ISBM University
PG Programs in India | PG Universities in India | ISBM Universities
Go Top
Find Course x
Find Course Apply online

MDP on Cyber Security and Privacy: Protect Your Identity and Data

This programme has been designed to provide specialized knowledge in security management. As organizations continue to deploy mission-critical network-centric information systems, managing the security of such systems will become more critical. The challenge is as much about securing networks, communications, data, and applications as it is about awareness of best practices on what is to be done and how it is to be integrated to the organizations operating environment and enterprise architecture.

Therefore, from the perspective of the organization, an understanding of how information security can be managed at organizational level keeping in mind the major information security standards (such as ISO 27001) and the legal provisions (such as IT ACT, 2000;2008) is important. This course is designed to provide a comprehensive framework for planning, analyzing and managing information security to suit to the differing requirements at individual and organizational level. This program also covers the major cybercrime incidents, discusses how they happened (the techniques/ methods used, motivation), and the learning’s from such incidents.


Apply Now

  • Give an understanding of the global threat scenario and how these cyber crimes happen. What are the major categories of cyber
  • crime and what precautions and safeguards can be deployed to minimize the damage  An understanding of Information Security, Trends in security incidents, The Need for Security; Threats such as Malware attacks
  • Phishing, Identity theft, Botnets, SQL injection, Insider risk and Spam, mobile risk.  An exposure on the various aspects of information security including confidentiality, integrity and availability of information resources;
  • Information security Governance issues.  Tools and techniques available to ensure confidentiality, integrity and authentication in the cyber space such as such as Firewall,
  • Intrusion Detection System, Virus Protection System, and Elements of Cryptography, digital signature, digital certificates, Public Key Infrastructure, Role of Central Certifying Authority etc  Precautions to take in online business, in using social media and using e-mails etc.
  • Analysis of the operating environment and sensitivity of information to suggest information security best practices/controls and Risk
  • Management Framework for an organization, Security Policy Development, Sample Security Policies.  Integrating the leading global frameworks and other practices and standards such as ISO 27001: 2013, NIST (FISMA), COBIT, PCIDSS
  • within the organization and inter-organizational relationships.  Approaches for assessment and evaluation of the necessary investment in information security from the economic view point.
  • Security audit and compliance
  • Understanding Privacy requirements. Critical factors in accommodating the security and privacy requirements in outsourcing arrangements, BPO and ITES Industry, e-Commerce, e-Government etc.
  •  Give exposure on legal aspects of information systems security including discussions of HIPAA, SOX and Indian IT Act 2000 and its amendments
  • Specialized knowledge on various issues in management of security.
  • To identify and assess security risks, formulate and implement security policies. To identify the key challenges managers face when  creating the risk control framework in order to achieve alignment of information security best practices to business requirements.
  •  To analyze different options for maintenance of the security infrastructure
  • Evaluating Information security Investments; security audit and assessment
  • An understanding of key standards, legal requirements, etc

Enquiry Form