KEMBAR78
Program in Cyber Security | PDF | Security | Computer Security
0% found this document useful (0 votes)
27 views19 pages

Program in Cyber Security

Cyber. Sec.

Uploaded by

ronakkriplani15
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views19 pages

Program in Cyber Security

Cyber. Sec.

Uploaded by

ronakkriplani15
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

MY JOB GROW

Job-ready Program in

Cyber Security
About “ MY JOB GROW “
Welcome to My Job Grow : Revolutionizing Career Development

My Job Grow stands at the forefront of Edtech innovation, dedicated to


shaping the future of professional growth. We offer a dynamic array of
opportunities, including internships, live industrial training, and specialized
upskilling programs, tailored to propel your career forward.

Internship Opportunity and Live Industrial Training


Embark on a journey of experiential learning with our
internship programs and live industrial training sessions,
designed to provide practical insights and hands-on
experience in real-world settings.

Upskilling Programs :
Stay ahead of industry trends and enhance your skill set
with our cutting-edge upskilling programs, crafted to meet
the evolving demands of the job market.

Live Projects :
Immerse yourself in live projects that challenge and inspire,
allowing you to apply your knowledge and collaborate with
industry professionals.

Premium Certifications :
Elevate your credentials with premium certifications from
esteemed institutions like IIT and partnered companies,
validating your expertise and enhancing your career
prospects. Join us at My Job Grow and embark on a
transformative journey towards professional excellence.
Learn skills that powers - Cyber Security
Embark on a journey to become a proficient AI Development professional, equipped
with the skills demanded by top companies across various industries. In this
comprehensive program, you'll delve into the core principles and practices that
power the field of Cyber Security,, preparing you for roles in renowned organizations
such as Google, Facebook, Amazon, and many more., preparing you for roles in
renowned organizations such as Google, Facebook, Amazon, and many more.

Who is this program meant for ?


The "Mastering Cyber Security" program is for anyone interested in artificial
intelligence,
graduates, regardless of career stage. It's ideal for recent
professionals shifting to CS development, or those curious about building Cyber
Security applications and solutions. No prior experience or technical skills are
needed. If you're passionate about technology, innovation, and shaping the future
with Cyber Security, this program is your gateway to the world of artificial
intelligence.

Our Excellence :
Hands-On CS Course Training: Gain practical experience through internship

opportunities and live industrial training, preparing you for real-world

challenges.

Tailored Upskilling Programs: Elevate your CS skills with specialized

programs designed to meet industry demands and enhance your

marketability.

Live Projects for Practical Learning: Engage in live projects to apply your

knowledge in a real-world context, fostering creativity and innovation in CS

strategies.
Salary Package & Job Opportunities
After completing our Cyber Security course at My Job Grow, you'll be eligible for various
promising job roles in the Indian AI sector. Here are some popular roles along with their
average salary packages and estimated job opportunities sector.

Major Job Roles & CTC :


Cyber Security Analyst Security Consultant

Average Salary: ₹6 LPA to ₹12 LPA Average Salary: ₹10 LPA to ₹18 LPA

Estimated Job Opportunities: 8,000+ Estimated Job Opportunities: 4,000+

Role: Monitor and protect networks, systems, and data Role: Advise organizations on how to protect their

from cyber threats. assets and respond to incidents.

Penetration Tester Chief Information Security Officer (CISO)

Average Salary: ₹7 LPA to ₹14 LPA Average Salary: ₹25 LPA to ₹50 LPA

Estimated Job Opportunities: 5,000+ Estimated Job Opportunities: 2,000+

Role: Conduct authorized simulated attacks on Role: Oversee the organization's entire information

computer systems to evaluate security. security strategy and ensure data protection.

Security Engineer Forensic Computer Analyst

Average Salary: ₹8 LPA to ₹15 LPA Average Salary: ₹8 LPA to ₹20 LPA

Estimated Job Opportunities: 7,000+ Estimated Job Opportunities: 3,000+

Role: Develop and implement security measures to Role: Investigate cybercrimes and retrieve data to aid

protect systems and networks. legal processes.


Mastery of Tools :

Wireshark
pfSense
Metasploit
OSSEC
Burp Suite
OWASP ZAP
OpenSSL
GnuPG
Nmap
Nessus
Kali Linux
Splunk
Autopsy
Volatility
We Offer Internship : College to Corporate
Get Ready With Us !

Get 3 Certificates Curriculum Co- 30+ Hours of


designed Video Content

Integrated Placement Beginner Friendly


Mock Interviews
Support Course

Dedicated Easy Doubt Resolution Recorded


Student Support Sessions
Industry Projects :
(TCS) - Secure Healthcare Data Management :

Description: Develop and implement a secure data


management system for healthcare providers to ensure
the confidentiality, integrity, and availability of patient
data.
Focus Areas: Data encryption, access control, compliance
with healthcare regulations (HIPAA).
Outcome: A secure platform for managing healthcare
data, reducing the risk of data breaches and ensuring
regulatory compliance.

Infosys - Advanced Threat Detection

Description: Create an advanced threat detection and


response system for financial institutions to quickly identify
and mitigate cyber threats.
Focus Areas: Machine learning-based threat detection,
incident response automation, real-time monitoring.
Outcome: An enhanced threat detection and response
capability, significantly reducing the time to detect and
respond to cyber threats.

Wipro - Securing E-Commerce Platforms

Description: Design and implement a comprehensive


security solution for an e-commerce platform to protect
against various cyber threats, including DDoS attacks,
fraud, and data theft.
Focus Areas: Web application security, fraud detection,
secure payment processing.
Outcome: A secure e-commerce environment that
ensures customer trust and reduces the risk of cyber
attacks.
Industry Projects :

HCL Technologies - IoT Security Framework

Description: Develop a security framework for IoT devices


used in industrial settings to protect against unauthorized
access and cyber attacks.
Focus Areas: Device authentication, network security,
anomaly detection.
Outcome: A robust security framework for IoT devices that
enhances security and reliability in industrial operations.

Tech Mahindra - Cloud Security for Telecom Providers

Description: Implement a cloud security solution tailored


for telecom providers to safeguard their cloud
infrastructure and customer data.
Focus Areas: Identity and access management,
encryption, compliance with telecom regulations.
Outcome: A secure cloud infrastructure for telecom
providers, ensuring data protection and regulatory
compliance.

Cognizant - Security Operations Center (SOC) for Retail

Description: Establish and operate a Security Operations


Center (SOC) for a large retail chain to provide
continuous monitoring and response to cyber threats.
Focus Areas: SIEM integration, threat intelligence, incident
response. Outcome: An effective SOC that enhances the
retail chain's ability to detect, respond to, and mitigate
cyber threats in real-time.
Case Studies Of Past Indian Companies :

Case Study: Wipro

Case Study: Wipro - Securing the Supply Chain for a Global


Manufacturer

Company: Wipro

Challenge: A global manufacturing client faced significant risks from


supply chain vulnerabilities, including the potential for cyber attacks
targeting third-party suppliers.

Solution: Wipro implemented a comprehensive supply chain security


framework. This included conducting risk assessments, establishing
secure communication channels, and implementing continuous
monitoring.

Outcome: The client significantly reduced supply chain risks,


improved visibility into third-party security practices, and ensured
compliance with industry standards
Case Studies Of Past Indian Companies :
Case Study: TCS

Case Study: TCS - Enhancing Cyber Security for a Leading Indian Bank

Company: Tata Consultancy Services (TCS)

Chllenge: A major Indian bank needed to enhance its cyber security


posture to protect against increasingly sophisticated cyber threats.

Solution: TCS deployed an advanced threat detection and response


system, incorporating AI and machine learning to identify and
mitigate threats in real-time. Additionally, TCS provided training to
the bank's security team.

Outcome: The bank achieved a significant reduction in security


incidents, faster response times to potential threats, and increased
overall security awareness among employees.
Case Studies Of Past Indian Companies :
Case Study: Cognizant

Case Study: Cognizant - Developing a Security Operations Center


(SOC) for a Retail Chain

Company: Cognizant

Challenge: A large retail chain needed continuous monitoring and


quick response capabilities to handle cyber threats effectively.

Solution: Cognizant established a Security Operations Center (SOC)


that provided 24/7 monitoring, integrated SIEM solutions, and
developed incident response playbooks.

Outcome: The retail chain achieved real-time threat detection and


response, significantly reduced the impact of security incidents, and
maintained a secure environment for customer transactions.
Curriculum

CYBER SECURITY : BASIC TO ADVANCED

Week 1: Introduction to Cyber Security

Overview of Cyber Security


History and evolution
Importance and relevance

Key Concepts and Terminology


Threats, vulnerabilities, and risks
Types of cyber attacks (phishing, malware, ransomware, etc.)

Cyber Security Frameworks - NIST, ISO/IEC 27001

Week 2: Network Security Fundamentals

Network Basics
OSI model
TCP/IP model

Firewalls and VPNs


Types of firewalls (hardware, software, cloud)
VPN protocols (IPSec, SSL/TLS)

Intrusion Detection and Prevention Systems (IDS/IPS)


Detection techniques
IDS vs. IPS
Curriculum

CYBER SECURITY : BASIC TO ADVANCED

Week 3: Operating System Security

Windows Security
User account control
Windows Defender

Linux Security
File permissions
SELinux/AppArmor

Endpoint Security
Antivirus and anti-malware
Endpoint Detection and Response (EDR)

Important Tools: Metasploit ,OSSEC

Week 4: Application Security

Web Application Security


OWASP Top 10
Secure coding practices

Common Vulnerabilities
SQL injection
Cross-Site Scripting (XSS)

Static and Dynamic Application Security Testing (SAST/DAST)


Important Tools: Burp Suite , OWASP ZAP
Curriculum

CYBER SECURITY : BASIC TO ADVANCED

Week 5: Cryptography

Cryptographic Basics
Symmetric vs. asymmetric encryption
Hash functions

Public Key Infrastructure (PKI)


Certificates and Certificate Authorities (CAs)

Practical Applications
Encryption in transit and at rest

Important Tools: OpenSSL , GnuPG

Week 6: Ethical Hacking and Penetration Testing

Ethical Hacking Basics


Legal and ethical considerations
Penetration testing methodologies

Penetration Testing Phases


Reconnaissance
Scanning and enumeration
Exploitation
Reporting

Important Tools: Nmap , Nessus , Kali Linux


Curriculum

CYBER SECURITY : BASIC TO ADVANCED

Week 7: Security Operations and Incident Response

Security Operations Centers (SOCs)


Roles and responsibilities
SOC processes and workflows

Incident Response
Incident response lifecycle
Playbooks and runbooks

Digital Forensics
Basics of digital forensics
Forensic tools and technique

Important Tools: Splunk, Autopsy & Volatility

Week 8: Capstone Project and Career Guidance

Project Planning
Selecting a project topic
Defining project scope and objectives

Implementation
Executing the project
Documenting findings

Presentation
Preparing and delivering the project presentation
Learn from the Best - Top MNC Mentors

Learn from Industry Experts: Gain insights from mentors with


5+ years' experience in top MNCs.
Cutting-Edge Knowledge: Access latest trends directly from
MNC professionals.
Real-World Case Studies: Explore successful campaigns from
MNCs' experiences.
Networking Opportunities: Forge connections for internships
and jobs.
Practical Insights: Receive tailored advice for corporate
success.
Earn Premium Certification :

Course Completion Certificate from MY JOB GROW

Internship Completion Certificate from partnered company after


projects & Premium Institute (IIT , IIM / Other UGC Approved)

Letter of Recommendation based on performance


Course Starts Duration

2 Months

Fees Structure Program Hours

INR 4500 to 6500 30+ Learning Hours


Live Sessions & 80+
Hours of Recorded
Sessions

Registration Policy (T&C)

For Enrolments, Contact

6361132372
support@myjobgrow.com

You might also like