Sie sind auf Seite 1von 5

PRISM – Overview of 28 Courses across 4 Trimesters

Trimester 1: Security Basics


C 01 Information Security Introduction
C 02 Physical and Environmental Security
C 03 Access Control
C 04 Network Security
C 05 Cryptography Fundamentals
C 06 UNIX Architecture
C 07 Windows Architecture

Trimester 2: Network Security & IS Audit


C 08 Internet and Web Security
C 09 Firewalls, IDS, IPS and Honey Nets
C 10 Wireless Communications and Telephony
C 11 Applied Cryptography
C 12 Computer Audit and Assurance
C 13 Cyber Crime Investigations and Forensics
C 14 Operations Security

Trimester 3: Application Security


C 15 Application Security
C 16 UNIX and LINUX Security
C 17 Windows Security
C 18 Web Application Security
C19 Security Models
C 20 Security Certifications
C 21 Security in Advanced Applications

Trimester 4: Enterprise Security Management


C 22 Business Continuity & Disaster Recovery
C 23 Cyber Laws & Anti Money Laundering
C 24 Enterprise Security Architecture
C 25 Security Incident Management
C 26 Cloud Computing & Virtualization
C 27 Information Security Management-Metrics and Compliances
C 28 Security Engineering and Information Security Risk Management

© MIEL e-security Pvt Ltd


Trimester 1

C 01 Information Security Introduction

Introduction to Information Security-World of Cyber Crimes-Information Assets & Operations-


Common Security Misnomers-Sound Canons of Info Security-Overview of Security Solutions-Info
Security Program-Overview of Standards & Metrics

C 02 Physical and Environmental Security

Relevance of Traditional Security even in modern days-Safekeeping of the Data & Records-Physical
Access Control-Human Issues-Nasty petty devices and related menace- Environmental Controls

C 03 Access Control

Full Spectrum of Access Control-Overview of Access Control Methods-Access Control Lists (ACL)-
Security Concerns

C 04 Network Security

Revisiting Network fundamentals - Network Protocols-Security Concerns of Computer Network-


Network Security Design-Network Security Administration-High Availability Technologies.

C 05 Cryptography Fundamentals

Introduction & Overview of Crypto-First Visit to Cryptology-Mathematical Foundation-Digital


Encryption Standard (DES)-Practical Implementation of Cryptography

C 06 Unix Architecture

Operating Systems Fundamentals-Kernel & Shell-Pipes, Filters and Redirection-File System-Rich


Command Set-Shell Scripts & AWK Scripts

C 07 Windows Architecture

Windows Origin & Development-Windows Architecture-Networking in Windows Building solutions


using MS Back-office-The WIN32 API-Processing-Memory & I/O Management

© MIEL e-security Pvt Ltd


Trimester 2

C 08 Internet Security and Web Security

Internet & Web Re-orientation for Controls-Overview of Protocols-Mapping Protocols onto OSI
Layers-Advanced Protocols-Security in non-Web modes of Internet

C 09 Firewalls, IDS, IPS and Honey Nets

Firewalls Introduction-Designing & Installing the Firewall system-Firewall Implementations-Intrusion


Detection & Prevention-Intrusion Detection & Prevention-Honey pots

C 10 Wireless Communication and Telephony

Wireless Communication Basics-Security Issues-Security Concerns-


Security Measures-Cell Phone Security

C 11 Applied Cryptography

Asymmetric Key Encryption-Digital Signatures & PKI-Other Applications of Cryptography-Security


Concerns in Asymmetric Crypto-Advanced Cryptographic Techniques

C 12 Computer Audit and Assurance

Origin & Progress-IT Controls: A Closer Look-Control Framework-IS Audit Steps-Assurance


Function

C 13 Cyber Crime Investigation and Forensics

Overview of Cybercrime-Electronic Evidence-First Visit to the Crime Spot-


Search and Seizure-Copying, Examination, Analysis and Reporting of Electronic Evidence

C 14 Operations Security

IT operations as Major Security Concern-Setting up the Infrastructure-Deployment &


Maintenance of Hardware & Networks-Installing and Configuring the software-Daily Operations-
processing & transmittal-Care of storage media-Support and Miscellaneous Services.

© MIEL e-security Pvt Ltd


Trimester-3

C 15 Application Security

Application Security Principles-Threats to applications-Application Vulnerabilities Secure Design &


Code Review-Threat Modeling

C 16 UNIX and Linux Security

Security Pre-view-Design Implications-File Systems-Account Security-Miscellaneous

C 17 Windows Security

Security Pre-view-Design Implications-Trust and Domains-Group Management Miscellaneous

C 18 Web Applications Security

Browser-based applications-Development of Web-based applications-Deployment of Web-based


Applications-Designing and Hosting a Web Site-Threats to Web Applications

C 19 Security Models

Concept of Security Model-Access Models-Multi-layered Models-Multi-level Models-Security


Evaluation-ISO 27001

C 20 Security Certifications

Introduction to Certifications-Vendor-Neutral IT Certifications-Brand-Specific IT Certifications-Post-


Certification Scenario

C 21 Security in Advanced Applications

Database Management Systems-Data Warehousing-Business Intelligence-Knowledge Management,


GIS, Applications handling spatial data-Artificial Intelligence and other advanced applications

© MIEL e-security Pvt Ltd


Trimester-4

C 22 Business Continuity & Disaster Recovery

Overview of DR / BC-Business Impact Analysis-Developing BC Strategies & Emergency Response-


Design & Implementing BCP-Senior Management Sanctions Testing, Training, Implementation &
Maintenance

C 23 Cyber Laws &Anti Money Laundering

Overview of Legal System-Origin & History of Cyber Laws-Broad Outline of IT Act, 2000-
Authorities empowered under IT Act, 2000 IT Act Amendments-Administration of Justice under the
Act-Case Law-Anti Money Laundering Laws

C 24 Enterprise Security Architecture

Basics of Security Architecture-Guiding Beacons-Elements of Security Architecture-Miscellaneous


Issues Living Architecture

C 25 Security Incident Management

Security Events & Incidents Nature, Symptoms & Impact-Incident Handling Process-Incident
Varieties-External Organizations.

C 26 Cloud Computing & Virtualization

Cloud Computing-Definitions-Hardware and Infrastructure requirements-Accessing the Cloud-Storage


and Standards-Developing Cloud Services-Various Utilities-Technology-Best Practices-Architecture-
Security and Privacy Issues-Securing the Virtual environment

C 27 Information Security Management-Metrics and Compliances

What are metrics-measurability-characteristics of a good metric system-application of metrics


system to various aspects of information security-calculating ROI

C 28 Security Engineering and Information Security Risk management

Principles of Security Engineering-SDLC-US-Laws-NIST standards-Information Risk Management-


End to End Security-Security in Social Networking-Prevention of Data Leakage-Virtualisation

Please note that with a view of maintaining the curriculum live and updated, there could be
some changes to this syllabus to ensure that PRISM students keep abreast with the latest
development in the information security sphere.

© MIEL e-security Pvt Ltd

Das könnte Ihnen auch gefallen