Brochure for Information Security Professional Course
-
Upload
pradeep-deshmukh -
Category
Documents
-
view
215 -
download
0
Transcript of Brochure for Information Security Professional Course
-
8/13/2019 Brochure for Information Security Professional Course
1/27
IFS-GFSU CERTIFIED
INFORMATION SECURITY PROFESSIONAL
INSTITUTE OF FORENSIC SCIENCE
GUJARAT FORENSIC SCIENCES UNIVERSITY
-
8/13/2019 Brochure for Information Security Professional Course
2/27
"
!"#$%"#& ()*+,-,./+,01 234553
!1-0*6/+,01 #).7*,+8 9*0-)::,01/;
!" $%&'()*+' $, )-' ."/*0" 10)*$"02 34%'5 6'(75*)4 8$2*(4 9 :;
#$ %&'()' ( *$&+,$&%' $, -../... 0&$,'112$3(41 1+244'5 23
%67'& 1'%8&2)6 23 )9' 3':) - 6'(&1 )9&$8;9 %(0(%2)6
7824523;/ 1+244 5'
?# "@A B534 ?C=D#
#9' ':(= ,$& )9' ?@ABC@AD E'&)2,2%()2$3
? !"#$%"#&
#921 %'&)2,2%()2$3 21 0&$
#921 5$%8='3) 21 2118'5 (1 ( ;825' )$
%(3525()'1 08&1823; (3 ?@ABC@AD
%'&)2,2%()2$3> ?@ABC@AD 5$'1 3$) =(+' (36&'0&'1'3)()2$31 $& *(&&(3)2'1 )9() )9' 81' $,
)921 5$%8='3) *244 (118&' %(3525()'1 $,
0(1123; (36 ?@ABC@AD %'&)2,2%()2$3>
U F."J ?31)2)8)' $, @$&'312% A%2'3%'/ C8P(&()
@$&'312% A%2'3%'1 D32
C8P(&() @$&'312% A%2'3%'1 D32
-
8/13/2019 Brochure for Information Security Professional Course
3/27
"
!"#$% '"#() *+ ,-./#/0 1 2-#/*-#/#/0 3+". 4567'568 $).*#9#$-*#+/
#$%&'() *+,- +)./&(0. 1.-0').)& 2.3(4&-'&(+) 5,0%.-6
"
7889* :+- &;. .*()3 &;. -.:.-.)?. 0'&.-('9 ?+08-(4()3 &;. @AB/CABD
E+00+) F+>* +: G)+H9.>3. :+- @):+-0'&(+) B.?,-(&* IEF$G@BJ6
K788.'- :+- &;. ?.-&(:(?'&(+) . +%&'() LMN () .'?; 4.?&(+)6
OP'-) *+,- ?.-&(:(?'&(+)6 P'-) &;. -(3;& &+ ,4. 46:6 C.& ,83-'>.> &+ 46:;':&.- Q *.'-46
QP'-) #"M E+)&(),()3 P>,?'&(+) D)(&4 IEPD4J .R.-* = *.'-4 ')> 4,%0(& 8-++: +: &;. 4'0.6
$%&'() 1257889* :+-
P
-
8/13/2019 Brochure for Information Security Professional Course
4/27
"
!"#$% '( )'*+%*+,
-. /%*%(0+, '( 12345236 )%7+0(08"+0'*, ...................................................................................... 9#$% &'(')*+, +- *(.*/*.012, %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %%%%%%%%%%%%%%%%%% 3#4% &'(')*+, +- -561(*71+*-(, %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 8
/. -#':+ +;% )%7+0(08"+0'* .............................................................................................................
-
8/13/2019 Brochure for Information Security Professional Course
5/27
"
!" $%&%'()* +' ,-./0-.1 2%3)('(45)(+&*
!6" $%&%'()* )+ (&7(8(795:*
! #$%&'(' ) %&*%'+ ,-.&/&-01 +)&.'1 )02,+-3-/&-0 4)./'+5
! 6'$-3' 3-+' '3,7-8)97':! #44&+3 8-;+ ,+-4'..&-0)7 '0$+').' ?-9 .'$;+&/8! @'3-0./+)/' /%)/ 8-; ,-..'..
'..'0/&)7 2-3)&0 A0-B7'2*'
! 6--./ +'7'()0$' 98 ./)8&0* $;++'0/&0 /%' ,+-4'..&-0 B&/% $-0/&0;&0*
'2;$)/&-0 +'C;&+'3'0/.D
! #2()0$' 8-;+ $)+''+ ,-/'0/&)7 2;'/- +'$-*0&/&-0 ). ) $'+/&4&'2
,+-4'..&-0)7
! E'$-*0&/&-0 -4 ,+-4'..&-0)7$-3,'/'0$' 98 ,+-4'..&-0)7 ,''+.
)02 3)0)*'3'0/
! >0$+').' 8-;+ ()7;' )02 &0$-3'! F'', ;, B&/% '('+G$%)0*&0*
./)02)+2. )02 /'$%0-7-*&'.
! H)7&2)/' 8-;+ A0-B7'2*'! @&44'+'0/&)/' 8-;+.'74 4+-3 8-;+
,''+.
! 6--./ 8-;+ $-04&2'0$'
5 I)7)+8 .;+('8. .%-B /%)/ /%' 3)?-+&/8 -4 %&+&0*
3)0)*'+. $-0.&2'+ $'+/&4&$)/&-0. ) 4)$/-+ &0 %&+&0*
2'$&.&-0.1 )02 /%)/ -9/)&0&0* +'7'()0/ $'+/&4&$)/&-0.
-4/'0 7')2. /- ) .)7)+8 &0$+').'D
:#$$-+2&0* /- )0 >@J B%&/' ,),'+1 KL=M -4 %&+&0*
3)0)*'+. 9'7&'(' $'+/&4&'2 &02&(&2;)7. )+' 3-+'
,+-2;$/&(' /%)0 /%'&+ 0-0G$'+/&4&'2 $-;0/'+,)+/.DK
=N-;+ '3,7-8'+1 $7&'0/.1 '3,7-8''. )02 ,''+. B&77
+'$-*0&O' 8-;+ PQIR $+'2'0/&)7 ). )0 &02&$)/&-0 -4 /%'
.A&77. )02 A0-B7'2*' 8-;S(' *)&0'2 /%+-;*%$'+/&4&$)/&-0D
! I%-B /%)/ 8-; A0-B /%' 3-./$;++'0/ ,+&0$&,7'. )02 ,+)$/&$'. -48-;+ 4&'72
! T'+.-0)7 .)/&.4)$/&-0 -4)$$-3,7&.%&0* ) 3&7'./-0' &0 8-;+
$)+''+
! I/)02 -;/ )*)&0./ -/%'+ ),,7&$)0/. &0) /-;*% ?-9 3)+A'/D
! P'/ ,+',)+'2 4-+ *+')/'+ -0G/%'G?-9+'.,-0.&9&7&/&'.
! T-/'0/&)778 ')+0 %&*%'+ &0$-3' 4-+9'&0* 4-+3)778 +'$-*0&O'2 ). )
$'+/&4&'2 ,+-4'..&-0)7
! @'3-0./+)/' N-;+ J-33&/3'0/! 6;&72 )02 '0%)0$' 8-;+ $+'2&9&7&/8! 6;&72 U I%-B$).' N-;+ IA&77.! 6'$-3' 3-+' 3)+A'/)97' B%'0 8-;$-3,'/' 4-+ /-, ,-.&/&-0.! E)&.' 8-;+ ,+'./&*' )3-0* 8-;+
./)44 )02 8-;+ ,''+.
! >3,+-(' -('+)77 ,'+4-+3)0$'1+'3-(' ;0$'+/)&0/8 )02 B&2'0
3)+A'/ -,,-+/;0&/&'.
! V0.;+' 8-; )+' $-0/&0;)778&3,+-(&0* )02 +'4&0&0* 8-;+
)$/&(&/&'.
! 6'$-3' ,)+/ -4 ) ,+-4'..&-0)70'/B-+A
! V0?-8 9'//'+ $)+''+ 47'
-
8/13/2019 Brochure for Information Security Professional Course
6/27
"
!"# %&'&()*+ *, ,-./')0/*),'+
! !"#$%&'()#$%& '()* +,-%$.$+/%$0123 405- 0-6/1$7/%$01 8$99 &/:, / ;,1+&-0:$?, >-0.,22$01/9 ?,:,90>0-%51$%$,2 .0- 2%/..A B&$2 +/1 /920 9,/? %0 908,- 2%/.. %5-10:,-A
! =.>%"( ?7':./0'()* +,-%$.$+/%$012 9,/? %0 -0?5+,? 8$%& $1+-,/2,?
,..$+$,1+4 /1? +012$2%,1+4 ;4 >-0.,22$01/92 8&0 52, $1?52%-4 2%/1?/-? %,+&1$G5,2A
! +7:/7(" ,2 :"'(#.#>'()* +,-%$.$+/%$012 ,08,- / +59%5-, 0. 9,/-1$16 /1? $-0:,
-
8/13/2019 Brochure for Information Security Professional Course
7/27
"
!" $%&'( ()* +*,(-.-/0(-&1
!2" 345&,(01/* &. 31.&,40(-&1 6*/',-(7
#$ %$&'()*+,'$ -./0(,+1 2('&.33,'$*4 ,3 35,44.6 ,$ 0$6.(3+*$6,$7 *$6 *$*418,$7 ,$&'()*+,'$
3./0(,+1 +9(.*+3 *$6 ,):4.).$+,$7 ;.3+ :(*/+,/.3 &'( %$&'()*+,'$ -./0(,+1< =9. ,):'(+*$/. '&
%$&'()*+,'$ -./0(,+1 /*$ ;. 0$6.(3+''6 &(') +9. &'44'>,$7 .?+(*/+ &(') +9. !"#$%" '%($)"%*
+,-./ 0.12/$(, 3)*$1, 4 5678@
A1;.(3:*/. ,3 B04$.(*;4. +' * >,6. B*(,.+1 '& ,$/,6.$+3C >9.+9.( ,$+.$+,'$*4 '(
*//,6.$+*4C )*$)*6. '( $*+0(*4C *$6 +9. 6*+* .?/9*$7.6 ,$ +9. /1;.(3:*/. /*$
;. .?:4',+.6 &'( $.&*(,'03 :0(:'3.3 ;1 ;'+9 $*+,'$D 3+*+.3 *$6 $'$D3+*+. */+'(39.4) +9. 7'B.($).$+C :0;4,/ *$6 :(,B*+.
3./+'( (.3'0(/.3 *$6 3.(B,/.3 ;1 6,3(0:+,$7 &0$/+,'$,$7 '& /(,+,/*4 ,$&'()*+,'$
313+.)3< A'):4,/*+,'$3 &(') 6,3(0:+,'$3 '& 30/9 * )*7$,+06. )*1 +9(.*+.$
4,B.3C ./'$')1 *$6 $*+,'$*4 3./0(,+1< H*:,6 ,6.$+,&,/*+,'$C ,$&'()*+,'$ .?/9*$7.C,$B.3+,7*+,'$ *$6 /''(6,$*+.6 (.3:'$3. *$6 (.).6,*+,'$ /*$ ),+,7*+. +9.
6*)*7. /*03.6 ;1 )*4,/,'03 /1;.(3:*/. */+,B,+118- 12 )&*1(>' 5$(5*&0%1$' 123:>4125 ?144:$
@&'8; A(>8% @&'8 B'1& &24 6241&C A0$31&:81$'D 62.(*7&81(2 E1'< ?&2&5$7$28 F 3(2'>:8125 12
E$5>:&8(*- '8&24&*4' '>3% &' GH6 IAA; #6GBB 670:$7$28&81(2; 6AJ +K,,"L6AJ ++M,"LNA +OPPP
170:$7$28&81(2 F 3(70:1&23$ &''$''7$28; 62.(*7&81(2 A$3>*18- F 9$3%2(:(5- *1'< &''$''7$28';N>'12$'' H(2812>18-LIE G:&22125; 62.(*7&81(2 A$3>*18- B*3%18$38>*$; 69 A8*&8$5-; 69 5()$*2&23$;
H(28*&38 3(70:1&23$; 0*$Q0('8 &3R>1'181(2 69 4>$ 41:15$23$C
!"#$ &'() *+ ,-)./0*1.
9%$ $/&712&81(2 S1:: 3(2'1'8 0*17&*1:- (. H&'$ A8>4- N&'$4 TG*(=:$7QN&'$4U R>$'81(2'C 9%$'$
R>$'81(2' 3(2'1'8 (. & 0*&3813&: 0*(=:$7 .(::(S$4 =- '$)$*&: (081(2'C H&2414&8$' 7>'8 &00:-
8%$1* 24$*'8&24125 (.
8%$ 8(013 *&8%$* 8%&2 *$R>1*125 8%$7 8( 7$7(*1'$ 12.(*7&81(2C A>3% R>$'81(2' .(3>' (2 8$'8125 &
3&2414&8$Y' '1*$ 8%12' (2 0>*$:- 8%$(*$813&:*18- THNJZ6AU $'8&=:1'%$' &=&'$:12$ .(* 8%$ =(4- (. *18-C HNJZ6A 1' & 3(70*$%$2'1)$
4$'3*1081(2 (. 8%$ '>7 (. *18-0*(.$''1(2C HNJZ6A 1' 2(8 '8&813 &24 S1:: =$3(2'8&28:- $)(:)125 &' 8%$ .1$:4 (. 62.(*7&81(2 A$3>*18-4$)$:(0'C!"G$ H 7>'8 3&**- & 0*128(>8 (. 8%1' B471''1(2 G&'' &:(25 S18% & W()$*27$281''>$4 0%(8(Q14$2818- 3&*4 T$C5C GB\ 3&*4; 4*1)$*' :13$2'$; 0&''0(*8; $83CUC
71/4' /* /6) )859 C)1/4)
E$51'8$*$4 3&2414&8$' 7>'8 $28$* 8%$ $/&7 3$28*$ M, 712>8$' 0*1(* 8( 8%$ '8&*8 (. 8%$
$/&7C B2- 3&2414&8$ S%( 1' :&8$ S1:: =$ 4$21$4 $28*- 8( 8%$ $/&7 3$28*$ &24 S1:: 2(8 =$
0$*7188$4 8( 8&3% & 3&2414&8$ S1:: =$ .(*.$18$4C
B()C05? H4451@)9)1/.
\( .((4 (* 4*12< 1' 0$*7188$4 &8 8%$ $/&7 3$28*$C B2 $/3$081(2 3&2 =$ 7&4$ 12 3&'$ (.
7$413&: *$&'(2' 0*()14$4 8%$ *$51'8$*$4 3&2414&8$ '%(S' & 4(38(*Y' 3$*81.13&8$ 8( 8%1'
$..$38C
-
8/13/2019 Brochure for Information Security Professional Course
13/27
-
8/13/2019 Brochure for Information Security Professional Course
14/27
"#
!"#$ &'()*
!"#$ '( )(*+,'-#'+./ 01.,(, ./
$%&'() "*+,-(&%(.)/ 01"2 "*+,3454674./ 01"#
$%&'() 01+,
89.:;/ 01"2 01+,
74./ 01"2 "*+,$49+4674./ 01"2
!+,$ -.)/.0)1 23 45'607'(027 89::';& :@ ':B:'4' :&+> +,4 C>;;>D:&E @45+:>&@F
"G H&'I9>:&+ $45%.:+)0G J4+D>.K L M&+4.&4+ $45%.:+)#G M&C>.6(+:>& $45%.:+) M&5:'4&+ N4@9>&@42G N4E%;(+>.) L $+(&'(.'@ O>69;:(&54PG 3(+( Q.>+45+:>&RG M&C>.6(+:>& $45%.:+) ?4@+:&ESG O>&+:&E4&5) Q;(&&:&E
!+"$ &)('0:)= 45'607'(027 89::';&4@ I 6177+742 6%..+#"-40"%#'( 8$1#0"09 3%$+71'( :1-+21 +'4;1"G0G0 $>C+D(.4 899;:5(+:>&@"G0G# ?,.4(+@ < *%''( 051=0( %2 $"'/%'47( >#4+05%2"?1$ 4--1''( 347&421( :/4.( @71-02%#"-
14A1'$2%//"#;( @71-02%#"- 024-B"#;( 67%#"#;( :12A12'12
-
8/13/2019 Brochure for Information Security Professional Course
15/27
"#
"$#$% &'(')*('+) ,-./*(0 1)*'+0( 2*0034.506 !"##$%&' )"*+,&-./ 01+%&"/23 4&".#5-##-%.36#2& 7.%$82'/2 ".' 92:";-%,&+-%.-./ 0C%&/%++2. !"##$%&' B2>%;2&D ".' B2#2+#3 A>>2## +% 1+%&2'
A>>%,.+ E.F%&5"+-%. ".' !"##$%&'#3 1%>-"8 G./-.22&-./'.(;*:'?*('4+ 9/@;.'(A 6 =,2#+ I1 E#%8"+-%.3 =,2#+ I1 K%.-+%&-./3 E5"/2 ".' 1."*#:%+K"."/252.+3 SD*2&;-#%& 12>,&-+D3 =,2#+ I1 12>,&-+D3 L-&+,"8-J2' E.F&"#+&,>+,&2
12>,&-+D3 N2#?+%* L-&+,"8-J"+-%. 12>,&-+D
"$'.(;*:'?*('4+ 2:*++'+) *+5 B/C:4A8/+(!"9:%;)2 $24)*)32*).4"$D$" =+5/.0(*+5'+) &/5'* 9*+'('?*('4+ 6 +D*2# %F 52'-"3 +&2.'# -. '"+" #+%&"/2 52'-"3
+&2.'# -. #".-+-J"+-%.3 +D*2# %F #".-+-J"+-%.3 ,#2 %F >&D*+%/&"*:D ".' >&D*+%/&"*:->
2&"#23 F">+% -.F8,2.>-./ #".-+-J"+-%. ".' '-#*%#"8 '2>-#-%.#3 #".-+-J"+-%. #>%*2
"$D$% E+F4.8*('4+ 9*+'('?*('4+ *+5 B'0C40'('4+ B/@'0'4+ &*G'+) 6 -.F%&5"+-%. '2>-#-%.# -.+:2 #D#+25 8-F2 >D>823 '2+2&5-."+-%. %F #2>,&-+D >"+2/%&-J"+-%.3 &2,#2 %F 52'-"3 >%.+&%8
%F 52'-"3 '"+" *&%+2>+-%. 82;283 #".-+-J"+-%. ".' '-#*%#"8 '2>-#-%.3 ;2&-FD 52+:%'#3
'%>,52.+"+-%.
"$D$7 B*(* H/*G*)/ 2./I/+('4+:.%8%/-2#3 72D
C,.>+-%.# %F EN!1 42>:.%8%/-2#3 )%55%. N2+2>+-%. K2+:%'%8%/-2#3 1-/."+,&2H9"#2'
N2+2>+-%.3 A.%5"8DH9"#2' N2+2>+-%.3 1+"+2F,8 !&%+%>%8 A."8D#-#3 4D*2# %F EN!1
42>:.%8%/-2#
%$"$% EB29 ,/@-+4:4)'/0 6 )%5*%.2.+# ".' A&>:-+2>+,&2 04D*->"8 )%5*%.2.+#3 M2+$%&?A&>:-+2>+,&2#,&-+D )"*"T-8-+-2# 0E.F%&5"+-%. ="+:2&-./ )"*"T-8-+-2#3 @%//-./
)"*"T-8-+-2#3 N2+2>+-%. )"*"T-8-+-2#3 !&2;2.+-%. )"*"T-8-+-2#:-+2>+,&2# ".' 12.#%& @%>"+-%.#,&-+D )"*"T-8-+-2# 0E.F%&5"+-%.
="+:2&-./ )"*"T-8-+-2#3 @%//-./ )"*"T-8-+-2#3 N2+2>+-%. )"*"T-8-+-2#3 !&2;2.+-%.
)"*"T-8-+-2#2:-+2>+,&2#3 12.#%& @%>"+-%.#,&-+D )"*"T-8-+-2#
0E.F%&5"+-%. ="+:2&-./ )"*"T-8-+-2#3 @%//-./ )"*"T-8-+-2#3 N2+2>+-%. )"*"T-8-+-2#3
!&2;2.+-%. )"*"T-8-+-2#
-
8/13/2019 Brochure for Information Security Professional Course
16/27
"#
!"#"$ $%&'()*&+, -./0 ( &'()'*+*,- .*/ 01234,+2,51+ 678)42.9 &'()'*+*,-: ;+,4+-: I*,+>1.,4*> D4MM+1+*, IDEB 7+23*'9'>4+- 6D41+2, IDEB I*,+>1.,4'*:I*/41+2, IDEB I*,+>1.,4'*A: G,3+1 7+23*'9'>4+- &.).C494,4+-:
?'>>4*> &.).C494,4+-: D+,+2,4'* &.).C494,4+-: E1+F+*,4'* &.).C494,4+-A: E+1M'1(.*2+
O+R541+(+*,-: H.*.>+(+*, O+R541+(+*,- 6D+-4>* .*/ I()9+(+*,.,4'*: G)+1.,4'*
.*/ H.4*,+*.*2+: 71.4*4*>: D'25(+*,.,4'*: .*/ 7+23*42.9 B5))'1,A: ?4M+ &829+ &'-,-:
SF.95.,4*> E1'/52,- 6IDEB 7+-,4*> &3.99+*>+-: E+1M'1(4*> IDEB SF.95.,4'*-A
!"#"#V $%6+78%'&!"!#$%&'())* (,- #$%&'()) ./)$019:9:" ;51+6%4%?5+& ( E.2=+, N49,+14*>: B,.,+M59 I*-)+2,4'*: 0))942.,4'* N41+51.,4'*A:
7+-,4*>: D+)9'84*>: H.*.>4*>
!"23/4567&% 8&06%$71 9/: ;(,(:&4&,79:C:" E6,+1&'*6,56? F%D82'+1 0+3215'7 G%?& ( 73+ Y.-42- 'M &'()5,+1 B+2514,8 ?'>-
6B+2514,8 B'M, B8-,+(-: 0))942.,4'*-: K-+M59*+-- 'M ?'>-A: 73+ ;++/ M'1
?'> H.*.>+(+*,: 73+ &3.99+*>+- 4* ?'> H.*.>+(+*, 6?'> Q+*+1.,4'* .*/ B,'1.>+:
?'> E1',+2,4'*: ?'> 0*.98-4-A
9:C:9 G%? H*6*?+D+6' -6I1*&'123'21+ ( 01234,+2,51+: N5*2,4'*-: B8-9'>LY.-+/ &+*,1.94\+/?'>>4*> B'M,4*>
E'9424+-: S*-51+ ,3., E'9424+- 01+ N+.-4C9+: D+-4>* ?'> H.*.>+(+*, I*M1.-,152,51+-
9:C:J G%? H*6*?+D+6' K8+1*'5%6*4 /1%3+&&+& ( &'*M4>51+ ?'> B'512+- 6?'> Q+*+1.,4'*: ?'>B,'1.>+ .*/ D4-)'-.9: ?'> B+2514,8A: 0*.98\+ ?'> D.,. 6K*/+1-,.*/4*> 'M ?'>-:
E14'14,4\4*> ?'> S*,14+-: &'().14*> B8-,+(L?+F+9 .*/ I*M1.-,152,51+L?+F+9 0*.98-4-A:
O+-)'*/ ,' I/+*,4M4+/ SF+*,-L H.*.>+ ?'*>L7+1( ?'> D.,. B,'1.>+: E+1M'1( 7+-,4*>
.*/ W.94/.,4'*
!"&)&'/%? (,- @&4/7& A00&** 8&06%$719:J:" KM+1M5+< %I N6'+1815&+ =+4+: 0))942.,4'*
E'1,.9-: O+(',+ D+-=,') 022+--: D41+2, 0))942.,4'* 022+--A
-
8/13/2019 Brochure for Information Security Professional Course
17/27
"#
$%&%$ '()*+( ,--(.. /*01+2*3 /(-142+5 6 !"#$%" '((")) *"+,"+ *"(-+.%/0 !"#$%" '(("))*"+,"+ 123("#"4% 564%"+#"7.3+/ !"#$%" '((")) *"+,"+)0 8479$.4% !"#$%" '(("))
*"+,"+):0 !"#$%" '((")) '-%;"4%.(3%.$40 '-%;$+.$+ ?"%@$+A =$##-4.(3%.$4)0 '(("))
=$4%+$2 >$+ '992.(3%.$4):0 !"#$%" '((")) =2."4% *$>%@3+" *"(-+.%/
$%&%7
8(0(9*4: ;02(3+ .B-+"
!")$-+(" =$4%+$2) '99+$9+.3%"2/:0 64)%322 347 =$4>.B-+" '77.%.$432 *"(-+.%/ =$4%+$2)0
*"(-+.%/ C")%.4B %;" L9"+3%.4B */)%"#
$%C%C /(-1423H +A( /(4=(4 /*@+9?4( 6 *"(-+"2/ 64)%322.4B %;" *"+,"+ *$>%@3+"0 =$4>.B-+.4B'((")) =$4%+$2)0 *"+,"+ !")$-+(" =$4)%+3.4%)0 *"2"(%.4B 347 6#92"#"4%.4B
'-%;"4%.(3%.$4 347 84(+/9%.$4 C"(;4$2$B.")
$%C%# J?23+?2323H +A( /(-142+5 *@ +A( /(4=(4 6 J$BB.4B 567"4%.>/.4B J$BB.4B =393O.2.%.") 347!"K-.+"#"4%)0 !",."@.4B 347 !"%3.4.4B J$B I.2")0 '-%$#3%"7 J$B I.2" '432/).) C$$2):0
*"+,"+ H3(A-9 1+$("7-+") 5*"+,"+ D3%3 H3(A-9 1$2.(.")0 *"+,"+ H3(A-9 C/9")0
G3.4%3.4 3 C")% *"+,"+:0 !"($,"+.4B I+$# 3 *"(-+.%/ =$#9+$#.)"0 *"(-+.%/ C")%.4B
*"+,"+) 5F-24"+3O.2.%/ *(344.4B0 1"4"%+3%.$4 C")%.4B:0 !"#$%"2/ '7#.4.)%"+.4B 3
*"+,"+M
!"./0%),&12+) 34+0 $%)*&+,-$%#%" D?-:H4*13> ?3> /+?3>?4>. 6 G-2%.9-+9$)" 64%"+4"% G3.2 8R%"4).$4)0 G3.2 C+34)9$+%
*%3473+7) 5*GC10 *GC1 8R%"4).$4)0 1+$9+."%3+/ G3.2 C+34)9$+%):0 =2."4% '(("))
*%3473+7) 51$)% L>>.(" 1+$%$($20 64%"+4"% G"))3B" '((")) 1+$%$($20 1+$9+."%3+/ G3.2O$R
'((")) G"(;34.)#)0 S"ONH3)"7 G3.2 '((")):
TMUMT /2H323H ?3> K3-45I+23H K)?20 J(..?H(. 6 L9"41P10 *VG6G80 W"/ G343B"#"4%0 6))-")@.%; 8#3.2 84(+/9%.$4
$%#%7 G0?3323H ?3> J?3?H23H J?20 /(4=(4. 6 64)%3223%.$4 347 D"92$/#"4% 12344.4B0 *"(-+.%/G343B"#"4% *%3>>0 G343B"#"4% 1+3(%.(")0 */)%"# *"(-+.%/ 12340 Q-#34 !")$-+(")
!"K-.+"#"4%)0 P"4"+32 64>$+#3%.$4 */)%"# *"(-+.%/ 1+.4(.92")
$%#%& /(-1423H +A( J?20 /(4=(4 FI(4?+23H /5.+() 6 E973%.4B 347 =$4>.B-+.4B %;" L9"+3%.4B*/)%"# 513%(; 347 E9B+37" L9"+3%.4B */)%"#0 !"#$," $+ D.)3O2" E44"("))3+/
-
8/13/2019 Brochure for Information Security Professional Course
18/27
"#
!"#$%&"' )*+ ,--.%&)/%0*'1 20*3%45#" 6-"#)/%*4 !7'/"8 9'"# ,5/:"*/%&)/%0*1 20*3%45#"
;"'05#&" 20*/#0.' ,--#0-#%)/".71 "'/%*4
D)%. !"#$"#' EX5.*"#)M%.%/7 !&)**%*41 F"*"/#)/%0* >"'/%*4=1 ;"80/".7 ,+8%*%'/"#%*4 )
D)%. !"#$"#
!"#$%&'() +,& -,./,. -,)%.(0167#7" B.-**)*+ -*1 ,-*-+)*+ C%D $%(/%(05 #5'/"+ 6-"#)/%*4 !7'/"8'1 N"M
!"#$"# ,--.%)*&"'1 F#"LC)#+"*"+ 6-"#)/%*4 !7'/"8' )*+ N"M !"#$"#'1 X%#/5).%R"+
F.)/30#8'=
67#76
$%&'()*+ 4A% C%D $%(/%( E;%(-4)*+ $F04%: 5 P! E!!PU>P! 2)-)M%.%/%"'1 N")K*"''"' 03 !!PU>P!1 !!PU>P!
G*-/%0* !&:"8"'1 P!1 !!PU>P!
-
8/13/2019 Brochure for Information Security Professional Course
19/27
"#
!"#"# $%&'(')*+,'(- *.+ /+0 1+,2+, 3 $%&&'(& *+,-(.'/0'(& .1- $%&&'(& 23435'6'.'-7 %/ 38-5 9-:;-:< +,-(.'/0'(& =,,'.'%(36 $%&&'(& >-?@':-A-(.7< >-B%AA-(,-, C-(-:'B
$%&&'(& 2%(/'&@:3.'%(< >-;'-D'(& 3(, >-.3'('(& $%& E'6-7< =@.%A3.-, $%& E'6-
=(3607'7 F%%67G< 8-5 9-:;-: H3BI@4 J:%B-,@:-7 *8-5 9-:;-: H3BI@4 J%6'B'-7 3(,
9.:3.-&'-7< K3'(.3'( 3 F-7. 8-5 9-:;-:< K3'(.3'( 3( [email protected]%:'.3.';- 2%40 %/
L:&3('M3.'%(36 8-5 2%(.-(.G< >-B%;-:'(& E:%A 3 9-B@:'.0 2%A4:%A'7-< 9-B@:'.0F-7.'(& 8-5 9-:;-:7 *N@6(-:35'6'.0 9B3(('(&< J-(-.:3.'%( F-7.'(&G< >-A%.-60
=,A'('7.-:'(& 3 8-5 9-:;-:
"#$%&'()& *&+,-./&01 -2 345645#5" 6(%+,)*7(%'(- 892: 3 $'A'.3.'%(7 %/ +J;O< K3P%: E-3.@:-7 %/ .1- +J;Q 94-B'/'B3.'%(%@.'(&< +J;Q
3(, .1- R%A3'( V3A- 907.-A *RV9G< K@6.'1%A'(&< +J;Q K@6.'B37.< +J;Q W@36'.0 %/
9-:;'B- *W%9G< K%5'6- +J;Q< X@A5%&:3A7< =,,:-77 9-6-B.'%(< R0(3A'B S%7.
2%(/'&@:3.'%( J:%.%B%6 *RS2JG /%: +J;Q< +J;Q J:-/'U :-(@A5-:'(&
45#54 892: 1+; 892: ?+@AB=&+(* 3 9-B@:'.0 >'7I7< =,,:-77'(& 9-B@:'.0< F:3(7'.'%( K-B13('7A7< [email protected] +J;OZ+J;Q T(;':%(A-(.7< F@((-6'(&< F:3(763.'%(< L.1-: F:3(7'.'%( K-B13('7A7>0 ;Q>Q 24+=&N34O0 ;QH-9==&(4/. K @)9==&(4/. .496(3C4+6B90 R+)B
G:'.(/3')0 ?/C/(+8 >/C'+(:4&)0 >(&C+'3C4+6B90 5+',3= 1:=P&4 E&'&4+(/3'0 X&9
S+'+C&=&'(0 @,%+'.&, $'.496(/3' >(+',+4, Y@$>Z0 S&))+C& @:(B&'(/.+(/3' ;3,&
YS@; H+)&, 3' + H83.O ;/6B&4 @8C34/(B=0 S@;) H+)&, 3' R+)B G:'.(/3')Z0 ?/C/(+8
>/C'+(:4& >(+',+4,0 5>@
M"#"I D/9:)3 Q14 5(@%'80%/30/%1 RDQ5S ; >&.:4/(9 5&D:/4&=&'() 234 7X- ;3=63'&'()0 [email protected]/(&.(:4&)
P="=9==&(4/. ;496(3C4+6B90 X&9 S+'+C&=&'(
P="=M L88188-1(08 ; ;496(3C4+6B/. S3,:8& [+8/,+(/3' 743C4+= Y;S[7Z0 1+(/3'+8 [38:'(+49\+P34+(349 @..4&,/(+(/3' 743C4+= Y1[\@7Z0 -',:)(49 +', >(+',+4,) Q4C+'/L+(/3')
P="=P 21:130)(& +%4.0,&%'.A4 O -'/(/+(/3'0 @.D:/)/(/3']?&%&836=&'(0 -=68&=&'(+(/3']@))&))=&'(0 Q6&4+(/3') +', S+/'(&'+'.&0 ?/)63)/(/3'
K"E,;78:D= -5>8@G;L57C7D=" 20,%'&1 213/%)04 $F1%F)1H ; G/8& >(34+C& H+)/.)0 (34+C& >&.:4/(90
>&.:4/(9 ;3'(438) 234 >(34+C&
-
8/13/2019 Brochure for Information Security Professional Course
21/27
"#
$%"%" &'()*+, -./)01'2(. 3,/4.(5(+2,6 7 !"##"$ &'()* "+ ,-"./0) 1$2.'(-3"$&)24$"5"03)* 67855 93*: 1$2.'(-3"$; )26? ;*.*+,;,.' 7 2"#("$)$-* "+ .3*: #/$/0)#)$-; #85-3-3).)= .3*:
#/$/0)#)$-; -.8*- /$= -.8*-M".-43$)**; ".0/$3N/-3"$/5 285-8.); .)5/-3"$*43( /#"$0
:)' .3*: 2"$2)(-*
KDLDE @26? ;*.*+,;,.' 1)(/,66 7 +./#3$0 .3*:; /**)**3$0 .3*:; .)*("$=3$0 -" .3*:;#"$3-".3$0 .3*:
!">.?9@AB=59: '567 )66;662/*'2(. F K.*50626 3,/4.2J=,6 7 H)-M".: 93*2"A).'; H)-M".: @".- /$=,).A32) G=)$-3+32/-3"$;
-
8/13/2019 Brochure for Information Security Professional Course
22/27
"#
!"#$%&'()*+,'% ./0+1) 2'%+,%31%4/ 56*%%,%3 5('4100$%"%# &'(')*+,-. /0' 1*-/,-.'-23 4)5--,-. 4*),23 6/5/'7'-/!"#"# 1*-892/,-. /0' :9;,-';; :-? 2*3 4%105%'69 ,21>-? @%&A03. 2*3
B;;.)&% =&0'2C%9 D8&%'*2&% =)&%.9 E-?9 /'0&%1&)0* 0; 4%.0-'1%.9 D3A%'%*1% &0 =%1-')&6 70*&'08.9 :3%*&);)12&)0* 0;
D8&%'*2&% =&0'2C% 2*3 /'01%..)*C M21)8)&)%.9 L.% 0; N)CA D52)82F)8)&6 ONDP /'01%..%.
$%D%" 1),'-/L6'C('C 63;/'7; @ 78)%*&Q=%'5%' =6.&%(. 70*&)*C%*16 70*.)3%'2&)0*. R =08-&)0*.$%D%A
E')'2*779-,25/,*-; 63;/'7; @ H%8%10((-*)12&)0*. 70*&)*C%*16 70*.)3%'2&)0*. R=08-&)0*.
$%D%D M5,-BC57' 63;/'7; @ @2)*;'2(% 70*&)*C%*16 70*.)3%'2&)0*. R =08-&)0*.
-
8/13/2019 Brochure for Information Security Professional Course
23/27
""
!" $%& '()*+(), !-./0.1-12 34156/0-. 78-986:
#$% &'()*'(+ ,-./0.1-12 34156/0-. 78-986: ;,37< 02 4%209.%4 /- =%%> ?-18 %@>%8/02% 6.4
2=0AA2 1>46/%4B C-1 68% 8%D108%4 /- -E/60. F"G ,3+2 ;,-./0.10.9 34156/0-. +.0/2< %H%8? I ?%682
/- :60./60. ?-18 *'(+ 5%8/0J056/0-.B
C-1 68% 8%D108%4 /- 21E:0/ 4-51:%./68? %H04%.5% %H%8? I ?%682 -J ,3+2 %68.%4 E? ?-1B 3.5A-2%
64:0.02/86/0H% J%% -J K2 "LGGG >A12 /6@%2 6A-.9 M0/$ /$% 4-51:%./68? %H04%.5% -J ,3+2B
! #$%&'&%( )*+, -./0-1 23$45-0%./( *'&1-0$- %3 6-
,465&%%-1
7.8&545
)*+, &0 . 9
(-./ :-/&31
F #%65$0.9L /860.0.9
-8 0.2/815/0.9 0. 6
8%A%H6./ J0%A4
I ,3+2 >%8 $-18 -J 65/16A
/%65$0.9L /860.0.9 -8
0.2/815/0.9
FB N%2580>/0-. -J 5-./%./
5-H%8%4
"B N%A0H%8? 46/%;2%8 $-18 -J 65/16A
>8%2%./6/0-.
FB N%2580>/0-. -J 5-./%./
5-H%8%4
"B N%A0H%8? 46/%;2? -J >8%2%./6/0-.
P" ,3+2
I 768/050>6/0-. 0. 6
*'(+ 6>>8-H%4
&.412/8? 3H%./L
(%:0.68L Q-8=2$->
-8 ,-.J%8%.5%
F ,3+ J-8 %65$ $-18
2>%./ 0. 6 8%A%H6./
2%220-.
FB #$% /?>% -J 65/0H0/? 6//%.4%4
;%H%./L 2%:0.68L M-8=2$-> -8
5-.J%8%.5%%80%.5% F ,3+ J-8 %65$ :-./$ 0. 6
8%A%H6./ >8-J0A%
'-AA-M0.9 4%/60A2 -. %:>A-?%8
A%//%8$%64S
FB ,188%./ T-E /0/A%
"B U80%J 4%2580>/0-. -J M-8=
>8-J0A%
IB N186/0-. 0. /$02 T-E ;2/68/ 6.4
%.4 46/%2A-?%8
/$6/ /$% 56.4046/% 02 :%%/0.9
/$% %@>%5/6/0-.2VB (09.6/18% -J /$% 56.4046/%2
21>%8H02-8
IW ,3+2
V 71EA02$0.9 -J 6
8%A%H6./
>8-J%220-.6A R8/05A%L
Q$0/% 76>%8 -8
U--=
P ,3+2 >%8 68/05A% -8
M$0/% >6>%8X
"G ,3+2 >%8 >1EA02$%4
E--=
N%2580>/0-. -J /$% 5-./%./
5-H%8%4
Y0.= /- -8 5->? -J /$% >1EA02$%4
M-8=
P" ,3+2
W R5/0H% :%:E%82$0>
-J 6 *'(+ 6>>8-H%4
8%A%H6./ ,-::0//%%
Z U-684 Z ,$6>/%8 Z
R22-506/0-.
GB"V ,3+ J-8 %65$ :-./$
-J :%:E%82$0>
FB ,-::0//%% Z U-684 Z ,$6>/%8
Z R22-506/0-. 4%/60A2
"B 78--J -J :%:E%82$0>
IB #0:%J86:% -J 65/0H%
:%:E%82$0>
[ ,3+2
-
8/13/2019 Brochure for Information Security Professional Course
24/27
-
8/13/2019 Brochure for Information Security Professional Course
25/27
"#
!" $%%&'()*'+, -+./ 0+. 12./),2,*
324'5*.)*'+, 67/82. 0+. 9-:;2.*'0'()*'+, 1.+4.)/5
$%&'()*+,%)&
-./,(,0,* %1 2%)*./(+ 3+(*.+*&
4056)6, 2%)*./(+ 3+(*.+*/ 7.(8*)/(,9&
46.:;(.6>*6)(.< 1%) -23?4237 @-./,(,0,* %1 2%)*./(+ 3+(*.+*& 4056)6, 2%)*./(+ 3+(*.+*/
7.(8*)/(,9A +*),(1(+6,(%./ 6.: ,;*)*1%)* )*B0*/, 1%) 6CC%,=*., %1 D*)=6.*., E**)/%.6C (.1%)=6,(%. (/ 6/ 0.:*)J
"# $"%&!"#$%
'"(()*
+,$%
'# (")& *+ ',-).-,. '/0%1 2*,#
(# /&$(&-!*3,)* ',)*
"((-&00 +*- 1*%%2$,1"),*$45,#%3*0% 6 7/8$* 983:*# ; %1* 9,3* /< %1* =8")("0>
?%#**% 6 @/,( 6 =/8)*A,#(
B/C0 6 D"%.
?%,%*
D/80%#. EF9 D/(* 6 GFE
H3,") 4((#*$$
D*)) 6 '/:")* 083:*# E1/0* 083:*# IC"%1 F?- 6 ?B- J/(*K
E)*,$* 5,$%* ./8# #*J*0%
5,$$5/#% $"L* J/)/8#
51/%/>#,51 "0 %1"$ :/MN
(* $*) 0)"34&
1# *1123"),*$
IF0 J,$* ./8 ,#* ,"#$%&'#O 3*0%"/0 (*%,")$ $8J1 ,$
D/))*>*O J/8#$*O .*,# *%JNK
-
8/13/2019 Brochure for Information Security Professional Course
26/27
"#
!" !$$ %$&'()*
$%&' ()%*+ &,-./) 00000000000000000000000000000 (%+/100000000000000000000000000 *2) +," -./// 3&2&4)/*,&1%.5/6
$%&' 7%-/ 0000000000000000000000000000000000000000000000000000000000000 $)%&89 0000000000000000000000000000000000000
:%;2,) ?&01 +123,4565. 7896564 !:51;,3< *
-
8/13/2019 Brochure for Information Security Professional Course
27/27
!"#$%&'()"*
$% &'()*'(+ ,-./ -0 102 2345 6127850139/ ,-:5 19;582392 38 637>417-0139 03 @581=. 0?5 -7745059522 3= 0?5 19=38,-0139
>83@1656 A. ,5% & -B855 03 733>58-05 19 -9. 283@1656%
"% & 58-0139 19 283@1619B -9. 19=38,-01390?-0 12 =8-