Looking forward to seek guidance in pursuing educational Degree(Masters, Specific domain related Program) in Information security. I did my engineering from Mechanical and have an overall 6 years of experience working as a Business system consultant and Senior Executive - PMO in renowned IT companies. During my tenure I was involved in IT asset life cycle governance and handled infrastructure related projects. I am PMP and Certified payment card industry security Information(CPISI) certified

Asked by Last Modified  

Follow 4
Answer

Please enter your answer

Tutor

I think compliance domain in information security suits well.
Comments

If you want to be a Project manager, you should do Project Manager programs in masters as you have a similar experience. Course wise quality analyst or selenium testing and manual testing will also suites you too.
Comments

My suggestion is to complete CISA, and post joining a company. There are a lot of options to pursue part-time/online courses from Great Lakes or BITS.
Comments

View 1 more Answers

Related Questions

How to hack a facebook account?
Before hacking facebook ,imagine why u cant do it in easy way with tools,imagine u are a developer whom develops forms and db of your own and publish it in iss, how can you hack your webpage? Unless its...
Midhunghosh
If I did "Cyber security and Ethical hacking" course. Will I get any certificate from that institution?
The certificate from any training institute does not have any value when you are applying for a job. You need to have standard certifications like CEH or Security+ to prove your knowledge. Its better to...
Hrishikesh
0 0
5

Can we do ethical hacking in between secondary school??

Yes u can do ethical hacking in between school
Harharan

Which book is good for hacking?

web application hackers handbook grey hat hacking third edition -
Zubair
0 0
5
How much time it takes to complete ethical hacking course?
If you are an beginner and dont have any knowledge about Information Security and wants to learn from Basic , we have 12 days program for CEH - EC COUNCIL.
Naveen
0 0
9

Now ask question in any of the 1000+ Categories, and get Answers from Tutors and Trainers on UrbanPro.com

Ask a Question

Related Lessons

Prerequisites To Get Started Into Ethical Hacking
Getting into ethical hacking as a beginner, one has confusion about where to start. There are many resources but the only question remains in mind for a beginner is "What is the zero level to start?"....
G

Grandhi Srikanth

2 0
0

What Is Cyber Crime?
Computer activities carried out by means computer or the internet.Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or...
D

Deleted User

0 0
0

How to become an Ethical Hacker?
Certified Ethical Hacker (CEH) is a qualification obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using...

Diploma in Cyber Security & Forensics
Program Highlights: * Computer Fundamentals & IT Applications * Core Java * Web & Graphics Designing * Python Language * Linux * Advance Android Development (Application...

What Is Ethical Hacking?
Ethical hacking and ethical hacker are terms used to describe hacking performed by a company or individual to help identify potential threats on a computer or network. An ethical hacker attempts to bypass...

Recommended Articles

Information technology consultancy or Information technology consulting is a specialized field in which one can set their focus on providing advisory services to business firms on finding ways to use innovations in information technology to further their business and meet the objectives of the business. Not only does...

Read full article >

Business Process outsourcing (BPO) services can be considered as a kind of outsourcing which involves subletting of specific functions associated with any business to a third party service provider. BPO is usually administered as a cost-saving procedure for functions which an organization needs but does not rely upon to...

Read full article >

Hadoop is a framework which has been developed for organizing and analysing big chunks of data for a business. Suppose you have a file larger than your system’s storage capacity and you can’t store it. Hadoop helps in storing bigger files than what could be stored on one particular server. You can therefore store very,...

Read full article >

Microsoft Excel is an electronic spreadsheet tool which is commonly used for financial and statistical data processing. It has been developed by Microsoft and forms a major component of the widely used Microsoft Office. From individual users to the top IT companies, Excel is used worldwide. Excel is one of the most important...

Read full article >

Looking for Ethical Hacking Training?

Learn from the Best Tutors on UrbanPro

Are you a Tutor or Training Institute?

Join UrbanPro Today to find students near you