SlideShare una empresa de Scribd logo
1 de 18
“Thousands of cyber-attacks […] are striking at the private
sector, strike at stock market, strike at other institutions
within our society, strike at government, strike at the
defence department, our intelligence agencies. Cyber is
now at a point where the technology is there to cripple a
country, to take down our power grid systems, to take
down our government systems, take down our financial
systems and literally paralyze the country."
In the new era, business has transformed its work-style
from reality to virtual reality.
2
The whole world is swiped by
this strategy for its accuracy and
non-redundancy measure.
3
This new sector where free flow and
accuracy has lowered down the
operational cost of big conglomerate
whereas it has bullion threat from the
remote cyber criminal on the other hand.
4
In recent years, cyber-crime has become
increasingly sophisticated, making it
difficult to combat, detect and mitigate.
The rise of a relatively new class of cyber-
attack is especially troubling. This new
class is referred to as an ‘Advanced
Persistent Threat’ (APT).
*Advanced Persistent Threats (APTs) are usually directed at business and political
targets for political ends. APTs involve stealth to persistently infiltrate a system over a
long period of time, without the system displaying any unusual symptoms.
5
Examples of cyber-attacks
Attack on South Korea’s banks and broadcasters, 2013. A suspected cyber-attack
brought down systems and computers at some of South Korea’s major banks and
broadcasters. As a result, the local equity market declined 1.0%.
The Flame virus, 2012. Thought to have been operating since 2010, the Flame virus was
detected in 2012. The virus code is seen as some of the most sophisticated and largest
malicious code to date. It infiltrated computers belonging to the Iranian Oil Ministry,
the Iranian National Oil Company and other networks in Hungary, Lebanon, Austria,
Russia, Hong Kong and the United Arab Emirates - stealing and deleting information
from the systems. Part of the functionality of the virus including turning on microphones
of computers to secretly record conversations, taking screen grabs of infected
computers and stealing credentials of high-level and administrative users.
6
Examples of cyber-attacks
Red October cyber-attack, 2013. Targeting governmental and diplomatic
organisations. The Red October attack was discovered in January of this year, but is
believed to have been operating undetected for a number of years. The attack
effectively stole confidential and encrypted documents (including deleted ones) from
embassies, nuclear research centres and oil and gas companies of US. Information
targeted included geopolitically sensitive data and credentials to access protected
computer systems. The malicious code was also able to detect when a USB stick was
inserted into a networked computer and undelete and steal any files on the stick. The
cyber-crime racket behind the attacks shut-down their operations after the attacks
were made public and documented.
7
Examples of cyber-attacks
The MiniDuke Cyber-attack on EU governmental organizations and operators of
critical infrastructure.13 The MiniDuke Cyber-attack exploited a flaw in Adobe’s
Acrobat reader to enter computer networks and gather information.
Operation Aurora, 2009. Attacks against some of the largest internet, technology and
defence companies such as Google, Adobe, Juniper, Yahoo!, Northrup Grumman.
The cyber-attack modified source code by exploiting vulnerabilities in an internet
browser.
8
Social Responsibility
To overcome this mission critical situation of cyber sabotage, the skilled man-
force of cyber expert is the solution.
After China and US, India has the highest number of internet users. Besides,
there are over 381 million mobile phone subscriptions with internet
connectivity.
“Today, there are more than 2 billion people online, who need to be protected.
Cyber attacks are already happening on a daily basis in the world and as we
grow more and more ‘connected’, the threats also become more complex and
difficult. On Facebook, there are 50 million Indian users and even if a small
fraction of them click unsuspectingly on a malevolent but seemingly ordinary
link, you have that many computers opened up to risk and infection,” – Former
Minister Shashi Tharoor stated.
9
Social Responsibility
India will require five lakh cybersecurity professionals by 2015 to support its fast
growing internet economy as per an estimate by the union ministry of information
technology.
Every organization across verticals will require cybersecurity professionals. Therefore,
the estimate of 5 lakh looks very conservative for a strong internet economy like India.
The actual requirement for cyber security professionals would be in multiples.
University Grants Commission directed all university vice chancellors in the country to
introduce curriculum around cyber security in their respective colleges to meet this
talent demand.
Quoting a Gartner report in its letter, UGC said, "The country's information security
market is expected to grow by 18% to reach Rs 1,415 crore in 2013 on the back of
increased spending by companies to secure their information assets. Despite a
continuing economic slowdown that has been putting pressure on IT budgets around
the world, cyber security spending globally would continue on an upward trajectory,
reaching $86 billion in 2016, up from $60 billion in 2012.“
10
Social Responsibility
Cyber security ensures realization and controlling of security
properties of an organization’s as well as users’ intellectual and
financial assets against relevant security risks in the cyber
environment.
BUT…
Cyber expertise can be taught in the syllabus as a part of
curriculum in colleges but practically its hard to horn the skill
with expertise.
11
Social Responsibility
Out of 10 buddying engineers/MCA/BCA… pass out, hardly 2-3
get placed in job. This is due to the additional and demanding
skill required by the recruiting company.
Cyber Professional is the very need of every individual company
to protect its virtual infrastructure of company asset.
Cyber Security Market worth $155.74 Billion by 2019.
Cyberfort Technolgies is the all to all solution where cyber
security is taught with complete passion and help shaping the
career of buddying young cyber professionals.
12
After a thorough research of world business
and political system, we have designed
few industry driven courses for
students/professionals
 Diploma in Cyber Security (CEH)
 Certificate in Cyber Security (CSCU)
 Project Integrated Program (PIP)
13
Syllabus at glance
Diploma in Cyber Security
 Module 01: Introduction to Ethical Hacking
 Module 02: Footprinting and Reconnaissance
 Module 03: Scanning Networks
 Module 04: Enumeration
 Module 05: System Hacking
 Module 06: Trojans and Backdoors
 Module 07: Viruses and Worms
 Module 08: Sniffing
 Module 09: Social Engineering
 Module 10: Denial of Service
 Module 11: Session Hijacking
 Module 12: Hacking Webservers
 Module 13: Hacking Web Applications
 Module 14: SQL Injection
 Module 15: Hacking Wireless Networks
 Module 16: Hacking Mobile Platforms
 Module 17: Evading IDS, Firewalls, and Honeypots
 Module 18: Buffer Overflow
 Module 19: Cryptography
 Module 20: Penetration Testing
14
Syllabus at glance
Certificate in Cyber Security
 Module 01: Foundations of Security
 Module 02: Securing Operating Systems
 Module 03: Protecting System Using Antiviruses
 Module 04: Data Encryption
 Module 05: Data Backup and Disaster Recovery
 Module 06: Internet Security
 Module 07: Securing Network Connections
 Module 08: Securing Online Transactions
 Module 09: Securing Email Communications
 Module 10: Social Engineering and Identity Theft
 Module 11: Security on Social Networking Sites
 Module 12: Information Security and Legal Compliance
 Module 13: Securing Mobile Devices
15
Syllabus at glance
Project Integrated Program
 Based on Project assigned and industry defined
16
Career & Profile after completion
Cyber Security Analyst
Cyber Security Architect
Cyber Security Engineer
Consultant - Cyber Threat Management
Information Security Event Analyst
Cyber Operations Malware Analyst
Executive Manager
Ethical Hacker Cum Cyber Security Trainer
Information Security Consultant
Career in Nationalized Bank
Bank of Maharashtra (Plz see page 7 of the link)
Information Security Officers
http://www.bankofmaharashtra.in/downdocs/FINAL-BOM-
ADVERTISEMENT-BM-2014-22-04.pdf
and many more…
17
18

Más contenido relacionado

La actualidad más candente

Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh Webinar
Arrow ECS UK
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
Symantec
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
IAEME Publication
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
 

La actualidad más candente (20)

Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh Webinar
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
Cyber attacks in 2021
Cyber attacks in 2021Cyber attacks in 2021
Cyber attacks in 2021
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
 
Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
 
188
188188
188
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Security weekly september 28 october 4, 2021
Security weekly september 28   october 4, 2021 Security weekly september 28   october 4, 2021
Security weekly september 28 october 4, 2021
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 

Similar a Cyberfort syllabus & career

MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
varun4110
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet
superintendingengine17
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
RakeshPatel583282
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
AnastaciaShadelb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
ChantellPantoja184
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
Adela Cocic
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
ijtsrd
 

Similar a Cyberfort syllabus & career (20)

Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
Cyber security
Cyber security Cyber security
Cyber security
 
CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdf
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Cyberfort syllabus & career

  • 1.
  • 2. “Thousands of cyber-attacks […] are striking at the private sector, strike at stock market, strike at other institutions within our society, strike at government, strike at the defence department, our intelligence agencies. Cyber is now at a point where the technology is there to cripple a country, to take down our power grid systems, to take down our government systems, take down our financial systems and literally paralyze the country." In the new era, business has transformed its work-style from reality to virtual reality. 2
  • 3. The whole world is swiped by this strategy for its accuracy and non-redundancy measure. 3
  • 4. This new sector where free flow and accuracy has lowered down the operational cost of big conglomerate whereas it has bullion threat from the remote cyber criminal on the other hand. 4
  • 5. In recent years, cyber-crime has become increasingly sophisticated, making it difficult to combat, detect and mitigate. The rise of a relatively new class of cyber- attack is especially troubling. This new class is referred to as an ‘Advanced Persistent Threat’ (APT). *Advanced Persistent Threats (APTs) are usually directed at business and political targets for political ends. APTs involve stealth to persistently infiltrate a system over a long period of time, without the system displaying any unusual symptoms. 5
  • 6. Examples of cyber-attacks Attack on South Korea’s banks and broadcasters, 2013. A suspected cyber-attack brought down systems and computers at some of South Korea’s major banks and broadcasters. As a result, the local equity market declined 1.0%. The Flame virus, 2012. Thought to have been operating since 2010, the Flame virus was detected in 2012. The virus code is seen as some of the most sophisticated and largest malicious code to date. It infiltrated computers belonging to the Iranian Oil Ministry, the Iranian National Oil Company and other networks in Hungary, Lebanon, Austria, Russia, Hong Kong and the United Arab Emirates - stealing and deleting information from the systems. Part of the functionality of the virus including turning on microphones of computers to secretly record conversations, taking screen grabs of infected computers and stealing credentials of high-level and administrative users. 6
  • 7. Examples of cyber-attacks Red October cyber-attack, 2013. Targeting governmental and diplomatic organisations. The Red October attack was discovered in January of this year, but is believed to have been operating undetected for a number of years. The attack effectively stole confidential and encrypted documents (including deleted ones) from embassies, nuclear research centres and oil and gas companies of US. Information targeted included geopolitically sensitive data and credentials to access protected computer systems. The malicious code was also able to detect when a USB stick was inserted into a networked computer and undelete and steal any files on the stick. The cyber-crime racket behind the attacks shut-down their operations after the attacks were made public and documented. 7
  • 8. Examples of cyber-attacks The MiniDuke Cyber-attack on EU governmental organizations and operators of critical infrastructure.13 The MiniDuke Cyber-attack exploited a flaw in Adobe’s Acrobat reader to enter computer networks and gather information. Operation Aurora, 2009. Attacks against some of the largest internet, technology and defence companies such as Google, Adobe, Juniper, Yahoo!, Northrup Grumman. The cyber-attack modified source code by exploiting vulnerabilities in an internet browser. 8
  • 9. Social Responsibility To overcome this mission critical situation of cyber sabotage, the skilled man- force of cyber expert is the solution. After China and US, India has the highest number of internet users. Besides, there are over 381 million mobile phone subscriptions with internet connectivity. “Today, there are more than 2 billion people online, who need to be protected. Cyber attacks are already happening on a daily basis in the world and as we grow more and more ‘connected’, the threats also become more complex and difficult. On Facebook, there are 50 million Indian users and even if a small fraction of them click unsuspectingly on a malevolent but seemingly ordinary link, you have that many computers opened up to risk and infection,” – Former Minister Shashi Tharoor stated. 9
  • 10. Social Responsibility India will require five lakh cybersecurity professionals by 2015 to support its fast growing internet economy as per an estimate by the union ministry of information technology. Every organization across verticals will require cybersecurity professionals. Therefore, the estimate of 5 lakh looks very conservative for a strong internet economy like India. The actual requirement for cyber security professionals would be in multiples. University Grants Commission directed all university vice chancellors in the country to introduce curriculum around cyber security in their respective colleges to meet this talent demand. Quoting a Gartner report in its letter, UGC said, "The country's information security market is expected to grow by 18% to reach Rs 1,415 crore in 2013 on the back of increased spending by companies to secure their information assets. Despite a continuing economic slowdown that has been putting pressure on IT budgets around the world, cyber security spending globally would continue on an upward trajectory, reaching $86 billion in 2016, up from $60 billion in 2012.“ 10
  • 11. Social Responsibility Cyber security ensures realization and controlling of security properties of an organization’s as well as users’ intellectual and financial assets against relevant security risks in the cyber environment. BUT… Cyber expertise can be taught in the syllabus as a part of curriculum in colleges but practically its hard to horn the skill with expertise. 11
  • 12. Social Responsibility Out of 10 buddying engineers/MCA/BCA… pass out, hardly 2-3 get placed in job. This is due to the additional and demanding skill required by the recruiting company. Cyber Professional is the very need of every individual company to protect its virtual infrastructure of company asset. Cyber Security Market worth $155.74 Billion by 2019. Cyberfort Technolgies is the all to all solution where cyber security is taught with complete passion and help shaping the career of buddying young cyber professionals. 12
  • 13. After a thorough research of world business and political system, we have designed few industry driven courses for students/professionals  Diploma in Cyber Security (CEH)  Certificate in Cyber Security (CSCU)  Project Integrated Program (PIP) 13
  • 14. Syllabus at glance Diploma in Cyber Security  Module 01: Introduction to Ethical Hacking  Module 02: Footprinting and Reconnaissance  Module 03: Scanning Networks  Module 04: Enumeration  Module 05: System Hacking  Module 06: Trojans and Backdoors  Module 07: Viruses and Worms  Module 08: Sniffing  Module 09: Social Engineering  Module 10: Denial of Service  Module 11: Session Hijacking  Module 12: Hacking Webservers  Module 13: Hacking Web Applications  Module 14: SQL Injection  Module 15: Hacking Wireless Networks  Module 16: Hacking Mobile Platforms  Module 17: Evading IDS, Firewalls, and Honeypots  Module 18: Buffer Overflow  Module 19: Cryptography  Module 20: Penetration Testing 14
  • 15. Syllabus at glance Certificate in Cyber Security  Module 01: Foundations of Security  Module 02: Securing Operating Systems  Module 03: Protecting System Using Antiviruses  Module 04: Data Encryption  Module 05: Data Backup and Disaster Recovery  Module 06: Internet Security  Module 07: Securing Network Connections  Module 08: Securing Online Transactions  Module 09: Securing Email Communications  Module 10: Social Engineering and Identity Theft  Module 11: Security on Social Networking Sites  Module 12: Information Security and Legal Compliance  Module 13: Securing Mobile Devices 15
  • 16. Syllabus at glance Project Integrated Program  Based on Project assigned and industry defined 16
  • 17. Career & Profile after completion Cyber Security Analyst Cyber Security Architect Cyber Security Engineer Consultant - Cyber Threat Management Information Security Event Analyst Cyber Operations Malware Analyst Executive Manager Ethical Hacker Cum Cyber Security Trainer Information Security Consultant Career in Nationalized Bank Bank of Maharashtra (Plz see page 7 of the link) Information Security Officers http://www.bankofmaharashtra.in/downdocs/FINAL-BOM- ADVERTISEMENT-BM-2014-22-04.pdf and many more… 17
  • 18. 18