Cyber Futures

Overview

Cyber Futures industry training program is designed for undergraduates & fresh graduates, looking to enhance their professional knowledge, skills and competencies in cybersecurity from fundamental to associate level. By participating in this one-of-a-kind program, candidates get a unique opportunity to learn about cybersecurity from ground-up and get hands-on experience in cybersecurity domains.

With Cyber Futures Program, candidates get the chance to learn and train under industry-leading working professionals and certified lecturers. The program enables candidates to gain insights into industry best practices, Standard Operating Procedures, and best-in-class cybersecurity tools. Apart from training on cybersecurity, candidates have the opportunity to improve soft skills, leadership skills, and professional English language skills.

Intake

February / June

Duration

6 months

Delivery

On Prem.

Career Options

CYBER FUTURES
CYBER FUTURES

Eligibility Requirements

Module Name Content
Introduction to Cyber Security
Principals of Cyber Security
Security Controls
Network Security
Cryptography
Information Risk Management
Cyber Security Threats (SOC & Incident Handling)
Introduction to Digital Forensic
Introduction to Penetration Testing
Module Name Content
Security Operations
Incident response and management
Incident Handling Training: Ability to identify, assess, and respond to security incidents promptly and effectively.
Security policies, procedures, and best practices
Security auditing and compliance
Hands-on Security Operations Center (SOC) Training
Cyber Security Threats (SOC & Incident Handling)
Hands-on SIEM Training: This experience allows you to become proficient in configuring, monitoring, and customizing the SIEM solution, as well as comprehending its reporting and alerting capabilities
Module Name Content
Information Security Management and Architecture
Security Architecture and Design
Security and Risk Management
Designing, Developing, and Maintaining an Enterprise Information Security Program
Legal, Regulations, Investigations and Compliance
Business Continuity and Disaster Recovery Management/Planning
Strategic Planning, Finance, Procurement and Vendor Management
Module Name Content
Vulnerability Assessment
Identifying and assessing vulnerabilities
Hands-on-experience on vulnerability scanning and analysis tools
Hands-on experience on industry-leading vulnerability tools like Nessus, and Qualys and vulnerability tools like Nessus, Qualys, and OWASP ZAP.
Mitigation strategies and solutions
Module Name Content
Penetration Testing
Overview of penetration testing
Preparation and conducting penetration tests
Reporting and remediation process
Module Name Content
Application Security
Identifying the need for security in software
Secure software development practices
Implementing common protections
Cryptography
Maintaining security in deployed software
Module Name Content
Business English
Effective communication in a professional setting
Business writing and documentation
Interpersonal skills in a workplace
Personal Branding
Professional grooming
Business Etiquettes
Presentation and negotiation skills