Information & Cyber Security Analyst -
AI Integrated
Product Literature
www.neotiaskill.com
Program Name : Information and Cyber Security Analyst (AI Integrated)
NSQF Alignment : QP No - SSC/Q0903 Level 5
Course Structure :
- Course is of a duration of 530 Hrs.
- Includes theory sessions, extensive LAB exercises, several project assignments and end term Capstone Project
- Validated by industry partner, WEBEL and Approved by NASSCOM
Designed For
1. Graduates and students in the final year
2. Engineering, Technology graduates and students who wish to make a career in Future Skills
3. Business School students who wish to make a career in emerging technology
4. IT professional for making career progression
5. Corporate professionals to upskill themselves
www.neotiaskill.com
Cyber Security Experts - a growing professional career
1. The society and corporate world is getting impacted everyday due to cyber security threats. Businesses nowadays
are strongly data driven and information systems are getting more and more robust. Almost all services are
application system driven and, backed by strong network, people at large have become the highest beneficiary of
such online systems
2. All these are facing threat every moment due to cyber attacks on all these fronts - network security, information
security and application security. Huge investments are being made to ensure that such security is not breached by
cyber attacks.
3. While industries are getting ready, at the same time cyber attackers are also evolving newer means to penetrate
the cyber threat barriers. Industry, therefore, needs the right resources skilled adequately to handle such events
and prevent attacks
4. Industry is looking for skilled professionals who can protect industries from these evolving threats and demand far
outweighs the supply and the demand is growing exponentially
www.neotiaskill.com
What industry is looking for
1. Industry is increasingly dependent on data and information systems, making cybersecurity a top
priority requirement, as cyber attackers are also evolving newer means to penetrate the cyber threat
barriers
2. There is a growing need of professional skilled adequately to preempt such events, prevent attacks,
guard against vulnerability across network, information, and application security domains
3. The demand for cybersecurity experts skilled in using AI to prevent attacks is outpacing supply.
4. Organizations seek professionals capable of detecting and mitigating threats using advanced
technologies and create security barriers to Application system, network system and information
system.
5. Industries need individuals who can handle incident responses, and vulnerability assessments, and
develop secure coding practices.
www.neotiaskill.com
Why this course
1. The course equips individuals to handle critical cybersecurity threats and vulnerabilities, offering
hands-on experience with industry-standard tools
2. It integrates AI into cybersecurity, a vital trend for improving threat detection and response.
3. Trained participants will have opportunities to engage with industry experts, participate in
projects, and earn a NASSCOM certification, enhancing credibility in the job market.
4. The course offers flexible learning through live, interactive sessions with real-world scenarios,
improving both practical and theoretical knowledge
5. The hybrid learning model and access to the Cyber Security Centre of Excellence offer unique
online and offline learning advantages.
www.neotiaskill.com
Program Uniqueness and Value Proposition
1. This course has uniqueness in terms of equipping to address CYBER SECURITY THREATS, VULNERABILITY,
DETECTION, INCIDENT RESPONSE AND MANAGEMENT in four impact areas - INFORMATION SECURITY,
NETWORK SECURITY, APPLICATION SECURITY, FORENSIC
2. All the modules are blended with sessions on AI-based threat detection and secure coding practices
3. Opportunity to get engaged with Cyber Security Centre of Excellence of WEBEL
4. Exposure to real-world cybersecurity problems through projects, preparing participants for immediate
industry roles
5. Industry-recognized certifications from NASSCOM and participation in capstone projects to demonstrate
applied knowledge
6. industry partners are engaged with the program and access to expert trainers with industry experience
7. Live classes with presentations, demonstrations, case studies - both in classroom mode with remote access
and in virtual mode
www.neotiaskill.com
Course Differentiation
1. Practical experience with advanced cybersecurity tools such as Kali Linux, Metasploit, and Splunk.
2. It’s not a course for awareness building. You will be trained to detect cyber threats, locate
vulnerability, incidence response, manage & mitigate threats
3. Uniquely designed and vetted by NASSCOM with AI integration with each module makes the
professionals future ready
4. Lesson plan drilled down to ensure trainee get exposed to real-world cyber security problems
through projects, assignments, simulations etc.
5. The hybrid learning model with facility of live streaming of classes - ensuring physical locations donot
come in the way.
6. Flexible learning through live, interactive sessions with real-world scenarios and practical exposures
7. Opportunity to Upskill for IT professionals for career shift
www.neotiaskill.com
Program Delivery Pedagogy Practical Sessions
● Interactive theoretical sessions to cover fundamental and advanced Hands-on exercises with cyber security
concepts. tools and AI applications, such as:
● Practical sessions in a controlled environment to apply theoretical ○ Network security simulations
knowledge. ○ Ethical hacking and penetration
● Real-world scenarios to enhance problem-solving skills. testing
● A comprehensive project to apply learning in a practical, real-world ○ AI-based threat detection and
context. response
○ Incident response and management
● Regular quizzes, assignments, and exams to evaluate understanding and
progress. ○ Secure coding practices
www.neotiaskill.com
Learning Outcome
After completing this programme, participants
1. Will have a strong foundation in the principles and practices of cyber security..
2. Can develop intermediate and advanced skills in identifying, analyzing, and mitigating cyber threats.
3. Will be able to integrate AI techniques and tools in enhancing cyber security measures..
4. Hands-on experience with real-world cyber security tools and scenarios.
5. Make the candidates professionally qualified to build careers in cyber security with nasscom certifications
Trainer Profile
1. All experienced trainers in Cyber Security domain with experience on using the tools as well as business
functional experience
2. Program Director is a well known Data Scientist with credential for AI based application development and
business analytics for several industries
3. Trainers from WEBEL Cyber Security Centre of Excellence
www.neotiaskill.com
Job Role and Opportunities Open after getting trained
1. Information Security Analyst: Responsible for protecting data by analyzing security
breaches and developing protection strategies.
2. Cyber Security Consultant: Advising organizations on how to mitigate risks, improve
security posture, and prevent cyber attacks
3. AI-Integrated Security Specialist: Using AI for advanced threat detection, vulnerability
management, and incident response
4. Ethical Hacker/Penetration Tester: Conducting vulnerability assessments and penetration
tests to identify security flaws
5. Network Security Engineer: Implementing security solutions for organizational networks,
including firewalls, VPNs, and advanced encryption.
www.neotiaskill.com
Broad Course Coverage
SECTION A : INTRODUCTION TO INFORMATION, NETWORK & CYBER SECURITY - ( SECTION C : NETWORK SECURITY AND FORENSIC - (60 hrs )
120 hrs)
Module 11 : Network Security
Module 1: Introduction to various operating systems, network systems,
Module 12 : Forensic Analysis
and digital forensics
Module 13 : Advanced Network Security Solutions
Module 2 : Fundamental Concepts in Cyber Security
SECTION D : INFORMATION & APPLICATION SECURITY (125 hrs )
Module 3 : Introduction to Network Security
Module 4 : Cyber Security Policies, procedure, standards and Module 14 : Technological Developments in Application
Security
Governance
Module 15 : Web and cloud application security
Module 5 : Introduction of AI in Cyber Security
Module 16 : Information System Security features and
SECTION B : CYBER SECURITY THREATS, VULNERABILITY, DETECTION,
management
INCIDENT RESPONSE AND MANAGEMENT (105 hrs )
Module 17 : Web Application Secure Configuration
Module 6 : Identification of Cyber Security threats and vulnerabilities Module 18 : Monitoring Application Security
Module 7 : Threats and vulnerability analysis Module 19 : Secure Software Development
Module 8 : Incident Response and Management Module 20 : Advanced Cryptography
Module 9 : Ethical Hacking and Penetration Testing Module 21 : AI-driven Security Operations
Module 10 : AI Techniques for Threat Detection SECTION E : Employability Skill and Capstone PROJECT
www.neotiaskill.com
Register for Admission
APPLY FOR ADMISSION
Click Here
Call Us At
70444 74443 | 8296654950
Mail Us At
[email protected]
Apply Online Please note that Neotia Skill Development Academy is a unit under
Ganpati Medical Institute, A section 8 company under Indian Company
Act.
www.neotiaskill.com
FAQ
1. XXXXX
a. YYYYY
www.neotiaskill.com