Cyber Security for the 4-year B.Tech (Hons.) program at Quantum University

B.Tech (Hons.) in Computer Science & Engineering with specialization in Cyber Security in Collaboration with Quick Heal Academy

Quantum University, Roorkee is offering a 4-year B.Tech (Hons.) program with specialization in Cyber Security putting forth a perceived Bachelor of Engineering degree in Computer Science with specialization in Cyber Security. The extraordinary program is meant to improve mindfulness and redesign the abilities of software engineering graduates to make them equipped for shielding the internet from potential threats.

At Quantum University, we mold Engineers out of quality education that can shape the cutting edge technology. We have designed unique “Hands-on” curricula to strengthen the creative spark of students. No wonder our students design all-terrain vehicles, raise steel bridges, animate video games and harness solar power to racing cars. We create engineers who can shape scientific theory into the realm of real life and real time applications.

Program Highlights

With increasing incidents of large scale cyber-attacks, governmental and corporate espionage, the demand for cyber security professionals has increased significantly in the past one year.

Understanding the effect of cyber threats and the constantly changing face of technology, this programme focuses on creating a pool of cyber security professionals to reduce the demand-supply gap in the industry.

Quantum University has collaborated with Quick Heal Academy and designed a B.Tech (Hons.) program with specialization in Cyber Security.

  • Interaction with industry
  • Course designed by industry experts
  • Hands-on training in the domain of Cyber Security
  • Learn network monitoring, threat analysis tools and code analysis tool

CAREER OPPORTUNITIES

“The more you gain knowledge, the more protective you will be”.

A 4-year B.Tech (Hons) with specialization in Cyber Security focuses covering theory as well as practical methods used to protect data and the cyber infrastructure.

Students go through hands-on training and interact with the industry experts to understand the technical and analytical skills required for a successful career in cyber security.

The demand for cyber security professionals is in both technical and as well as non-technical companies. They can expect great placements offers in top multinationals and research jobs in various industries. Following are some of the job profiles in the domain of cyber security and information security:

Security Analyst Security Engineer
Security Architect Security Administrator
Cyber Forensics Solutions Architect/Tech Consultant Risk Analyst
System Administrator Intelligence analyst

Read more about this programme on University website-

http://quantumuniversity.edu.in/engineering/quickheal-cyber-security-engineering

About Quantum University

In the year 2008, Quantum Global Campus was established which started in a sprawling 30 acres campus located in the Higher Education Mecca of India, Roorkee known for IIT Roorkee. Right from inception, Quantum has focused on delivering quality education and getting the best placements for their students.

Quantum was upgraded to a university status in 2017. Quantum University is a full-fledged university established by Uttarakhand State Legislature and is included in the list of universities maintained by University Grants Commission (UGC) under Section 2(f) with the right to confer degrees as per Section 22(1) of the UGC Act, 1956.

The University offers inter-disciplinary programs, all of which are designed to be industry-relevant. Here students can choose interesting Major-Minor combinations and can skill themselves in multiple domains. Quantum is today considered one of the top institutions in North India.

Quantum University believes that passion and profession are two faces of a single coin. One nourishes the body, other feeds the soul. At Quantum, students are asked to take up passion programs as per their choice. Quantum, encourages the students to pursue their passion while studying at Quantum and excel in the field. Students no longer have to give up on their passion to pursue their careers. Through this the students have a chance to grow under a guided and structured format and achieve excellence in the chosen passion program. At the end of the program students would be expected to showcase their work in front of a live audience.

Test1

About the training

Quick Heal Academy aims to ensure that students passing out after their graduation and post-graduation courses should be industry ready. In that regard the knowledge of books should be combined with the practical knowledge with the hands on experience of the Cyber Security industry.

To bridge the gap QHA proudly offers up to 6 Weeks/Months training to the students who are looking to make their career in the Cyber Security domain.

QHA offers

  • Up to 3 months industrial training (Project Training) for BTech, BE, MCA, MSc (IT) and other students.
  • Up to 6 months industrial training (Project Training) for BTech, BE, MCA, BCA, BSc (IT), MSc (IT) students.

Training Highlights

  • Hands-on training of Cyber Security.
  • Training provided by Industry Experts from Quick Heal.
  • Exposure to Industry Processes & Methodologies.
  • 100% Job-Oriented Training.
  • Opportunity of Live International Projects Exposure.
  • Certification & Training Letter on Completion.

Eligibility

  • Graduation and Post-Graduation students seeking for an Industrial Training in the domain of Cyber Security.

Frequently Asked Questions

What are the eligibility criteria and what prior knowledge do I need to possess before enrolling myself for the training programme?

The candidate has to be the student of graduation or post-graduation, pursuing courses like BTech, BE, MCA, MSc (IT), and BSc (IT). Basics of technical concepts are usually sufficient to enroll for the training.

What are all the Training locations?

Currently, the training will be offered in the following four cities.

  • Pune:

    Location 1: Marvel Edge, Office No.7010 C, and D, 7th Floor, Viman Nagar, Pune – 411014

    Location 2: CTS No-1442-1445,Thube Park , Behind Sancheti Physiotherapy Centre, Shivaji Nagar, Pune – 411005

  • Delhi:

    2nd Floor, 9, DLF Industrial Area, Moti Nagar, New Delhi-110015.

  • Bangalore:

    Pride Hulkul, Office No.202, 2nd Floor, Lalbagh Road, Diagonally Opposite Passport office, Bangalore – 560027, Karnataka, India.

  • Kolkata:

    Office No.702, (7th Floor), Diamond Heritage Building Fairly Place., 16, Strand Rd, Fairley Place, BBD Bagh, Kolkata, West Bengal 700001

How do I get enrolled/register myself / or raise a query for the training?

For enrollment or to register yourself, please logon to www.quickhealacademy.com > industrial training > apply now and fill in the form.

You can write to us at [email protected] OR call us on- + 91-9999688588/+91-9545778888 on all working days (Monday to Friday 11 am to 5 pm)

How will I pay the fees?

We have shared the details on the application form. You can pay the fees by online fund transfer (RTGS/NEFT/IMPS) and share the transaction details with us.

Is there any refund policy?

There is no refund policy for the fees once paid to the company.

When will the training begin and end and what will be the timings and days of the training?

  • For 3 months- Training usually starts in the month of April, however for different colleges there are different requirements thus we customize it accordingly.
  • For 6 months- Mostly this part of training starts in January, but again as per the requirements of the University we rework on the schedule part.

The timings of the training are 09:30 AM to 06:30 PM from Monday through Friday.

Do I have to carry my own Laptop for the Training?

Yes, Students have to carry their own laptops.

Who will be our Trainers?

Subject matter Qualified and Experienced Industry Experts will be conducting the trainings.

Is there any dress code for the trainings?

Since, it is an Industrial training we recommend to be in formals from Monday to Thursday and Friday is when the student can wear casual clothing like Jeans, Collar T-shirts etc.

Testimonials for 45 Days Industrial Training at Pune

I have learnt from this training of how to be curious and learn in practical way. The trainers provided were very helpful, always available and very resourceful.

Asif Shaikh

How to be curious was one of the important key plus everyday news session and assignment were very much helpful.

Jayesh Rajesh Gehlot

The actual perspective towards information security got changed. Manual testing , different views towards gathered information can said to be as key takes from this training. Both the trainers were very much helpful and cooperative throughout the training sessions. The practical sessions taken by them was much helpful.

Saurabh Banwaskar

Learnt the practical implementation, fast learning of new things, having a proper order of implementing concepts. basic concepts should be emailed to the students before the training starts for better grasping

Anmol Bava

I understand the main thing how industry works. The whole Quick Heal Academy team helps me a lot in each and every way and the support provided with the team was great. It really helped me to explore this field. I really loved the way of trainers how they teach, they helped me in each and every way and help me to understand what actually cyber security is.

Akash Agarwal

Learnt all the basic concepts which one would require to enter Cyber security domain and practised everything practically.

Kirti Vilas Nagargoje

I’ve finally found here the scroll of truth! “You don’t become a hacker by installing kali linux”. We have previously covered the CEH syllabus and even after joining, I had an thought in mind that most of the things going to be remain same and would just refresh what I learned previously. But soon as the training started I realized, we should know the way to dig information manually rather than depending upon on automated tools like Qualys, Nessus, Nikto, Acunetix, and alike. To become an pentester one need to be able to break into the systems manually and be able to gain root/administrator privileges on that system you are breaking which cannot be done without knowing in depth, which I got to know here, what steps I need to follow. One most important thing I should quote here is, not only the module which were provided in prospectus was covered but also we had an daily news hunt session where we discussed the security threats happened previous day, which was really helpful. Sessions were interactive and trainers helped us, to get started with root-me challenges. The trainers also helped us all the time and answered all our mail whenever we faced any problem.

Harshit Agrawal

Cyber Security for the 4-year Undergraduate program at Chitkara University

UG Program in Computer Science Engineering with specialisation in Cyber Security jointly conducted by Chitkara University and Quick Heal Academy.

Chitkara University, Chandigarh is offering a recognized Bachelor of Engineering degree in Computer Science with specialisation in Cyber Security. The unique program aims to enhance awareness and upgrade the skills of computer science graduates to make them capable of protecting cyber space from potential threats.
At Chitkara University, our Engineering students receive a quality education that prepares them to advance the frontiers of technology. Through our “Hands-on” curriculum, students design and construct all-terrain vehicles; design, build and load steel bridges; produce computer animations and video games; and harness the power of the sun to race cars that they design, build and test. Our engineers don’t just learn theory – they expand upon it and apply it.

Program Highlights

Chitkara University has collaborated with Quick Heal Academy with an objective of increasing Cyber Security professionals in the industry and has introduced specialization in Cyber Security for CSE students after 4th semester.

PROGRAM OVERVIEW

Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, security includes both cyber security and physical security. Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.

The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it.

Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it.

Know More

CAREER OPPORTUNITIES

It is estimated that India will require five lakh cyber security professionals by 2015 to support its fast growing internet economy as per an estimate by the union ministry of information technology. The financial sector alone is expected to hire over 2 lakh people while telcos, utility sectors, power, oil & gas, airlines, government (law & order and e-governance) will hire the rest. The country’s information security market is expected to grow by 18% to reach Rs 1,415 crore in 2013. Despite a continuing economic slowdown cyber security would continue on an upward trajectory, reaching $86 billion in 2016, up from $60 billion in 2012.

All graduating engineers with specialization in Cyber Security, may find excellent placements in research-oriented industries and top ranking global companies and may start their career as:

Cyber Security Specialist

Security Software Developer

Cyber Forensics planning and expansion specialist

Security Architect

Security Network Engineer

Cyber forensics malware analyst /examiner/engineer

Risk Analyst

Security Network Engineer

Cyber Security Architect

Cyber Operations Analyst

Security Analyst

Cyber security administrator

Cyber Threats Analyst

Security Consultant

Intelligence analyst

System Administrator

Cyber Forensics Solutions Architect/Tech Consultant

Information Security Analyst

Expert at Antivirus firms

Computer and Information system manager

Network security analyst

About Chitkara University

In the year 2002, Chitkara Educational Trust established Punjab campus 30 kilometers from Chandigarh, on the Chandigarh–Patiala National Highway. In the year 2010 Chitkara University was established by the Punjab State Legislature under “The Chitkara University Act”.

Chitkara University, the best university in Punjab is a government-recognized university with the right to confer degrees as per the Sections 2(f) and 22(1) of the UGC Act, 1956.

The sprawling campus of the University is equidistant from Chandigarh, Mohali, Panchkula, Ambala and Patiala. The University offers multi-disciplinary programs, all of which are designed to be industry-relevant. As a result of this student-centric approach, Chitkara University is renowned as one of the best private universities in the North India region. From business management programs to programs in nursing and medical laboratory technologies; and from computer science, electronics and mechanical engineering programs, to hotel management and architecture—Chitkara University, Punjab is a veritable cornucopia of educational services.

M.Tech in Information Security jointly conducted by Pune University (SPPU) and Quick Heal Academy.

Programme Summary

Savitribai Phule Pune University is offering a recognized M-Tech degree in the domain of Information Security. The programme aims to enhance awareness and upgrade the skills, and provide professionals capable of protecting the cyber space.

With the growing use of computer and information technology in various aspects of daily life and at a point when there are growing concerns about cyber security security, it is paramount that we wake up and take steps to protect our cyber infrastructure and this is only possible through a skilled work force.

Notification for Admission by DoT, SPPU http://campus.unipune.ac.in/Pre_Admission_Process/Notifications/Technology_2018_2019.pdf

Programme Highlights

Savitribai Phule Pune University (Pune University) in collaboration with Quick Heal Academy have jointly designed M – Tech (Information Security), Weekend Programme which will help in creating skilled and employable workforce in the area of Cyber Security, Cyber Forensic, Cyber Crime Investigation, Cyber Threat Intelligence, and Malware Analysis & Reverse Engineering.

 

Highlights of the programme

  • The duration of the program is 2 years divided into four semesters.
  • The lectures shall be conducted on weekends only.
  • In total the program consists of 100 Credit.
  • Duration of contact hours: 1500 (Classroom teaching – 500 hours and Online study and tutorials – 1000 hours)
  • The program shall be conducted jointly by the Department of Technology, Savitribai Phule Pune University and Quick Heal Academy
  • Degree shall be awarded by Savitribai Phule Pune University
  • Interaction with industry
  • Course Designed by Industry Experts
  • State of the Art Cyber Lab

Programme Structure

A comprehensive program spread over four semesters covering the following streams.

Semester – I

  • Algorithms and Programming
  • Systems and Network Security
  • Cryptography
  • Internet Technologies and Protocols
  • Security Architecture
  • Mobile Security
  • Development – I

Semester – II

  • Vulnerability Assessment and
  • Penetration Testing
  • Operating Systems Security
  • Cryptography Advanced
  • Cyber Law

Semester – III

  • Vulnerability Management
  • Security Monitoring
  • Forensics – I
  • Development – II
  • Malware and Reverse Engineering

Semester – IV

  • Governance, Risk and Compliance
  • Forensics – II
  • Development – III
  • Security Management
  • Dissertation

Followed by Assignments in each semester & a Dissertation.

Fee Structure

Total course fees (without GST)

Rs. 4,50,000.00

Total Fee Split
Department of Technology, SPPU:   Rs. 1,21,588.00
Quick Heal Technologies   Rs. 3,28,412.00
Total Fee Split with GST
Department of Technology, SPPU No GST Rs. 1,21,588.00
Quick Heal Technologies 18% GST Rs. 3,28,412 + 59,114.16
= Rs. 3,87,526.16
Total Amount Payable (inclusive of GST) Rs. 5,09,114.16
Annual Fee Breakup
Department of Technology, SPPU Rs. 60,794.00
Quick Heal Technologies Rs. 1,93,763.08

Important Dates

Particulars

Dates

Starting date of online filling form 13th April 2018 (Friday)
Last date for filling the form online

Extended

22nd July 2018 (Sunday)
Last day for physically submitting the form To be declared
Entrance exam date (Extended) 29th July 2018 (Sunday)
Entrance exam Time Morning Shift
Result declaration to be declared
Date declaration for interview To be declared
Final result declaration To be declared
Course starting date Tentatively 1st August 2018

Eligibility

Successfully completed Bachelor of Engineering or Bachelor of Technology from a UGC /AICTE (or equivalent body) recognized University.

About SPPU

Savitribai Phule Pune University is one of the finest and most popular educational centers in the city. It offers excellent programs in various areas including Science,Commerce, Arts, Languages and Management Studies. Popularly known as the ‘Oxford of the East’, SP Pune University has about 307 recognized research institutes and 612 affiliated colleges offering graduate and undergraduate courses.

DEPARTMENT OF TECHNOLOGY

Savitribai Phule Pune University’s Department of Technology aims at providing research platforms for solving cutting edge industry relevant research problems.

The Department runs Industry-University sponsored M.Tech – Ph.D. integrated programs. Four Technology boards have been established under the umbrella of ‘Faculty of Technology’.

Department of Technology promotes industry-academic interaction in true sense, by providing a formal platform for doctoral candidates to carry out industry sponsored research projects. The sponsoring industries partner with the University to define quality research problems of relevance.

About QHA

Quick Heal Academy (QHA) is a division of Quick Heal Technologies Limited, headquartered in Pune, Maharashtra, India.

Quick Heal Academy is a premier institute engaged in supporting and securing the cyberspace. QHA imparts cyber security education programmes globally with an objective of building a talent pool of cyber security professionals. QHA committed towards providing awareness around the ever-changing and evolving cyber security domain and creating security professionals that help deter the threats with the strong cyber skill-sets.

The Academy offers online, classroom, corporate and need based training courses with the objective to empower organizations and government in effectively addressing cyber security challenges and contribute towards strengthening the cyber security ecosystem.

MISSION

  • To encourage the development of education and training programs in the area of information security and cybersecurity.
  • To support the government and industry needs and to be instrumental in capacity building with collaboration and cooperation with stakeholders.
  • To partner with educational institutions globally to establish centres of excellence for awareness and skill development.
  • To be an enabler to educate and facilitate awareness on cybersecurity regulatory framework and compliances.

VISION

To be the premier educational institution engaged in creating educated and employable workforce capable of Securing and Creating a Safer Digital World.

VALUES

  • Progressive – We recognize that improvement is continuous. We are curious and committed pursuers of positive change.
  • Agile – We are focused, intuitive and flexible in our service.
  • Collaborative – We work in partnership to achieve shared goals.
  • Trusted – We are relentless in our drive to generate trust through our credibility, knowledge, and expertise.

Career Prospects

  • Cyber Forensics Solutions Architect/Tech Consultant
  • Cyber Forensics planning and expansion specialist
  • Cyber forensics malware analyst /examiner/engineer
  • Cyber Security Architect
  • Cyber security administrator
  • Intelligence analyst
  • Information Security Analyst
  • Expert at Antivirus firms
  • Computer and Information system manager
  • Network security analyst

Contact us

Please intimate me all the important days (which includes admission date, course commencement date, online form submission date, entrance exam dates etc)
Particulars Dates
Starting date of online filling form 5th April, 2018 (Thursday)
Last date for filling form online To be declared
Last day for physically submitting the form To be declared
Entrance exam date 10th June 2018, (Sunday)
Entrance exam Time Morning Shift
Result declaration 30th June, 2018 (Tentatively)
Date declaration for interview To be declared
Final result declaration To be declared
Course starting date Tentatively 1st August,2018
Starting and ending date of generating challan To be declare
Where will I find the list of the candidates who have been selected?

At the notice board of Department of Technology (DOT), Pune University.

Is there any entrance exam for admission and if yes, what will be the mode of entrance exam?

Yes, there is an entrance exam for admissions and the mode of entrance exam will be offline at SPPU premises.

What is the process for entrance exam?

Once you fill in the admission form (available at URL provided at the SPPU Website), fill in the form and submit the hard copy of the form along with the challan at DOT SPPU premises.

After you submit the form you will be intimated about the entrance exam through an e-mail or a phone call.

Is the admission form available offline? If not then please provide the URL for filling the admission form?

No, the admission form is only available online and the SPPU Website.

Whether the complete filled form be submitted online?

No, the form is only filled online and then the hard copy is submitted offline at DOT SPPU premises.

What all are the documents required to be attached while filling the form? Also mention all the additional requirements apart from the documents as well.
  • Mark sheets: High School, Intermediate, Graduation, or any other diploma / certification courses
  • Certificates: Domicile, Caste Certificate etc., if any.
Any other requirement with respect to the documents attached with in the form.
  • Attested (Self or Govt. Officer).
    YES, EITHER IS ACCEPTABLE
  • Original Documents required, if so, when?
    AT TIME OF VERIFICATION AND ADMISSION
Where do I need to submit the printed copy of the form?

Once you have downloaded and filled in the form the hard copy has to be submitted at DOT SPPU premises, Pune.

Details of the person to be contacted for the submission of the form?

Office of DOT, SPPU premises, Pune

What are the office timings to submit the form?

Between 11:00 AM to 06:00 PM (Monday to Saturday).

What is the eligibility check for the admission process?

Documents required for eligibility check.

  • To check eligibility, Documents required must be original or attested.
  • Place/address of eligibility check.
  • Person to be contacted (details Name, Post, Contact Number: mobile and landline, email id)
  • Timings for the said process.
  • Check list of documents required for eligibility check.
  • Any last date of eligibility check.
What is the total fees of the course and what is the fee breakage and the process to pay the fees?
Total course fees (without GST) Rs. 4,50,000.00
Total Fee Split
Department of Technology, SPPU:   Rs. 1,21,588.00
Quick Heal Technologies   Rs. 3,28,412.00
Total Fee Split with GST
Department of Technology, SPPU No GST Rs. 1,21,588.00
Quick Heal Technologies 18% GST Rs. 3,28,412 + 59,114.16
= Rs. 3,87,526.16
Total Amount Payable (inclusive of GST) Rs. 5,09,114.16
Annual Fee Breakup
Department of Technology, SPPU Rs. 60,794.00
Quick Heal Technologies Rs. 1,93,763.08
  • Fees to SSPU cannot be split.
  • Fees to QHA can be paid in two equal parts.
Whether the fees to be paid on yearly basis or semester basis?

Yes, the fees has to be paid on yearly basis. However, the fees paid to the Quick Heal can be split into two equal parts.

The payment of fees to Pune University?
  1. Starting date and Last date of fees submission.
    TBD
  2. The amount
    RS. 60794
  3. Mode of payment
    ONLINE WITH VISA CARD ONLY, ELSE BY CASH OR BANK TRANSFER
  4. If online: link, URL, Website name or portal.
    LINK AVAILABLE ONLY AFTER FILLING FORM
  5. The details of account: account number of Pune University, Bank Name, branch name, branch IFSC code, name of account holder to be shared.
  6. Format of the receipt if fees is paid online to university.
  7. If offline: what is acceptable Cheque, DD, Cash or any other mode accepted by the University.
  8. (In case of Offline) Address / place where to submit the fees to university.
  9. Details of the person/ department / office to whom fee is to be paid.
  10. Details of a person who can be contacted by the candidate in case of any query related to FEES, FORM FILLING, and PROCEDURE OF ADMISSION.
  11. Receipt of fees from university, copy of receipt for Quick Heal (If required).
    XEROX OF CHALLAN FOR QHA
The payment of fees to Quick Heal (QH)?
  1. Starting and Last date of fees submission.
    TBD
  2. The amount
    Rs. 1,64,206.00 per year + 18% GST
  3. Mode of payment
    Cheque, in favour of Quick Heal Technologies Ltd.
  4. If online: link, URL, Website name or portal.
  5. The details of account:
    account number of QH, Bank Name, branch name, branch IFSC code, name of account holder to be shared.
  6. Format of the receipt if fees is paid online to QH.
    Format can be got from Amruttaa / Rohit
  7. If offline: what is acceptable Cheque, DD, Cash or any other mode accepted by QH.
    Cheque
  8. (In case of Offline) Address / place where to submit the fees.
    Quick Heal, Marvel Edge, 7th floor, Vimannagar, Pune.
  9. Details of the person/ department / office to whom fee is to be paid.
    Reception Desk, Quick Heal
  10. Details of a person who can be contacted by the candidate in case of any query related to FEES, FORM FILLING, and PROCEDURE OF ADMISSION.
  11. Receipt of fees from QH, a copy of receipt for Pune University (If required)
    Yes
What is the venue, time table and the calendar schedule for classes?

TBD

Whether the laptops are required during the course?

Yes, students have to carry their own laptops.

Whether the access to library or the labs will be given to the students?

YES, LIBRARY ACCESS WILL BE GIVEN. ONLY ACCESS TO THE QHA-DOT LAB WILL BE PROVIDED

    • Name of the Programme:

      M.Tech In INFORMATION SECURITY jointly conducted by, The Department of Technology (DoT), Savitribai Phule Pune University (SPPU), Pune and Quick Heal Academy, Quick Heal Technologies Limited, Pune.

    • Programme Duration:

      2 years, weekend classes

    • Fee structure:

      Rs. 5,09,115 (inclusive of all the taxes)

    • Quick Contact:

      +91 99996-88588

SPPU’s website

Cyber Law & Corporate Liability

About the programme:

When we talk about cyber law and corporate liability, we tend to talk about how evolving technology has transformed the legal aspects of operating business and the corporate sector. Perhaps we try to bridge the gap where the industry has to be smart enough to accept the technology, be much more comfortable with the use of it as well as understand the concepts of law governing them.

Highlights of the programme

  • Know the tools-tactics and procedures of bad actors to formulate appropriate defence mechanism.
  • Empower with skills that enables you to lead with an intelligence-led approach in cyber security.
  • Improves credibility in terms of cyber security knowledge and experience.
  • Take this course and be amongst the few elite people of the country to know this technology.

Eligibility

  • Anyone who is using technology and has the ability to excel in Cyber Security Domain so as to mitigate risks.

Safeguarding Digital Footprints

About the programme:

With the ubiquity of internet, Cyber Space and the increased use of social networking sites, Cyber Security has become the need of every individual as well as organisations. Studying Safeguarding Digital Footprints will help you learn the importance of Cyber Security in the Cyber World.
Cyber Security Awareness is the first step to protect and mitigate risks involved in this technology-oriented era. Cyber Security Awareness programme helps in understanding various types of cybercrimes, their effect and countermeasures to protect the confidential information.

Programme Suitable for:

  • This programme is for all the tech-savvy enthusiasts and for all those who want to embark on a career within the Cyber Security domain

Eligibility

  • Anyone who is using technology and has the ability to excel in Cyber Security Domain so as to mitigate risks.

Blockchain, Darkweb and Cyber Crime.

About the programme:

This is a special programme designed to keep in mind the conundrum, bitcoin has caused in the market leaving people struggling to digest the reality.
Adding on, this special programme of evolves not only around the bitcoins and the dilemma it has caused but also makes you familiar with topics which has yet not touched the grounds of reality.
Perhaps it would not be wrong to say that to survive in the era of “Internet of Things” one has to beaware of the basic concepts of this special programme designed by the industry experts.

Highlights of the programme

  • Learning the effective and efficient use of technology behind the crypto currencies.
  • This special programme revolves around the blockchain technology and the part it has played to change the era of internet.
  • To build the skills which will help to learn and understand the revolutionising era of Cyber Security.

Eligibility

  • Anyone who is using technology and has the ability to excel in Cyber Security Domain so as to mitigate risks.

Industrial Training

About the training

Quick Heal Academy aims to ensure that students passing out after their graduation and post-graduation courses should be industry ready. In that regard, the knowledge of books should be combined with the practical knowledge with the hands-on experience of the Cyber Security industry.

To bridge the gap QHA proudly offers 6 Weeks/Months training to the students who are looking to make their career in the Cyber Security domain.

QHA offers

  • 6 weeks industrial training (Project Training) for BTech, BE, MCA, MSc (IT) and other students.
  • 6 months industrial training (Project Training) for BTech, BE, MCA, BCA, BSc (IT), MSc (IT) students.

Training Highlights

  • Hands-on training of Cyber Security.
  • Training provided by Industry Experts from Quick Heal.
  • Exposure to Industry Processes & Methodologies.
  • 100% Job-Oriented Training.
  • An opportunity of Live International Projects Exposure.
  • Certification & Training Letter on Completion.

Eligibility

  • Graduation and Post-Graduation students seeking an Industrial Training in the domain of Cyber Security.

Frequently Asked Questions

Q: What are the eligibility criteria and what prior knowledge do I need to possess before enrolling myself in the training programme?

The candidate has to be the student of graduation or post-graduation, pursuing courses like BTech, BE, MCA, MSc (IT), and BSc (IT). Basics of technical concepts are usually sufficient to enroll for the training.

 

Q: What are all the Training locations?

Currently, the training will be offered in the following four cities.

  • Pune: Location 1: Marvel Edge, Office No.7010 C, and D, 7th Floor, Viman Nagar, Pune – 411014Location 2: CTS No-1442-1445,Thube  Park , Behind Sancheti Physiotherapy Centre, Shivaji Nagar, Pune – 411005
  • Delhi:2nd Floor, 9, DLF Industrial Area, Moti Nagar, New Delhi-110015.
  • Bangalore: Pride Hulkul, Office No.202, 2nd Floor, Lalbagh Road, Diagonally Opposite Passport office, Bangalore – 560027, Karnataka, India.
  • Kolkata: Office No.702, (7th Floor), Diamond Heritage Building Fairly Place., 16, Strand Rd, Fairley Place, BBD Bagh, Kolkata, West Bengal 700001

 

Q: How do I get enrolled/register myself / or raise a query for the training?

For enrollment or to register yourself, please login to www.quickhealacademy.com > industrial training > apply now and fill in the form.

You can write to us at [email protected] OR call us on- + 91-9999688588/+91-9545778888 on all working days (Monday to Friday 11 am to 5 pm)

 

Q: How will I pay the fees?

We have shared the details on the application form. You can pay the fees by online fund transfer (RTGS/NEFT/IMPS) and share the transaction details with us.

 

Q: Is there any refund policy?

There is no refund policy for the fees once paid to the company.

 

Q: When will the training begin and end and what will be the timings and days of the training?

  • For 3 months- Training usually starts in the month of April, however for different colleges, there are different requirements thus we customize it accordingly.
  • For 6 months- Mostly this part of training starts in January, but again as per the requirements of the University, we rework on the schedule part.

The timings of the training are 09:30 AM to 06:30 PM from Monday through Friday.

 

Q: Do I have to carry my own Laptop for the Training?

Yes, Students have to carry their own laptops.

 

Q: Who will be our Trainers?

Subject matter Qualified and Experienced Industry Experts will be conducting the training.

 

Q: Is there any dress code for the training?

Since it is an Industrial training we recommend to be in formals from Monday to Thursday and Friday is when the student can wear casual clothing like Jeans, Collar T-shirts etc.

Testimonials for 45 Days Industrial Training at Pune

I have learnt from this training of how to be curious and learn in practical way. The trainers provided were very helpful, always available and very resourceful.

– Asif Shaikh

How to be curious was one of the important key plus everyday news session and assignment were very much helpful.

– Jayesh Rajesh Gehlot

The actual perspective towards information security got changed. Manual testing , different views towards gathered information can said to be as key takes from this training. Both the trainers were very much helpful and cooperative throughout the training sessions. The practical sessions taken by them was much helpful.

– Saurabh Banwaskar

Learnt the practical implementation, fast learning of new things, having a proper order of implementing concepts. basic concepts should be emailed to the students before the training starts for better grasping

– Anmol Bava

I understand the main thing how industry works. The whole Quick Heal Academy team helps me a lot in each and every way and the support provided with the team was great. It really helped me to explore this field. I really loved the way of trainers how they teach, they helped me in each and every way and help me to understand what actually cyber security is.

– Akash Agarwal

Learnt all the basic concepts which one would require to enter Cyber security domain and practised everything practically.

– Kirti Vilas Nagargoje

I’ve finally found here the scroll of truth! “You don’t become a hacker by installing kali linux”. We have previously covered the CEH syllabus and even after joining, I had an thought in mind that most of the things going to be remain same and would just refresh what I learned previously. But soon as the training started I realized, we should know the way to dig information manually rather than depending upon on automated tools like Qualys, Nessus, Nikto, Acunetix, and alike. To become an pentester one need to be able to break into the systems manually and be able to gain root/administrator privileges on that system you are breaking which cannot be done without knowing in depth, which I got to know here, what steps I need to follow. One most important thing I should quote here is, not only the module which were provided in prospectus was covered but also we had an daily news hunt session where we discussed the security threats happened previous day, which was really helpful. Sessions were interactive and trainers helped us, to get started with root-me challenges. The trainers also helped us all the time and answered all our mail whenever we faced any problem.

– Harshit Agrawal

Cyber Literacy Programme

About Programme

Today, Children are seen to give more regard to their “digital playgrounds”. It is not uncommon to see children playing on their smart phones while at a restaurant with their family, or to see a child operating a computer better than some adults.

Knowingly or unknowingly there is a lot of personal information being shared online by kids without knowing its effects. Therefore, it is very important that cyber Education is made part of School curriculum. Thus, to handle the situation we have designed CYBER LITERACY PROGRAMME for the Students, Parents and Management.

Why this programme?

  • No single agency or government institution can ensure the safety of children from online threats and violence.

    -UNICEF Report

  • 28 million out of 400 million internet users are school going kids.

    -An IAMAI 2016 report.

  • In India about 134 million children have access to mobile phones and the number is growing very fast with even faster access to internet.

    -UNICEF Study

  • India ranks #1 for highest blue whale related searches worldwide.

    -Google Data

  • Despite crackdown, India emerges as one of biggest contributors, consumers of child porn.

    -India Today Report

Eligibility

  • Anyone (Students, parents and teachers including the management) who wants to build skills that helps to create and maintain a cyber safe environment.

QHA Certified SOC Analyst (QCSA) Training

About Programme

Elevate your ability & skills in SOC & CSOC Operations with real-world, hands-on experience.

This programme has been specially designed and delivered by industry experts split over two weekends to fit easily into your work schedule.

And that’s not all! On the completion of the training, you might get an exciting opportunity to work with industry giants.

Register today! Call us on +91-9545778888

Best Suited For

  • Security Architects
  • Senior Security Engineers
  • Technical Security Managers
  • SOC Analysts / Engineers / Managers
  • Those seeking a career change to take advantage of the job opportunities in information security and need formal training/certification

Cyber Threat Intelligence

About program

The interdependence between the Internet and technology has created a vertical segment of cyber threats. Along with technology, the sophistication of threats associated with it also keeps evolving with time. Traditional security measures such as Antivirus, Firewall, IDS, IPS, etc., alone are not enough to effectively respond to today’s cyber threats anymore. There was a time when cybersecurity only meant protection from “hacking” and “defacements”. Looking at the events which have unfolded in the last 5 years, it is clear that these terms are now being replaced with newer and more polished ones such as “Cyber Crime”, “Espionage/APTs”, and “Hacktivism”. Further, the focus has been shifted more towards “Motivation” and “Attribution” instead of just firewall rules.

Cyber Threat Intelligence is a complex subject which enables security ninjas to venture into the “unknowns” and convert them into the “knowns”. The program focuses more on knowing about an adversary, their tools, and their methods (TTP). With its help, any organization can build Intelligence-led security programs, where the intelligence gathered on the field about the adversary leads to security decisions and investments.

This training program builds a solid foundation towards understanding various aspects of Cyber Threat Intelligence and provides a quick kick start towards targeted and result-oriented threat research.

Best Suited For

  • Students, Incident Response Team Members
  • Security Operations Center Personnel and Information Security Practitioners
  • Experienced Digital Forensic Analysts
  • Law Enforcement Officials
  • Anyone who is keen on understanding this domain.

Eligibility

  • Anyone who has experience in incident response and information security techniques OR Students who have real world experience with incident response techniques and are comfortable with Linux can expect to succeed in this course.

Malware Analysis and Reverse Engineering

About program

The program explores malware analysis tools and techniques that help IT admins, security analysts and other such professionals acquire the practical skills to examine malicious programs that target and infect computer systems. The program provides a deep understanding of malware capabilities that can help individuals and businesses develop threat intelligence, respond to security incidents, and defend future threats.

Highlights of the program

  • In-depth understanding of malware analysis tools and techniques
  • Understanding how a malware works
  • Practical exposure to tools used as debugger, disassembler, system monitoring
  • Learn network monitoring, binary analysis tools, and code analysis tool

Best Suited For

  • Individuals interested in learning malware and understand key aspects of malicious programs.
  • Forensic investigators and IT practitioners looking to expand their skillsets
  • Those seeking a career change to take advantage of the job opportunities in information security and need formal training/certification

Eligibility

  • Pursuing graduation in a computer related domain
  • Knowledge of computers
  • A fast learner
  • Knowledge of multiple programming languages
  • Out of the box thinking

Cyber Law -The Indian Perspective

Cyber Law -The Indian Perspective

The Information Technology Act of 2000 was introduced to deal with concepts of e-commerce and e-governance. However, the Act did not cover specific computer or Internet crimes such as publishing sexually explicit material, voyeurism, breach of confidentially etc. The Information Technology (Amendment) Act, 2008, was then introduced to address such issues.

This program addresses the rising concerns of the cyberspace, inter-alia, like Cybercrimes, IPR issues, electronic evidence and their admissibility in Indian courts; and offers an in-depth knowledge of cyber law and its application.

Program Suitable For

  • Students having interest in Technology and Law
  • Information Security Professionals
  • Law Enforcement officers
  • Non-IT Security Managers
  • Those who want to take advantage of the job opportunities in the domain of information security & law and need formal training

Eligibility

  • Minimum: 10+2 or its equivalent
  • Knowledge of Law and Technology would be an added advantage

First Responder Electronic Crime Scene Investigation (Level 1)

First Responder – Electronic Crime Scene Investigation (Level -1)

Computers and other electronic media are being increasingly used to commit crimes. Hence they serve as potential evidence of crimes and provide information on suspects and victims irrespective of their geography. Digital evidence can be found on pen drives, smartphones, hard disks, etc., and can be hidden in images, videos, encrypted files, etc. It can even be altered, damaged, or destroyed easily from improper handling or examination. This warrants the need to preserve such evidence with utmost care.

Program Suitable For Personnel Working With

  • Physical Security
  • Fraud Investigations
  • Forensic Accounting Unit
  • Fraud Control Unit and IT Security
  • New entrants in the above domain are also welcome.

Eligibility

  • Anyone managing an organization that processes such a crime scene.
  • Sound understanding of computer basics.
  • Anyone who wish to understand the legal and technical requirements necessary to carry out a successful high technology investigation.
  • Knowledge of Law and Technology would be an added advantage.

Cybercrime Investigation

Cybercrime Investigation

You will learn the best practices followed while investigating a cybercrime. A deep insight into various tools and techniques for investigation along with the existing cyber laws will be your takeaway.

Program Suitable For

  • Those who want to take advantage of the job opportunities in the domain cybercrime investigation & law and need formal training.

Eligibility

  • Basic knowledge of networking
  • Basic Internet terms
  • Minimum: 10+2 or its equivalent

First Responder Electronic Crime Scene Investigation (Level 2)

First Responder – Electronic Crime Scene Investigation(Level -2)

Computers and other electronic media are being increasingly used to commit crimes. Hence they serve as potential evidence of crimes and provide information on suspects and victims irrespective of their geography. Digital evidence can be found on pen drives, smartphones, hard disks, etc., and can be hidden in images, videos, encrypted files, etc. It can even be altered, damaged, or destroyed easily from improper handling or examination. This warrants the need to preserve such evidence with utmost care.

Program Suitable For

  • Personnel working with Physical Security
  • Fraud Investigations
  • Forensic Accounting Unit
  • Fraud Control Unit and IT Security
  • New entrants in the above domain are also welcome.

Eligibility

  • Anyone managing an organization that processes such a crime scene.
  • Sound understanding of computer basics.
  • Anyone who wish to understand the legal and technical requirements necessary to carry out a successful high technology investigation.
  • Knowledge of Law and Technology would be an added advantage.

Cyber Security Awareness

Cyber Security Awareness

Basic Cyber Awareness is the first step to protect and mitigate risks involved in this technology-oriented era. Cyber Security Awareness programme helps in understanding various types of cybercrimes, their effect and countermeasures to protect the confidential information.

Program Suitable For

  • This programme is for all the tech-savvy enthusiasts and for all those who want to embark on a career within the Cyber Security domain.

Eligibility

  • Anyone who is using technology and has the ability to excel in Cyber Security Domain so as to mitigate risks.

Linux Hardening

About program

Linux systems are said to be less vulnerable to cyber-attacks. But this should not be a reason to overlook its security. All an attacker needs is one flaw in a system to mobilize their nefarious plans. Linux systems stay at risk of infected email attachments, websites that steal user information (phishing), unofficial or pirated software, and malware such as rootkits to name a few.

The Linux Hardening program covers aspects beginning right from secure installation of Linux to automation of tasks using SSH and SE Linux.

Highlights of the program

  • In-depth coverage of Linux and UNIX concepts
  • Insights into Linux operating systems
  • Performing secure installation of Linux with practical real-world examples
  • General troubleshooting of issues related to Linux and UNIX systems
  • Learning security of Linux systems:
  • Boot configurations
  • Minimizing security vulnerabilities
  • User access controls
  • Kernel tuning
  • IP chains
  • Automation of Tasks using SSH and SE Linux

Best Suited For

  • Students, Security professionals looking to learn the basics of securing Unix operating systems.
  • Experienced administrators
  • Administrators needing information on how to secure common Internet applications on the Unix platform.
  • Auditors, incident responders, and information security analysts who need greater visibility into Linux and Unix security tools, procedures, and best practices.
  • Those seeking a career change to take advantage of the job opportunities in information security and need formal training/certification

Eligibility

  • Undergraduates
  • Basic computer skills
  • A fast learner

Image Forensics Analysis

About program

Media such as images and videos have evolved to become the preferred means of communication in today’s era and they function as a strong evidence in everyday life, controversies, and trials. The Image Forensics Analyst program helps users understand the process to extract, analyze and interpret the content of the image in legal matters.

Highlights

  • Understanding the importance and role of image forensics in investigation
  • Identification of the source device
  • Acquiring the image and the right way of storage
  • Techniques used for identifying image sources
  • Identifying acts of tampering and techniques used for tampering
  • Identifying the image contents
  • Learning right Documentation.

Best Suited For

  • Students and Information Security Professionals
  • Incident Response Team Members
  • Media Exploitation Analysts
  • Anyone interested in deep understanding of image forensics.

Eligibility

  • Undergraduates
  • Anyone with sound technical knowledge and a fast learner OR basic understanding of computers

Mac OS Hardening

About program

The increase in the popularity and use of Apple devices warrants the need for trained professionals who understand the security architecture of these devices. The Mac OS Hardening program provides extensive knowledge and the expertise necessary to deal with Mac security concepts which would enable participants to broaden their analytic capabilities.

Highlights of the program

  • An understanding of the security architecture of Apple devices
  • Understanding Mac security concepts
  • Learning Mac OS X basics
  • Discovering security vulnerabilities
  • Securing loopholes and rootlets

Best Suited For

  • Experienced Digital Forensic Analysts
  • Law Enforcement Officers or Detectives
  • Media Exploitation Analysts
  • Incident Response Team Members
  • Students, Information Security Professionals who want to become knowledgeable with Mac OS and iOS system internals.

Eligibility

  • Undergraduates
  • Basic computer skills
  • A fast learner