Cyber Security Overview

India is a large global player in the IT industry and plans to not only secure its IT assets but also to emerge as a global player in the field of cybersecurity products and services. The demand of cybersecurity professionals and it is to be growing in coming years 3.5 times faster than the demand for other technology jobs.

Honourable Prime Minister Shri Narendra Modi at the NASSCOM’s 25th-year anniversary event, on 1st March, had recommended NASSCOM to create a Cyber Security Task Force (CSTF), with an aim to develop and provide cybersecurity solutions for the global market.

NASSCOM, together with the Data Security Council of India (DSCI), has set up a Cyber Security Task Force (CSTF) in order to shape the government’s vision of making India the global hub of Cyber Security Products and Services (solutions).

The CSTF’s charter of industry development also entails a focus on Capacity Building/Skills Development, Cyber/ Information Security policies and the development of state-of-the-art indigenous technology solutions.

Four working groups, namely ‘Industry Development’, ‘Technology Development’, ‘Skills Development’ and ‘Policy Development’ have been set up to cater to the four vital and intertwined aspects of the CSTF vision.


Task Force aims to :

  • lift the Cyber Security industry in India to about USD 35 billion by 2025;
  • create a trained base of one million certified and skilled cybersecurity professionals by 2020;
  • build 1,000 start-ups within the Cyber Security/Information Security domain;

Program Overview

Nasscom Certified Cyber Security Analytic program aim is to address two key requirements, of closing the industry-academia skill gap, and of creating a talent pool that can reasonably weather future externalities in the IT-BPM industry. Global markets are on their way towards revival and recovery, and this is well reflected in the proactive recruitment measures taken by IT-ITeS organizations in India in recent times. India’s IT-BPM industry is on track to achieve its target of USD 225 billion by 2020. From a base on about 4.1 million employees in FY2018, the industry is expected to add another 2 million additional employees by 2020. Indirect employment generated by 2020 is expected to be 3X the total direct employment number is between 1316 million by 2020.

To realize India’s potential of emerging as a skills hub of the world, a significant amount of foresight and work is requisite. It is imperative that stakeholders engage in a concerted effort to undertake the transformation of the labour pool estimated to enter the market into skilled and employable talent. Enabling the creation of a future industry-ready cohort will give the IT-ITeS industry an edge in leadership and sustainability.

One of the growing areas of global interest and concern is Information/ Cyber Security. This led to the identification of the “hot skills” du jour, resulting in the formal creation of a Qualification Pack (QP) or job role framework for the role of a Security Analyst. The QP is designed to capture the skills required by the IT-BPM industry for an entry-level position in this field.

To ensure the creation of an academic course that is both relevant and viable, IT-ITeS Sector Skills Council NASSCOM (SSC NASSCOM) partnered with key industry stakeholders, including Cyber Eye Research, Cypher Cloud, Deloitte, First American, HCL, HDFC, IBM, ISC2, Karvy Analytics, NIIT University, PwC, Symantec, TCS, Wells Fargo, and the Data Security Council of India (DSCI) for design of the curricula and courseware. In addition, the program addresses the need for faculty support and achieves this by acquainting trainers with the latest advancements in pedagogy

Course Curriculum

An Introduction : The industry, sub-sector, occupation and career Contribute to managing information security

  • Information Security and Threats
  • Fundamentals of Information Security
  • Data Leakage and Prevention
  • Information Security Policies, Procedures, Standards and Guidelines
  • Information Security Management – Roles and Responsibilities
  • Information Security Performance Metrics
  • Risk Assessment
  • Configuration Review
  • Device Log Correlations
  • Data Backup

Coordinate responses to information security incidents

  • Incident response overview
  • Incident Response – Roles and Responsibilities
  • Incident Response Process
  • Handling Malicious Code Incidents
  • Handling Network Security Incidents

Install, configure and troubleshoot information security devices

  • Configuring Network Devices
  • Configuring Secure Content Management
  • Configuring Firewall
  • Troubleshooting Cisco IOS Firewall Configurations
  • Cisco IOS Firewall IDS
  • IPS Configuration
  • Anti-virus and Antispam Software
  • Web Application Security Configuration
  • Patch Management

Support teams to prepare for and undergo information security audits

  • Information Security Audit
  • Work and Work Environment
  • Information Security Auditor
  • Vulnerability Analysis
  • Student Handbook – Security Analyst
  • Penetration Testing
  • Information Security Audit Tasks
  • Audit Reports and Actions
  • Audit Support Activities

Contribute to managing information security

  • Understanding scope of work and working within limits of authority
  • Work and work environment
  • Maintaining confidentiality

Work effectively with colleagues

  • Effective Communication
  • Working Effectively

Maintain a healthy, safe and secure working environment

  • Need For Health and Safety at Work
  • Security Analyst’s role
  • Emergency Situations
  • Skills for Maintaining Health and Safety at Work

Provide data/information in standard formats

  • Information and Knowledge Management
  • How to manage data/ information effectively
  • Skills required to manage data and information effectively
  • Performance Evaluation Criteria for an Information Security Analyst

Develop knowledge, skills & competence

  • Importance of Self-Development
  • Knowledge and Skills Required for the Job
  • Avenues of Self-Development
  • Planning for Self-Development
Security Assessment Template
Case studies
Personality Development
Interview Preparation

Course Benefits

  • 400 hours of Exhaustive Instructor Led Training (ILT)
  • 100% Instructor-Led Classroom Training
  • Course Content created by 21 Leading Companies in Collaboration with NASSCOM
  • Assessment and Certification by NASSCOM IT-ITES SSC
  • NASSCOM SSC official study material
  • Government of India Approved Certificate
  • Certificate exam from NASSCOM
  • Globally recognized Certificate
  • State of the Art Infrastructure & Fully Equipped Lab.
  • Training delivered by Certified & Experienced Trainers
  • 100% Placement Assistance
  • High Remuneration Threshold
  • Student Loan Facility from Leading Banks

Career Graph

Quick Contact