careercarta.com Open in urlscan Pro
103.21.59.132  Public Scan

URL: https://careercarta.com/sample-sop-for-ms-in-cybersecurity/
Submission: On October 15 via api from US — Scanned from DE

Form analysis 3 forms found in the DOM

POST /sample-sop-for-ms-in-cybersecurity/

<form id="wpforms-form-121" class="wpforms-validate wpforms-form" data-formid="121" method="post" enctype="multipart/form-data" action="/sample-sop-for-ms-in-cybersecurity/" data-token="466af55be803bde19e98796a9721bd52" novalidate="novalidate">
  <noscript class="wpforms-error-noscript">Please enable JavaScript in your browser to complete this form.</noscript>
  <div class="wpforms-field-container">
    <div id="wpforms-121-field_1-container" class="wpforms-field wpforms-field-name" data-field-id="1"><label class="wpforms-field-label" for="wpforms-121-field_1">Your Name <span class="wpforms-required-label">*</span></label><input type="text"
        id="wpforms-121-field_1" class="wpforms-field-medium wpforms-field-required" name="wpforms[fields][1]" required=""></div>
    <div id="wpforms-121-field_2-container" class="wpforms-field wpforms-field-email" data-field-id="2"><label class="wpforms-field-label" for="wpforms-121-field_2">Your Email <span class="wpforms-required-label">*</span></label><input type="email"
        id="wpforms-121-field_2" class="wpforms-field-medium wpforms-field-required" name="wpforms[fields][2]" required=""></div>
    <div id="wpforms-121-field_5-container" class="wpforms-field wpforms-field-number" data-field-id="5"><label class="wpforms-field-label" for="wpforms-121-field_5">Mobile Number <span class="wpforms-required-label">*</span></label><input
        type="number" pattern="\d*" id="wpforms-121-field_5" class="wpforms-field-medium wpforms-field-required" name="wpforms[fields][5]" required=""></div>
    <div id="wpforms-121-field_6-container" class="wpforms-field wpforms-field-number" data-field-id="6"><label class="wpforms-field-label" for="wpforms-121-field_6">Country Code (Eg: +1 For USA +91 For India +33 For France etc.) <span
          class="wpforms-required-label">*</span></label><input type="number" pattern="\d*" id="wpforms-121-field_6" class="wpforms-field-medium wpforms-field-required" name="wpforms[fields][6]" required=""></div>
    <div id="wpforms-121-field_9-container" class="wpforms-field wpforms-field-select wpforms-field-select-style-classic" data-field-id="9"><label class="wpforms-field-label" for="wpforms-121-field_9">Course <span
          class="wpforms-required-label">*</span></label><select id="wpforms-121-field_9" class="wpforms-field-medium wpforms-field-required" name="wpforms[fields][9]" required="required">
        <option value="SOP/Essay Consultancy">SOP/Essay Consultancy</option>
        <option value="GRE">GRE</option>
        <option value="GMAT">GMAT</option>
        <option value="Career Guidance">Career Guidance</option>
        <option value="Others">Others</option>
      </select></div>
    <div id="wpforms-121-field_7-container" class="wpforms-field wpforms-field-text" data-field-id="7"><label class="wpforms-field-label" for="wpforms-121-field_7">Country</label><input type="text" id="wpforms-121-field_7"
        class="wpforms-field-medium" name="wpforms[fields][7]"></div>
    <div id="wpforms-121-field_10-container" class="wpforms-field wpforms-field-text" data-field-id="10"><label class="wpforms-field-label" for="wpforms-121-field_10">Any message for us</label><input type="text" id="wpforms-121-field_10"
        class="wpforms-field-medium" name="wpforms[fields][10]"></div>
  </div>
  <div class="wpforms-field wpforms-field-hp"><label for="wpforms-121-field-hp" class="wpforms-field-label">Email</label><input type="text" name="wpforms[hp]" id="wpforms-121-field-hp" class="wpforms-field-medium"></div>
  <div class="wpforms-submit-container"><input type="hidden" name="wpforms[id]" value="121"><input type="hidden" name="wpforms[author]" value="1"><input type="hidden" name="wpforms[post_id]" value="1131"><button type="submit" name="wpforms[submit]"
      class="wpforms-submit " id="wpforms-submit-121" value="wpforms-submit" aria-live="assertive" data-alt-text="Sending" data-submit-text="Send Message">Send Message</button></div>
</form>

POST https://careercarta.com/canada-scholarships/

<form id="wpforms-form-121" class="wpforms-validate wpforms-form" action="https://careercarta.com/canada-scholarships/" enctype="multipart/form-data" method="post" novalidate="novalidate" data-formid="121">
  <div class="wpforms-field-container">
    <div data-field-id="1"></div>
  </div>
  <div data-field-id="1">tags: Sample SOP for MS in Cybersecurity</div>
  <div data-field-id="1">tags:&nbsp; tips for Sample SOP for MS in Cybersecurity</div>
  <div data-field-id="1">tags: how to write Sample SOP for MS in Cybersecurity</div>
  <div data-field-id="1">tags: essay of a selected candidate for Sample SOP for MS in Cybersecurity</div>
  <div data-field-id="1"></div>
</form>

POST https://beacon.by/landing-ebook

<form method="post" action="https://beacon.by/landing-ebook">
  <div class="form-contents">
    <div class="BN-form-row BN-input-name"> <label data-name="BN-label-name" for="erq1-BN-dd356e02d4735920-0">Name</label> <input type="text" name="erq1" required="required" id="erq1-BN-dd356e02d4735920-0"> </div>
    <div class="BN-form-row BN-input-firstname" style="display: none;"> <label data-name="BN-label-firstname" for="firstname-BN-dd356e02d4735920-0">First Name</label> <input type="text" name="firstname" id="firstname-BN-dd356e02d4735920-0"> </div>
    <div class="BN-form-row BN-input-lastname" style="display: none;"> <label data-name="BN-label-lastname" for="lastname-BN-dd356e02d4735920-0">Last Name</label> <input type="text" name="lastname" id="lastname-BN-dd356e02d4735920-0"> </div>
    <div class="BN-form-row BN-input-email"> <label data-name="BN-label-email" for="erq2-BN-dd356e02d4735920-0">Email</label> <input type="email" name="erq2" required="required" id="erq2-BN-dd356e02d4735920-0"> </div>
    <div class="BN-form-row BN-checkbox BN-input-checkbox"> <input type="checkbox" required="required" name="consent" id="consent-BN-dd356e02d4735920-0"> <label class="BN-label-consent-text" for="consent-BN-dd356e02d4735920-0"
        style="font-weight: normal; margin-bottom: 0px;"> Please give consent to receive emails</label> </div>
  </div><!--/form-contents-->
  <div class="BN-form-row"> <button type="submit" style="background-color: rgb(34, 204, 170); color: rgba(255, 255, 255, 0.7);">SEND ME THE RESOURCE!</button> </div> <span class="data-capture"><input name="email" type="email"><input name="name"
      type="text"></span><input type="hidden" name="eBook" value="dd356e02d4735920"><input type="hidden" name="ref" value="https://careercarta.com/sample-sop-for-ms-in-cybersecurity/#BN-dd356e02d4735920"><input type="hidden" name="version"
    value="2"><input type="hidden" name="raw" value="">
</form>

Text Content

Toggle navigation


CAREERCARTA

Your personal coach!

Skip to content
 * Home
 * Services
   
   
   
   * SOP Services
   * Career Guidance
 * Blog
   
   
   
   * Sample SOP for MBA in Event Management [2023]
   * Sample SOP for MBA in India [2023]
   * Sample SOP for MS in Aerospace Engineering [2023]
   * Sample SOP for MS in Artificial Intelligence [2023]
   * Sample SOP for MS in Big Data [2023]
   * Sample SOP for MS in Biotechnology [2023]
   * Sample SOP for MS in Blockchain [2023]
   * Sample SOP for MS in Business Analytics [2023]
   * Sample SOP for MS in Chemical Engineering [2023]
   * Sample SOP for MS in Civil Engineering [2023]
   * Sample SOP for MS in Computer Architecture [2023]
   * Sample SOP for MS in Computer Science [2023]
   * Sample SOP for MS in Cybersecurity [2023]
   * Sample SOP for MS in Data Science [2023]
   * Sample SOP for MS in Electrical Engineering [2023]
   * Sample SOP for MS in Industrial Engineering [2023]
   * Sample SOP for MS in IOT [2023]
   * Sample SOP for MS in Machine Learning [2023]
   * Sample SOP for MS in Material Sciences and Engineering [2023]
   * Sample SOP for MS in Mechanical Engineering [2023]
 * Scholarship
 * Scholarships
   
   
   
   * The Top 25 Consulting Firms To Work For In America
   * Top 10 Cybersecurity Firms to work for in the world
   * Top 10 Edtech companies to work in India
   * Top 10 Edtech companies to work in Singapore
   * Top 100 Business Schools in the World
   * Top 100 Business Schools outside the US- Aggregate Rankings
   * Top 100 Business Schools outside US
   * Top 5 Affordable Countries For Indian Students to Study Abroad
   * Top 50 Business Schools in the US- Aggregate Rankings
   * Top 50 Firms to work for in 2022-Consulting Firms
   * Top Banking firms to work for in India
   * Top Business Schools in India
   * Top business schools: Germany
   * Top business schools: UK
   * Top Consulting Firms To Work For In UK
   * Top Cybersecurity firms to work for in India
   * Top Ecommerce Firms To Work For In USA
 * About Us
 * Courses


August 19, 2021 careercarta


SAMPLE SOP FOR MS IN CYBERSECURITY [2023]


SAMPLE SOP FOR MS IN CYBERSECURITY [WITH WORK EXPERIENCE]

Sample SOP for MS in Cybersecurity: In the mobile first world of today where
trillions of data packets are exchanged every day, Cyber Security has become a
ubiquitous for every individual. Pervasive mobile applications have entered the
realm of personal life where choices of an individual have become a commodity to
be traded amongst content publishers.

Like many other developing nations, India has experienced accelerated progress,
often bypassing traditional stages of evolution. A significant example of this
phenomenon is the widespread adoption of smartphones and the emergence of
cost-effective telecommunications, which in turn facilitated easy access to
digital technology. A pivotal aspect of this digital transformation has been the
development of payment infrastructure, including platforms like NEFT, RTGS,
Internet Banking, Mobile Banking, and the latest addition, UPI (Unified Payment
Interface). The implementation of demonetisation two years ago acted as a
catalyst, propelling digital payments to unprecedented levels of growth. To
illustrate, segments such as UPI, Aadhaar-based transactions, online banking,
e-wallets, and debit card payments witnessed a remarkable 46% increase in value
and a staggering 65% surge in volume during the fiscal year 2016-17 compared to
the preceding year. This thrust towards digitalizing financial transactions has
underscored the critical importance of cyber and data security within the
financial sector.

Hired as a Specialist Manager in a bank with a vast customer base, I recognize
that any vulnerability in the financial applications handling customer accounts
and transaction details can expose sensitive data to potential hackers,
potentially leading to substantial losses for the bank. This not only
jeopardizes customer trust but also carries the risk of a significant public
relations crisis. While many of us assume that our data is secure and our
actions are confidential, the reality is often different. A single cyber-attack
has the potential to compromise individuals, government entities, and even
corporate sectors. A recent case in point is the hacking of Capital One, a major
financial institution and credit issuer in the US and Canada, affecting 100
million Americans and 6 million Canadians. This breach led to the exposure of
over 140,000 Social Security numbers and personal details of credit card
holders.

Sample SOP for MS in Cybersecurity

As a Technical Field Manager I’m cognizant of the importance of data and cyber
security as we interact with millions of customer’s data. In the year 2016 my
bank had a cyber-attack on one of our public facing tax payer’s website
compromising bank’s server and data. Our Bank website was defaced and it was a
field day for media leaving an adverse impact on our Bank’ reputation. The
incident was immediately reported to CERT-IT and IT team of Reserve Bank of
India to investigate the vulnerabilities at Bank’s side. Fortunately, there was
no loss of data and CERT-IN and RBI team provided suggestions to develop and
implement our public facing applications with secure code practices. I, along
with my team reworked on the project of migrating 30 different state Government
tax payments applications in 3 tier architecture where in public facing user
interface is hosted in Web layer( 1st layer), the business logic(2nd layer)is
hosted in app layer and data is stored in database layer( 3rd layer). The
communication among these three layers was encrypted making applications robust
as this architecture ensures safety of data layer even when web layer is
breached. From that incident to the present, we have reworked on ensuring cyber
security of all our applications. We have adopted a practice to make all our
public facing applications go through ethical hacking, code audit test,
vulnerability assessment and penetration testing and IS-audit before making it
live for the customers. We have secured our servers by hardening the OS,
obfuscation, adding the applications under Web Application Firewall and allowing
only required network access ports from the server. Initiatives towards cyber
security has propelled my motivation towards the subject as a career field to
ensure that our applications are robust and secure eliminating any kind of
damage to any of the customer’s data and Bank.

Sample SOP for MS in Cybersecurity

The last couple of years have been a steep learning curve for me after I
graduated with a B.E. in Electronics and Communication from University Institute
of Engineering and Technology, XYZ. The curriculum helped me in basics of
engineering while electives such as Wireless communications, Computer
architecture and Organisation, Digital signal and Processing, Radar Engineering
gave me exposure to encryption methodologies. After my under graduate, I joined
ABC Bank, one of the largest public sector Banks owned by the Government of
India as a Technical Field Officer. During this period of association with
Canara Bank, I further honed my technical skills along with practical
application leading to my promotion to Technical Field Manager in the same
organisation in a short span. While performing my duties for the Bank, I came
across the various IT certifications issued by Indian Institute of Banking and
Finance namely IT security, Digital Banking, Cyber security Fraud Management and
Information Systems Banker. As I started studying these subjects and appearing
for certificate examinations, my success in these certifications made me realize
my affinity for the topic. I realized my interests andidentified that this is
what I want to pursue further. My interest in cryptic is further aggravated by
application of acquired knowledge in practical work life i.e. resolving VAPT
observations of servers, ensuring data base masking, ensuring developers stick
to secure code practices and protecting IT assets and data from any unauthorised
access etc.

I come from a modest middle-class background in India, where financial resources
were often limited for pursuing higher education. I proudly hold the distinction
of being the first in my family to achieve a Bachelor’s degree in Engineering.
During my undergraduate years, I began tutoring local children to support
myself. Subsequently, I embarked on the path of preparing for highly competitive
recruitment exams conducted by various government-owned banks in India. Securing
a position as a Technical Officer at ABC Bank was a significant achievement that
fills me with enduring pride. This role not only provided me with my first taste
of professional experience but also afforded me financial stability and
independence. While working at the bank, I met my future husband and we married
at a relatively young age. Initially, I hesitated to broach the topic of
pursuing further education with my husband. However, when I finally mustered the
courage to share my aspirations, he not only encouraged me to chase my dreams
but also wholeheartedly supported my decision to pursue a Masters in the field
that impassions me the most. On a personal note, I see this incredible
opportunity as a pivotal milestone, as I would be the first woman in my family
to pursue a Masters degree from one of the prestigious universities in the USA.
If granted this opportunity, it would serve as a beacon of inspiration for the
female members of my family, demonstrating that dreams can be pursued even after
marriage. It would also encourage the male members to wholeheartedly support
their spouses in realizing their aspirations. Additionally, it would raise the
aspirations of my two younger siblings who harbor ambitions of pursuing higher
education in the technical field.

The Masters in Engineering in Cyber Security at University of Maryland, College
Park seems to be tailor made for my needs. One of the papers which particularly
caught my attention was-Professor Christian B. Almazan’s scholarly paper on
“Information Dynamics: Understanding Information in Computer and Software
Systems”, which proposes understanding the vital role information has in any
system, whether it be for business, government, academic, etc. The approach
proposes that the information is considered to be the primary component of any
system, not just internal to the processes. It proposes that by making
information first class objects in a system, it allows for easy extensibility
and understanding of how a system should be built and maintained. It focuses on
understanding how information plays a vital role in computer and software
systems. The invention of the computer would not have happened if we did not
have the need to process large amounts of information”. Since I deal with
customer data on daily basis I can relate to the scholarly work and understand
the vitality of customer data in our tax payment processes and systems as any
loss/leakage of customer information has a direct impact on our Bank and our
customers. I have motivation, aptitude and desire to learn. I hope that my
academic background coupled with my work experience will enable me to develop
myself into a successful Cyber Security professional. I look forward to an
interesting and rewarding association with your esteemed University.

We are a platform that connects aspiring candidates with experts who have aced
the admission process at the top universities of the world. We offer highly
personalized programs at the most affordable market beating prices.  You can
fill the form below for any help or guidance with your application in general or
scholarships in particular. Alternatively you write to us at
connect@careercarta.com

 


SAMPLE SOP FOR MS IN CYBERSECURITY [WITHOUT WORK EXPERIENCE]

Sample SOP for MS in Cybersecurity: In the mobile first world of today where
trillions of data packets are exchanged every day, Cyber Security has become a
ubiquitous for every individual. Pervasive mobile applications have entered the
realm of personal life where choices of an individual have become a commodity to
be traded amongst content publishers.

Like many other developing nations, India has experienced accelerated progress,
often bypassing traditional stages of evolution. A significant example of this
phenomenon is the widespread adoption of smartphones and the emergence of
cost-effective telecommunications, which in turn facilitated easy access to
digital technology. A pivotal aspect of this digital transformation has been the
development of payment infrastructure, including platforms like NEFT, RTGS,
Internet Banking, Mobile Banking, and the latest addition, UPI (Unified Payment
Interface). The implementation of demonetisation two years ago acted as a
catalyst, propelling digital payments to unprecedented levels of growth. To
illustrate, segments such as UPI, Aadhaar-based transactions, online banking,
e-wallets, and debit card payments witnessed a remarkable 46% increase in value
and a staggering 65% surge in volume during the fiscal year 2016-17 compared to
the preceding year. This thrust towards digitalizing financial transactions has
underscored the critical importance of cyber and data security within the
financial sector.

I graduated with a B.E. in Electronics and Communication from University
Institute of Engineering and Technology, XYZ. The curriculum helped me in basics
of engineering while electives such as Wireless communications, Computer
architecture and Organisation, Digital signal and Processing, Radar Engineering
gave me exposure to encryption methodologies. After my under graduate, I joined
ABC Bank, one of the largest public sector Banks owned by the Government of
India as a Technical Field Officer. During this period of association with
Canara Bank, I further honed my technical skills along with practical
application leading to my promotion to Technical Field Manager in the same
organisation in a short span. While performing my duties for the Bank, I came
across the various IT certifications issued by Indian Institute of Banking and
Finance namely IT security, Digital Banking, Cyber security Fraud Management and
Information Systems Banker. As I started studying these subjects and appearing
for certificate examinations, my success in these certifications made me realize
my affinity for the topic. I realized my interests andidentified that this is
what I want to pursue further. My interest in cryptic is further aggravated by
application of acquired knowledge in practical work life i.e. resolving VAPT
observations of servers, ensuring data base masking, ensuring developers stick
to secure code practices and protecting IT assets and data from any unauthorised
access etc.

During my final year I undertook The “Secure Network Infrastructure Design and
Implementation” project aimed at bolstering the cybersecurity measures of a
college. Its central focus lies in constructing a resilient security framework,
consisting of strategically placed firewalls, robust intrusion detection systems
(IDS), secure virtual private networks (VPN), and stringent access controls.
This endeavor not only ensures the protection of sensitive data but also
enhances the institution’s overall ability to withstand cyber threats. The
project begins with a thorough vulnerability assessment and threat modeling
phase, enabling the identification and prioritization of potential
vulnerabilities and threat vectors within the existing network. Following this,
the implementation and configuration of firewalls are carried out to carefully
filter incoming and outgoing traffic. These firewalls are fine-tuned to enforce
strict access policies, allowing legitimate traffic while blocking unauthorized
access attempts. Additionally, an intrusion detection system is integrated to
continuously monitor network traffic for any signs of suspicious activities or
potential security breaches. Real-time alerts are set up to promptly notify
administrators in case of detected anomalies. The project also includes the
establishment of a secure virtual private network infrastructure, facilitating
encrypted communication for remote access. Stringent authentication mechanisms
are implemented to ensure that only authorized users can establish VPN
connections, adding an extra layer of security. Access controls are reinforced
through the application of technologies like multi-factor authentication (MFA)
and role-based access controls (RBAC). Comprehensive security policies,
outlining best practices, compliance requirements, and incident handling
procedures, are developed and documented. Incident response plans are also
crafted to guide the team in effectively mitigating and recovering from security
incidents. The expected outcome of this project is a fortified network
infrastructure that significantly reduces the likelihood of successful
cyber-attacks. The implementation of advanced security measures and the
establishment of robust security policies and incident response plans will
provide a sturdy framework for ongoing security management and response,
ultimately strengthening the college’s cybersecurity postur

The Masters in Engineering in Cyber Security at University of Maryland, College
Park seems to be tailor made for my needs. One of the papers which particularly
caught my attention was-Professor Christian B. Almazan’s scholarly paper on
“Information Dynamics: Understanding Information in Computer and Software
Systems”, which proposes understanding the vital role information has in any
system, whether it be for business, government, academic, etc. The approach
proposes that the information is considered to be the primary component of any
system, not just internal to the processes. It proposes that by making
information first class objects in a system, it allows for easy extensibility
and understanding of how a system should be built and maintained. It focuses on
understanding how information plays a vital role in computer and software
systems. The invention of the computer would not have happened if we did not
have the need to process large amounts of information”. Since I deal with
customer data on daily basis I can relate to the scholarly work and understand
the vitality of customer data in our tax payment processes and systems as any
loss/leakage of customer information has a direct impact on our Bank and our
customers. I have motivation, aptitude and desire to learn. I hope that my
academic background coupled with my work experience will enable me to develop
myself into a successful Cyber Security professional. I look forward to an
interesting and rewarding association with your esteemed University.

We are a platform that connects aspiring candidates with experts who have aced
the admission process at the top universities of the world. We offer highly
personalized programs at the most affordable market beating prices.  You can
fill the form below for any help or guidance with your application in general or
scholarships in particular. Alternatively you write to us at
connect@careercarta.com

 

Sample SOP for MS in cybersecurity

Please enable JavaScript in your browser to complete this form.
Your Name *
Your Email *
Mobile Number *
Country Code (Eg: +1 For USA +91 For India +33 For France etc.) *
Course *SOP/Essay ConsultancyGREGMATCareer GuidanceOthers
Country
Any message for us
Email
Send Message

Read about: SOP Writing Services

Read more about: Sample SOP for MS

Read more about:Sample SOP for MS in Computer Science

Read more about:Sample SOP for MS in Computer Architecture

Read more about: SAMPLE SOP FOR CHICAGO HARRIS SCHOOL OF PUBLIC POLICY-Selected
Candidate

Read More About: Canada Scholarships

tags: Sample SOP for MS in Cybersecurity
tags:  tips for Sample SOP for MS in Cybersecurity
tags: how to write Sample SOP for MS in Cybersecurity
tags: essay of a selected candidate for Sample SOP for MS in Cybersecurity



VIDEOS

Video Player

https://www.youtube.com/watch?v=CngYhWA9bCQ

00:00
00:00
14:17
Use Up/Down Arrow keys to increase or decrease volume.




KNOW CAREERCARTA

Video Player

https://www.youtube.com/watch?v=wP0HjjyBQrY

00:00
00:00
00:31
Use Up/Down Arrow keys to increase or decrease volume.




GMAT/GRE ONLINE

Video Player

https://www.youtube.com/watch?v=TxnOwKyzZBw

00:00
00:00
00:31
Use Up/Down Arrow keys to increase or decrease volume.




GET A COACH

Video Player

https://www.youtube.com/watch?v=OD9tyge37EM

00:00
00:00
00:31
Use Up/Down Arrow keys to increase or decrease volume.




BUSINESS ANALYTICS

Video Player

https://www.youtube.com/watch?v=A9rGckqHeDo

00:00
00:00
00:56
Use Up/Down Arrow keys to increase or decrease volume.




GMAT STUDY GUIDE

Video Player

https://www.youtube.com/watch?v=CtOJ9wMq8Gc

00:00
00:00
00:40
Use Up/Down Arrow keys to increase or decrease volume.




MBA IN FINANCE

Video Player

https://www.youtube.com/watch?v=RsLYQ0KxiOg

00:00
00:00
06:34
Use Up/Down Arrow keys to increase or decrease volume.




MBA IN AUSTRALIA

Video Player

https://www.youtube.com/watch?v=fPUSBUJjsbM

00:00
00:00
08:27
Use Up/Down Arrow keys to increase or decrease volume.




HARVARD 2+2

Video Player

https://www.youtube.com/watch?v=fdf3XLPP6hw

00:00
00:00
05:39
Use Up/Down Arrow keys to increase or decrease volume.




ISB YOUNG LEADERS

Video Player

https://www.youtube.com/watch?v=qOAFJV_NNYA

00:00
00:00
07:57
Use Up/Down Arrow keys to increase or decrease volume.




SELECTING THE RIGHT BSCHOOL

Video Player

https://www.youtube.com/watch?v=pQ2qw0LNyI0

00:00
00:00
07:00
Use Up/Down Arrow keys to increase or decrease volume.


47/1 Kalu Sarai, Opposite Vijaymandal Enclave-Gate No.1, New Delhi- 110016
connect@careercarta.com
+91 7428474591 +91-8287291076

Copyright@Careercarta 2023

Zerif Lite developed by ThemeIsle
× WhatsApp
Go to mobile version


GET 2 FREE SOP SAMPLE ESSAYS 

Just enter your details in the form below and we'll send you a free bonus
resource.

Name
First Name
Last Name
Email
Please give consent to receive emails
SEND ME THE RESOURCE!