Placements @ SRIT

2021-22 Placements: DBS - 49(8.9 LPA), CTS - 181 (4(6.75 LPA), 18 (4.25 LPA), 159 (4.0 LPA)), Wipro - 239(3.5 LPA), Infor - 10 (6.5 LPA), Infosys- 43(3(6.5 LPA), 40 (3.6 LPA)), TCS - 119(Ninja - 115 (3.36 LPA) & Digital - 4 (7.0 LPA)), Capgemini - 39 (4.0 LPA), EPAM - 1(6.0 LPA),Astrazeneca - 1(5.56 LPA), Hitachi - 1(5.0 LPA), Accolite - 1(5.0 LPA), IBM - 36 (4.25 LPA), Hexaware - 17 ( 2 (5.0 LPA) & 15 (4.0 LPA)), Mindtree - 12 (4.0 LPA), HCL - 11(3.5 LPA) , KPIT - 5(4.0 LPA), Virtusa -1(4.0 LPA), Quest Global - 4(3.0 LPA), Zensar - 2(3.3 LPA)

2021-22 Placements: DBS - 49(8.9 LPA), CTS - 181 (4(6.75 LPA), 18 (4.25 LPA), 159 (4.0 LPA)), Wipro - 239(3.5 LPA), Infor - 10 (6.5 LPA), Infosys- 43(3(6.5 LPA), 40 (3.6 LPA)), TCS - 119(Ninja - 115 (3.36 LPA) & Digital - 4 (7.0 LPA)), Capgemini - 39 (4.0 LPA), EPAM - 1(6.0 LPA),Astrazeneca - 1(5.56 LPA), Hitachi - 1(5.0 LPA), Accolite - 1(5.0 LPA), IBM - 36 (4.25 LPA), Hexaware - 17 ( 2 (5.0 LPA) & 15 (4.0 LPA)), Mindtree - 12 (4.0 LPA), HCL - 11(3.5 LPA) , KPIT - 5(4.0 LPA), Virtusa -1(4.0 LPA), Quest Global - 4(3.0 LPA), Zensar - 2(3.3 LPA)

Event Detail

  • Start Date 12/23/2022
  • Start Time 11:30 AM
  • End Date 12/23/2022
  • End Time 01:00 PM
  • Location B-Block Seminar Hall

Cyber security is the practice of protecting systems, networks, and programs from digital attacks. These cyber attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.

Implementing effective cyber security measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative.

In today’s connected world, everyone benefits from advanced cyber defense programs. At an individual level, a cyber security attack can result in everything from identity theft, to extortion attempts, to the loss of important data like family photos. Everyone relies on critical infrastructure like power plants, hospitals, and financial service companies. Securing these and other organizations is essential to keeping our society functioning.

Technology is essential to giving organizations and individuals the computer security tools needed to protect themselves from cyber attacks. Three main entities must be protected: endpoint devices like computers, smart devices, and routers; networks; and the cloud. Common technology used to protect these entities include next-generation firewalls, DNS filtering, malware protection, antivirus software, and email security solutions.