Download - Course Details
Training | Consulting | Outsourcing
Information Security
Appin Executive Masters Program
in
1
appin
Appin Knowledge Solutions, is a premier provider of hi- technology certification, courseware as well as online, computer based and instructor led training across the world. Appin is primarily an IIT Alumni company. Appin has come up with the way of innovative learning concept using Computer Based Training Software (CBTS) in a highly interactive environment.
Appin Security Group(ASG) is a globally recognized Information Security Consulting body with its headquarters in New Delhi and spanning more than 15 countries. ASG is a leading information security services firm with an esteemed clientele ranging from Government Bodies (Ministries, Embassies,.) to top Corporate houses (mostly ET Top 100) spanning all major sectors viz., IT/ITES, F inanc ia l Ser v ices, Av ia t ion , Telecom/ISP, Media, Infrastructure and Manufacturing. With a strong focus on Research and Development and innovating new services and products in Information Security, Appin Security group has an R&D Centre that provides end to end Information Security Services - Security Assessment, Security Implementation and Security Management. Appin Security Group has the strongest technical backend to ensure that its clients are completely protected from any security breaches.
ABOUT US VISIONTo be the Leader in Information Security training and consulting..
MISSIONTo provide a complete range of Information Security solutions under one roof from Consulting to Training.
CREDENTIALS4Appreciated by the former President of India, Dr A.P.J Abdul Kalam.4The only security company across the globe to
have a dedicated Research and Development Centre for Information Security, inside IIT Delhi.
4CERT In empaneled company, approved by Ministry of IT, India to carry out technical audits for various critical sectors like finance, power etc.
4Official partners of various cyber crimes division in India including CBI.
4Serving more than 820 key clients across 40 countries in both private and Govt. Sector.
2
Competing with the global top, Indian airports are
set for modernization. State-of-the-art IT systems
and data centers are implemented to manage their
operations and to deliver world class performance.
Airports also act as network service providers for
third parties, such as airlines . All these steps boost efficiency and quality of
service, but also increase the information security
risks multi-fold.For GMR Hyderabad International Airport Ltd.
Appin Security Group took the challenge of
complete airport security management, including
security auditing, Security Operations Center
(SOC) implementation and management, security
incident management and people training and
awareness , to ensure that the airport follows the
road map of greater security. The assignment
included a detailed security risk analysis with
respect to people, process and technology
including vulnerability assessments, penetration
testing, configurations audit. Backed by rigorous
security risk analysis policies, procedures and IT
security systems, the whole infrastructure is
monitored from the central SOC inside the airport.
The SOC monitors all IT devices, including
routers, critical servers, switches, fire walls, and
IDS/IPS. It also does forensics and handles all
security incidents.An team from Appin dedicated to security training
and awareness assures that the entire airport IT
staff is aware of all security policies and complies
with them. The SOC ensures that security threats
are detected before they are exploited and the
security incidents are handled with acceptable
recovery time lines. And that translates into safety.
Safety for the airport, and for the traveler.
APP SECURES IN THE NEW HYDERABAD AIRPORT OUR CLIENTS
3DAIKIN
ESCORTS
Airports Authority of India
lqj{kk lfgr lsok
LVsV cSad vkWQ chdkusj ,.M t;iqj
State Bank of Bikaner and Jaipur
The Bank with a Vision
D OF EY FRT ES NI CNI EM
DE N
OF IE TN AC SIE NR AE GS RE A OTR NCH E& M LE OD PEV
~; ewyL a y foc Kkue
Actis
Microsoft®
Information Security
Information security is the process of protecting availability, privacy and integrity of information. Access to stored information on computer databases has increased greatly as most of the companies store business and individual information on computer than ever before. Much of the information stored is highly confidential and not for public viewing.
The rapid growth and widespread use of electronic data processing and electronic business conducted through the Internet, along with numerous occurrences of international terrorism, fueled the need for better methods of protecting the computers and the information they store, process and transmit. The academic disciplines of computer security, information security and information assurance emerged along with numerous professional organizations - all sharing the common goals of ensuring the security and reliability of information systems.
Governments, military, corporates, financial institutions, hospitals, and private businesses amass a great deal of confidential information about their employees, customers, products, research, and financial status.
The field of Information Security has grown and evolved significantly in recent years. As a career choice there are many ways of gaining entry into the field. It offers many areas for specialization including, securing network(s) and allied infrastructure, securing applications and databases, security testing, information systems auditing, business continuity planning and digital forensics science, to name a few.
Web security is going to be a big focus in 2009. Bigger than ever before. Be it all the social networking we're doing or Web-based malware exploits, this thing we call the Web is where we're going to have to focus a large part of our security efforts. Like it or not, it's the part of everyone's network that's open. It's also where business logic is exposed and where the system complexities and subsequent vulnerabilities are simply waiting around to be exploited.4
COURSE DURATION: One Year
PROGRAM OBJECTIVES
1To instil the current and comprehensive knowledge of Information Security.
1 To enable students to develop and implement Information Security policies & practices and related change management.
1 To develop students' management abilities in Information Security to be applied in organizations.
1To enable students to cope with the change management issues involved in developing and implementing information security policies in organizations.
1 To expand the scholarly credentials of students, thereby increasing their marketability with prospective employers.
METHODOLOGY
1 The program will be conducted in a highly interactive and open environment providing opportunities of discussions and intellectual growth.
PLACEMENT
1Our placement partners include our client companies among others
1A Student Placement Cell dedicated for exploring job opportunities across various sectors of the industry guided by the Admissions Team.
ELIGIBILITY
1B.E. Electronics / Computer Science / Electronics & Telecom / Electrical / MSc IT / MCA / MSc (Physics or Maths) with minimum 50% marks from a recognized university.
PROGRAM
1The Program will be spread across 4 Trimesters of 3 months each and will be completed within a year.
AWARD
1 Successful completion of the Program entitles a candidate to receive a Post Graduate Diploma in the field of Information Security.
1 Internationally recognized and affiliated to IADL, UK.
CONCEPTAppin Executive Masters Program is a joint initiative of Appin Security Group and Appin Knowledge Solutions. It envisions to bridge the gap between industry and academia by integration of learning and technology. The program will be conducted under Appin School of Niche Technology, an innovative concept designed to experiment intellectually with modes of study that over time could form the basis for new domain specific programs.
Appin Executive Masters Program
5
1. INTRODUCTION TO NETWORKINGq Introduction & Historyq Advantage & Disadvantageq Computer Networks Protocolq OSI Model & Physical Topologyq Network Architectureq Communication Media
2. THE INTERNET PROTOCOL (IP)q Introduction to IPq IP Packet Formatq IP Address Classesq Transmission Control Protocolq Subnetting & CIDR
3. IP ROUTINGq Introduction to hardware & software related to IP routingq Routing information Protocolq Enhanced Interior Routing Protocolq Open Shortest Path First
4. SWITCHING & BRIDGINGq Introduction of Switching & Bridgingq STP & LAN Switch Typesq VLAN - Virtual LANq Flexibility and Scalability
5. WIDE AREA NETWORKq Understanding WAN fundamentalsq Understanding Tunneling Protocol & Frame Relay
Fundamentalsq VPN - Virtual Private Networkq NAT - Network Address Translation
6. NETWORK CONFIGURATION AND TROUBLESHOOTING
q Networking Introductionq LAN Switchingq Wireless Networkingq Layer by Layer Troubleshooting with a Cisco Routerq Router Troubleshooting at OSI Layersq Managing your network connections
7. IMPLEMENTING AND TROUBLE-SHOOTING WI-FI NETWORKS
q Introduction to 802.11q Finding And Connecting To Wireless Networksq Introduction to RADIUSq EAP & Bringing EAP to the LANq Authenticating the AP to the User, and Vice Versaq Scanning and Enumerating 802.11 Networks
1. INFORMATION SECURITY & ETHICAL HACKING? Introduction? Basics of Data ? Information ? Security? Hacking ? Richard's Law of computer security ? Types of hackers? Cyber Threats? Case Studies
2. DESKTOP & SERVER SECURITY? Windows Security? Windows Vulnerability? Hacking into windows platform? Windows task manager ? Linux Security
3. NETWORK & FIREWALL SECURITY? Setting up a LAN? Threats Of LAN? Firewall? Anti-virus? Anti Spyware? Network Scanner? Introduction to Wireless Network security
4. INTERNET & CYBER SECURITYq IP Spoofing q E-Mail Trackingq Proxy Serversq E-mail Forgery and Detectionq MAC Spoofingq Microsoft Outlook Securityq Cyber Stalking
5. INFORMATION GATHERING METHODSq Daemon-Banner Grabbingq Active Finger Printingq Passive Fingerprintingq Port Scanningq Full TCP Scan Half TCP Scanq Flagq Tracert
6. WINDOWS REGISTRIESq Reshackq Registry tweaks
7. HACKING ATTACKSq Social Engineering Attack q Phishing Attack q Input Validation Attack q SqL injection q XSS attackq Attack Dos Attacks q Sniffing Attackq Session Hijacking etc.
8. EMAIL SECURITY & WEB SECURITYq Introduction to E-mail q How E-mail Worksq Mail serversq E-mail Protocolq Web Servers (introduction to web Security)
Paper 2. Information Security & Ethical Hacking BasicsPaper 1. Networking
Trimester-1
6
Paper 4. Network SecurityPaper 3. Programming
Trimester-2
1. PROGRAMMING IN Cq Introduction to Cq Data Typesq Basic programming conceptq If else ladderq Switch statementsq Array, simple array ,multi dimension q Function q Loops: for, do while, while q Structure, structure with function, structure array,q Pointerq Multiple return from function q Pointer to function, passing value through pointerq Introduction to file handling ,what is text file q Preprocessor compiler (#)
2. PROGRAMMING IN C++ q OOPSq Class, how to declare a classq Inheritance, Polymorphism, Operator overloading,
Abstraction q Using class with function q Exception handlingq Template, generic class
3. INTRODUCTION TO DATA STRUCTUREq Queueq Stackq Link listq Tree
1. WIRELESS & MOBILE SECURITY ? Introduction to the Wireless ? Mobile Technology ? GSM Technology ? CDMA Technology ? Different type of attacks
2. VOIP & VPN SECURITY
? Introduction to the VOIP and VPN Technology Protocol and Architecture
3. ROUTER SECURITY ? Introduction to router ? Protocols on a router and types of connection ? NAT Services ? Various types of Attacks and their Detection
4. IDS & IPS ? Introduction to IPS & IDS? IDS Overview (AIDS, HIDS, and NIDS) ? IDS system & IPS System ? Perimeter Firewall? Analysis of System Deficienciesq VoIP & Wireless
7
Paper 6. Information Security Management SystemsPaper 5. Vulnerability Assessment &
Advanced Ethical Hacking
Trimester-3
1. VULNERABILITY ASSESSMENT & PENETRATION TESTING? Scoping and Tools for Vulnerability Tests ? Risk Assessment? Google Hacking? Methodologyq Google Hackingq Application Auditq Network Devices
2. SECURED PROGRAMMING TECHNIQUE & ADVANCED HACKING ATTACKS
? Defining Programming methodology? Explaining Bugs? Removing Errors? Buffer over flows ? Back door? Trojans? Enumeration
1. INFORMATION SECURITY MANAGEMENT SYSTEM? ISO 27001 and other Standard? Policy & Projects? Audit & Certification ? Managing Security Awareness ? Risk Assessment? Business Continuity and Disaster Recovering ? Planning Security Management Practices
2. INFORMATION SECURITY AUDITING
? Audit Objectives & Steps? Network Controls? Network Data Standards and Data Access? Access to Network Operating Systems Software and
Facilities? Data Encryption and Filtering
3. SECURITY FRAMEWORK-COBIT? Security ? Adequate Security? Approaches for Achieving Security? Holistic View of Security? Defense in Depth? OCTAVE? Security Risk Analysis? Threats Modeling? Current Security Issues? Trends for Security8
Paper 8. Computer ForensicsPaper 7. Cryptography
Trimester-4
1. CRYPTOGRAPHY & ENCRYPTION? Introduction to cryptography ? SKCS ? PKCS? MD5? DES? RSA? Digital signature? Digital certificate
1. CYBER CRIME INVESTIGATION? Forensics methodology and forensic tool kit
2. INTERNATIONAL CYBER LAWS
3. COMPUTER FORENSICS? Introduction to Cyber Forensics? Cyber Crimes? Recognizing Preparation and Preservation? Documentation and reporting? Security Systems to Prevent Further Attacks? Basic Steps in Forensic Analysis of UNIX System? Crime Scene Management? Live System Data Gathering? Recovering of deleted files? Non- verbal analysis? Interpretation of common LOG files? Advanced Honey Pots
9
Dignitaries Associated with APPIN Group
q Dr. Dheeraj Bhardwaj featured as one of the top 50 youth on fast track by India Today, who has worked as Professor at IIT Delhi and as Director with Sun Asia Pacific Science & Technology Center, Sun Microsystems Inc.
q Mr. A.S. Chandrasekhar worked as Director with Bureau of Indian Standards and Confederation of Indian Industries.
q Mr. Ashok Sapra who has worked as the President and MD with AT&T South Asia and as CEO- GE Communications
q Prof. S.K Gupta Professor, Department of Computer Science, Indian Institute of Technology, Delhi
q Prof. K.K Chaudhary Senior Professor, Indian Institute of Technology, Delhi q Prof. S.K. Jain Associate Professor and Intellectual Property Rights Chair, Department
of Management Studies, Indian Institute of Technology, Delhi q Prof. V.B. Aggarwal Former Head of IT Department, Delhi Universityq Dr Naveen Singla Academician, University of Washington, St Louis USAq Dr Ashish Kapoor Academician, Massachusetts Institute of Technology (MIT), Boston,
USA q Mr Arvind Siotia Graduate(MBA) Kellogg School of Management, Chicago, USA
Booze-Allanq Mr Vijay Kumar General Manager, BHELq Mr. Manmohan Gupta Cofounder & Director (Operations), Nagarro Inc. q Mr. Pradeep Chopra Cofounder & Director (Marketing), Whizlabs Software q Mr Tarun Jain Graduate(MBA) International School of Business, Currently with
Microsoftq Mr Kumar Gautam Graduate (MBA), IIM Bangalore, Currently, working with Lehman
Brothersq Mr Pankaj Kant Jha Graduate (MBA), IIM Ahemdabad, Currently working with EXL
Services
Dr. A.P.J Abdul KalamFormer President of India,Known as the Missile Man of India
The former President showed interest in the work being done by Appin Knowledge Solutions in the field of Information Security and Nano-Technology. He has also advised appin with respect to future of niche technologies in india
“Youth is the most powerful resource. Ignited minds of youth is indeed the biggest force on the earth, above the earth and below the earth.”
10
TM
For office use only
Roll Number
Applicant’s Name:
Date
Surname First Name
Father’s/ Husband’s Name:
d d / m m / y y
Sex: Male Female Date of Birth Nationality
d d / m m / y y
Correspondence Address:
Permanent Address:
Educational Qualification:
Examination University/Board Institution Year Division % of Marks
Please fill in Block Letters
(Attach xerox copies of 10th ,12th or Diploma mark sheets)
Details of Experience (if any)...........................................................................................................................................................................................................................................................................................................................................
Signature of ApplicantDate: .................................... Place: ............................
Affix your passport size photograph and attach three photograph
APPLICATION FORM FOR 2009-2010
Appin Executive Masters Programin
INFORMATION SECURITYForm No.: .............................
Mobile:
Contact no.:
E-mail:
Mother’s Maiden Name:
ISD Code STD Code ISD CodeLandline No.
PriceRs. 100/-
Centre : ..........................................................................................................
www.appinonline.com
12appin