India – Africa ICT Knowledge Consortium

The India – Africa ICT Knowledge Consortium has been proposed, accepted and formed on 8th May 2017 by all the Core Committee Members (Directors) of the International Organization for Educational Development “IOED” – An International Diplomatic Mission.

The UNCESDA under the India - Africa Knowledge Consortium is offering a unique range of hands on training programs in the area of Cyber Security. it would assist the participants embark on a journey to become Cyber Warriors, who would possess the requisite skills to Prevent, Detect and Respond to the current, highly sophisticated and potent attack vectors.

These Cyber warriors would be a great asset to the governmental and private organisations to assist in keeping the critical IT assets safe and secure. These courses are being organized with Industry partners to ensure that the skills attained can be directly applied in their own organizations’ current setups. The Cyber Range adds a lot of value to the course conduct as it presents hyper real network environments with real world attacks which participants detect and respond repeatedly. This helps them develop the requisite skill in addition to the knowledge and understanding and validate their existing processes.

Cyber Security Basic Level Program

The basic level course is suitable for individuals who handle sensitive data in any vertical of an organization. These may be managers or equivalent personnel and may or may not be from IT / security background. However, it is essential these days that these individuals have basic knowledge as well as the requisite skills to implement standard cyber security controls to combat the modern day attacks.

On completion, the participants would acquire the skills to harden their windows based machines right from the operating system level to the commonly used applications being used. They will gain visibility into the various attack vectors in a LAN environment and would be made aware of techniques to remain secure while surfing the web. An overview of Wi-Fi and mobile security including an understanding of the IT act is also a part of the curriculum to ensure that the participants get an overall understanding of the security domain.

Security Cyber Intermediate Level Program

As Offense is the best form of Defence?, this Course helps the participants in imbibing the skills of an ethical hacker. These skills are essential as only after learning the techniques being employed by the real hackers, can one effectively assess their organization’s own security posture.

The intermediate level Cyber Security course is well suited for individuals who handle sensitive IT networks and have a couple of years of IT / cyber security experience. They must have basic knowledge of networking protocols and security fundamentals. While undergoing this training program the participants would be given ample hands on exercises on simulated network environments and access to latest hacking tools to practice all the steps of the ethical hacking cycle from Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks. The course is modeled using a cyber- range thereby helping the participants acquire the skills in addition to the knowledge and understanding of the security domain.

Cyber Security Advance Level Program
The advance level course is suitable for individuals who handle sensitive IT networks data centers, server farms security operational centers etc. It is understood that they have adequate experience in handling security incidents. They must have good knowledge of networking and security protocols and have basic knowledge of ethical hacking methodology.

This course helps the participants acquire the finer points of being a master penetration tester thereby being able to respond to vicious modern day attacks like DDOS, APT, ransom ware etc. They will be able to practice on complex simulated networked environments alive with high volume of business traffic and the standard perimeter security framework all of which would be created on a state of the art cyber-range. This hyper real environment would be attacked by using advanced Kali Linux tools, Metaspolit framework and other custom techniques and tools. The course would also include modules on web application attacks, bypassing firewalls and anti-virus applications.

This would give a thorough understanding of the pen test technique enabling the participants to acquire the skill of an offensive security professional and confidently fine tune their organisations security posture.

IICA's Employability Enhancement Programs
Government of India's Schemes
Dr. Arvind Kumar Sharma, Vice-Chairman - Diplomatic Affairs Committee - DAC of Indo-OIC-Islamic Chamber of Commerce and Industry
Board of Advisors
Executive Council
Security Council
Legal Council
Partner Organizations
Letter from Min. of Tribal Affairs
Letter from Min. of Science
Letter from Min. of MSME
IOED Strategic Plan
Specimen of IOED HQ Agreement