izen-favicon-300x300-1.png
  • Joint Industry leading certificate from NASSCOM and iZen
  • Earn Cashback from the Government of India and exclusive offers from NASSCOM*
  • Upskill and become job ready

Kickstart your career with a certificate in

Security Operations Center Analyst

Acccredited by NASSCOM, approved by the Government of India
FSP-Logo-2
  • Hands-on Projects
  • Learn from Dr. Fred Cohen
  • Developed by iZen from Silicon Valley, CA
  • Fully online, self-paced
  • Learn by doing using Cyberlabs
  • Hands-on practice for real-world scenarios
  • Access for 3 months and complete in 80 hours
Starts On
September 23, 2024
Multiple
Certificate
Options
INR. 20,000
16,100+ GST
Introductory Offer
to check eligibility for cashback from NASSCOM

Benefits

certificate
Certificate
  • Joint Co-Branded Participation Certificate by FutureSkills Prime and iZen.
  • NASSCOM Assessment certificate after clearing the mandatory NASSCOM Assessment:
    • Gold Certificate if you score 70% or more
    • Silver Certificate if you score 60% to 69%
    • Bronze Certificate if you score 50% to 59%
  • Note: Get a “Certificate of Completion” from Webster University (USA) if you score 70% or higher in iZen quizzes for an additional fee of Rs. 5,000
jobs
Jobs

Land a lucrative job in Cybersecurity upon completing this course.

future
Future-proof

Cybersecurity jobs are one of the few future-proof areas, with ever-increasing demand.

Cybersecurity Landscape

high-demand
High Demand

Companies are losing millions of dollars to network attacks. They’re fighting back by hiring cybersecurity experts.

bright-future
Bright Future

3.5 million unfilled cybersecurity jobs projected by 2022. Unlike many others, the cybersecurity jobs are not going away.

fac3.png

Dr. Fred Cohen

Meet your faculty, Dr. Fred Cohen

  • Scientist who first defined the term “Computer Virus” and came up with most of the early virus defense mechanisms
  • One of the very few Cybersecurity experts in the world, recognized as a fellow of (ISC)2
  • Authored more than 200 research articles and several books on information protection
  • Was named the “most famous hacker of all time” by ABC News in 2009
  • 40+ years of experience in Cybersecurity
  • Ph.D. in Electrical Engineering (University of Southern California), MS in Information Sciences (University of Pittsburgh), and a BS in Electrical Engineering (Carnegie-Mellon University)

Curriculum

  • Physical and Logical Layers
  • Protocols and IP
  • Operational Technology Networking/Protocols
  • TCP, UDP, and DNS
  • How does the traffic flow?
  • Governance, Flow of Traffic & SMTP as an example
  • Live Cyber-Lab exercises
  • Components
  • Attacker Methods & Mechanisms
  • Starting Position and Attack Progression
  • Combining Attack Tools
  • Live Cyber-Lab exercises
  • Detecting Attack on Networks
  • Magnitude of the Problem
  • Live Cyber-Lab exercises
  • Detecting Attack Sequences
  • General Approach to Detection
  • Loss of Accountability
  • Detection and Response in the NOC
  • Live Cyber-Lab exercises

Testimonials

t2

“I took this Cyber Security course as a final year MCA (Master of Computer Applications) student. It is well structured with top quality content and hands-on labs. The employability focus is really helpful, and I am now confidently interviewing for a job in cybersecurity space. Thank you!”

5/5

Undergraduate Student.

t3

“I found the course to be comprehensive and flexible. It has really increased my awareness of this critical topic. Whether you have a foundation in cybersecurity or not, this course is easy to follow and will help you better understand the current landscape.”

5/5

Postgraduate Student.

team3

“I took the Security Operations Center Analyst course taught by Dr. Cohen, a world-class authority. The experiential learning using cyberlabs and real-life case-studies helped me with my part-time job at a cybersecurity startup. I strongly recommend it for those wanting to build a career in cybersecurity.”

5/5

Cyber Security Consultant.

Frequently Asked Questions and Answers

Who should take this course?

This is an outcome-based program, with a focus on employability. This course is for you if you are a student seeking employment in the field of cybersecurity, or an employee interested in up-skilling/re‐skilling for a career in cybersecurity.

For example, you can seek a job in a NOC (Network Operations Center) or a SOC (Security Operations Center) upon successfully completing this course.

Are there any prerequisites for this course?

There are no prerequisites in cybersecurity itself. However, a basic understanding of computers and networking, in general, would be helpful.

What are the equipment and technical requirements of this program?

The participants need to have a computer with Internet access, and an internet browser to access this course. No special software is required except for a PDF viewer.

What is required to successfully complete this course?

A participant must score at least 70%, in all the quizzes. We want you to do well in the quizzes, learn and benefit from the course. Once you are enrolled, you can refer to the video on “How to take the tests and do well in them?” in the orientation module.

In case you cannot do well in a quiz on the first attempt, no worries. You can go through the required sections of the course again and retake the quiz. You will get a maximum of 3 attempts to “pass” a quiz.

What are the duration and the time commitment required for this course?

The duration of the course will be 8 weeks. Students are expected to dedicate 60-75 hours in total to complete the course. This is a self-directed online program and hence you are free to decide when you want to study during these 8 weeks.
Note: You will have an additional 2 weeks to review what you have learned. That means that you will have a total of 10 weeks of access to the course content.

Who will I learn from?

You will learn from Dr. Cohen who has 40+ years of experience in cybersecurity academia and industry.
Following are some of the highlights of his accomplishments and background:

  • First defined the term “Computer Virus” and invented most of the widely used computer virus defense techniques
  • Won several international awards for his work in Cybersecurity
  • Did seminal research in the use of deception for information protection
  • His “Deception for Protection” series of papers is widely cited, and the techniques he pioneered are now in global use
  • A leader in advancing the science of digital forensic evidence examination
  • Top-flight information protection consultant and industry analyst for many years
  • Authored more than 200 invited, refereed, and other scientific and management research articles
  • Wrote monthly articles on cyber since 1995 and wrote several books on information protection
  • His “Enterprise Information Protection Architecture”, “Challenges to Digital Forensic Evidence”, and “Digital Forensic Evidence Examination” are used in graduate classes and other venues worldwide
  • Leading security practitioners around the globe have used his “Chief Information Security Officers ToolKit” series of books and booklets
  • His “Frauds Spies and Lies and How to Defeat Them” book has been the subject of radio talk shows
  • The research community has widely used his series of “Infosec Baseline” studies as stepping off points for further research
  • His “50 Ways” series is very popular among practitioners looking for issues to be addressed
  • His “World War 3 … Information Warfare Basics” is highly regarded among the thinkers in this arena
  • Founded the College Cyber Defenders program at Sandia National Laboratories that ultimately led to the formation of the CyberCorps program
  • Was named the “most famous hacker” of all time by ABC News in 2009
  • Has a Ph.D. in Electrical Engineering (University of Southern California), MS in Information Sciences (University of Pittsburgh), and a BS in Electrical Engineering (Carnegie‐Mellon University)

Do I receive a certificate for this course?

Upon successful completion of the course and taking up the NASSCOM Assessment, you will receive a Joint Co-Branded Participation Certificate from FutureSkills Prime and iZen. After you clear the mandatory NASSCOM Assessment, you will also earn the NASSCOM Assessment certificate based upon the score you get.

When and how do I receive the certificate?

You will receive a digital certificate within two weeks after your successful completion of the course. You can share this verifiable certificate on various social media platforms (e.g. Facebook, Twitter, LinkedIn, etc.).

What are the accepted payment methods for this course?

We accept all major credit and debit cards. If you encounter any challenges please contact [email protected]

Does the program fee include taxes?

Yes, the program fee is inclusive of any taxes with the exception of GST for India.

What is your refund policy?

You will not be eligible for refund once you pay the fees & enroll for the course.

Do I need to buy any textbooks for this course?

No. E-books and all required resources are provided in this course and you can access them online.

Whom do I contact if I have more questions?

Please send all your queries to [email protected]

Scroll to Top

Download Brochure

Am I an eligible beneficiary?

To avail the incentives, beneficiaries must fall under the following categories.Check your eligibility here.

  • IT employees in IT & Non-IT firms.
  • Non-IT employees looking to explore emerging technologies.
  • Central & state government employees.
  • Officials of PSUs & autonomous bodies.
  • Employees with outdated job roles or those who are currently unemployed.
  • Fresh recruits, interns and apprentices.
Am I an eligible beneficiary?

Details about the Government of India incentive program

  • Reimbursement up to 12K for Courses Subject to sub-limits within course categories for foundation, bridge & deep skilling courses
  • Reimbursement up to 2400 for Assessments 600 per assessment x 4 assessments
  • 1 FREE Government funded ‘competency diagnostic’ Otherwise priced at 100

Course categories include Foundation, Bridge & Deep Skilled courses (paid & free)

What is the process for availing these incentives? Sign up for the incentive scheme on FutureSkills Prime
  • Fill the form & submit your GTC acceptance and self-declaration
  • Find your Learner Ledger & confirm the courses/ assessments that can be applied for
  • Apply for the GoI incentive within 60 days of successful certification & wait for the reimbursement

For more and latest updates please visit: https://futureskillsprime.in/govt-of-India-incentives