Executive Program in Cyber Security
Acquire Specialization in Cyber-Security
100% Placement Assistance | 1000+ Hiring Partners
About Executive Program in Cyber Security
Dependence on digital space has increased manifold in the past few decades. With increased dependence comes increased risk. Cyber Security is centered around the implementation of defensive measures to protect digital data from such harm. The JAINx Executive Program in Cyber Security features hands-on assessments of cyber vulnerabilities, attacks, and defenses and showcases real-life applications of Cyber Security(CyS). The program has been specifically designed with a strong emphasis on ‘experiential learning’ achieved by way of Virtual Lab sessions. Apart from the engaging lab hours, webinars and interactive sessions with industry experts cater to the extensive learning needs of students and inspire them to focus on the big picture of career growth.
Course Start Date
16th Nov, 2020
Mode of Delivery
Live Online Classroom
No. of Hours
180 of Online Practical Sessions
2 Months Live Projects
Basic to Advanced
Important Things to Know About Cyber Security
Growth of Cyber Security
Over 59% of the population world over are active internet users. With every business running on the digital platform today, it is no surprise that Cyber Security has indeed become one of the most crucial aspects in this hyperconnected world. India, being no exception, has one of the largest internet user bases in the world. A joint study conducted by PwC India and the Data Security Council of India (DSCI) says that the Indian cyber-security market is set to grow from USD 1.97 billion in 2019 to USD 3.05 billion by 2022, at a compound annual growth rate (CAGR) of 15.6.%. For obvious reasons, the need for Cyber-security professionals is increasing manifold too.
Careers & Remuneration in Cyber Security
According to Business Insider, at least one in three Indian organizations face a data breach. This finding is a clear calling for the need for Cyber Security specialists. Job opportunities in this field are ample with a 98% increase in Cyber Security job postings. According to Business Insider, India, the salary of a Cyber Security Specialist in India has grown to 8.8 Lakh rupees on an average. However, a combination of higher experience, seniority, and the right company can gain you a whooping 60 Lakh rupees pa too. Now, isn't that the job we all want!
Who Can Learn
Get trained in industry-relevant skills and Interact with Mentors across multiple industries and enhance your learning through Certifications. Get rewarding Job offers from top companies and Kickstart your career.
Upskill & Prepare Yourself for Senior Positions or Transition to new roles by gaining in-demand Skills. Experience seamless Integration of Theory, Practicals and Continuous Evaluation of your Progress by Mentors.
Module 1: Network Fundamentals, Routing, and Switching Basics"Introduction to Networking Network topology architecture Network Standards and protocol stacks Physical Network Connections Ethernet LANs Ethernet Switching Introduction to Wireless LANs IP and IPv4v4 Addressing IPv4 Subnetting Introducing Basic IPv6 TCP and UDP Support and Management Protocols Communications Protocols Web Protocols Virtualization Fundamentals Introduction to Network Security Introduction to IP Telephony and VOIP Implementation Operating Cisco IOS Software and Junos Configuring a Router Exploring the Packet Delivery Process Troubleshooting a Simple Network Configuring Static Routing Understanding and Implementing VLANs and Trunking Routing Between VLANs Introducing Dynamic Routing Introducing OSPF Building Redundant Switched Topologies Improving Redundant Switched Topologies with EtherChannel Exploring Layer 3 Redundancy Introducing WAN Technologies Explaining the Basics of ACLs IP Services Automation and Programmability Implementing Wide Area Networks
Module 2: Core Routing and SwitchingExamining Cisco Enterprise Network Architecture Understanding Cisco Switching Paths Implementing Campus LAN Connectivity Building Redundant Switched Topology Implementing Layer 2 Port Aggregation Understanding EIGRP Implementing OSPF Optimizing OSPF Exploring EBGP Implementing Network Redundancy Implementing NAT Introducing Virtualization Protocols and Techniques Understanding Virtual Private Networks and Interfaces Understanding Wireless Principles Examining Wireless Deployment Options Understanding Wireless Roaming and Location Services Examining Wireless AP Operation Understanding Wireless Client Authentication Troubleshooting Wireless Client Connectivity Introducing Multicast Protocols Introducing QoS Implementing Network Services Using Network Analysis Tools Implementing Infrastructure Security Implementing Secure Access Control Understanding Enterprise Network Security Architecture Exploring Automation and Assurance Using Cisco DNA Center Examining the Cisco SD-Access Solution Understanding the Working Principles of the Cisco SD-WAN Solution Understanding the Basics of Python Programming Introducing Network Programmability Protocols Introducing APIs in Cisco DNA Center and vManage
Module 3: Advanced Enterprise Routing and switchingConfigure classic EIGRP and named EIGRP for IPv4 and IPv6 Optimize classic EIGRP and named EIGRP for IPv4 and IPv6 Troubleshoot classic EIGRP and named EIGRP for IPv4 and IPv6 Configure Open Shortest Path First (OSPF)v2 and OSPFv3 in IPv4 and IPv6 Optimize OSPFv2 and OSPFv3 behavior Troubleshoot OSPFv2 for IPv4 and OSPFv3 for IPv4 and IPv6 Implement route redistribution using filtering mechanisms Troubleshoot redistribution Implement path control using Policy-Based Routing (PBR) and IP SLAs Configure Multiprotocol-Border Gateway Protocol in IPv4 and IPv6 Optimize MP-BGP in IPv4 and IPv6 environments Troubleshoot MP-BGP for IPv4 and IPv6 Describe the features of Multiprotocol Label Switching Describe the major architectural components of an MPLS VPN Identify the routing and packet forwarding functionalities for MPLS VPNs Explain how packets are forwarded in an MPLS VPN environment Implement Cisco Internetwork Operating System Dynamic Multipoint VPNs Implement Dynamic Host Configuration Protocol Describe the tools available to secure the IPV6 first hop Troubleshoot Cisco router security features Troubleshoot infrastructure security and services
Module 4: Deploying Cloud SolutionsIntroduction to Cloud Computing Cloud Architectures Cloud Delivery Models Identity Access Management Amazon Storage Management Basic Operation of Amazon Linux JSON operation in AWS Resources Managing Virtual Machines (Instances) Configuring and attaching Load Balancer to Virtual Machines Content Delivery Service AWS’s DNS-as-a-Service Hosting Routing Policy AWS’s Database-as-a-Service Types of Databases Managing Databases Networking in AWS Cloud Securing and Monitoring the AWS Cloud Managing Applications Developer friendly services
Module 5: Implementing High Availability, Storage, and Security in the Cloud."High Availability and Business Continuity Minimizing and optimizing Infrastructure cost Manage and Implement the right infrastructure Network Design for a complex large scale deployment Implement the most appropriate data storage architecture Security management systems and compliance controls Design protection of Data at Rest controls Design protection of Data in Flight and Network Perimeter controls Scalability and Elasticity Cloud Migration and Hybrid Architecture Cloud Privacy and Security Governance and auditing for cloud operations. Threats, risk, and requirements landscape. Privacy, data, and digital identity. Data sensitivity, location, and legal jurisdiction. Cloud security approaches and challenges.
Module 6: Implementing Microsoft Azure Data SolutionUnderstanding Infrastructure-as-a-Service (IaaS), Platform-as-a-Service(PaaS), and Software-as-a-Service (SaaS) Public, Private, and Hybrid cloud models. Core Azure architectural components. Core Azure Services and Products Azure Solutions Azure management tools Securing network connectivity in Azure Core Azure Identity services Security tools and features Azure governance methodologies Monitoring and Reporting in Azure Privacy, Compliance, and Data Protection standards in Azure Working with Data Storage Enabling Team-Based Data Science with Azure Databricks Building Globally Distributed Databases with Cosmos DB Working with Relational Data Stores in the Cloud Performing Real-Time Analytics with Stream Analytics Orchestrating Data Movement with Azure Data Factory Monitoring and Troubleshooting Data Storage and Processing