(BCA + MCA) Dual Degree

IT IMS & Cyber Security

Eligibility - 12th Pass in Any Stream with 50 % from Any Education Board

M.Sc. 

Cyber Security

Eligibility - Graduate in Any Stream with 45 % from Any Recognized University

IT IMS

infrastructure management (IM) is the management of essential operation components, such as policies, processes, equipment, data, human resources, and external contacts, for overall effectiveness. 

Technologies

Network Security, SharePoint Admins, Provisioning, Budgeting and Resource Planning, Operation System Admins - Unix, Linux, Windows, Database, Admins, Infrastructure-as-a-service (IaaS), Platform as a service (PaaS), Software as a service (SaaS)

Cloud Computing

Cloud computing is the delivery of Information Technology services—servers, databases, storage, networking, software, analytics and more over the Internet.

Companies offering these Technology services are called cloud Computing provider

Market Size

India’s Remote Infrastructure Management Segment has been on an accelerated growth path, recording a -11% growth in F Y 2010. By 2020, India's RIM segment is expected to be —US 30 billion and exploiting this opportunity will require all stakeholders — industry.

Cyber Security

Cyber security or information technology security are the techniques of protecting computers, networks, programs and data from unauthorized access or attacks that are aimed for exploitation.

Job Areas

Server Administration, Network Administration, Storage Management, Data Center Management, Database Management, IT Security Management, Remote Infrastructure Management, Cloud Technology, Virtualization, VOIP Services etc...

Objective

The course provides opportunity for the students to learn all aspects of IMS such as Networking, Operating Systems, Virtualization and Data Center technologies. Complete package of Information Security management services.

Employment

Windows Admin, Linux Admin, Network Specialist, Cloud Project Manager, Cloud Business Analyst, Cloud Network Architect/Planner, Cyber Crime Investigator/Forensic Expert, Vulnerability Researcher, Deputy of CISO/ Technical Director, Security Architect, Security tester in Application 

© 2023 by Designtalk. Proudly created with Wix.com