background

According to research from the University of Maryland, computer hacks are now so frequent that they occur almost every 39 seconds. With rampant ransomware attacks and the imminent threat of cyberwarfare, demand for cybersecurity professionals is on the rise. At NIIT, we prepare your workforce to be threat-savvy strategic thinkers who can proactively plan for, detect, and prevent cyberthreats and cyberattacks swiftly and efficiently to reduce business risk.

background
service

Information Security Essentials

  • Conceptual understanding of IT Assets, Threats, Vulnerabilities and Risk assessment
  • Install, configure and monitor network security devices
  • Ensure proper configuration and security of fixed and mobile end-point devices
  • Scan, monitor and perform penetration testing to identify threats and vulnerabilities
  • Troubleshoot and document security incidents
service

Incident Response and Security Operations

  • Work in an Agile team environment
  • Comply with standard operating procedures and practices to track, report, manage and analyze incidents
  • Ensure IT infrastructure assets are securely provisioned
service

Network and Cloud IT Infrastructure and Administration

  • Perform basic and core troubleshooting tasks on Linux
  • Perform Network administration
  • Configure & manage application servers
  • Automate tasks using shell scripting
  • Manage and Troubleshoot Advanced Server Configurations
  • Basics of Cloud computing and Virtual IT infrastructure
service

Professional Skills

  • Develop a strong sense of self-efficacy that enables the learner to confidently manage challenges confidently
  • Sharpen listening and communication skills
  • Collaborate with others in managing infrastructure
  • Work effectively in a virtual unsupervised environment
  • Troubleshoot and respond with empathy in a remote environment
  • Respond swiftly and calmly during crisis situations
service

Analyze and Manage IT Security Operations

  • Install and maintain PKI
  • Define rules and configure for identity and access management
  • Continuously protect and defend all IT assets
  • Analyse and mitigate potential threats and vulnerabilities
  • Oversee investigation into security incidents
  • Perform and document root cause analysis for all incidents
  • Implement corrective actions based on incident analysis
  • Perform routine drill and practice to ensure readiness to respond to incidents
  • Regularly review and recommend updates to security procedure
  • Educate end users on security best practices
  • Awareness of the Cybersecurity framework - NIST Cybersecurity Framework Core
  • Awareness of regulatory frameworks or standards such as OWASP, GDPR, PCI-DSS, HIPAA