach
REPORTED THAT
CURRENTLY
MORE THAN
1,000,000 AVAILABLE
CYBER SECURITY JOBS
IN THE U.S ALONE
AND 6,000,000
GLOBALLY.
CISCO
SCHOOL OF CYBER SECURITY
Intel claims that the number
of connected devices could
surge to 200 billion by 2020,
up from 15 billion in 2015.
Cisco and Microsoft have both
predicted 50 billion devices
will be connected to the
Internet by 2020. Regardless
of which estimate proves
right, the bottom line is that
the digital attack surface will
grow massively over the next
five years.
Are you a tech-pro and look forward to something exciting every day in your job? If yes, then this is a great
time to consider a new career opportunity, the cyber security professional. According to CIO magazine, the
cyber security experts are among the most sought after professionals in the technical sector; with demand
for workers in that ļ¬eld out spacing other IT jobs by a good margin.
Those who aspire to reach the highest level of cyber security and hope to have a lasting career in the profes-
sion should strongly consider having a master degree. It will surely give students additional technical and
theoretical skills and depending on the expertise can oļ¬€er the leadership, managerial and business skills
required in the high-level position. Those interested in a career in cyber security may pursue work as a secu-
rity administrator, cyber policy analyst, and information security analyst or software developer.
In todayā€™s world, there is a high demand for the cyber security professionals. It is estimated that the demand
of a cybersecurity professional is supposed to cross 6 million globally by 2019. This industry has too many
reasons to choose it as a profession some of which are:
Top Jobs in Market In Diverse Industries like
Career Opportunity In Cyber Security
SCHOOL OF CYBER SECURITY
ā€¢ Security Engineer
ā€¢ Security Analyst
ā€¢ Information Security Analyst
ā€¢ Information Security Engineer
ā€¢ Network Security Engineer
ā€¢ Information Technology Security
ā€¢ Analyst
ā€¢ Information Security Manager
ā€¢ Information Assurance Engineer
ā€¢ Senior IT Auditor
ā€¢ Security Administrator
ā€¢ Security Architect
ā€¢ Security Software Developer
ā€¢ Cryptographer/Cryptologist.
ā€¢ Cryptanalyst
ā€¢ Chief Information Security Oļ¬ƒcer.
ā€¢ Security Consultant/Specialist
ā€¢ E commerce
ā€¢ Medical & Healthcare
ā€¢ Banking & Finance
ā€¢ Energy & Utilities
ā€¢ Government bodies and Associations
ā€¢ Manufacturing
ā€¢ Wholesale & Retail Trading
ā€¢ IT and Software
ā€¢ Telecommunications, Mobile & Media
Not only from defence in
police, from corporate perspective
people are also targeted,
especially in research institutes
like atomic research institutes or
ISRO or DRDO They are on roads
with this organisation.
Amit Dubey
Author,
National Security Expert
Crime Investigator & Deputy CTO
Tech Mahindra
Satish Kumar Dwibhashi
ā€œCyber attacks are the
bigggest attacks. Its no
more a technology
challenge, its a
business challenge.ā€
Dr. Satnam Singh
Chief Data Scientist
Acalvio Technologies
In 2020, The rockstars of
software industry and the
product industry will be security
data scientist.
Chief Information Security Oļ¬ƒcer
SCHOOL OF CYBER SECURITY
Aegis and NVIDIA signed MoU for Deep Learning & Applied AI
Aegis -IBM Signed MoU for Post Graduate Program in Cyber Security
BUILD YOUR OWN CURRICULUM !
CORE COURSES
ELECTIVE COURSES
Capstone Project
TM
Application Security
PATTERN RECOGNITIONPATTERN RECOGNITION
Machine Learning for Cyber Security Ethical Hacking
Security and Privacy
IBM Watson for
Cognitive Cyber Security
Cyber Laws Applied Cryptography Digital Forensics
Penetration Testing and
Vulnerability Analysis
Cloud Security Pattern Recognition
Cyber Laws
Design and Analysis of Algorithm Capstone Project
Network SecurityApplication SecuritySecurity Engineering and ManagementFoundation Course in Security
Access Management by IBM
Python for Data Science
Fundamental Course in Cloud Security
& Application Security by IBM
Foundation Course in Security
Identity Management by IBM
SCHOOL OF CYBER SECURITY
SCHOOL OF CYBER SECURITY
M u m b a i | P u n e | B e n g a l u r u
Office of Admission Processing
Aegis School of Cyber Security
| Cell : 8291693261 | 8422970034 | 8828084908 | 9022137010
| Phone : +91 (0)22 25709461
| Email : admission@aegis.edu.in |
Download mUni Campus App to access Aegis Courses
www.aegis.edu.inFor More Info Visit -

More Related Content

What's hot

Fortinet k
Fortinet kFortinet k
Fortinet kmrehan2k2
Ā 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?btpsec
Ā 
Overview of Recorded Future Intel Cards
Overview of Recorded Future Intel CardsOverview of Recorded Future Intel Cards
Overview of Recorded Future Intel CardsRecorded Future
Ā 
Introduction to PCI DSS
Introduction to PCI DSSIntroduction to PCI DSS
Introduction to PCI DSSSaumya Vishnoi
Ā 
The strategies of password
The strategies of passwordThe strategies of password
The strategies of passwordMohammedAlhamoodi
Ā 
Steganography
Steganography Steganography
Steganography Humajabeen31
Ā 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
Ā 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesKrist Davood - Principal - CIO
Ā 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
Ā 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxAmanuelZewdie4
Ā 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testingNezar Alazzabi
Ā 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system gaurav koriya
Ā 
Network Architecture Review Checklist
Network Architecture Review ChecklistNetwork Architecture Review Checklist
Network Architecture Review ChecklistEberly Wilson
Ā 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardeninganupriti
Ā 
CyberArk
CyberArkCyberArk
CyberArkJimmy Sze
Ā 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyNetwork Intelligence India
Ā 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
Ā 
Password strength svm
Password strength svmPassword strength svm
Password strength svmSunil Rm
Ā 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolschrizjohn896
Ā 
Blockchain and Cybersecurity
Blockchain and Cybersecurity Blockchain and Cybersecurity
Blockchain and Cybersecurity gppcpa
Ā 

What's hot (20)

Fortinet k
Fortinet kFortinet k
Fortinet k
Ā 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
Ā 
Overview of Recorded Future Intel Cards
Overview of Recorded Future Intel CardsOverview of Recorded Future Intel Cards
Overview of Recorded Future Intel Cards
Ā 
Introduction to PCI DSS
Introduction to PCI DSSIntroduction to PCI DSS
Introduction to PCI DSS
Ā 
The strategies of password
The strategies of passwordThe strategies of password
The strategies of password
Ā 
Steganography
Steganography Steganography
Steganography
Ā 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
Ā 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
Ā 
Cia security model
Cia security modelCia security model
Cia security model
Ā 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
Ā 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
Ā 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
Ā 
Network Architecture Review Checklist
Network Architecture Review ChecklistNetwork Architecture Review Checklist
Network Architecture Review Checklist
Ā 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
Ā 
CyberArk
CyberArkCyberArk
CyberArk
Ā 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
Ā 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
Ā 
Password strength svm
Password strength svmPassword strength svm
Password strength svm
Ā 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
Ā 
Blockchain and Cybersecurity
Blockchain and Cybersecurity Blockchain and Cybersecurity
Blockchain and Cybersecurity
Ā 

Similar to Cyber security brochure(1)

Digital Security Capacity Building: Role of the University
Digital Security Capacity Building: Role of the UniversityDigital Security Capacity Building: Role of the University
Digital Security Capacity Building: Role of the UniversityNizar Ben Neji
Ā 
Cyber Security Course in Hyderabad April 2024
Cyber Security Course in Hyderabad April 2024Cyber Security Course in Hyderabad April 2024
Cyber Security Course in Hyderabad April 2024Skillogic Solutions
Ā 
Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024Skillogic Solutions
Ā 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxSkillogic Solutions
Ā 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
Ā 
Cyber Security Course in Pune March 2024.pptx
Cyber Security Course in Pune March 2024.pptxCyber Security Course in Pune March 2024.pptx
Cyber Security Course in Pune March 2024.pptxSkillogic Solutions
Ā 
Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Skillogic Solutions
Ā 
Cyber Security Course in Chennai March 2024
Cyber Security Course in Chennai March 2024Cyber Security Course in Chennai March 2024
Cyber Security Course in Chennai March 2024Skillogic Solutions
Ā 
Cyber Security Course in Chennai April 2024
Cyber Security Course in Chennai April 2024Cyber Security Course in Chennai April 2024
Cyber Security Course in Chennai April 2024Skillogic Solutions
Ā 
Why MSc is Right Choice
Why MSc is Right ChoiceWhy MSc is Right Choice
Why MSc is Right ChoiceEmma Thompson
Ā 
Cyber Security Course in Hyderabad January 2024
Cyber Security Course in Hyderabad January 2024Cyber Security Course in Hyderabad January 2024
Cyber Security Course in Hyderabad January 2024Skillogic Solutions
Ā 
Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Skillogic Solutions
Ā 
Cyber security course in Hyderabad January
Cyber security course in Hyderabad JanuaryCyber security course in Hyderabad January
Cyber security course in Hyderabad JanuarySkillogic Solutions
Ā 
Cyber Security Course in Hyderabad February 2024.pptx
Cyber Security Course in Hyderabad February 2024.pptxCyber Security Course in Hyderabad February 2024.pptx
Cyber Security Course in Hyderabad February 2024.pptxSkillogic Solutions
Ā 
Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Skillogic Solutions
Ā 
Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024Skillogic Solutions
Ā 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Skillogic Solutions
Ā 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Skillogic Solutions
Ā 

Similar to Cyber security brochure(1) (20)

Digital Security Capacity Building: Role of the University
Digital Security Capacity Building: Role of the UniversityDigital Security Capacity Building: Role of the University
Digital Security Capacity Building: Role of the University
Ā 
Cyber Security Course in Hyderabad April 2024
Cyber Security Course in Hyderabad April 2024Cyber Security Course in Hyderabad April 2024
Cyber Security Course in Hyderabad April 2024
Ā 
Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024
Ā 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptx
Ā 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Ā 
Cyber Security Course in Pune March 2024.pptx
Cyber Security Course in Pune March 2024.pptxCyber Security Course in Pune March 2024.pptx
Cyber Security Course in Pune March 2024.pptx
Ā 
Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024
Ā 
Cyber Security Course in Chennai March 2024
Cyber Security Course in Chennai March 2024Cyber Security Course in Chennai March 2024
Cyber Security Course in Chennai March 2024
Ā 
Cyber Security Course in Chennai April 2024
Cyber Security Course in Chennai April 2024Cyber Security Course in Chennai April 2024
Cyber Security Course in Chennai April 2024
Ā 
Azure Security.pdf
Azure Security.pdfAzure Security.pdf
Azure Security.pdf
Ā 
Azure security
Azure securityAzure security
Azure security
Ā 
Why MSc is Right Choice
Why MSc is Right ChoiceWhy MSc is Right Choice
Why MSc is Right Choice
Ā 
Cyber Security Course in Hyderabad January 2024
Cyber Security Course in Hyderabad January 2024Cyber Security Course in Hyderabad January 2024
Cyber Security Course in Hyderabad January 2024
Ā 
Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024
Ā 
Cyber security course in Hyderabad January
Cyber security course in Hyderabad JanuaryCyber security course in Hyderabad January
Cyber security course in Hyderabad January
Ā 
Cyber Security Course in Hyderabad February 2024.pptx
Cyber Security Course in Hyderabad February 2024.pptxCyber Security Course in Hyderabad February 2024.pptx
Cyber Security Course in Hyderabad February 2024.pptx
Ā 
Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024
Ā 
Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024
Ā 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024
Ā 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024
Ā 

Recently uploaded

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
Ā 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
Ā 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
Ā 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
Ā 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
Ā 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
Ā 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
Ā 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
Ā 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
Ā 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
Ā 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
Ā 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
Ā 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
Ā 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
Ā 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
Ā 
call girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļø
call girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļøcall girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļø
call girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļø9953056974 Low Rate Call Girls In Saket, Delhi NCR
Ā 

Recently uploaded (20)

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
Ā 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
Ā 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
Ā 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
Ā 
Model Call Girl in Bikash Puri Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in Bikash Puri  Delhi reach out to us at šŸ”9953056974šŸ”Model Call Girl in Bikash Puri  Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in Bikash Puri Delhi reach out to us at šŸ”9953056974šŸ”
Ā 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
Ā 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
Ā 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
Ā 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
Ā 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
Ā 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
Ā 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
Ā 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
Ā 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Ā 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
Ā 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
Ā 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Ā 
Model Call Girl in Tilak Nagar Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in Tilak Nagar Delhi reach out to us at šŸ”9953056974šŸ”Model Call Girl in Tilak Nagar Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in Tilak Nagar Delhi reach out to us at šŸ”9953056974šŸ”
Ā 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
Ā 
call girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļø
call girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļøcall girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļø
call girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļø
Ā 

Cyber security brochure(1)

  • 1. Post Graduate Program in Cyber Security in association with IBM SCHOOL OF CYBER SECURITY
  • 2. SCHOOL OF CYBER SECURITY mUni Campus is oļ¬€ering Aegis world class digital infra, MOOC platform, learning management system, learning app and online course delivery platform on cloud. This enables Aegis to improve learning outcome and oļ¬€er high quality live interactive. courses online worldwide. Check Aegis MOOC courses at www.mUniversity.mobi/Aegis The emerging need of Techno Management & Cross Functional skills will be mandate for Future Leadership in the organizations. Leadership in Organizations will urge for creation of synergy between Technological Developments with new age managerial skills. Dr. Abhijit Gangopadhyay Dean, Aegis Professor, XLRI Founding Dean, IIM Indore Former Dean, TISS s Aegis was started in 2002 with the support of ā€œAirtel Bhartiā€ for developing cross functional telecom leaders. . Accepting Scores The old models of producing general managers and functional specialists are no longer adequate in today's fast changing environment. Organizations need leaders who are able to harness the power of innovation and lead them through a rebirth; they need 'Renaissance Leaders'. ā€œHow do we create a Renaissance Leader? Are they born or are they made?ā€ Aegis was founded to answer these questions in 2002 with support from Bharti, Airtel and to develop cross functional technology leaders. In 2015 Aegis and IBM collaborated to launch, India's ļ¬rst Post Graduate Program (PGP) in Data Science, Business Analytics and Big Data and again in 2017 IBM joined hands with Aegis to launch PGP in Cyber Security. These programs are jointly certiļ¬ed and delivered by Aegis in association with IBM. IBM has set up high end Business Analytics, Cloud Computing and Cyber Security Lab at Campus. SCHOOL OF CYBER SECURITY In 2017 NVIDIA and Aegis partnered to develop skills for applied AI and Deep Learning in India. Aegis initiated Data Science Congress, an independent platform for sharing knowledge among data scientist, practitioners, users, tech vendors, academia and Government for developing eco-system to bring India at the forefront of world map and for growth of disruptive technologies like Data Science, Analytics, Big Data, Block Chain, AI, Machine Learning, Cyber Security etc. ā€œVaidyanathan R Iyer The course content will be dynamic. IBM with its technology of Watson, Cognitive, Big Data technologies behind it and our analytics skills will look forward to support this course in the best way we can by pulling in along with our Research and Development resources Business Unit Excecutive IBM Security-Asia Paciļ¬c IBM
  • 3. ā€œCYBERCRIME IS THE GREATEST THREAT TO EVERY COMPANY IN THE WORLD.ā€ Gini Rometty, IBMā€™S Chairman, President & CEO And she was right. During the next ļ¬ve years, cybercrime might become the greatest threat to every person, place, and thing. With the vast amount of sensitive data now stored in the digital universe - everything from social security numbers to ļ¬nancial records and matters of national security - itā€™s critical that we secure and protect it from malicious interests. For vital computer networks and electronic infrastructures, cyber security experts stands as the last and most eļ¬€ective line of defence against such attacks. Looking at the huge gap in skills for Cyber Security, Aegis has launched Post Graduate Program (PGP) in Cyber Security in association with IBM. This PGP in Cyber Security is an interdisciplinary program that prepares students with both the academic and practical training to be competitive in the ever-changing technical landscape of Cyber Security. There has never been a better time to specialize your skills. Elevate your technical abilities in booming areas like cloud security, wireless network security, and mobile device hacking. The cyber security ļ¬eld is expected to generate many new jobs over the next decade as industry and government continue to emphasize safe data and information system. As a graduate of the Cyber Security Post Graduate Program youā€™ll be ready for a career as a developer of security products, security application programmer, security analyst, and penetration tester. You can also pursue work as a security researcher, vulnerability analyst or security architect or continue your studies toward a doctorate. Post Graduate Program In Cyber Security In Association With IBM SCHOOL OF CYBER SECURITY MOU signing ceremony by Aegis - IBM Program Delivery Models Total Program: 36 Credit Units Full Time PGP On-Campus Classroom Program Duration: 11 months 9 months of Class room training (3 terms each of 3 months) + 2 months of Internships Total Program: 36 Credit Units Core courses: 30 Credit Units Units Elective courses: 6 Credit Units Program Duration: 11 months Weekend Executive PGP On-Campus Classroom Model Total Program: 36 Credit Units Core courses: 30 Credit Units Units Elective courses: 6 Credit Units Program Duration: 11 months Executive Weekend PGP Live Online Interactive ā€¢ Post Graduate Program in Cyber Security in association with IBM ā€¢ Final PGP certiļ¬cation by IBM ā€¢ Program will be taught by IBM experts and top faculties ā€¢ Exposure to IBM Cyber Security Lab and software ā€¢ Career Management Center to facilitate you with career opportunities ā€¢ Globally accepted credit structure program duration 11 months ā€¢ On campus Full Time Program is 11 months ā€¢ Executive Weekend Program is 11 months duration both on campus as well as Online Certification from IBMProgram Highlights Registration No. Registration No. Dean Aegis School of Business School of Telecommunication This is to certify that Name of Student has fulfilled the requirements for SAMPLE CERTIFICATE Course Details : Post Graduate Program in CyberSecurity in association with IBM Program Duration : January 2017 ā€“ May 2018 Tools Used : IBM Security Access Manager , IBM Security Identity Manager , IBM Security AppScan Specialization Areas : Cybersecurity Specialization in Post Graduate Program in CyberSecurity in association with IBM Country Manager - Software Services IBM Software Group Jagadisha Bhat
  • 4. Biggest Ransomware attack in history The attack began on Friday, 12 May 2017, and within a day was reportes to have infected more than 230,000 computers in over 150countries. Last Year, U.S. News & Report Ranked Cyber Security eighth on a list of the 100 best jobs. Cyber crime damage costs to hit $6 trillion annually by 2021. Cyber Security spending to exceed $1 trillion from 2017 to 2021. Unfilled Cyber Security Jobs will reach 1.5 million by 2019. Human attack surface to reach 4 billion people by 2020. Up to 200 billion IoT devices will need securing by 2020. The Ponemon Institute reported that the average cost of a cyber breach has reached $3.8 million. The rising tide of cyber crime has pushed Cyber Security spending on products and services to more than $80 billion in 2016, according to Gartner. * According to forbes magazine, the Cyber Security job market is expected to grow to more than $170 billion in just four years, making it not only one of the fastest growing employment segments in IT, but one that also comes with six-ļ¬gure salaries, security and plenty of room for upward As the world goes digital, humans have moved ahead of machines as the top target for Cyber Criminals. Microsoft estimates that by 2020, 4 billion people will be online twice the number that are online now. The hackers smell blood now, not silicon. This year, analysts and the media concluded there is a severe shortage of Cyber Security talent globally. There were 1 million Cyber Security Job openings in 2016, and that is expected to reach REPORTED THAT CURRENTLY MORE THAN 1,000,000 AVAILABLE CYBER SECURITY JOBS IN THE U.S ALONE AND 6,000,000 GLOBALLY. CISCO SCHOOL OF CYBER SECURITY Intel claims that the number of connected devices could surge to 200 billion by 2020, up from 15 billion in 2015. Cisco and Microsoft have both predicted 50 billion devices will be connected to the Internet by 2020. Regardless of which estimate proves right, the bottom line is that the digital attack surface will grow massively over the next five years.
  • 5. Are you a tech-pro and look forward to something exciting every day in your job? If yes, then this is a great time to consider a new career opportunity, the cyber security professional. According to CIO magazine, the cyber security experts are among the most sought after professionals in the technical sector; with demand for workers in that ļ¬eld out spacing other IT jobs by a good margin. Those who aspire to reach the highest level of cyber security and hope to have a lasting career in the profes- sion should strongly consider having a master degree. It will surely give students additional technical and theoretical skills and depending on the expertise can oļ¬€er the leadership, managerial and business skills required in the high-level position. Those interested in a career in cyber security may pursue work as a secu- rity administrator, cyber policy analyst, and information security analyst or software developer. In todayā€™s world, there is a high demand for the cyber security professionals. It is estimated that the demand of a cybersecurity professional is supposed to cross 6 million globally by 2019. This industry has too many reasons to choose it as a profession some of which are: Top Jobs in Market In Diverse Industries like Career Opportunity In Cyber Security SCHOOL OF CYBER SECURITY ā€¢ Security Engineer ā€¢ Security Analyst ā€¢ Information Security Analyst ā€¢ Information Security Engineer ā€¢ Network Security Engineer ā€¢ Information Technology Security ā€¢ Analyst ā€¢ Information Security Manager ā€¢ Information Assurance Engineer ā€¢ Senior IT Auditor ā€¢ Security Administrator ā€¢ Security Architect ā€¢ Security Software Developer ā€¢ Cryptographer/Cryptologist. ā€¢ Cryptanalyst ā€¢ Chief Information Security Oļ¬ƒcer. ā€¢ Security Consultant/Specialist ā€¢ E commerce ā€¢ Medical & Healthcare ā€¢ Banking & Finance ā€¢ Energy & Utilities ā€¢ Government bodies and Associations ā€¢ Manufacturing ā€¢ Wholesale & Retail Trading ā€¢ IT and Software ā€¢ Telecommunications, Mobile & Media Not only from defence in police, from corporate perspective people are also targeted, especially in research institutes like atomic research institutes or ISRO or DRDO They are on roads with this organisation. Amit Dubey Author, National Security Expert Crime Investigator & Deputy CTO Tech Mahindra Satish Kumar Dwibhashi ā€œCyber attacks are the bigggest attacks. Its no more a technology challenge, its a business challenge.ā€ Dr. Satnam Singh Chief Data Scientist Acalvio Technologies In 2020, The rockstars of software industry and the product industry will be security data scientist. Chief Information Security Oļ¬ƒcer
  • 6. SCHOOL OF CYBER SECURITY Aegis and NVIDIA signed MoU for Deep Learning & Applied AI Aegis -IBM Signed MoU for Post Graduate Program in Cyber Security
  • 7. BUILD YOUR OWN CURRICULUM ! CORE COURSES ELECTIVE COURSES Capstone Project TM Application Security PATTERN RECOGNITIONPATTERN RECOGNITION Machine Learning for Cyber Security Ethical Hacking Security and Privacy IBM Watson for Cognitive Cyber Security Cyber Laws Applied Cryptography Digital Forensics Penetration Testing and Vulnerability Analysis Cloud Security Pattern Recognition Cyber Laws Design and Analysis of Algorithm Capstone Project Network SecurityApplication SecuritySecurity Engineering and ManagementFoundation Course in Security Access Management by IBM Python for Data Science Fundamental Course in Cloud Security & Application Security by IBM Foundation Course in Security Identity Management by IBM SCHOOL OF CYBER SECURITY
  • 8. SCHOOL OF CYBER SECURITY M u m b a i | P u n e | B e n g a l u r u Office of Admission Processing Aegis School of Cyber Security | Cell : 8291693261 | 8422970034 | 8828084908 | 9022137010 | Phone : +91 (0)22 25709461 | Email : admission@aegis.edu.in | Download mUni Campus App to access Aegis Courses www.aegis.edu.inFor More Info Visit -