india's no.1 digital skills institute ... - admin.jetking.com
TRANSCRIPT
Data Science Forensic Computer Analyst
Cyber Security Analyst
Penetration Tester
Network Security Engineer
Cloud Architect
Cloud Security
Infrastructure Engineer
SysOps Engineer
It takes 20 Years To Build A Reputation And Few
Minutes Of Cyber-Incident To Ruin It
INDIA'S NO.1 DIGITALSKILLS INSTITUTE
www.jetking.com
Partnership with NSDC
75Y EA R Sof Brand Legacy
BCA Cloud Computing& Cyber Security
UGC Approved 3 Years University Graduation Degree Program
Marketed By Jetking
1 0 1 0 1
0 1 0 1 0
1 0 1 0 1
0 1 0 1 0
1 0 1 0 1
0 1 0 1 0
1 0 1 0 10 1 0 1 01 0 1 0 10 1 0 1 01 0 1 0 10 1 0 1 0
1 0 1 0 1
0 1 0 1 0
1 0 1 0 1
0 1 0 1 0
1 0 1 0 1
0 1 0 1 0
1 0 1 0 1
0 1 0 1 0
1 0 1 0 1
0 1 0 1 0
1 0 1 0 1
0 1 0 1 0
SECURITY
Security Consultant
TABLE OFCONTENTS
3
4
5
6
9
10
About Jetking
Why Jetking ?
Jetking Learning Experience
Why Cloud Computing & CyberSecurity ?
Understanding Industry
Program Highlights
Career Support
Placement Policy
Map To Your Future
Hear From Our Learners
Course Curriculum
Program Details
14
15
16
18
19
22
ABO U TJETK ING
3INDIA'S NO.1 DIGITAL SKILLS INSTITUTE
Partnership with NSDC
75Y EA R Sof Brand Legacy
*Ter
ms
& C
ondi
tions
App
ly
A 75 year old legacy of moulding innovators for tomorrow. India's No.1 Digital Skills Institute committed
to create a Better Life for students.
As technology changes and disrupts the manner in which we live and work, Jetking
focus is on transforming lives with skill.
In Jetking, we not only enable the learner with technical and employability skills, but
prepare the learner to build a career in the Information Technology domain.
Till date, Jetking has trained 10,00,000+ students across India and overseas and upheld
its legacy of providing 100% Job placements.
4INDIA'S NO.1 DIGITAL SKILLS INSTITUTE
WHYJETKING ?
Over 10LakhStudentsTrained
100+Successful
Centers
Over
5000+Recruitment
Partners
For HighestNumber
of Placements
75Y EA R Sof Brand Legacy
*Ter
ms
& C
ondi
tions
App
ly
Partnership with
5INDIA'S NO.1 DIGITAL SKILLS INSTITUTE
JETK INGLEARNING EX PERIENCE
MasterclassTrained by SMEs & Master Trainers
Technology ProjectsHands-on practical, assignments and project for every Technology
CertificationmappedCurriculum mapped to 18 OEM papers
Industryuse caseLearning throughIndustry-drivencase studies &assignments.
MentoringsessionsQuery handling & Doubt clarifications by Expert Trainers. Leave nothing to chance.
6INDIA'S NO.1 DIGITAL SKILLS INSTITUTE
WHYCLOUD COMPUTING & C YB ER SECURIT Y ?The BCA (Cloud Computing & Cyber Security) creates the foundation for an evolving career in one ofthe hottest and in-demand Industry 4.0 technology domain, namely, Cloud & Cyber Security. Boththese domain have very high manpower requirement, especially with good understanding ofNetworking technology. This program is designed to engage 10+2 pass student and prepare them tobuild their careers in an aspirational domain.
A graduation option power-packed with technology,skillsets and practical orientation required to begin and build a successful career in the Industry 4.0domain of Cloud and/or Cybersecurity, as the progression demands.
The uniqueness of the program lies in the twin benefits that it offers – it makes no distinction on the stream from which the student has passed his/her class-10+2/Intermediate studies and at the same time, providing the opportunity to start earning and gather experience, while still pursuing studies.The program puts determination and intent above background and puts the student ahead of his/her peers.
The program enables gathering experience, knowledge & hands-on skills and earning while learning A distinction very few can stake their claim. Jetking does and lives by it.
UGC ApprovedGraduation
ImmersiveCurriculum
Earn whileYou Learn
PlacementAssurance
Return onInvestment
7INDIA'S NO.1 DIGITAL SKILLS INSTITUTE
G L O B A L M A R K E T S I Z E
C Y B E R S E C U R I T Y D O M A I N C A R E E R S
FEEDER ROLES ENTRY LEVEL
Networking CybersecuritySpecialist /Technician
CybersecurityAnalyst
CybersecurityManager /
Administrator
CybersecurityEngineer
CybersecurityArchitect
CybersecurityConsultant
Penetration &Vulnerability
Tester
Cyber CrimeAnalyst /
Investigator
Incident Analyst /
Responder
ITAuditor
SoftwareDevelopment
SystemsEngineering
Financialand RiskAnalysis
SecurityIntelligence
Common Cybersecurity Feeder Roles !
Core Cybersecurity Roles !
MID LEVEL ADVANCED LEVEL
Cloud Computing Market Size, 2019-2023 Global Cyber Security Market
2019 2020 2021 2022 2023
$293B$331B
$406B
$492B
$572B
$51B$73B
$100B
$128B
$156B
$74B
$156B
$88B
$98B
$70B
$141B
$72B
$81B
$64B
$121B
$57B
$64B
$59B
$105B
$43B
$50B
$58B
$102B
$38B
$45B
North AmericaLargest MarketBy Region (2019)
APACFastest Growing MarketBy Region (2020-2023)
2 0 1 9M a r k e t S i z e
$ 1 1 9 . 9B i l l i o n
M a r k e tG r o w t h R a t e( 2 0 2 1 - 2 0 2 3 )
1 2 . 6 %
8INDIA'S NO.1 DIGITAL SKILLS INSTITUTE
S K I L L S T H A T M A T T E R M O S T
HOW DESIRED?SKILL
Technical Ability/ Mindset
Responsible
Good Written Communication
Attention to Detail
Proactive Approach
Penetration Testing Knowledge / Experience
Self Driven
Coding Knowledge / Experience
Good Organisation
Good Oral Communication
Reliable
Enthusiastic
Forward Thinking
Willingness To Self-Learn
Passionate
RANK
1
2
3
4
5
7
9
11
12
13
14
15
10
6
8
OUT OF 834 JOBLISTINGS ANALYSED SKILL APPEARED IN...
831
663
427
314
188
172
120
104
96
89
86
76
66
63
32
79%
51%
37%
22%
20%
14%
12%
11%
11%
10%
9%
8%
7%
4%
99%
U N D E R S T A N D I N G I N D U S T R Y 4 . 0
9INDIA'S NO.1 DIGITAL SKILLS INSTITUTE
I N D U S T R Y 4 . 0 & T E C H N O L O G I C A L P I L L A R S
T H E I N D U S T R Y E V O L U T I O N S T O R Y
Industry 4.0 relates to convergence and application of 9 digital industrial Technologies
4.0
CLOUD COMP UTING
CO G N ITIVECO M PUTIN G
MOBILE TECH NOLOGIES
R FID TECHNOLOG IES
INTERN ET O FTHIN G S
BIG DATA/AN ALYTIC S
MACH INE TO MACH INE
3 D P RINTING
ADVANCED ROBOTICS
CYBERSECURITY
Late 19th - Mid 20th Century
Early 21st Century
Late 18th - Early 19th Century
Second half of 20th Century
Mechanization
Automation
Robotization
Mass Production
1.0
2.0
3.0
4.0
Industrial Cities Substitution
Industrial Regions Scale Economies
Global Production Networks Input Costs
Global value Chains Added Value
Steam Engine and mechanical Prduction
Electricity and division of labor
Electronics and information technologies
Cyber-physical systems
Certification MappedCurriculum mapped to 18 OEM papers.
Dedicated career support
For the industryby the industry Learn from case studies& industry experts fromCloud Computing & Cyber Security
SpecializationSpecialization in Cloud & Cyber Security with extensive hands-on practical, assignments and projects
Training SupportMasterclass by SMEs And Domain Expert
10INDIA'S NO.1 DIGITAL SKILLS INSTITUTE
PROGRAMHIGH L IGH T S
100% Job Assurance100% Placement Assurance as per Jetking Placement policy fulfilment
Receive 360-degree career supportfrom mock interviews with placement officers, resume building, career fairs, industry mentors and much more.
11INDIA'S NO.1 DIGITAL SKILLS INSTITUTE
I M M E R S I V E L E A R N I N G
Videos &Presentation
Assignment& Quiz
Case Study& Scenario
Subject-wise Hands-on Project
C O N N E C T I N G T H E D O T S
STRUCTURE• Total 6 Semesters• Cloud LMS• Credit-based Sem Exam
STUDENT BENEFITS• Learn in safety• Industry 4.0 laced (2 Technologies)• Practical-oriented• 18 OEM Certification papers-mapped• Expert SMEs as Trainers• Immersive• 80% Activity-Based• ROI• Learning made “Fun-Faster-Easier”• Placements Assurance • Earn While You Learn• University Graduation program• Hybrid/Offline engagement (as specified)
COURSE CODING IN CRM• JK Certified Cloud & Cyber Security Professional
LEARNING TRACK & MODALITY• Offline/Hybrid (as per applicability)• For online engagement, students require Laptop/Desktop with specific configuration (as detailed by the learning centre)
TARGET SEGMENT• Intermediate/12th Pass (Any Stream)• 10+2 Open School Pass (Govt. Approved)• 10+3 Diploma pass (Govt. Recognized Inst)• >=40% Aggregate marks
CONSTRUCT• 12 Hours/Week Engagement• Total 1152 Hours JK-content• Engagement of 192 Hrs/Sem
12INDIA'S NO.1 DIGITAL SKILLS INSTITUTE
T E C H I N C L U S I O N S
Disclaimer: Logos of OEMs shown here only as illustration purpose and with no intent of copyright violation
PC Hardware & OS Skills
N e t w o r k i n g w i t h C i s c o
M S - 3 6 5 A d m i n N W M o n i t o r i n g w i t h W i r e s h a r k
Core Networking W i n S e r v e r 2 0 1 9 K a l i L i n u x C h e c k p o i n t F i r e w a l l
OS – Windows 10
Python Programming Cyber LawsSearch-Monitor-Analyze-Visualize with Splunk
Ethical Hacking Penetration with Kali (PWK)Pen Testing
Digital Forensics Capstone ProjectPen Test with Bug Bounty
A W S C l o u d A d m i n S h e l l P r o g r a m m i n g A z u r e C l o u d A d m i n
13INDIA'S NO.1 DIGITAL SKILLS INSTITUTE
U N I Q U E T R A I N I N G M E T H O D O L O G Y
I M M E R S I V E P E D A G O G Y
QuizAssignment
ConceptsApplication
PracticalDemo
ProjectsGroupwork
Case StudyScenario
Basis for 80% Activity-Based Learning
ROLE PLAY FLIPPED CLASSROOM MIND MAP BRAIN STORMING
CASE STUDIES & SCENARIOS
E-LEARNING GROUP WORK PRACTICAL
ENGLISH SPEAKING
THINK - PAIR - SHARE
PERSONALITY DEVELOPMENT
QUIZ YOGA
CAREE RSUPPORT
14INDIA'S NO.1 DIGITAL SKILLS INSTITUTE
Job OpportunitiesGain exclusive access to Jetking’s Job Opportunities hub which has 100 plus job opportunities from Jetking’s hiring partners at any given time.
Jetking ElevateVirtual hiring drive giving you the opportunity to interview with Jetking’s 5000+ hiring partners ensuring you get every opportunity you deserve.
Just-In-Time InterviewsGet company and role-specificpreparation with mock interviews rightbefore your actual interviews.
Resume ReviewObtain specific, personalized inputs on your resume structure and content.
Personalised MentorshipGet mentored by an experienced SME and receive personalized feedback
Career MentoringGet a dedicated career mentor to help track your weekly company application targets, coach you on your profile, and support you during your career transition journey.
Post-Graduation Career SupportCareer sessions are continued post graduation because we want you to have all the help you need. These include live sessions with industry mentors to guide you, dedicated mentorship, and access to Jetking’s career assistance resources.
Company-Specific PreparationGet company-specific guidance with access to a carefully curated pool of interview resources per company to ensure you are interview-ready.
Live Profile Building Have live sessions of how to build your profile with hands-on sessions.
15INDIA'S NO.1 DIGITAL SKILLS INSTITUTE
PLACE ME NTP OLICY
PLACEME NT OP PORTUNITIES
Disclaimer: Placements are subject to recruitment norms. Jetking does not guarantee placements in the above organizations.
Internship/Placement post Sem-2 completion and will be in the L0-Desktop / Networking / IMS domain
Post Semester-2, the student will have the opportunity to “Earn & Learn”. Complete the course requirement by Attending classes & exam appearance as per schedule in (hybrid) mode
If student does not avail Internship/placements post Sem-2 completion, he/she can do so post Sem-3. No Internship/placements before sem-2 exam is complete and the student has been declared pass
If the student does not require internship/placements, he/she will inform the centre by Submitting a written Application for the same
Internship/placement can be anywhere in India. Refusal of opportunity lead to removal of “Job Assurance” tag
If a student’s program performance is not found up to the mark and/or he/she fails in the exam, then placement Assistance will come into effect.
If internship/placements is deferred by the recruiter, at its own volition, owing to unsafe circumstances, prevailing Environmental conditions. Jetking will not be held responsible for non-delivery of service
Placements / Internship Eligibility subject to Jetking Placement Policy 2021:
MAP TO Y OUR
FUT UREBecome pro�cient in at least one of the operating systems like Windows or Linux, to understand how cloud services operates.
Understand and get hands-on experience in programming languages to develop cloud-based applications that meet business requirements.
Learn the fundamentals of networking, virtual networks, and other networking functions to understand the back-end cloud infrastructure.
Master a cloud platform (or all of them) to gain the hands-on experience critical to becoming a cloud computing engineer.
CLOUD SERVICE PROVIDERS
Microsoft Azure |Amazon Web Services |Google Cloud Platform
OPERATING SYSTEM Windows | Unix Linux
CLOUD ARCHITECT
16INDIA'S NO.1 DIGITAL SKILLS INSTITUTE
C A R E E R P R O G R E S S I O N I N C L O U D D O M A I N
NETWORKINGVirtual networks | LAN/WAN | Private/ Public Networks
PROGRAMMING LANGUAGESQL | Go | Python | .NET
17INDIA'S NO.1 DIGITAL SKILLS INSTITUTE
C A R E E R P R O G R E S S I O N I N C Y B E R S E C U R I T Y D O M A I N
MAP T O YOUR
FUTU RE Learn About The Di�erentTypes Of Cyberattacks And The Actions RecomendedFor Them
Understand How The Common OperatingSystems Work In OrderTo Install, Test And RunApplications in A System
OPERATING SYSTEMSWINDOWS |lINUX |Macos
NETWORKINGIP | MAC AddressOSI Model
UNDER STANDING PROTOCOLSRouting | TCP / IP
Get The In-Depth NetworkingSkills Required To UnderstandsAnd Protect A Network And Its Components
Learn Top ProgrammingLanguages For IdentifyingValnerbilities. Malwares And Viruses In A System
Gain Knowledge On TheCritical Security ApproachesNecessary To Identify AndPrevent Threats
Study Security ProtocolsTo Know How Data PacketsAre Transferred, And How Computers Are Connected In A Network
INTRO TO CYBERSECURITYMalware Attack |Phishing Attack |Password Attack
PROGRAMMINGJAVA Script |Python / Perl |C / C++
SECURITY APPROACHESCon�guration Of Firewalls | Vunerability Analysis & Cryptography |Forensic Investigation
CYBERSECURITYARCHITECH
18INDIA'S NO.1 DIGITAL SKILLS INSTITUTE
“Without Jetking, I don’t know where I would be. You made a major difference in my life. All those times that you have gone the extra mile for me, I really did notice. Your belief in me makes me believe in myself.”
“I made the right decision when I was looking up various institutes and finally enrolled into Jetking. Thank you for making my technical basics strong.”
“As I am from a Government school, my communication skills were not good. I started my Jetking journey with intensive technical classes. I am thankful to Jetking for this platform and lifewhich I could not even have imagined 2 years ago.”
“Both the course and faculties at Jetking were excellent.It has been the most practical training I have ever received.The course is extremely professional and the material is practical, clear and concise. It provided me with the perfect foundation for my career. I would highly recommend Jetking to others.”
“I am very happy with Jetking for the placement assistance, even after my first job. I am grateful for all the guidance and technical knowledgeprovided. At Jetking we are notonly trained in the technical domain as well as I have also improved my communication skills and confidence in appearing for interviews.”
“Before joining Jetking, I was not sure what to do with my career. But after completing the course, I got the right platform to start my career. It's been nearly 5 years and I have never looked back. I am very satisfied with my decision to join Jetking which has proved that there is no disadvantage of being a girl in technical domain.”
Nikhil PathareTata Consultancy
Services
Ritesh MishraHCL Technologies
Shivam PorwalDell
Pravat Mohapatra McKinsey
Abhishek IBM-Collabera
Preeti MadanQuatrro
HEAR FROMOUR LE A RNER S
19INDIA'S NO.1 DIGITAL SKILLS INSTITUTE
COURSECURRICUL UMBCA Cloud computing& CyberSecurity
HARDWARE SKILLS (MAPPED TO: 220-1001 & 1002)INTRODUCTION | MOTHERBOARD AND RAM | PC EXPANSION CARDS AND STORAGE DEVICES | CPU TECHNOLOGIES |
DISPLAY DEVICES, ADAPTERS AND CONVERTERS | WIRELESS HARDWARE | INSTALL AND CONFIGURE PERIPHERAL | TYPES
OF PRINTERS AND MAINTENANCE | TYPES OF SCANNERS AND INSTALLING | MOBILE DEVICES AND SECURITY |
BENEFITS OF PM AND CLEANING A PC
NETWORKING (MAPPED TO: N10-007)INTRODUCTION | NETWORK TOPOLOGIES | FUNCTIONS OF NETWORK SERVICES | WAN TECHNOLOGIES |
NETWORK COMMON ATTACKS | NETWORK DEVICE SECURITY & ACCESS CONTROL | WIRELESS NETWORK AND SECURITY |
SCANNING, MONOTORING AND PATCHING PROCESS
OPERATING SYSTEM WIN-10 (MAPPED TO: MD-100)INTRODUCTION | POST-INSTALLTION CONFIGURATION | MANAGE LOCAL USERS, LOCAL GROUPS, DEVICES | DATA ACCESS
AND PROTECTION | MANAGE WINDOWS SECURITY |CONFIGURE CONNECTIVITY | MANAGE INTUNE DEVICE ENROLLMENT
AND INVENTORY | MANAGE APPS AND DATA | MAINTAIN WINDOWS
NETWORKING WITH CISCO (MAPPED TO: 200-301)NETWORK FUNDAMENTALS | NETWORK ACCESS | IP CONNECTIVITY | IP SERVICES | SECURITY FUNDAMENTALS |
AUTOMATION AND PROGRAMMABILITY
WINDOWS SERVER ADMIN 2019 PAPER-1 (MAPPED TO: WS011-T00)INSTALL, UPGRADE AND MIGRATE SERVERS | IDENTITY SERVICES IN WINDOWS SEREVR | NETWORK INFRASTRUCTURE
SERVICES | STORAGE MANAGEMENT IN WINDOWS SERVER | IMPLEMENT AND MANAGE HYPER-V | IMPLEMENT HIGH
AVAILABILITY | MAINTAIN SERVER ENVIRONMENTS | WINDOWS SERVER SECURITY | REMOTE ACCESS & WEB SERVICES IN
WINDOWS SERVER | PERFORMANCE MONITORINF IN SERVER ENVIROMENTS
AWS CLOUD ADMIN (MAPPED TO: SAA-C02)INTRODUCTION TO CLOUD COMPUTING | AWS AND FOUNDATIONAL SERVICES | AMAZON S3 AND GLACIER STORAGE |
AMAZON EC2 AND EBS | AWS DATABASES | DESIGN AWS ENVIRONMENTS | AWS SECURITY & COMPLIANCE |
AWS ARCHITECTED FRAMEWORK
Y E A R - 1
20 INDIA'S NO.1 DIGITAL SKILLS INSTITUTE
HARDWARE SKILLS (MAPPED TO: 220-1001 & 1002)INTRODUCTION | MOTHERBOARD AND RAM | PC EXPANSION CARDS AND STORAGE DEVICES | CPU TECHNOLOGIES |
DISPLAY DEVICES, ADAPTERS AND CONVERTERS | WIRELESS HARDWARE | INSTALL AND CONFIGURE PERIPHERAL | TYPES
OF PRINTERS AND MAINTENANCE | TYPES OF SCANNERS AND INSTALLING | MOBILE DEVICES AND SECURITY |
BENEFITS OF PM AND CLEANING A PC
NETWORKING (MAPPED TO: N10-007)INTRODUCTION | NETWORK TOPOLOGIES | FUNCTIONS OF NETWORK SERVICES | WAN TECHNOLOGIES |
NETWORK COMMON ATTACKS | NETWORK DEVICE SECURITY & ACCESS CONTROL | WIRELESS NETWORK AND SECURITY |
SCANNING, MONOTORING AND PATCHING PROCESS
OPERATING SYSTEM WIN-10 (MAPPED TO: MD-100)INTRODUCTION | POST-INSTALLTION CONFIGURATION | MANAGE LOCAL USERS, LOCAL GROUPS, DEVICES | DATA ACCESS
AND PROTECTION | MANAGE WINDOWS SECURITY |CONFIGURE CONNECTIVITY | MANAGE INTUNE DEVICE ENROLLMENT
AND INVENTORY | MANAGE APPS AND DATA | MAINTAIN WINDOWS
NETWORKING WITH CISCO (MAPPED TO: 200-301)NETWORK FUNDAMENTALS | NETWORK ACCESS | IP CONNECTIVITY | IP SERVICES | SECURITY FUNDAMENTALS |
AUTOMATION AND PROGRAMMABILITY
WINDOWS SERVER ADMIN 2019 PAPER-1 (MAPPED TO: WS011-T00)INSTALL, UPGRADE AND MIGRATE SERVERS | IDENTITY SERVICES IN WINDOWS SEREVR | NETWORK INFRASTRUCTURE
SERVICES | STORAGE MANAGEMENT IN WINDOWS SERVER | IMPLEMENT AND MANAGE HYPER-V | IMPLEMENT HIGH
AVAILABILITY | MAINTAIN SERVER ENVIRONMENTS | WINDOWS SERVER SECURITY | REMOTE ACCESS & WEB SERVICES IN
WINDOWS SERVER | PERFORMANCE MONITORINF IN SERVER ENVIROMENTS
AWS CLOUD ADMIN (MAPPED TO: SAA-C02)INTRODUCTION TO CLOUD COMPUTING | AWS AND FOUNDATIONAL SERVICES | AMAZON S3 AND GLACIER STORAGE |
AMAZON EC2 AND EBS | AWS DATABASES | DESIGN AWS ENVIRONMENTS | AWS SECURITY & COMPLIANCE |
AWS ARCHITECTED FRAMEWORK
OFFICE -365 (MAPPED TO: MS-100)INTRODUCTION | MANAGE DOMAINS | PLAN MIGRATION OF USERS AND DATA | MANAGE USER IDENTITY AND ROLES | MANAGE
USER ROLES & AZURE AD IDENTITIES | MANAGE ACCESS AND AUTHENTICATION | PLAN OFFICE 365 WORKLOAD DEPLOYMENT
| PLAN OFFICE 365 APPLICATIONS DEPLOYMENT
WINDOWS SERVER ADMIN 2019 PAPER-2 (MAPPED TO: WS012-T00)INTRODUCTION TO AZURE HYBRID IaaS | IMPLEMENTING IDENTITY IN AZURE IaaS | OPERATIONAL MONITORING IN AZURE
ENVIRONMENT | MANAGING SECURITY IN AZURE ENVIRONMENT | IMPLEMENT FILE SERVICES IN AZURE ENVIRONMENT |
CONFIGURE & MANAGE AZURE VM | MAINTAINING AZURE VM | MIGRATION & RECOVERY SERVICES IN AZURE ENVIRONMENT
KALI LINUX & SHELL PROGRAMMINGINTRODUCTION TO KALI LINUX | GETTING STARTED WITH KALI | LINUX FUNDAMENTALS | CONFIGURE KALI LINUX | SECURING
AND MONITORING KALI | DEBIAN PACKAGE MANGEMENT
CHECKPOINT SECURITY (MAPPED TO: R-80) & WIRESHARK MONITORING (MAPPED TO: WCNA)INTRODUCTION TO CHECK POINT ARCHITECTURE | MANAGE SECURITY POLICY | CHECK POINT SECURITY SOLUTIONS | TRAFFIC
VISIBILITY | CONCEPTS OF VPN | MANAGING USER’S ACCESS & CLUSTER XL | ADMINISTRATOR TASK IMPLEMENTATION
AZURE CLOUD ADMIN (MAPPED TO: AZ-104)MANAGE AZURE SUBCERIPTION AND RESOURCES | MANAGE AZURE STROAGE SERVICES | MANAGE VIRTUAL MACHINES |
MANAGE AZURE CLOUD VIRTUAL NETWORKS | MANAGE AZURE IDENTITIES
PYTHON PROGRAMMING (MAPPED TO: PYTHON VER.3.9.0)MANAGE OPERATIONS USING DATA TYPES AND OPERATORS | MANAGE CONTROL FLOW | MANAGE INPUT AND OUTPUT
OPERATIONS | IMPLEMENT STRUCTURE CODE | MANAGE OPERATIONS WITH MODULES & TOOLS | TROUBLESHOOTING AND
ERROR HANDLING
Y E A R - 2
21INDIA'S NO.1 DIGITAL SKILLS INSTITUTE
IMPLEMENTING RESPONSIVE HACKING & SECURITY (MAPPED TO: CEH-V.11)INTRODUCTION TO ETHICAL HACKING | FOOTPRINTING & RECONNAISSANCE | SCANNING NETWORKS | ENUMERATION |
VULNERABILITTY ANALYSIS | SYSTEM HACKING |MALWARE THREATS | SNIFFING | SOCIAL ENGINEERING | DENIAL-OF-SERVICE |
SESSION HIJACKING | EVADING IDS, FIREWALLS & HONEYPOTS | HACKING WEB SERVERS |HACKING WEB APPLICATIONS | SQL
INJECTION | HACKING WIRELESS NETWORKS | HACKING MOBILE PLATFORMS | IoT & OT HACKING | CLOUD COMPUTING
DIGITAL FORENSICS (MAPPED TO: CHFI V.9)COMPUTER FORENSICS IN TODAY’S WORLD | COMPUTER FORENSICS INVESTIGATION PROCESS | HARD DISK AND FILE
SYSTEMS | DATA ACQUISITION AND DUPLICATION | DEFARTING ANTI-FORENSICS TECHNIQUES | OPERATING SYSTEM
FORENSICS | NETWORK FORENSICS | INVESTIGATING WEB ATTACKS | DATABASE FORENSICS | CLOUD FORENSICS | MALWARE
FORENSICS | INVESTIGATING EMAIL CRIMES | MOBILE FORENSICS | FORENSICS REPORT WRITING & PRESENTATION
SECURITY WITH SPLUNK (MAPPED TO: CORE CERTIFIED ADVANCED POWER USER)INTRODUCTION TO SPLUNK DEVELOPER | INTRODICTION TO SPLUNK ADMINISTRATION |INTRODUCTION TO SIEM SECURITY
PEN TESTING (WEB APPS & BUG BOUNTY)INTRODUCTION TO PENTESTING | INTRODUCTION TO BUG BOUNTY | WEB APPLICATION METHODOLOGY | DIFFERENT METHODS
FOR ATTACKS
CYBER LAW & PWK (MAPPED TO: PEN-200)PENETRATION TESTING WITH KALI | GETTING COMFORTABLE WITH KALI LINUX | MANAGING TOOLS | BASH SCRIPTING |
INFORMATION GATHERING | VULNERABILITY SCANNING | WEB APPLICATION ATTACKS | BUFFER OVERFLOWS | FIXING EXPLOITS |
ASSEMBLING THE PIECES: PENETRATION | CYBER SECURITY LAWS |
CAPSTONE PROJECT ON SECURITY IMPLEMENTATION
Y E A R - 3
IMPLEMENTING RESPONSIVE HACKING & SECURITY (MAPPED TO: CEH-V.11)INTRODUCTION TO ETHICAL HACKING | FOOTPRINTING & RECONNAISSANCE | SCANNING NETWORKS | ENUMERATION |
VULNERABILITTY ANALYSIS | SYSTEM HACKING |MALWARE THREATS | SNIFFING | SOCIAL ENGINEERING | DENIAL-OF-SERVICE |
SESSION HIJACKING | EVADING IDS, FIREWALLS & HONEYPOTS | HACKING WEB SERVERS |HACKING WEB APPLICATIONS | SQL
INJECTION | HACKING WIRELESS NETWORKS | HACKING MOBILE PLATFORMS | IoT & OT HACKING | CLOUD COMPUTING
DIGITAL FORENSICS (MAPPED TO: CHFI V.9)COMPUTER FORENSICS IN TODAY’S WORLD | COMPUTER FORENSICS INVESTIGATION PROCESS | HARD DISK AND FILE
SYSTEMS | DATA ACQUISITION AND DUPLICATION | DEFARTING ANTI-FORENSICS TECHNIQUES | OPERATING SYSTEM
FORENSICS | NETWORK FORENSICS | INVESTIGATING WEB ATTACKS | DATABASE FORENSICS | CLOUD FORENSICS | MALWARE
FORENSICS | INVESTIGATING EMAIL CRIMES | MOBILE FORENSICS | FORENSICS REPORT WRITING & PRESENTATION
SECURITY WITH SPLUNK (MAPPED TO: CORE CERTIFIED ADVANCED POWER USER)INTRODUCTION TO SPLUNK DEVELOPER | INTRODICTION TO SPLUNK ADMINISTRATION |INTRODUCTION TO SIEM SECURITY
PEN TESTING (WEB APPS & BUG BOUNTY)INTRODUCTION TO PENTESTING | INTRODUCTION TO BUG BOUNTY | WEB APPLICATION METHODOLOGY | DIFFERENT METHODS
FOR ATTACKS
CYBER LAW & PWK (MAPPED TO: PEN-200)PENETRATION TESTING WITH KALI | GETTING COMFORTABLE WITH KALI LINUX | MANAGING TOOLS | BASH SCRIPTING |
INFORMATION GATHERING | VULNERABILITY SCANNING | WEB APPLICATION ATTACKS | BUFFER OVERFLOWS | FIXING EXPLOITS |
ASSEMBLING THE PIECES: PENETRATION | CYBER SECURITY LAWS |
CAPSTONE PROJECT ON SECURITY IMPLEMENTATION
22INDIA'S NO.1 DIGITAL SKILLS INSTITUTE
PRO G RAMDETA IL S
ELIGIBILITY
Class-10+2/Intermediate Pass12th Pass from Recognised Open School10+3 Diploma Pass from Govt. Recognised InstitutionMin 40% aggregate marks
PROGRAM DURATIONAND FORMAT
3 Years (6 Semesters) | Hybrid Masterclass | Mentored by domain Experts
PROGRAM FEE
Flexible - One-Time / Pay-Per-Year / Pay-Per-Semester
PROGRAM START DATES
As per Univ. admission intake cycle
WEEKLY COMMITMENT (12 hours)
CALL:
7666830000
COMPANY INFORMATION
401, Bussa Udyog Bhavan, T. J. Road, Near Sewri Bus Terminus,
Sewri (W), Mumbai - 400 015.Call : 7666830000
CONTACT OR VISIT THE JETKING CENTRE FOR PROGRAM DETAILS
Doubt Clarification/Query Handling
Practical Demo & Simulation Practice through Cloud Labs
Hours Asynchronous Assignment, Practical, Case-Study,
Simulations & Projects