Académique Documents
Professionnel Documents
Culture Documents
com
December
2015
23
Copyright
CISO
Cybersecurity
2015.
A ll
Rights
Reserved.
Reproduction
o r
d istribution
other
than
for
intended
purposes
is
prohibited,
without
the
prior
written
consent
of
CISO
Cybersecurity
Private
Limited.
These
materials
a re
confidential,
and
shall
b e
returned
to
CISO
Cybersecurity
upon
request.
The
t rademarks
and
service
marks
of
CISO
Cybersecurity,
including
the
CISO
Cybersecurity
mark
and
logo,
a re
the
exclusive
property
of
CISO
Cybersecurity,
and
may
not
b e
used
without
permission.
All
other
marks
a re
the
property
of
their
respective
o wners
marks
a re
the
p roperty
of
their
respective
owners.
Table of Contents
Introduction to Information Security Course ....................................................... 3
Course Objectives ...................................................................................................... 3
Topics to be covered .................................................................................................. 4
Methodology ............................................................................................................... 4
Evaluation of the participants ................................................................................. 4
Commercial Proposal ................................................................................................ 4
Pricing: ................................................................................................................................. 4
General Terms and Conditions: ...................................................................................... 5
Course Objectives
At the end of the course, the course will be able to equip the participant with
ability to
Appreciate the terminology and vocabulary used in the modern
Information security realm
Gain knowledge about cybersecurity fundamentals and get equipped
with understanding of real world risksafflicting cyber space and
approaches for its mitigation at the national andenterprise levels
Develop a clear perception of the current and emerging cyber threat
environment tools, mechanism, threat actors and threat vectors
Get exposed to the emerging digital technologies Mobile, Cloud, Big
Data and Internet of Things (IoT) and the rising concerns regarding
security and privacy in the digital business era
Gain a comprehensive understanding of key cybersecurity domains
Appreciate the three major classifications of controls and
countermeasures (preventive, detective, and recovery) used in the
modern Information security realm, and be able to identify examples
and samples of controls and countermeasures within each classification
Appreciate the risks to critical infrastructures and their mitigations
Understand the cyber crime and key terms and concepts in cyber law
including IT Act
Methodology
Suitable practical demonstrations and case studies would be incorporated to
the class room discussions to ensure clear understanding of related concepts.
Students would be required to work in groups of 5 to present a project on
identified current topics of Information security.
Commercial Proposal
Please find below the pricing details and general terms and conditions for
conducting the course Introduction to Information Security as part of
undergraduate program.
Pricing:
Cost per student for course duration of 14 weeks INR 4500.00
(T&C: minimum batch size should be 50 students)
Cost of Instructor per visit INR 5000.00
4
Proposal
for
conducting
Foundations
of
Information
Security
course
for
the
Undergraduate
Program
December
23,
2015
www.cisocybersecurity.com
He has held multi-faceted roles in his career in large global MNCs and
government. He has been:
6
Proposal
for
conducting
Foundations
of
Information
Security
course
for
the
Undergraduate
Program
December
23,
2015
www.cisocybersecurity.com