Brochure for Information Security Professional Course

download Brochure for Information Security Professional Course

of 27

Transcript of Brochure for Information Security Professional Course

  • 8/13/2019 Brochure for Information Security Professional Course

    1/27

    IFS-GFSU CERTIFIED

    INFORMATION SECURITY PROFESSIONAL

    INSTITUTE OF FORENSIC SCIENCE

    GUJARAT FORENSIC SCIENCES UNIVERSITY

  • 8/13/2019 Brochure for Information Security Professional Course

    2/27

    "

    !"#$%"#& ()*+,-,./+,01 234553

    !1-0*6/+,01 #).7*,+8 9*0-)::,01/;

    !" $%&'()*+' $, )-' ."/*0" 10)*$"02 34%'5 6'(75*)4 8$2*(4 9 :;

    #$ %&'()' ( *$&+,$&%' $, -../... 0&$,'112$3(41 1+244'5 23

    %67'& 1'%8&2)6 23 )9' 3':) - 6'(&1 )9&$8;9 %(0(%2)6

    7824523;/ 1+244 5'

    ?# "@A B534 ?C=D#

    #9' ':(= ,$& )9' ?@ABC@AD E'&)2,2%()2$3

    ? !"#$%"#&

    #921 %'&)2,2%()2$3 21 0&$

    #921 5$%8='3) 21 2118'5 (1 ( ;825' )$

    %(3525()'1 08&1823; (3 ?@ABC@AD

    %'&)2,2%()2$3> ?@ABC@AD 5$'1 3$) =(+' (36&'0&'1'3)()2$31 $& *(&&(3)2'1 )9() )9' 81' $,

    )921 5$%8='3) *244 (118&' %(3525()'1 $,

    0(1123; (36 ?@ABC@AD %'&)2,2%()2$3>

    U F."J ?31)2)8)' $, @$&'312% A%2'3%'/ C8P(&()

    @$&'312% A%2'3%'1 D32

    C8P(&() @$&'312% A%2'3%'1 D32

  • 8/13/2019 Brochure for Information Security Professional Course

    3/27

    "

    !"#$% '"#() *+ ,-./#/0 1 2-#/*-#/#/0 3+". 4567'568 $).*#9#$-*#+/

    #$%&'() *+,- +)./&(0. 1.-0').)& 2.3(4&-'&(+) 5,0%.-6

    "

    7889* :+- &;. .*()3 &;. -.:.-.)?. 0'&.-('9 ?+08-(4()3 &;. @AB/CABD

    E+00+) F+>* +: G)+H9.>3. :+- @):+-0'&(+) B.?,-(&* IEF$G@BJ6

    K788.'- :+- &;. ?.-&(:(?'&(+) . +%&'() LMN () .'?; 4.?&(+)6

    OP'-) *+,- ?.-&(:(?'&(+)6 P'-) &;. -(3;& &+ ,4. 46:6 C.& ,83-'>.> &+ 46:;':&.- Q *.'-46

    QP'-) #"M E+)&(),()3 P>,?'&(+) D)(&4 IEPD4J .R.-* = *.'-4 ')> 4,%0(& 8-++: +: &;. 4'0.6

    $%&'() 1257889* :+-

    P

  • 8/13/2019 Brochure for Information Security Professional Course

    4/27

    "

    !"#$% '( )'*+%*+,

    -. /%*%(0+, '( 12345236 )%7+0(08"+0'*, ...................................................................................... 9#$% &'(')*+, +- *(.*/*.012, %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %%%%%%%%%%%%%%%%%% 3#4% &'(')*+, +- -561(*71+*-(, %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 8

    /. -#':+ +;% )%7+0(08"+0'* .............................................................................................................

  • 8/13/2019 Brochure for Information Security Professional Course

    5/27

    "

    !" $%&%'()* +' ,-./0-.1 2%3)('(45)(+&*

    !6" $%&%'()* )+ (&7(8(795:*

    ! #$%&'(' ) %&*%'+ ,-.&/&-01 +)&.'1 )02,+-3-/&-0 4)./'+5

    ! 6'$-3' 3-+' '3,7-8)97':! #44&+3 8-;+ ,+-4'..&-0)7 '0$+').' ?-9 .'$;+&/8! @'3-0./+)/' /%)/ 8-; ,-..'..

    '..'0/&)7 2-3)&0 A0-B7'2*'

    ! 6--./ +'7'()0$' 98 ./)8&0* $;++'0/&0 /%' ,+-4'..&-0 B&/% $-0/&0;&0*

    '2;$)/&-0 +'C;&+'3'0/.D

    ! #2()0$' 8-;+ $)+''+ ,-/'0/&)7 2;'/- +'$-*0&/&-0 ). ) $'+/&4&'2

    ,+-4'..&-0)7

    ! E'$-*0&/&-0 -4 ,+-4'..&-0)7$-3,'/'0$' 98 ,+-4'..&-0)7 ,''+.

    )02 3)0)*'3'0/

    ! >0$+').' 8-;+ ()7;' )02 &0$-3'! F'', ;, B&/% '('+G$%)0*&0*

    ./)02)+2. )02 /'$%0-7-*&'.

    ! H)7&2)/' 8-;+ A0-B7'2*'! @&44'+'0/&)/' 8-;+.'74 4+-3 8-;+

    ,''+.

    ! 6--./ 8-;+ $-04&2'0$'

    5 I)7)+8 .;+('8. .%-B /%)/ /%' 3)?-+&/8 -4 %&+&0*

    3)0)*'+. $-0.&2'+ $'+/&4&$)/&-0. ) 4)$/-+ &0 %&+&0*

    2'$&.&-0.1 )02 /%)/ -9/)&0&0* +'7'()0/ $'+/&4&$)/&-0.

    -4/'0 7')2. /- ) .)7)+8 &0$+').'D

    :#$$-+2&0* /- )0 >@J B%&/' ,),'+1 KL=M -4 %&+&0*

    3)0)*'+. 9'7&'(' $'+/&4&'2 &02&(&2;)7. )+' 3-+'

    ,+-2;$/&(' /%)0 /%'&+ 0-0G$'+/&4&'2 $-;0/'+,)+/.DK

    =N-;+ '3,7-8'+1 $7&'0/.1 '3,7-8''. )02 ,''+. B&77

    +'$-*0&O' 8-;+ PQIR $+'2'0/&)7 ). )0 &02&$)/&-0 -4 /%'

    .A&77. )02 A0-B7'2*' 8-;S(' *)&0'2 /%+-;*%$'+/&4&$)/&-0D

    ! I%-B /%)/ 8-; A0-B /%' 3-./$;++'0/ ,+&0$&,7'. )02 ,+)$/&$'. -48-;+ 4&'72

    ! T'+.-0)7 .)/&.4)$/&-0 -4)$$-3,7&.%&0* ) 3&7'./-0' &0 8-;+

    $)+''+

    ! I/)02 -;/ )*)&0./ -/%'+ ),,7&$)0/. &0) /-;*% ?-9 3)+A'/D

    ! P'/ ,+',)+'2 4-+ *+')/'+ -0G/%'G?-9+'.,-0.&9&7&/&'.

    ! T-/'0/&)778 ')+0 %&*%'+ &0$-3' 4-+9'&0* 4-+3)778 +'$-*0&O'2 ). )

    $'+/&4&'2 ,+-4'..&-0)7

    ! @'3-0./+)/' N-;+ J-33&/3'0/! 6;&72 )02 '0%)0$' 8-;+ $+'2&9&7&/8! 6;&72 U I%-B$).' N-;+ IA&77.! 6'$-3' 3-+' 3)+A'/)97' B%'0 8-;$-3,'/' 4-+ /-, ,-.&/&-0.! E)&.' 8-;+ ,+'./&*' )3-0* 8-;+

    ./)44 )02 8-;+ ,''+.

    ! >3,+-(' -('+)77 ,'+4-+3)0$'1+'3-(' ;0$'+/)&0/8 )02 B&2'0

    3)+A'/ -,,-+/;0&/&'.

    ! V0.;+' 8-; )+' $-0/&0;)778&3,+-(&0* )02 +'4&0&0* 8-;+

    )$/&(&/&'.

    ! 6'$-3' ,)+/ -4 ) ,+-4'..&-0)70'/B-+A

    ! V0?-8 9'//'+ $)+''+ 47'

  • 8/13/2019 Brochure for Information Security Professional Course

    6/27

    "

    !"# %&'&()*+ *, ,-./')0/*),'+

    ! !"#$%&'()#$%& '()* +,-%$.$+/%$0123 405- 0-6/1$7/%$01 8$99 &/:, / ;,1+&-0:$?, >-0.,22$01/9 ?,:,90>0-%51$%$,2 .0- 2%/..A B&$2 +/1 /920 9,/? %0 908,- 2%/.. %5-10:,-A

    ! =.>%"( ?7':./0'()* +,-%$.$+/%$012 9,/? %0 -0?5+,? 8$%& $1+-,/2,?

    ,..$+$,1+4 /1? +012$2%,1+4 ;4 >-0.,22$01/92 8&0 52, $1?52%-4 2%/1?/-? %,+&1$G5,2A

    ! +7:/7(" ,2 :"'(#.#>'()* +,-%$.$+/%$012 ,08,- / +59%5-, 0. 9,/-1$16 /1? $-0:,

  • 8/13/2019 Brochure for Information Security Professional Course

    7/27

    "

    !" $%&'( ()* +*,(-.-/0(-&1

    !2" 345&,(01/* &. 31.&,40(-&1 6*/',-(7

    #$ %$&'()*+,'$ -./0(,+1 2('&.33,'$*4 ,3 35,44.6 ,$ 0$6.(3+*$6,$7 *$6 *$*418,$7 ,$&'()*+,'$

    3./0(,+1 +9(.*+3 *$6 ,):4.).$+,$7 ;.3+ :(*/+,/.3 &'( %$&'()*+,'$ -./0(,+1< =9. ,):'(+*$/. '&

    %$&'()*+,'$ -./0(,+1 /*$ ;. 0$6.(3+''6 &(') +9. &'44'>,$7 .?+(*/+ &(') +9. !"#$%" '%($)"%*

    +,-./ 0.12/$(, 3)*$1, 4 5678@

    A1;.(3:*/. ,3 B04$.(*;4. +' * >,6. B*(,.+1 '& ,$/,6.$+3C >9.+9.( ,$+.$+,'$*4 '(

    *//,6.$+*4C )*$)*6. '( $*+0(*4C *$6 +9. 6*+* .?/9*$7.6 ,$ +9. /1;.(3:*/. /*$

    ;. .?:4',+.6 &'( $.&*(,'03 :0(:'3.3 ;1 ;'+9 $*+,'$D 3+*+.3 *$6 $'$D3+*+. */+'(39.4) +9. 7'B.($).$+C :0;4,/ *$6 :(,B*+.

    3./+'( (.3'0(/.3 *$6 3.(B,/.3 ;1 6,3(0:+,$7 &0$/+,'$,$7 '& /(,+,/*4 ,$&'()*+,'$

    313+.)3< A'):4,/*+,'$3 &(') 6,3(0:+,'$3 '& 30/9 * )*7$,+06. )*1 +9(.*+.$

    4,B.3C ./'$')1 *$6 $*+,'$*4 3./0(,+1< H*:,6 ,6.$+,&,/*+,'$C ,$&'()*+,'$ .?/9*$7.C,$B.3+,7*+,'$ *$6 /''(6,$*+.6 (.3:'$3. *$6 (.).6,*+,'$ /*$ ),+,7*+. +9.

    6*)*7. /*03.6 ;1 )*4,/,'03 /1;.(3:*/. */+,B,+118- 12 )&*1(>' 5$(5*&0%1$' 123:>4125 ?144:$

    @&'8; A(>8% @&'8 B'1& &24 6241&C A0$31&:81$'D 62.(*7&81(2 E1'< ?&2&5$7$28 F 3(2'>:8125 12

    E$5>:&8(*- '8&24&*4' '>3% &' GH6 IAA; #6GBB 670:$7$28&81(2; 6AJ +K,,"L6AJ ++M,"LNA +OPPP

    170:$7$28&81(2 F 3(70:1&23$ &''$''7$28; 62.(*7&81(2 A$3>*18- F 9$3%2(:(5- *1'< &''$''7$28';N>'12$'' H(2812>18-LIE G:&22125; 62.(*7&81(2 A$3>*18- B*3%18$38>*$; 69 A8*&8$5-; 69 5()$*2&23$;

    H(28*&38 3(70:1&23$; 0*$Q0('8 &3R>1'181(2 69 4>$ 41:15$23$C

    !"#$ &'() *+ ,-)./0*1.

    9%$ $/&712&81(2 S1:: 3(2'1'8 0*17&*1:- (. H&'$ A8>4- N&'$4 TG*(=:$7QN&'$4U R>$'81(2'C 9%$'$

    R>$'81(2' 3(2'1'8 (. & 0*&3813&: 0*(=:$7 .(::(S$4 =- '$)$*&: (081(2'C H&2414&8$' 7>'8 &00:-

    8%$1* 24$*'8&24125 (.

    8%$ 8(013 *&8%$* 8%&2 *$R>1*125 8%$7 8( 7$7(*1'$ 12.(*7&81(2C A>3% R>$'81(2' .(3>' (2 8$'8125 &

    3&2414&8$Y' '1*$ 8%12' (2 0>*$:- 8%$(*$813&:*18- THNJZ6AU $'8&=:1'%$' &=&'$:12$ .(* 8%$ =(4- (. *18-C HNJZ6A 1' & 3(70*$%$2'1)$

    4$'3*1081(2 (. 8%$ '>7 (. *18-0*(.$''1(2C HNJZ6A 1' 2(8 '8&813 &24 S1:: =$3(2'8&28:- $)(:)125 &' 8%$ .1$:4 (. 62.(*7&81(2 A$3>*18-4$)$:(0'C!"G$ H 7>'8 3&**- & 0*128(>8 (. 8%1' B471''1(2 G&'' &:(25 S18% & W()$*27$281''>$4 0%(8(Q14$2818- 3&*4 T$C5C GB\ 3&*4; 4*1)$*' :13$2'$; 0&''0(*8; $83CUC

    71/4' /* /6) )859 C)1/4)

    E$51'8$*$4 3&2414&8$' 7>'8 $28$* 8%$ $/&7 3$28*$ M, 712>8$' 0*1(* 8( 8%$ '8&*8 (. 8%$

    $/&7C B2- 3&2414&8$ S%( 1' :&8$ S1:: =$ 4$21$4 $28*- 8( 8%$ $/&7 3$28*$ &24 S1:: 2(8 =$

    0$*7188$4 8( 8&3% & 3&2414&8$ S1:: =$ .(*.$18$4C

    B()C05? H4451@)9)1/.

    \( .((4 (* 4*12< 1' 0$*7188$4 &8 8%$ $/&7 3$28*$C B2 $/3$081(2 3&2 =$ 7&4$ 12 3&'$ (.

    7$413&: *$&'(2' 0*()14$4 8%$ *$51'8$*$4 3&2414&8$ '%(S' & 4(38(*Y' 3$*81.13&8$ 8( 8%1'

    $..$38C

  • 8/13/2019 Brochure for Information Security Professional Course

    13/27

  • 8/13/2019 Brochure for Information Security Professional Course

    14/27

    "#

    !"#$ &'()*

    !"#$ '( )(*+,'-#'+./ 01.,(, ./

    $%&'() "*+,-(&%(.)/ 01"2 "*+,3454674./ 01"#

    $%&'() 01+,

    89.:;/ 01"2 01+,

    74./ 01"2 "*+,$49+4674./ 01"2

    !+,$ -.)/.0)1 23 45'607'(027 89::';& :@ ':B:'4' :&+> +,4 C>;;>D:&E @45+:>&@F

    "G H&'I9>:&+ $45%.:+)0G J4+D>.K L M&+4.&4+ $45%.:+)#G M&C>.6(+:>& $45%.:+) M&5:'4&+ N4@9>&@42G N4E%;(+>.) L $+(&'(.'@ O>69;:(&54PG 3(+( Q.>+45+:>&RG M&C>.6(+:>& $45%.:+) ?4@+:&ESG O>&+:&E4&5) Q;(&&:&E

    !+"$ &)('0:)= 45'607'(027 89::';&4@ I 6177+742 6%..+#"-40"%#'( 8$1#0"09 3%$+71'( :1-+21 +'4;1"G0G0 $>C+D(.4 899;:5(+:>&@"G0G# ?,.4(+@ < *%''( 051=0( %2 $"'/%'47( >#4+05%2"?1$ 4--1''( 347&421( :/4.( @71-02%#"-

    14A1'$2%//"#;( @71-02%#"- 024-B"#;( 67%#"#;( :12A12'12

  • 8/13/2019 Brochure for Information Security Professional Course

    15/27

    "#

    "$#$% &'(')*('+) ,-./*(0 1)*'+0( 2*0034.506 !"##$%&' )"*+,&-./ 01+%&"/23 4&".#5-##-%.36#2& 7.%$82'/2 ".' 92:";-%,&+-%.-./ 0C%&/%++2. !"##$%&' B2>%;2&D ".' B2#2+#3 A>>2## +% 1+%&2'

    A>>%,.+ E.F%&5"+-%. ".' !"##$%&'#3 1%>-"8 G./-.22&-./'.(;*:'?*('4+ 9/@;.'(A 6 =,2#+ I1 E#%8"+-%.3 =,2#+ I1 K%.-+%&-./3 E5"/2 ".' 1."*#:%+K"."/252.+3 SD*2&;-#%& 12>,&-+D3 =,2#+ I1 12>,&-+D3 L-&+,"8-J2' E.F&"#+&,>+,&2

    12>,&-+D3 N2#?+%* L-&+,"8-J"+-%. 12>,&-+D

    "$'.(;*:'?*('4+ 2:*++'+) *+5 B/C:4A8/+(!"9:%;)2 $24)*)32*).4"$D$" =+5/.0(*+5'+) &/5'* 9*+'('?*('4+ 6 +D*2# %F 52'-"3 +&2.'# -. '"+" #+%&"/2 52'-"3

    +&2.'# -. #".-+-J"+-%.3 +D*2# %F #".-+-J"+-%.3 ,#2 %F >&D*+%/&"*:D ".' >&D*+%/&"*:->

    2&"#23 F">+% -.F8,2.>-./ #".-+-J"+-%. ".' '-#*%#"8 '2>-#-%.#3 #".-+-J"+-%. #>%*2

    "$D$% E+F4.8*('4+ 9*+'('?*('4+ *+5 B'0C40'('4+ B/@'0'4+ &*G'+) 6 -.F%&5"+-%. '2>-#-%.# -.+:2 #D#+25 8-F2 >D>823 '2+2&5-."+-%. %F #2>,&-+D >"+2/%&-J"+-%.3 &2,#2 %F 52'-"3 >%.+&%8

    %F 52'-"3 '"+" *&%+2>+-%. 82;283 #".-+-J"+-%. ".' '-#*%#"8 '2>-#-%.3 ;2&-FD 52+:%'#3

    '%>,52.+"+-%.

    "$D$7 B*(* H/*G*)/ 2./I/+('4+:.%8%/-2#3 72D

    C,.>+-%.# %F EN!1 42>:.%8%/-2#3 )%55%. N2+2>+-%. K2+:%'%8%/-2#3 1-/."+,&2H9"#2'

    N2+2>+-%.3 A.%5"8DH9"#2' N2+2>+-%.3 1+"+2F,8 !&%+%>%8 A."8D#-#3 4D*2# %F EN!1

    42>:.%8%/-2#

    %$"$% EB29 ,/@-+4:4)'/0 6 )%5*%.2.+# ".' A&>:-+2>+,&2 04D*->"8 )%5*%.2.+#3 M2+$%&?A&>:-+2>+,&2#,&-+D )"*"T-8-+-2# 0E.F%&5"+-%. ="+:2&-./ )"*"T-8-+-2#3 @%//-./

    )"*"T-8-+-2#3 N2+2>+-%. )"*"T-8-+-2#3 !&2;2.+-%. )"*"T-8-+-2#:-+2>+,&2# ".' 12.#%& @%>"+-%.#,&-+D )"*"T-8-+-2# 0E.F%&5"+-%.

    ="+:2&-./ )"*"T-8-+-2#3 @%//-./ )"*"T-8-+-2#3 N2+2>+-%. )"*"T-8-+-2#3 !&2;2.+-%.

    )"*"T-8-+-2#2:-+2>+,&2#3 12.#%& @%>"+-%.#,&-+D )"*"T-8-+-2#

    0E.F%&5"+-%. ="+:2&-./ )"*"T-8-+-2#3 @%//-./ )"*"T-8-+-2#3 N2+2>+-%. )"*"T-8-+-2#3

    !&2;2.+-%. )"*"T-8-+-2#

  • 8/13/2019 Brochure for Information Security Professional Course

    16/27

    "#

    !"#"$ $%&'()*&+, -./0 ( &'()'*+*,- .*/ 01234,+2,51+ 678)42.9 &'()'*+*,-: ;+,4+-: I*,+>1.,4*> D4MM+1+*, IDEB 7+23*'9'>4+- 6D41+2, IDEB I*,+>1.,4'*:I*/41+2, IDEB I*,+>1.,4'*A: G,3+1 7+23*'9'>4+- &.).C494,4+-:

    ?'>>4*> &.).C494,4+-: D+,+2,4'* &.).C494,4+-: E1+F+*,4'* &.).C494,4+-A: E+1M'1(.*2+

    O+R541+(+*,-: H.*.>+(+*, O+R541+(+*,- 6D+-4>* .*/ I()9+(+*,.,4'*: G)+1.,4'*

    .*/ H.4*,+*.*2+: 71.4*4*>: D'25(+*,.,4'*: .*/ 7+23*42.9 B5))'1,A: ?4M+ &829+ &'-,-:

    SF.95.,4*> E1'/52,- 6IDEB 7+-,4*> &3.99+*>+-: E+1M'1(4*> IDEB SF.95.,4'*-A

    !"#"#V $%6+78%'&!"!#$%&'())* (,- #$%&'()) ./)$019:9:" ;51+6%4%?5+& ( E.2=+, N49,+14*>: B,.,+M59 I*-)+2,4'*: 0))942.,4'* N41+51.,4'*A:

    7+-,4*>: D+)9'84*>: H.*.>4*>

    !"23/4567&% 8&06%$71 9/: ;(,(:&4&,79:C:" E6,+1&'*6,56? F%D82'+1 0+3215'7 G%?& ( 73+ Y.-42- 'M &'()5,+1 B+2514,8 ?'>-

    6B+2514,8 B'M, B8-,+(-: 0))942.,4'*-: K-+M59*+-- 'M ?'>-A: 73+ ;++/ M'1

    ?'> H.*.>+(+*,: 73+ &3.99+*>+- 4* ?'> H.*.>+(+*, 6?'> Q+*+1.,4'* .*/ B,'1.>+:

    ?'> E1',+2,4'*: ?'> 0*.98-4-A

    9:C:9 G%? H*6*?+D+6' -6I1*&'123'21+ ( 01234,+2,51+: N5*2,4'*-: B8-9'>LY.-+/ &+*,1.94\+/?'>>4*> B'M,4*>

    E'9424+-: S*-51+ ,3., E'9424+- 01+ N+.-4C9+: D+-4>* ?'> H.*.>+(+*, I*M1.-,152,51+-

    9:C:J G%? H*6*?+D+6' K8+1*'5%6*4 /1%3+&&+& ( &'*M4>51+ ?'> B'512+- 6?'> Q+*+1.,4'*: ?'>B,'1.>+ .*/ D4-)'-.9: ?'> B+2514,8A: 0*.98\+ ?'> D.,. 6K*/+1-,.*/4*> 'M ?'>-:

    E14'14,4\4*> ?'> S*,14+-: &'().14*> B8-,+(L?+F+9 .*/ I*M1.-,152,51+L?+F+9 0*.98-4-A:

    O+-)'*/ ,' I/+*,4M4+/ SF+*,-L H.*.>+ ?'*>L7+1( ?'> D.,. B,'1.>+: E+1M'1( 7+-,4*>

    .*/ W.94/.,4'*

    !"&)&'/%? (,- @&4/7& A00&** 8&06%$719:J:" KM+1M5+< %I N6'+1815&+ =+4+: 0))942.,4'*

    E'1,.9-: O+(',+ D+-=,') 022+--: D41+2, 0))942.,4'* 022+--A

  • 8/13/2019 Brochure for Information Security Professional Course

    17/27

    "#

    $%&%$ '()*+( ,--(.. /*01+2*3 /(-142+5 6 !"#$%" '((")) *"+,"+ *"(-+.%/0 !"#$%" '(("))*"+,"+ 123("#"4% 564%"+#"7.3+/ !"#$%" '((")) *"+,"+)0 8479$.4% !"#$%" '(("))

    *"+,"+):0 !"#$%" '((")) '-%;"4%.(3%.$40 '-%;$+.$+ ?"%@$+A =$##-4.(3%.$4)0 '(("))

    =$4%+$2 >$+ '992.(3%.$4):0 !"#$%" '((")) =2."4% *$>%@3+" *"(-+.%/

    $%&%7

    8(0(9*4: ;02(3+ .B-+"

    !")$-+(" =$4%+$2) '99+$9+.3%"2/:0 64)%322 347 =$4>.B-+" '77.%.$432 *"(-+.%/ =$4%+$2)0

    *"(-+.%/ C")%.4B %;" L9"+3%.4B */)%"#

    $%C%C /(-1423H +A( /(4=(4 /*@+9?4( 6 *"(-+"2/ 64)%322.4B %;" *"+,"+ *$>%@3+"0 =$4>.B-+.4B'((")) =$4%+$2)0 *"+,"+ !")$-+(" =$4)%+3.4%)0 *"2"(%.4B 347 6#92"#"4%.4B

    '-%;"4%.(3%.$4 347 84(+/9%.$4 C"(;4$2$B.")

    $%C%# J?23+?2323H +A( /(-142+5 *@ +A( /(4=(4 6 J$BB.4B 567"4%.>/.4B J$BB.4B =393O.2.%.") 347!"K-.+"#"4%)0 !",."@.4B 347 !"%3.4.4B J$B I.2")0 '-%$#3%"7 J$B I.2" '432/).) C$$2):0

    *"+,"+ H3(A-9 1+$("7-+") 5*"+,"+ D3%3 H3(A-9 1$2.(.")0 *"+,"+ H3(A-9 C/9")0

    G3.4%3.4 3 C")% *"+,"+:0 !"($,"+.4B I+$# 3 *"(-+.%/ =$#9+$#.)"0 *"(-+.%/ C")%.4B

    *"+,"+) 5F-24"+3O.2.%/ *(344.4B0 1"4"%+3%.$4 C")%.4B:0 !"#$%"2/ '7#.4.)%"+.4B 3

    *"+,"+M

    !"./0%),&12+) 34+0 $%)*&+,-$%#%" D?-:H4*13> ?3> /+?3>?4>. 6 G-2%.9-+9$)" 64%"+4"% G3.2 8R%"4).$4)0 G3.2 C+34)9$+%

    *%3473+7) 5*GC10 *GC1 8R%"4).$4)0 1+$9+."%3+/ G3.2 C+34)9$+%):0 =2."4% '(("))

    *%3473+7) 51$)% L>>.(" 1+$%$($20 64%"+4"% G"))3B" '((")) 1+$%$($20 1+$9+."%3+/ G3.2O$R

    '((")) G"(;34.)#)0 S"ONH3)"7 G3.2 '((")):

    TMUMT /2H323H ?3> K3-45I+23H K)?20 J(..?H(. 6 L9"41P10 *VG6G80 W"/ G343B"#"4%0 6))-")@.%; 8#3.2 84(+/9%.$4

    $%#%7 G0?3323H ?3> J?3?H23H J?20 /(4=(4. 6 64)%3223%.$4 347 D"92$/#"4% 12344.4B0 *"(-+.%/G343B"#"4% *%3>>0 G343B"#"4% 1+3(%.(")0 */)%"# *"(-+.%/ 12340 Q-#34 !")$-+(")

    !"K-.+"#"4%)0 P"4"+32 64>$+#3%.$4 */)%"# *"(-+.%/ 1+.4(.92")

    $%#%& /(-1423H +A( J?20 /(4=(4 FI(4?+23H /5.+() 6 E973%.4B 347 =$4>.B-+.4B %;" L9"+3%.4B*/)%"# 513%(; 347 E9B+37" L9"+3%.4B */)%"#0 !"#$," $+ D.)3O2" E44"("))3+/

  • 8/13/2019 Brochure for Information Security Professional Course

    18/27

    "#

    !"#$%&"' )*+ ,--.%&)/%0*'1 20*3%45#" 6-"#)/%*4 !7'/"8 9'"# ,5/:"*/%&)/%0*1 20*3%45#"

    ;"'05#&" 20*/#0.' ,--#0-#%)/".71 "'/%*4

    D)%. !"#$"#' EX5.*"#)M%.%/7 !&)**%*41 F"*"/#)/%0* >"'/%*4=1 ;"80/".7 ,+8%*%'/"#%*4 )

    D)%. !"#$"#

    !"#$%&'() +,& -,./,. -,)%.(0167#7" B.-**)*+ -*1 ,-*-+)*+ C%D $%(/%(05 #5'/"+ 6-"#)/%*4 !7'/"8'1 N"M

    !"#$"# ,--.%)*&"'1 F#"LC)#+"*"+ 6-"#)/%*4 !7'/"8' )*+ N"M !"#$"#'1 X%#/5).%R"+

    F.)/30#8'=

    67#76

    $%&'()*+ 4A% C%D $%(/%( E;%(-4)*+ $F04%: 5 P! E!!PU>P! 2)-)M%.%/%"'1 N")K*"''"' 03 !!PU>P!1 !!PU>P!

    G*-/%0* !&:"8"'1 P!1 !!PU>P!

  • 8/13/2019 Brochure for Information Security Professional Course

    19/27

    "#

    !"#"# $%&'(')*+,'(- *.+ /+0 1+,2+, 3 $%&&'(& *+,-(.'/0'(& .1- $%&&'(& 23435'6'.'-7 %/ 38-5 9-:;-:< +,-(.'/0'(& =,,'.'%(36 $%&&'(& >-?@':-A-(.7< >-B%AA-(,-, C-(-:'B

    $%&&'(& 2%(/'&@:3.'%(< >-;'-D'(& 3(, >-.3'('(& $%& E'6-7< =@.%A3.-, $%& E'6-

    =(3607'7 F%%67G< 8-5 9-:;-: H3BI@4 J:%B-,@:-7 *8-5 9-:;-: H3BI@4 J%6'B'-7 3(,

    9.:3.-&'-7< K3'(.3'( 3 F-7. 8-5 9-:;-:< K3'(.3'( 3( [email protected]%:'.3.';- 2%40 %/

    L:&3('M3.'%(36 8-5 2%(.-(.G< >-B%;-:'(& E:%A 3 9-B@:'.0 2%A4:%A'7-< 9-B@:'.0F-7.'(& 8-5 9-:;-:7 *N@6(-:35'6'.0 9B3(('(&< J-(-.:3.'%( F-7.'(&G< >-A%.-60

    =,A'('7.-:'(& 3 8-5 9-:;-:

    "#$%&'()& *&+,-./&01 -2 345645#5" 6(%+,)*7(%'(- 892: 3 $'A'.3.'%(7 %/ +J;O< K3P%: E-3.@:-7 %/ .1- +J;Q 94-B'/'B3.'%(%@.'(&< +J;Q

    3(, .1- R%A3'( V3A- 907.-A *RV9G< K@6.'1%A'(&< +J;Q K@6.'B37.< +J;Q W@36'.0 %/

    9-:;'B- *W%9G< K%5'6- +J;Q< X@A5%&:3A7< =,,:-77 9-6-B.'%(< R0(3A'B S%7.

    2%(/'&@:3.'%( J:%.%B%6 *RS2JG /%: +J;Q< +J;Q J:-/'U :-(@A5-:'(&

    45#54 892: 1+; 892: ?+@AB=&+(* 3 9-B@:'.0 >'7I7< =,,:-77'(& 9-B@:'.0< F:3(7'.'%( K-B13('7A7< [email protected] +J;OZ+J;Q T(;':%(A-(.7< F@((-6'(&< F:3(763.'%(< L.1-: F:3(7'.'%( K-B13('7A7>0 ;Q>Q 24+=&N34O0 ;QH-9==&(4/. K @)9==&(4/. .496(3C4+6B90 R+)B

    G:'.(/3')0 ?/C/(+8 >/C'+(:4&)0 >(&C+'3C4+6B90 5+',3= 1:=P&4 E&'&4+(/3'0 X&9

    S+'+C&=&'(0 @,%+'.&, $'.496(/3' >(+',+4, Y@$>Z0 S&))+C& @:(B&'(/.+(/3' ;3,&

    YS@; H+)&, 3' + H83.O ;/6B&4 @8C34/(B=0 S@;) H+)&, 3' R+)B G:'.(/3')Z0 ?/C/(+8

    >/C'+(:4& >(+',+4,0 5>@

    M"#"I D/9:)3 Q14 5(@%'80%/30/%1 RDQ5S ; >&.:4/(9 5&D:/4&=&'() 234 7X- ;3=63'&'()0 [email protected]/(&.(:4&)

    P="=9==&(4/. ;496(3C4+6B90 X&9 S+'+C&=&'(

    P="=M L88188-1(08 ; ;496(3C4+6B/. S3,:8& [+8/,+(/3' 743C4+= Y;S[7Z0 1+(/3'+8 [38:'(+49\+P34+(349 @..4&,/(+(/3' 743C4+= Y1[\@7Z0 -',:)(49 +', >(+',+4,) Q4C+'/L+(/3')

    P="=P 21:130)(& +%4.0,&%'.A4 O -'/(/+(/3'0 @.D:/)/(/3']?&%&836=&'(0 -=68&=&'(+(/3']@))&))=&'(0 Q6&4+(/3') +', S+/'(&'+'.&0 ?/)63)/(/3'

    K"E,;78:D= -5>8@G;L57C7D=" 20,%'&1 213/%)04 $F1%F)1H ; G/8& >(34+C& H+)/.)0 (34+C& >&.:4/(90

    >&.:4/(9 ;3'(438) 234 >(34+C&

  • 8/13/2019 Brochure for Information Security Professional Course

    21/27

    "#

    $%"%" &'()*+, -./)01'2(. 3,/4.(5(+2,6 7 !"##"$ &'()* "+ ,-"./0) 1$2.'(-3"$&)24$"5"03)* 67855 93*: 1$2.'(-3"$; )26? ;*.*+,;,.' 7 2"#("$)$-* "+ .3*: #/$/0)#)$-; #85-3-3).)= .3*:

    #/$/0)#)$-; -.8*- /$= -.8*-M".-43$)**; ".0/$3N/-3"$/5 285-8.); .)5/-3"$*43( /#"$0

    :)' .3*: 2"$2)(-*

    KDLDE @26? ;*.*+,;,.' 1)(/,66 7 +./#3$0 .3*:; /**)**3$0 .3*:; .)*("$=3$0 -" .3*:;#"$3-".3$0 .3*:

    !">.?9@AB=59: '567 )66;662/*'2(. F K.*50626 3,/4.2J=,6 7 H)-M".: 93*2"A).'; H)-M".: @".- /$=,).A32) G=)$-3+32/-3"$;

  • 8/13/2019 Brochure for Information Security Professional Course

    22/27

    "#

    !"#$%&'()*+,'% ./0+1) 2'%+,%31%4/ 56*%%,%3 5('4100$%"%# &'(')*+,-. /0' 1*-/,-.'-23 4)5--,-. 4*),23 6/5/'7'-/!"#"# 1*-892/,-. /0' :9;,-';; :-? 2*3 4%105%'69 ,21>-? @%&A03. 2*3

    B;;.)&% =&0'2C%9 D8&%'*2&% =)&%.9 E-?9 /'0&%1&)0* 0; 4%.0-'1%.9 D3A%'%*1% &0 =%1-')&6 70*&'08.9 :3%*&);)12&)0* 0;

    D8&%'*2&% =&0'2C% 2*3 /'01%..)*C M21)8)&)%.9 L.% 0; N)CA D52)82F)8)&6 ONDP /'01%..%.

    $%D%" 1),'-/L6'C('C 63;/'7; @ 78)%*&Q=%'5%' =6.&%(. 70*&)*C%*16 70*.)3%'2&)0*. R =08-&)0*.$%D%A

    E')'2*779-,25/,*-; 63;/'7; @ H%8%10((-*)12&)0*. 70*&)*C%*16 70*.)3%'2&)0*. R=08-&)0*.

    $%D%D M5,-BC57' 63;/'7; @ @2)*;'2(% 70*&)*C%*16 70*.)3%'2&)0*. R =08-&)0*.

  • 8/13/2019 Brochure for Information Security Professional Course

    23/27

    ""

    !" $%& '()*+(), !-./0.1-12 34156/0-. 78-986:

    #$% &'()*'(+ ,-./0.1-12 34156/0-. 78-986: ;,37< 02 4%209.%4 /- =%%> ?-18 %@>%8/02% 6.4

    2=0AA2 1>46/%4B C-1 68% 8%D108%4 /- -E/60. F"G ,3+2 ;,-./0.10.9 34156/0-. +.0/2< %H%8? I ?%682

    /- :60./60. ?-18 *'(+ 5%8/0J056/0-.B

    C-1 68% 8%D108%4 /- 21E:0/ 4-51:%./68? %H04%.5% %H%8? I ?%682 -J ,3+2 %68.%4 E? ?-1B 3.5A-2%

    64:0.02/86/0H% J%% -J K2 "LGGG >A12 /6@%2 6A-.9 M0/$ /$% 4-51:%./68? %H04%.5% -J ,3+2B

    ! #$%&'&%( )*+, -./0-1 23$45-0%./( *'&1-0$- %3 6-

    ,465&%%-1

    7.8&545

    )*+, &0 . 9

    (-./ :-/&31

    F #%65$0.9L /860.0.9

    -8 0.2/815/0.9 0. 6

    8%A%H6./ J0%A4

    I ,3+2 >%8 $-18 -J 65/16A

    /%65$0.9L /860.0.9 -8

    0.2/815/0.9

    FB N%2580>/0-. -J 5-./%./

    5-H%8%4

    "B N%A0H%8? 46/%;2%8 $-18 -J 65/16A

    >8%2%./6/0-.

    FB N%2580>/0-. -J 5-./%./

    5-H%8%4

    "B N%A0H%8? 46/%;2? -J >8%2%./6/0-.

    P" ,3+2

    I 768/050>6/0-. 0. 6

    *'(+ 6>>8-H%4

    &.412/8? 3H%./L

    (%:0.68L Q-8=2$->

    -8 ,-.J%8%.5%

    F ,3+ J-8 %65$ $-18

    2>%./ 0. 6 8%A%H6./

    2%220-.

    FB #$% /?>% -J 65/0H0/? 6//%.4%4

    ;%H%./L 2%:0.68L M-8=2$-> -8

    5-.J%8%.5%%80%.5% F ,3+ J-8 %65$ :-./$ 0. 6

    8%A%H6./ >8-J0A%

    '-AA-M0.9 4%/60A2 -. %:>A-?%8

    A%//%8$%64S

    FB ,188%./ T-E /0/A%

    "B U80%J 4%2580>/0-. -J M-8=

    >8-J0A%

    IB N186/0-. 0. /$02 T-E ;2/68/ 6.4

    %.4 46/%2A-?%8

    /$6/ /$% 56.4046/% 02 :%%/0.9

    /$% %@>%5/6/0-.2VB (09.6/18% -J /$% 56.4046/%2

    21>%8H02-8

    IW ,3+2

    V 71EA02$0.9 -J 6

    8%A%H6./

    >8-J%220-.6A R8/05A%L

    Q$0/% 76>%8 -8

    U--=

    P ,3+2 >%8 68/05A% -8

    M$0/% >6>%8X

    "G ,3+2 >%8 >1EA02$%4

    E--=

    N%2580>/0-. -J /$% 5-./%./

    5-H%8%4

    Y0.= /- -8 5->? -J /$% >1EA02$%4

    M-8=

    P" ,3+2

    W R5/0H% :%:E%82$0>

    -J 6 *'(+ 6>>8-H%4

    8%A%H6./ ,-::0//%%

    Z U-684 Z ,$6>/%8 Z

    R22-506/0-.

    GB"V ,3+ J-8 %65$ :-./$

    -J :%:E%82$0>

    FB ,-::0//%% Z U-684 Z ,$6>/%8

    Z R22-506/0-. 4%/60A2

    "B 78--J -J :%:E%82$0>

    IB #0:%J86:% -J 65/0H%

    :%:E%82$0>

    [ ,3+2

  • 8/13/2019 Brochure for Information Security Professional Course

    24/27

  • 8/13/2019 Brochure for Information Security Professional Course

    25/27

    "#

    !" $%%&'()*'+, -+./ 0+. 12./),2,*

    324'5*.)*'+, 67/82. 0+. 9-:;2.*'0'()*'+, 1.+4.)/5

    $%&'()*+,%)&

    -./,(,0,* %1 2%)*./(+ 3+(*.+*&

    4056)6, 2%)*./(+ 3+(*.+*/ 7.(8*)/(,9&

    46.:;(.6>*6)(.< 1%) -23?4237 @-./,(,0,* %1 2%)*./(+ 3+(*.+*& 4056)6, 2%)*./(+ 3+(*.+*/

    7.(8*)/(,9A +*),(1(+6,(%./ 6.: ,;*)*1%)* )*B0*/, 1%) 6CC%,=*., %1 D*)=6.*., E**)/%.6C (.1%)=6,(%. (/ 6/ 0.:*)J

    "# $"%&!"#$%

    '"(()*

    +,$%

    '# (")& *+ ',-).-,. '/0%1 2*,#

    (# /&$(&-!*3,)* ',)*

    "((-&00 +*- 1*%%2$,1"),*$45,#%3*0% 6 7/8$* 983:*# ; %1* 9,3* /< %1* =8")("0>

    ?%#**% 6 @/,( 6 =/8)*A,#(

    B/C0 6 D"%.

    ?%,%*

    D/80%#. EF9 D/(* 6 GFE

    H3,") 4((#*$$

    D*)) 6 '/:")* 083:*# E1/0* 083:*# IC"%1 F?- 6 ?B- J/(*K

    E)*,$* 5,$%* ./8# #*J*0%

    5,$$5/#% $"L* J/)/8#

    51/%/>#,51 "0 %1"$ :/MN

    (* $*) 0)"34&

    1# *1123"),*$

    IF0 J,$* ./8 ,#* ,"#$%&'#O 3*0%"/0 (*%,")$ $8J1 ,$

    D/))*>*O J/8#$*O .*,# *%JNK

  • 8/13/2019 Brochure for Information Security Professional Course

    26/27

    "#

    !" !$$ %$&'()*

    $%&' ()%*+ &,-./) 00000000000000000000000000000 (%+/100000000000000000000000000 *2) +," -./// 3&2&4)/*,&1%.5/6

    $%&' 7%-/ 0000000000000000000000000000000000000000000000000000000000000 $)%&89 0000000000000000000000000000000000000

    :%;2,) ?&01 +123,4565. 7896564 !:51;,3< *

  • 8/13/2019 Brochure for Information Security Professional Course

    27/27

    !"#$%&'()"*

    $% &'()*'(+ ,-./ -0 102 2345 6127850139/ ,-:5 19;582392 38 637>417-0139 03 @581=. 0?5 -7745059522 3= 0?5 19=38,-0139

    >83@1656 A. ,5% & -B855 03 733>58-05 19 -9. 283@1656%

    "% & 58-0139 19 283@1619B -9. 19=38,-01390?-0 12 =8-