NASSCOM Certified Security Analyst
IT Security is a growing area of concern with damages on account of security breaches estimated to cost the world $6 trillion annually by 2021.
Globally, the scale and magnitude of data breach has increased enormously over the past few years. This has pushed risk associated with IT at the top of the international agenda, as high-profile breaches and other security failures could endanger the global economy. The intention of such attacks could be industrial espionage, terrorism, military espionage or simply to cause widespread misuse of user data. With advancement in technology, unauthorized users and hackers are able to attack remotely without any fear of being identified. The following are few instances of security attacks that have led to huge financial losses and also caused widespread panic amongst users:
- Restaurant app Zomato suffered a major security breach in May 2017 when data of some 17 million users was stolen.
- In what can surely be termed as one of the biggest-ever breaches of financial data in India, debit cards of some 3.2 million users was compromised, enabling fraudsters to steal funds. The worst affected banks are said to be SBI, HDFC, ICICI, Yes Bank and Axis Bank.
- With the increased use of crypto currencies, online payments and e-wallets, fraud and theft in these channels has also increased. The recent theft in Bitcoins is another example of the same.
This has led to unprecedented demand for certified security professionals. Organizations from small to large scale are facing a huge challenge in sourcing the right candidates to protect their IT infrastructure and sensitive data. NASSCOM estimates India alone will need 1 million security professionals by 2020 to meet the demands of its rapidly growing economy. This program would open a whole new career avenue for learners.
Holistic Edge
- Curriculum created by industry in collaboration with NASSCOM
- State-of-the-art infrastructure and fully equipped labs
- Training delivered by Certified and experienced trainers
- 100% Instructor Led Classroom Training
- NASSCOM SSC official study material
- Assessment & Certification from NASSCOM IT-ITES SSC
- Student loan available from leading financial institutions
- Globally recognised Certificate
- Placement assistance
- Week-end batches for working professional
Course Outline
Our Security Analyst program comprises of the following cutting edge industry-aligned curriculum with the right blend of hands on training on tools and devices to secure networks:
An Introduction: The industry, sub-sector, occupation and career
Contribute to managing information security
- Information Security and Threats
- Fundamentals of Information Security
- Data Leakage and Prevention
- Information Security Policies, Procedures, Standards and Guidelines
- Information Security Management – Roles and Responsibilities
- Information Security Performance Metrics
- Risk Assessment
- Configuration Review
- Device Log Correlations
- Data Backup
Coordinate responses to information security incidents
- Incident response overview
- Incident Response – Roles and Responsibilities
- Incident Response Process
- Handling Malicious Code Incidents
- Handling Network Security Incidents
Install, configure and troubleshoot information security devices
- Configuring Network Devices
- Configuring Secure Content Management
- Configuring Firewall
- Troubleshooting Cisco IOS Firewall Configurations
- Cisco IOS Firewall IDS
- IPS Configuration
- Anti-virus and Antispam Software
- Web Application Security Configuration
- Patch Management
Support teams to prepare for and undergo information security audits
- Information Security Audit
- Work and Work Environment
- Information Security Auditor
- Vulnerability Analysis
- Student Handbook – Security Analyst
- Penetration Testing
- Information Security Audit Tasks
- Audit Reports and Actions
- Audit Support Activities
Contribute to managing information security
- Understanding scope of work and working within limits of authority
- Work and work environment
- Maintaining confidentiality
Work effectively with colleagues
- Effective Communication
- Working Effectively
Maintain a healthy, safe and secure working environment
- Need For Health and Safety at Work
- Security Analyst’s role
- Emergency Situations
- Skills for Maintaining Health and Safety at Work
Provide data/information in standard formats
- Information and Knowledge Management
- How to manage data/ information effectively
- Skills required to manage data and information effectively
- Performance Evaluation Criteria for an Information Security Analyst
Develop knowledge, skills & competence
- Importance of Self-Development
- Knowledge and Skills Required for the Job
- Avenues of Self-Development
- Planning for Self-Development
Security Assessment Template
Case studies
Personality Development
Interview Preparation
Career Graph
Total Centres
%
Placement Rate
Powered By
Contact us
Why Choose Us ?
Holistic Skills offers a great platform for a successful professional career. What differentiates us is our commitment to offer industry relevant programs thereby giving better employment and professional growth. All our centres are fully equipped to provide a world-class training experience.