TITLE - (Gyalsung Cybersecurity Academy) Slogan - Imparting 21st Century Skills Writing Page About The Gyalsung Cybersecurity Academy is envisioned to empower our future generation with the right skill sets to embrace the 21st century challenges. The six months program will pave the way for smooth sailing when you embark on your journey further into your chosen career where university-recognized certificates will be awarded and in the long run you can even transfer credits should you choose to pursue your tertiary education within the country. The courses are designed with special attention to build market-ready skills and also engage industry experts to guide the cadets into real-world environments. Objectives The program aims to offer a platform for our young minds to quickly learn & master job related skills, industry tools and get ready for an in-demand career. The following skills will be imparted to the cadets: Basic cybersecurity skills First-level Security Operation Center services Basic programming skills/game development in python Key technologies in data science and business analytics Data mining, machine learning, visualization techniques, predictive modeling, and statistics. Data problem analysis and decision-making.
Courses (Program) Foundation Course The 2-month course will equip you with the prerequisite skills prior to taking up the specialization courses. The building blocks of the course are: ● Basics of Data and Data Structure ● Python Programming Fundamentals ● Linux Administration ● Network Fundamentals Basics of Data and Data Structure Given the significance of the data which gives data insights at later stages, it is essential for the cadets to learn and understand what makes data and how efficient data structures must be designed.The modules of the data and data structures which includes generating data, the application of the data, data storage and retrieval and common terminologies of the data will be useful in the core competencies stage. - Introduction to database - Common terminology - Data characteristics - Data storage - Data operations - Database design - Database access - Database users Python Programming Fundamentals Linux Administration Network Fundamentals
Specialisation Course: After completion of the foundation course, you will have the choice to select from the following 4-month courses: ● Digital Marketing ● Cyber Security Operation Center ● Game Programming (Software Engineering) ● Data Science Digital Marketing With every business going digital, companies will increasingly leverage the internet and adapt to Digital Marketing trends and strategies to influence consumer behaviour and convert their audience into paying customers.
Cyber-Security Operation Center The Gyalsung Cyber-SOC training will expose you to the industrys’ best practices, equip you with the latest skillset, widen your mindset to think from the practitioners’ perspective and help brace for future growth. Game Programming This course is designed to teach cadets the concept of programming by building games in an interesting way. The course will be for a period of 6 months. At the end of this course, the cadets will gain software development skills and a basic introduction to the game programming industry. Data Science The 6 months course will teach learners in basic python programming environments including fundamental python programming techniques to read and manipulate csv files, and the numpy library. The course will introduce data manipulation and cleaning techniques using the popular python pandas data science library and introduce the abstraction of the Series and DataFrame as the central data structures for data analysis, along with tutorials on how to use functions such as groupby, merge, and pivot tables effectively. Game Programming Topics Covered (few) Unit Title General Introduction to Game - General introduction to game programming Programming & Pygame Library - Game Graphics - Storyboarding Hands-on simple 2-D game - Video - Opportunities as game developer development using PyGame - PyGame concepts and basic PyGame program Introduction to collaborative tool - Drawing on screen - Input Handling Game Development in Group - Animation - Collision Detection - Storyboarding and game design - level design - Scoring system - Concept of git repo - Git commands using github - Git branching, merging - Use git - Develop a game in group - Students will work on their own or individually to come up with game ideas and develop a game based on their research and interest
FOUNDATION -> Topics Covered (few) Data Science Unit Title - Introduction to statistics Statistics - Level of Measurement - Data Presentation Data Analytics using Python - Measures of Variation - Describing data and hypothesis testing Blockchain in Data Analytics - Data Science Project Life Cycle - Data Exploration - Data Manipulation, classification, analysis and visualizations - Data modelling and machine learning - Introduction to Block Chain - Blockchain Algorithm - Blockchain Analytics Cyber Security Topics Covered (few) Unit Title Security Operation Center - Harden the Operating Systems - perimeter defenses to scan and attack own networks - Configure Network Inventory - how to manage a variety of incidents - Vulnerability Scanning
Network Defence - Signature Updates - Comprehend the Log Analysis Security Information and Event Management - Understand network security threats and vulnerabilities - Implement Network Security Controls and Protocols - Design and implement Network Security Policies - Define Physical Security Controls and authentication techniques - Configure Host Security and file system encryption - Firewall implementation and management - Configure and manage IDPS (Intrusion Detection and Prevention Systems) - Ensure and manage VPN security - Secure wireless networks - Monitor and analyze network traffic - Understand network risks and vulnerabilities - Network Incident Response and Management - Comprehend Intrusion Tolerance, Prevention and Detection - Comprehend characteristics of a Robust SIEM - Install SIEM systems like AlienVault - Set up threat intelligence systems like Intelmq, MISP, Hive - Use Web Interface - Configure Sensor, Server, and Logger - Configure Network Inventory System - Configure Vulnerability Scanners - Configure Signature Updates - Configure Ticketing Systems - Prologue to Cyberoam UTM - Install and configure Cyberoam - Monitor Security and logs with cyberoam - Report analysis of Cyberoam
Search
Read the Text Version
- 1 - 6
Pages: