Vous êtes sur la page 1sur 7

www.cisocybersecurity.

com
December
2015 23

Proposal for conducting Foundations of


Information Security course for the
Undergraduate Program

Copyright CISO Cybersecurity 2015. A ll Rights Reserved. Reproduction o r d istribution other than for intended purposes is
prohibited, without the prior written consent of CISO Cybersecurity Private Limited. These materials a re confidential, and shall b e
returned to CISO Cybersecurity upon request. The t rademarks and service marks of CISO Cybersecurity, including the CISO
Cybersecurity mark and logo, a re the exclusive property of CISO Cybersecurity, and may not b e used without permission. All other
marks a re the property of their respective o wners marks a re the p roperty of their respective owners.

Confidential Document for Ansal University




www.cisocybersecurity.com

Table of Contents



Introduction to Information Security Course ....................................................... 3
Course Objectives ...................................................................................................... 3
Topics to be covered .................................................................................................. 4
Methodology ............................................................................................................... 4
Evaluation of the participants ................................................................................. 4
Commercial Proposal ................................................................................................ 4
Pricing: ................................................................................................................................. 4
General Terms and Conditions: ...................................................................................... 5

Trainer Profiles ........................................................................................................... 6


Dr. Manmohan Chaturvedi ............................................................................................. 6
Dr. Burzin Bharucha .......................................................................................................... 6
















2 Proposal for conducting Foundations of Information Security course for the
Undergraduate Program
December 23, 2015


www.cisocybersecurity.com

Introduction to Information Security Course



This course is designed as foundational course to expose the participants to the
subject of Information Security. As computers and networks are used for
communication and for varieties of online interactions and transactions,
Information security has become the key issue in todays information
technology world. Information security is required at all levels the personal
level, corporate level, state and country level It has become imperative for
companies, governments, and organizations to understand how to guard
against hackers, outsiders, and even disgruntled employees who threaten their
Information security, integrity and daily business operations.
The course material is structured to cater for requirement of a one semester (40
hours) course.

This course will be delivered by seasoned information security practitioners.

Course Objectives

At the end of the course, the course will be able to equip the participant with
ability to

Appreciate the terminology and vocabulary used in the modern
Information security realm
Gain knowledge about cybersecurity fundamentals and get equipped
with understanding of real world risksafflicting cyber space and
approaches for its mitigation at the national andenterprise levels
Develop a clear perception of the current and emerging cyber threat
environment tools, mechanism, threat actors and threat vectors
Get exposed to the emerging digital technologies Mobile, Cloud, Big
Data and Internet of Things (IoT) and the rising concerns regarding
security and privacy in the digital business era
Gain a comprehensive understanding of key cybersecurity domains
Appreciate the three major classifications of controls and
countermeasures (preventive, detective, and recovery) used in the
modern Information security realm, and be able to identify examples
and samples of controls and countermeasures within each classification
Appreciate the risks to critical infrastructures and their mitigations
Understand the cyber crime and key terms and concepts in cyber law
including IT Act

Proposal for conducting Foundations of Information Security course for the 3


Undergraduate Program
December 23, 2015


www.cisocybersecurity.com

Topics to be covered

Introduction to Information Security
Information Threat Environment
Evolution of Information Security and security organization
Tools, Mechanism and threat vectors
Introduction to digital technologies
Securing Digital Business
Key Information Security Domains
Critical Information Infrastructures(CIIs) and Industrial Control
System(ICS) Security
Information Security Frameworks
Legal Frameworks for Information Security

Methodology

Suitable practical demonstrations and case studies would be incorporated to
the class room discussions to ensure clear understanding of related concepts.
Students would be required to work in groups of 5 to present a project on
identified current topics of Information security.

Evaluation of the participants



Students would be evaluated by participation in class room quiz and on the
basis of group project report and presentations.

Commercial Proposal

Please find below the pricing details and general terms and conditions for
conducting the course Introduction to Information Security as part of
undergraduate program.

Pricing:

Cost per student for course duration of 14 weeks INR 4500.00
(T&C: minimum batch size should be 50 students)
Cost of Instructor per visit INR 5000.00
4 Proposal for conducting Foundations of Information Security course for the
Undergraduate Program
December 23, 2015


www.cisocybersecurity.com

General Terms and Conditions:



CISO Cybersecuritys proposal to Ansal University is subject to the following
terms and conditions:
All costs provided in this proposal represent the net amounts to be
received by CISO Cybersecurity and do not include any current or
future customs duties or taxes, including, but not limited to, sales tax,
withholding taxes, VAT, service tax and any other taxes which may
apply
All rates, fees and other costs provided as part of this proposal are valid
for thirty (30) days from the date of this proposal
PO needs to be issued in the favor of CISO Cybersecurity Private
Limited
Invoice will be issued before starting the training program
All payments have to be made within 15 days of submission of invoice
The schedule and the session timings needs to be planned as per the
mutual agreement
All the required infrastructure & facilities to deliver the training will be
provided by Ansal University
The course content and the course material is the property of CISO
Cybersecurity Pvt. Ltd and cannot be reproduced or used in any way or
for any purpose without written consent of CISO Cybersecurity Pvt. Ltd.

Proposal for conducting Foundations of Information Security course for the 5


Undergraduate Program
December 23, 2015


www.cisocybersecurity.com

Trainer Profiles

Dr. Manmohan Chaturvedi



Dr Manmohan Chaturvedi is an M.Tech and PhD
(Information Security) from the Indian Institute of
Technology, Delhi. He is currently a visiting Professor at IIT
Delhi, prior to which he was Professor and Associate Dean
in School of Engineering and Technology at Ansal
University.
He has extensive experience in managing Information Technology as Director
in the Government of India, and as Head of IT and Telecommunication
infrastructure of the Air Force, from where he retired as an Air Commodore.
He is an alumnus of the prestigious National Defence College, Delhi and has
held senior appointments in the Government dealing with Policy and Strategic
issues.
He is Fellow of Institute of Electronics and Telecommunication Engineers,
Senior Member of IEEE, and Chair of the Information Security Cell at Centre
for Digital Economy Policy Research.
He has published journal papers and presented many conference papers at
prestigious institutions across India. Recently he has been invited as Member
of the European Commission International Advisory Group on Cybersecurity,
and has presented papers in Brussels, Lisbon, Malaga and Vilnius as a part of
a project funded by European Commission on Building International
Cooperation in Trustworthy ICT; where he presented papers on Information
Security.

Dr. Burzin Bharucha

With a dual Ph.D. in Security Risk Management and


Computer Network Engineering, Dr. Burzin is an
acknowledged technology and security visionary. He
has in-depth experience in IT systems and information
security both at strategic and operational levels to
support business objectives.

He has held multi-faceted roles in his career in large global MNCs and
government. He has been:

6 Proposal for conducting Foundations of Information Security course for the
Undergraduate Program
December 23, 2015


www.cisocybersecurity.com

Advisor/Chief of Information Security & Systems, Govt. of Bahrain


Principal Consultant at Microsoft
CIO of Orchid IT Systems
CIO of MidDay Multimedia
Vice President (Technology & Risk) at VFS Global, and
Vice President (IT & Telecom) for APAC Region at HSBC Bank.

Dr. Burzin has extensive experience in technology implementation and


consultation in both systems and network areas. Having advised KPMG
Fakhro on critical security requirements on behalf of the Prime Ministers
Office in Bahrain. Designed and implemented Visa processing centers globally
in the name of UK Border Agency; implemented business continuity and
disaster recovery strategy and has in-depth experience in implementing ISMS,
HIPPA, SOX, SAS, and PCI standards in global organizations.

Dr. Burzin has also been a Distinguished Adjunct Professor at the University
Of Maryland College of Europe, teaching Cybersecurity to the 5th Fleet of The
US Navy and Armed Forces. He has conducted Graduate and Undergraduate
level courses in Cybersecurity including Network, Internet & Cyberspace
Security, Human aspects, and psychology of Cybersecurity, Defensive
Cybersecurity Strategies, Cybercrime Investigation, Cyber-attack detection
and response and Digital Forensics.

Dr. Burzin is a certified CISA, CISSP, Cisco Security+, Cloud U Expert, e-
Hacking and Cyber Forensics Expert, ISO 27001 and 9001 Lead Auditor, Lean
Six Sigma, CoBit, ITIL Service Management, Enterprise Architecture
TOGAF/TAFIM and PMP.

He was awarded best eMaturity Excellence Award, 2012, from eGovernment
Authority, Bahrain; and received the United Nations Award for Innovation in
2014 for his design of secure RFID that ensured security and confidentiality of
PII on diverse platforms

Dr. Burzin has been a Speaker at various Local and International Cyber and
Information Security Conferences.

Proposal for conducting Foundations of Information Security course for the 7


Undergraduate Program
December 23, 2015

Vous aimerez peut-être aussi