• +91-471- 4077077
  • Thejaswini Annexe, Technopark, Trivandrum
faithaltimg

PROPEL INFO SEC

Information Security and Performance Engineering

Master Information Security & Performance Engineering and Launch a Rewarding Career.

4.9 Ratings

What is Information Security?


Information security protects information assets from unauthorized access, use, disclosure, disruption, modification, or destruction.

It ensures the confidentiality, integrity, and availability (CIA triad) of information. Information security professionals safeguard data, systems, and networks from cyberattacks.

Information security helps organizations comply with various legal and regulatory requirements, ensuring they avoid penalties and maintain their reputation.

What is Performance Engineering?


Performance Engineering ensures the speed, stability, and scalability of software applications & IT Systems. Performance Engineering professionals optimize code, infrastructure, and systems to prevent performance bottlenecks.

Performance Engineering helps organizations maintain competitive advantage, meet business objectives, and ensure customer satisfaction.

PROPEL INFO SEC: Information Security and Performance Engineering Course Overview


This is an intensive 2-month training program in Information Security and Performance Engineering. Hands-on paid internship for 6 months to gain real-world experience. Eligible candidates gain expertise and skills for a thriving career in tech.

Gain in-demand skills in high-growth fields Real-world experience through hands-on internship Expertise and training to excel in tech careers Opportunity to be absorbed by Canza as a full-time employee.

You'll learn Information Security fundamentals, Performance Engineering best practices, Hands-on experience with industry-leading tools and technologies. You'll Get 2-month intensive training program, 6-month hands-on paid internship. Expert guidance and mentorship. Career support and networking opportunities. Chance to be considered for full-time employment at Canza for top-performing candidates.

Course Content

(Click on each Camp to view its details)

  • Basic Concepts in Performance Engineering. Performance Measurement Fundamentals. Postman.
  • Performance Testing in Software Development Lifecycle
  • Introduction to Performance Testing
  • Tools
  • Certifications
  • Fiddler
  • Client-Side Performance Testing
  • Performance Test Execution.
  • Client-side tools.
  • Google Lighthouse.
  • Webpagetest.org
  • Sitespeed.io
  • Server-side Performance Testing
  • Server-side Performance
  • Testing Tools
  • JMeter
  • LoadRunner, Neo Load, Gatling
  • Performance Test monitoring
  • Performance Testing results analysis.
  • Performance Test monitoring tools
  • Dynatrace
  • Grafana
  • Application insight.
  • Discover the CIA Triad: Safeguarding Confidentiality, Integrity, and Availability
  • Dive into the AAA Model: Ensuring Authentication, Authorization, and Accounting
  • Explore the CIANA Pentagon
  • Model for Enhanced Security
  • Harness the Power of Encryption: Symmetric and Asymmetric Techniques Unveiled
  • Ensure Data Integrity with Advanced Hashing Algorithms
  • Ethical Hacking
  • Penetration Testing
  • Fortify Physical Security: Perimeter Protection and Surveillance Mastery
  • Strengthen Logical Access Control: From User Management to Access Control Models
  • Security Hardening
  • Network Hacking
  • Identifying Threats & Defense Strategies
  • Navigate Through Malware: Combatting Viruses, Worms, Trojans, and Ransomware
  • Combat Phishing Attacks and Understand DoS & DDoS Threats
  • Strategies to Mitigate Zero-Day Vulnerabilities
  • Web Application Security: Unleash the Power of BurpSuite
  • Mobile App Security: Dominate with MobSF Assessments
  • Network Analysis: Uncover Insights with Wireshark
  • Advanced Search Techniques: Harness Google Dorks for Efficiency
  • Vulnerability Scanning: Tools and Best Practices for a Secure Environment
  • Fortify Physical Security: Perimeter Protection and Surveillance Mastery
  • Strengthen Logical Access Control: From User Management to Access Control Models
  • Security Hardening
  • Network Hacking
Download Brochure           Enroll Now