Vous êtes sur la page 1sur 13

appin

Training | Consulting | Outsourcing

Appin Executive Masters Program


in

Information
Security
1
ABOUT US VISION
Appin Knowledge Solutions, is a premier To be the Leader in Information Security training
provider of hi- technology certification, courseware and consulting..
as well as online, computer based and instructor led
training across the world. Appin is primarily an IIT MISSION
Alumni company. Appin has come up with the way To provide a complete range of Information Security
of innovative learning concept using Computer solutions under one roof from Consulting to
Based Training Software (CBTS) in a highly Training.
interactive environment.
CREDENTIALS

2
Appin Security Group(ASG) is a globally 4
Appreciated by the former President of India,
recognized Information Security Consulting body Dr A.P.J Abdul Kalam.
with its headquarters in New Delhi and spanning 4
The only security company across the globe to
more than 15 countries. ASG is a leading have a dedicated Research and Development
information security services firm with an esteemed Centre for Information Security, inside IIT Delhi.
clientele ranging from Government Bodies 4
CERT In empaneled company, approved by
(Ministries, Embassies,.) to top Corporate houses Ministry of IT, India to carry out technical audits
(mostly ET Top 100) spanning all major sectors viz., for various critical sectors like finance, power etc.
I T / I T E S, F i n a n c i a l S e r v i c e s, Av i a t i o n , 4
Official partners of various cyber crimes division
Telecom/ISP, Media, Infrastr ucture and in India including CBI.
Manufacturing. With a strong focus on Research and 4
Serving more than 820 key clients across 40
Development and innovating new services and countries in both private and Govt. Sector.
products in Information Security, Appin Security
group has an R&D Centre that provides end to end
Information Security Services - Security Assessment,
Security Implementation and Security Management.
Appin Security Group has the strongest technical
backend to ensure that its clients are completely
protected from any security breaches.
APPIN SECURES
THE NEW HYDERABAD AIRPORT OUR CLIENTS
Competing with the global top, Indian airports are
set for modernization. State-of-the-art IT systems l
qj
{
k
klf
g
rlso
k
Airports Authority of India

and data centers are implemented to manage their


operations and to deliver world class performance. IST
RY OF DEFE
N

CE
MI
DEFENC

IO N
Airports also act as network service providers for

IS A T
RE

AN
SE cyL; ewya foKkue~ G
ARC OR
H & DEVELOPMENT

third parties, such as airlines .


All these steps boost efficiency and quality of
service, but also increase the information security
risks multi-fold.
For GMR Hyderabad International Airport Ltd.

3
Appin Security Group took the challenge of LVsV cSad vkWQ chdkusj ,.M t;iqj
State Bank of Bikaner and Jaipur
The Bank with a Vision

complete airport security management, including


security auditing, Security Operations Center
(SOC) implementation and management, security
incident management and people training and
awareness , to ensure that the airport follows the
road map of greater security. The assignment
included a detailed security risk analysis with
respect to people, process and technology
including vulnerability assessments, penetration
testing, configurations audit. Backed by rigorous
security risk analysis policies, procedures and IT
security systems, the whole infrastructure is DAIKIN
monitored from the central SOC inside the airport.
The SOC monitors all IT devices, including
routers, critical servers, switches, fire walls, and
IDS/IPS. It also does forensics and handles all
security incidents.
An team from Appin dedicated to security training
and awareness assures that the entire airport IT
staff is aware of all security policies and complies
with them. The SOC ensures that security threats
are detected before they are exploited and the Actis
ESCORTS
security incidents are handled with acceptable
recovery time lines. And that translates into safety.
Microsoft ®

Safety for the airport, and for the traveler.


Information Security
Information security is the process of protecting The field of Information Security has grown and
availability, privacy and integrity of information. evolved significantly in recent years. As a career
Access to stored information on computer choice there are many ways of gaining entry into the
databases has increased greatly as most of the field. It offers many areas for specialization
companies store business and individual including, securing network(s) and allied
information on computer than ever before. Much of infrastructure, securing applications and databases,
the information stored is highly confidential and not security testing, information systems auditing,
for public viewing. business continuity planning and digital forensics
science, to name a few.

4
The rapid growth and widespread use of electronic
data processing and electronic business conducted Web security is going to be a big focus in 2009.
through the Internet, along with numerous Bigger than ever before. Be it all the social
occurrences of international terrorism, fueled the networking we're doing or Web-based malware
need for better methods of protecting the exploits, this thing we call the Web is where we're
computers and the information they store, process going to have to focus a large part of our security
and transmit. The academic disciplines of computer efforts. Like it or not, it's the part of everyone's
security, information security and information network that's open. It's also where business logic is
assurance emerged along with numerous exposed and where the system complexities and
professional organizations - all sharing the common subsequent vulnerabilities are simply waiting around
goals of ensuring the security and reliability of to be exploited.
information systems.

Governments, military, corporates, financial


institutions, hospitals, and private businesses amass a
great deal of confidential information about their
employees, customers, products, research, and
financial status.
Appin Executive Masters Program

COURSE DURATION: One Year

CONCEPT
Appin Executive Masters Program is a joint initiative of Appin Security Group and Appin Knowledge Solutions. It
envisions to bridge the gap between industry and academia by integration of learning and technology. The program
will be conducted under Appin School of Niche Technology, an innovative concept designed to experiment
intellectually with modes of study that over time could form the basis for new domain specific programs.
PROGRAM OBJECTIVES ELIGIBILITY
1
To instil the current and comprehensive 1
B.E. Electronics / Computer Science /
knowledge of Information Security. Electronics & Telecom / Electrical / MSc IT /
1
To enable students to develop and implement MCA / MSc (Physics or Maths) with minimum
Information Security policies & practices and 50% marks from a recognized university.
related change management.
1
To develop students' management abilities in PROGRAM

5
Infor mation Security to be applied in
organizations. 1
The Program will be spread across 4 Trimesters of
1
To enable students to cope with the change 3 months each and will be completed within a
management issues involved in developing and year.
implementing information security policies in
organizations.
1
To expand the scholarly credentials of students, AWARD
thereby increasing their marketability with
1
Successful completion of the Program entitles a
prospective employers.
candidate to receive a Post Graduate Diploma in
the field of Information Security.
1
Internationally recognized and affiliated to
METHODOLOGY
IADL, UK.
1
The program will be conducted in a highly
interactive and open environment providing
opportunities of discussions and intellectual
growth.

PLACEMENT

1
Our placement partners include our client
companies among others
1
A Student Placement Cell dedicated for exploring
job opportunities across various sectors of the
industry guided by the Admissions Team.
Trimester-1
Paper 1. Networking Paper 2. Information Security & Ethical Hacking Basics

1. INTRODUCTION TO NETWORKING 1. INFORMATION SECURITY & ETHICAL HACKING


q Introduction & History ?Introduction
q Advantage & Disadvantage ?Basics of Data
q Computer Networks Protocol ?Information
q OSI Model & Physical Topology ?Security
q Network Architecture ?Hacking
q Communication Media ?Richard's Law of computer security
?Types of hackers
2. THE INTERNET PROTOCOL (IP) ?Cyber Threats
q Introduction to IP ?Case Studies
q IP Packet Format
q IP Address Classes 2. DESKTOP & SERVER SECURITY
q Transmission Control Protocol ? Windows Security
q Subnetting & CIDR ? Windows Vulnerability
? Hacking into windows platform
3. IP ROUTING ? Windows task manager
q Introduction to hardware & software related to IP routing ? Linux Security
q Routing information Protocol
q Enhanced Interior Routing Protocol 3. NETWORK & FIREWALL SECURITY
q Open Shortest Path First ? Setting up a LAN
? Threats Of LAN
4. SWITCHING & BRIDGING ? Firewall

6
qIntroduction of Switching & Bridging ? Anti-virus
qSTP & LAN Switch Types ? Anti Spyware
qVLAN - Virtual LAN ? Network Scanner
qFlexibility and Scalability ? Introduction to Wireless Network security

5. WIDE AREA NETWORK 4. INTERNET & CYBER SECURITY


q Understanding WAN fundamentals qIP Spoofing
q Understanding Tunneling Protocol & Frame Relay qE-Mail Tracking
Fundamentals qProxy Servers
q VPN - Virtual Private Network qE-mail Forgery and Detection
q NAT - Network Address Translation qMAC Spoofing
qMicrosoft Outlook Security
6. NETWORK CONFIGURATION AND qCyber Stalking
TROUBLESHOOTING
q Networking Introduction 5. INFORMATION GATHERING METHODS
q LAN Switching qDaemon-Banner Grabbing
q Wireless Networking qActive Finger Printing
q Layer by Layer Troubleshooting with a Cisco Router qPassive Fingerprinting
q Router Troubleshooting at OSI Layers qPort Scanning
q Managing your network connections qFull TCP Scan Half TCP Scan
qFlag
7. IMPLEMENTING AND TROUBLE-SHOOTING WI-FI qTracert
NETWORKS
qIntroduction to 802.11 6. WINDOWS REGISTRIES
qFinding And Connecting To Wireless Networks q Reshack
qIntroduction to RADIUS q Registry tweaks
qEAP & Bringing EAP to the LAN
qAuthenticating the AP to the User, and Vice Versa 7. HACKING ATTACKS
qScanning and Enumerating 802.11 Networks q Social Engineering Attack
q Phishing Attack
q Input Validation Attack
q SqL injection
q XSS attack
q Attack Dos Attacks
q Sniffing Attack
q Session Hijacking etc.

8. EMAIL SECURITY & WEB SECURITY


q Introduction to E-mail
q How E-mail Works
q Mail servers
q E-mail Protocol
q Web Servers (introduction to web Security)
Trimester-2
Paper 3. Programming Paper 4. Network Security

1. PROGRAMMING IN C 1. WIRELESS & MOBILE SECURITY


qIntroduction to C ?Introduction to the Wireless
qData Types ?Mobile Technology
qBasic programming concept ?GSM Technology
qIf else ladder ? CDMA Technology
qSwitch statements ? Different type of attacks
qArray, simple array ,multi dimension
qFunction 2. VOIP & VPN SECURITY
qLoops: for, do while, while ? Introduction to the VOIP and VPN Technology Protocol
qStructure, structure with function, structure array, and Architecture
qPointer
qMultiple return from function 3. ROUTER SECURITY
qPointer to function, passing value through pointer ? Introduction to router
qIntroduction to file handling ,what is text file ? Protocols on a router and types of connection
qPreprocessor compiler (#) ? NAT Services
? Various types of Attacks and their Detection

2. PROGRAMMING IN C++ 4. IDS & IPS


qOOPS ? Introduction to IPS & IDS
qClass, how to declare a class ? IDS Overview (AIDS, HIDS, and NIDS)
qInheritance, Polymorphism, Operator overloading, ? IDS system & IPS System

7
Abstraction ? Perimeter Firewall
qUsing class with function ? Analysis of System Deficiencies
qException handling q VoIP & Wireless
qTemplate, generic class

3. INTRODUCTION TO DATA STRUCTURE


qQueue
qStack
qLink list
qTree
Trimester-3
Paper 5. Vulnerability Assessment & Paper 6. Information Security Management Systems
Advanced Ethical Hacking

1. VULNERABILITY ASSESSMENT & PENETRATION TESTING 1. INFORMATION SECURITY MANAGEMENT SYSTEM


?Scoping and Tools for Vulnerability Tests ?ISO 27001 and other Standard
?Risk Assessment ?Policy & Projects
?Google Hacking ?Audit & Certification
?Methodology ?Managing Security Awareness
qGoogle Hacking ?Risk Assessment
qApplication Audit ?Business Continuity and Disaster Recovering
qNetwork Devices ?Planning Security Management Practices
2. SECURED PROGRAMMING TECHNIQUE & ADVANCED 2. INFORMATION SECURITY AUDITING
HACKING ATTACKS
? Defining Programming methodology ?Audit Objectives & Steps
? Explaining Bugs ?Network Controls
? Removing Errors ?Network Data Standards and Data Access
? Buffer over flows ?Access to Network Operating Systems Software and
? Back door Facilities
? Trojans ?Data Encryption and Filtering
? Enumeration
3. SECURITY FRAMEWORK-COBIT
?Security

8
?Adequate Security
?Approaches for Achieving Security
?Holistic View of Security
?Defense in Depth
?OCTAVE
?Security Risk Analysis
?Threats Modeling
?Current Security Issues
?Trends for Security
Trimester-4
Paper 7. Cryptography Paper 8. Computer Forensics

1. CRYPTOGRAPHY & ENCRYPTION 1. CYBER CRIME INVESTIGATION


? Introduction to cryptography ?Forensics methodology and forensic tool kit
? SKCS
? PKCS 2. INTERNATIONAL CYBER LAWS
? MD5
? DES 3. COMPUTER FORENSICS
? RSA ? Introduction to Cyber Forensics
? Digital signature ? Cyber Crimes
? Digital certificate ? Recognizing Preparation and Preservation
? Documentation and reporting
? Security Systems to Prevent Further Attacks
? Basic Steps in Forensic Analysis of UNIX System
? Crime Scene Management
? Live System Data Gathering
? Recovering of deleted files
? Non- verbal analysis
? Interpretation of common LOG files
? Advanced Honey Pots

9
Dr. A.P.J Abdul Kalam
Former President of India,
Known as the Missile Man of India

The former President showed interest in the work being done


by Appin Knowledge Solutions in the field of Information
Security and Nano-Technology. He has also advised appin
with respect to future of niche technologies in india

“Youth is the most powerful resource. Ignited minds of


youth is indeed the biggest force on the earth, above the
earth and below the earth.”

10
Dignitaries Associated with
APPIN Group
Dr. Dheeraj
q Bhardwaj featured as one of the top 50 youth on fast track by India Today,
who has worked as Professor at IIT Delhi and as Director with Sun Asia Pacific Science &
Technology Center, Sun Microsystems Inc.
Mr. A.S. Chandrasekhar worked as Director with Bureau of Indian Standards and
q
Confederation of Indian Industries.
Mr. Ashok Sapra who has worked as the President and MD with AT&T South Asia and
q
as CEO- GE Communications
Prof. S.K Gupta Professor, Department of Computer Science, Indian Institute of
q
Technology, Delhi
Prof. K.K Chaudhary Senior Professor, Indian Institute of Technology, Delhi
q
Prof. S.K. Jain Associate Professor and Intellectual Property Rights Chair, Department
q
of Management Studies, Indian Institute of Technology, Delhi
Prof. V.B. Aggarwal Former Head of IT Department, Delhi University
q
Dr Naveen Singla Academician, University of Washington, St Louis USA
q
Dr Ashish Kapoor Academician, Massachusetts Institute of Technology (MIT), Boston,
q
USA
Mr Arvind Siotia Graduate(MBA) Kellogg School of Management, Chicago, USA
q
Booze-Allan
Mr Vijay Kumar General Manager, BHEL
q
Mr. Manmohan Gupta Cofounder & Director (Operations), Nagarro Inc.
q
Mr. Pradeep Chopra Cofounder & Director (Marketing), Whizlabs Software
q
Mr Tarun Jain Graduate(MBA) International School of Business, Currently with
q
Microsoft
Mr Kumar Gautam Graduate (MBA), IIM Bangalore, Currently, working with Lehman
q
Brothers
Mr Pankaj Kant Jha Graduate (MBA), IIM Ahemdabad, Currently working with EXL
q
Services
TM
Price
APPLICATION FORM FOR 2009-2010 Rs. 100/-
Appin Executive Masters Program
in
INFORMATION SECURITY
Form No.: .............................

For office use only d d / m m / y y

Roll Number Date

Please fill in Block Letters


Applicant’s Name:
Affix your
passport size
photograph and
Surname First Name attach three
photograph

Contact no.:
ISD Code STD Code Landline No. ISD Code Mobile:

E-mail:

Father’s/ Husband’s Name:

Mother’s Maiden Name:

dd/mm/yy

Sex: Male Female Date of Birth Nationality


Correspondence Address:

Permanent Address:

Educational Qualification:
Examination University/Board Institution Year Division % of Marks

(Attach xerox copies of 10th ,12th or Diploma mark sheets)


Details of Experience (if any).............................................................................................................................................
..............................................................................................................................................................................................

Centre : ..........................................................................................................

Date: .................................... Place: ............................ Signature of Applicant


12
appin
www.appinonline.com

Vous aimerez peut-être aussi