Looking forward to seek guidance in pursuing educational Degree(Masters, Specific domain related Program) in Information security. I did my engineering from Mechanical and have an overall 6 years of experience working as a Business system consultant and Senior Executive - PMO in renowned IT companies. During my tenure I was involved in IT asset life cycle governance and handled infrastructure related projects. I am PMP and Certified payment card industry security Information(CPISI) certified

Asked by Last Modified  

Follow 4
Answer

Please enter your answer

Tutor

I think compliance domain in information security suits well.
Comments

If you want to be a Project manager, you should do Project Manager programs in masters as you have a similar experience. Course wise quality analyst or selenium testing and manual testing will also suites you too.
Comments

My suggestion is to complete CISA, and post joining a company. There are a lot of options to pursue part-time/online courses from Great Lakes or BITS.
Comments

View 1 more Answers

Related Questions

What is the minimum course fees for ethical hacking courses?
Full fledged Information Security training with placement opportunity on successful completion. Also Ethical Hacking with certification.
Reshma
How many types of hacking are there?
Hacking can be of many types. Basically what you want to know is not clear. Can you elaborate your question Deepak.
Deepak

Do we need laptop or PC for the classes of hacking?

Yes, you require to have a laptop with 8 GB RAM. You will have to install 2 to 3 OS in VMware workstation to practice.
Shaik

What is the first step in hacking?

Footprinting is the first step in ethical hacking.
Micheal
Which the best training institute of OSCP?
Hi, we can help you with GPEN ( GIAC Penetration Testing)
Bhuvaneshwar
0 0
6

Now ask question in any of the 1000+ Categories, and get Answers from Tutors and Trainers on UrbanPro.com

Ask a Question

Related Lessons

What Is Ethical Hacking?
Ethical hacking and ethical hacker are terms used to describe hacking performed by a company or individual to help identify potential threats on a computer or network. An ethical hacker attempts to bypass...

Black Box VS Gray Box VS White Box Pentesting Difference?
Penetration testing, often referred to as penetration testing or penetration testing, is a security method that simulates a cyber attack on a computer system, network, or application to identify vulnerabilities...
B

Bharath Kumar

0 0
0

How to become an Ethical Hacker?
Certified Ethical Hacker (CEH) is a qualification obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using...

Malware Analysis: Analyzing Macros For Payload
Hello There ! last night I got a mail from an Unknown source regarding a Credit card which include a Document attachment. I was Curious that it may be Social engineering attack One of the Popular Attacking...

Assessment Methodology
Basically assessment starts with few septs And gradually reach the final stage of testing and reporting 1.) Information gathering 2.) Fuzzing 3.) Known vulnerabilities 4.) Testing for known vulnerabilities 5.) Output / Reporting

Recommended Articles

Information technology consultancy or Information technology consulting is a specialized field in which one can set their focus on providing advisory services to business firms on finding ways to use innovations in information technology to further their business and meet the objectives of the business. Not only does...

Read full article >

Business Process outsourcing (BPO) services can be considered as a kind of outsourcing which involves subletting of specific functions associated with any business to a third party service provider. BPO is usually administered as a cost-saving procedure for functions which an organization needs but does not rely upon to...

Read full article >

Hadoop is a framework which has been developed for organizing and analysing big chunks of data for a business. Suppose you have a file larger than your system’s storage capacity and you can’t store it. Hadoop helps in storing bigger files than what could be stored on one particular server. You can therefore store very,...

Read full article >

Microsoft Excel is an electronic spreadsheet tool which is commonly used for financial and statistical data processing. It has been developed by Microsoft and forms a major component of the widely used Microsoft Office. From individual users to the top IT companies, Excel is used worldwide. Excel is one of the most important...

Read full article >

Looking for Ethical Hacking Training?

Learn from the Best Tutors on UrbanPro

Are you a Tutor or Training Institute?

Join UrbanPro Today to find students near you