cssrl pgdcs brochure final
DESCRIPTION
CourseTRANSCRIPT
INFORMATION BROCHURE
TESTIMONIALS
KATER HAAGA
CCSE 2014-15 SESSION
IT TRAINEE
“The CSSRL experience is an experience that every aspiring and professional Cyber Secu-
rity Personnel should have the Mode of teaching goes beyond just acquiring knowledge to
developing skills that meet the fast growing need for Cyber Security Experts globally
.Thanks CSSRL”
WUN LI (TAIWAN)
PGDCS 2013-14 SESSION
IT TRAINEE
“...I am deeply overwhelmed by the Training Environment developed at CSSRL. Learning
in CSSRL Simulated Virtual Classroom….I found was much comfortable and easier to
grasp than Full-time classroom sessions….Professional Trainers here really have indepth
understanding of Age-ahead Technologies….Thanks CSSRL…..”
PGDCS, CSSRL’s most successful PG Diploma in Generic Information
System Security offering great opportunity to Job Seekers, Corporate
Professionals and Graduate Security Aspirants to develop a strong
Career fulcrum that strengthens their Career Profile and probability
to set deep marks with their Skills and Specialization in IT Security
Industry.
POST GRADUATE D IPLOMA IN CYBER SECURITY
4 OUT OF 5 CYBER SECURITY JOBS REQUIRE A DEGREE
Most positions in the cyber security sector require at least a bachelor's degree. A re-
cent study found that 84 percent of cyber security positions require a bachelor's de-
gree or higher. (courtesy UMUC, Maryland )
DO YOU KNOW ?
5,00,000 SECURITY PROFESSIONALS REQUIRED TILL 2014-15 IN INDIA
To Secure Governmental / Non-Governmental or Corporate, Banking Network Infra-
structure, India shall need 5,00,000 security professionals till 2014 whereas Indian Se-
curity is still starving with hardly 50,000 Cyber Defense personnel. (courtesy Union Minis-
try of Communication and Information Technology, Govt of India)
GOVERNMENT OF INDIA INITIATIVES FOR NATIONAL CYBER DEFENCE
In July 2013, to counter cyber crime , GOI released National Cyber Security Poli-
cy of India and guidelines by National Critical Information Infrastructure Protec-
tion Centre of the National Technical Research Organization (NTRO), the coun-
try’s elite technical intelligence agency. (courtesy Department of Information Technology, Govt of India)
PG
DIP
LO
MA
IN
CY
BE
R S
EC
UR
ITY
(P
GD
CS
)
A Defensive Technology CY BE R S E C U RIT Y O R I NF O RM ATI O N SYS TE M SE C U RI -
TY IS M O RE A B O UT P RO T EC TI N G E N TE RP R ISE I N F RA-
ST R U C T U RE F RO M P OS S IBL E T H R EAT S, EX TE R N A L /
IN TE R NAL EXPL OIT ATI O N S O R P RIV IL E D GE AB U SE S.
bridging gap between
you and your career
IT SECURITY CAREER
BUILDING BLOCK
ASSESSMENT/ EXAMINATION METHODOLOGY
In order to make sure that such a Critical Industry like IT Security must receive
best talent, CSSRL employs various methods to evaluate and assess academ-
ic and practical performance of Security Trainees.
Every Examination award CGPA and associated credits to the
trainee.
CSSRL maintains Exam Automation in order to ensure Validity of
Examinee using Multi-Tier Authentications System.
The Laboratory expects Trainees to perform all drills and practic-
es under the sharp supervision of Evangelists
CSSRL Trainees follow defined Formal Dress Code while attend-
ing laboratory sessions
PGDCS Component is evaluated by CSSRL with
Objective Quiz Examinations . Every Trainee is
provided with Assessment Dashboard to facilitate
On-Demand Exam Conduction.
POST GRADUATE DIPLOMA IN CYBER SECURITY
(TRIMESTER- I)
Network Packet Analysis
Windows Client-Side Security
Linux Client-Side Security
Web Application Security
Server Security
Network Security (CORE)
PROGRAM DETAILS
PG
DIP
LO
MA
IN
CY
BE
R S
EC
UR
ITY
(P
GD
CS
)
Wh y C y b e r S e c u r i t y?
P G Diploma in Cyber Security
Program is a 24 WEEKS POST
GRADUATION INDUSTRIAL
STUDY in Generic Information System
Security. PGDCS imparts Associate Level
training to Corporate Professionals &
Graduates creating Strong Foundation in
IT Security. This improves one’s chances
in least competitive and most demanding
IT Security Industry further.
PROGRAM HIGHLIGHTS
EC-Council International Certification like CEH / CHFI / ECSP (Optional)
200+ Information Security Tools, Frameworks and Softwares
International Research Publication / Industrial Internship
32 Security Sciences’ and Domains’ Coverage
Live Corporate Projects
70% Industry Driven Research Curriculum
Globally recommended Reference Text and Multimedia Couse-kit. And so on...
CYBER SECURITY JOB PROFILES
SECURITY CONSULTANT
IT INFRASTRUCTURE AUDITOR
SECURITY ARCHITECT
NETWORK SECURITY ADMINISTRATORS
DATA SECURITY ANALYST
PENETRATION TESTER
MALWARE ANALYST
COMPLAINCE MANAGER
INFORMATION SECURITY OFFICER
SECURE PROGRAMMER
NETWORK ENGINEER
APPLICATION SECURITY SPECIALIST
VULNERABILITY RESEARCHER
INTRUSION ANALYST
BUSINESS CONTINUITY ANALYST
CRIME INVESTIGATOR
CYBER FORENSIC EXPERT
…….and more than 70+ profiles and
roles (courtesy www.sans.com)
MAJOR CORPORATE
RECRUITERS
ERNST & YOUNG (EY)
WIPRO TECHNOLOGIES
GENPACT
IBM GLOBAL SERVICES
TCS LIMITED
PALADION NETWORKS
DELOITTE TOUCHE
TOHMATSU (DTT)
MINDTREE CONSULTING
YAHOO INC
MPHASIS CORP
ORACLE CORP
CISCO SYSTEMS (INDIA)
250+ COMPANIES
IT GRADUATION (CS)
NETWORKING SKILLS
INTERNATIONAL CERTIFICATIONS
(CISA / CISM / CISSP)
RESEARCH EXPERIENCE
WORK EXPERIENCE
“ . . . s ince 2010 we h ave o bserved no other do main
except Sys te m Secur i ty govern in g Ind ia n Jo b m arket
l i ke any th in g. As p er the requ i remen t of 5 ,00 ,000 cer -
t i f ied pr of s , the na t ion s t a rves he av i l y w i th l ack o f
secur i ty exper t s . That ’ s o bv ious ly a b ad ne ws fo r na-
t iona l c yber in f ras t ructu r e , but t u rns out to b e a
go od one fo r b ud din g se cur i ty learner s me anin g eve-
ry one s tu de nt ca n ava i l more t han 100 n at io na l j ob
opp or tun i t ie s . Jo b Marke t fo r Secur i ty seems to c on-
t inue l i ke t h i s t i l l 2020 . . . ” (COURTSEY NAUKRI.COM)
Mary Ann Davidson Chief Security Officer
Oracle Corporation “current academic trainee
doesn’t seem to fulfill Industri-
al needs. What they learn we
don’t need...What we need
they don't learn. In order to
fill this vacuum, Security education doubtlessly
need to evolve ”
(TRIMESTER- II )
Network Security (ADVANCED)
Data Security and Cryptography
Cyber Criminology
Secured Programming in Python
Vulnerability Assessment
Penetration Testing
ISMS and IT Security Audit
Regulatory Compliances
MANDATORY 1 MONTH
INDUSTRIAL INTERNSHIP
EC -COUNCIL CERTIFICATIONS
(OPTIONAL)
CEH / CHFI / ECSA / LPT /
ECSP / ECIH