Posted by : Siva Priya Saturday, 24 October 2015

This program lies in the Infrastructure Management space and acts as a value add to working professionals in networking background who would like to upgrade themselves to security operations.
Becoming Ethical Hacker enables the individual to conduct penetration testing to assess the vulnerability in the IT system of an organization. This is required by many organizations as ISO/IEC 27001 is increasingly becoming mandatory security compliance that is governed by customers globally.

Why it is BIG?
Cybercrime is increasingly on the rise. According to a report India lost 8 bn dollar in 2011 due to cybercrime and is ranked 5th in e-commerce breaches. Govt of India has also recognized the need for building capability to fight against hackers and as a result also rolled out India's first cyber security policy in 2013. According to NASSCOM, India requires about 77,000 ethical hackers every year while Forbes has ranked Ethical Hacking as the no.2 in high paying jobs of the future.

Program Highlights :
1.Expert Faculty : Renowned Evangelist, Researchers and Practitioner from the Info security world to train professionals on the concepts and best practices of Ethical Hacking
2.Program structure and pace designed to enable learners to comprehensively grasp the concepts
3.Program is bundled with International Certification – RISC Redback International Security Council.
4.35 GB of real life hacking tools that are used by hackers underground
5.Enabled with Cloud Services
a)      Cloud Classroom: Learn from the experts
b)      Cloud Courseware: Anywhere access to the courseware
c)       Guided virtual labs to practice exercises from anywhere.
d)      Cloud Bytes: Blogs/Journals, updated material
e)      Focused Cloud learning complimenting what you learn in class
6.Invitations to focused and closed door technology webinars
7.Special Capsule on Indian Cyber Laws
8.Online screening test to assess the pre-requisite skills to undertake the program

1.Working professionals with 1-3 yrs of experience in IT
2.Knowledge of networking concepts and implementations especially TCP/IP fundamentals
3.Working knowledge of operating systems UNIX, Linux

Further Details :
Training Coordinator

Leave a Reply

Subscribe to Posts | Subscribe to Comments

Follow by Email

Google+ Followers


Cloud Label

Blogumulus by Roy Tanck and Amanda Fazani

Blog Archive

- Copyright © 2013 Redback IT Academy -- Powered by Redback - Designed by @ Redback Studio -