Cyber Security

It is estimated that there will be roughly 250 billion connected devices by 2022. The rapid convergence of Mobility, Internet of Things and Cloud Computing is leading to an explosive increase in security threats (Out of the top 10 most targeted countries by cyber attackers, India ranks fourth) and the need for Cyber Defence experts to combat these threats is becoming all the more important. The demand for professionals is outstripping supply.

Companies need sophisticated responders to defend against the growing threat of cyber attacks. There is a huge talent crunch and 59% of the companies have vacant positions suggesting a cumulative global shortfall of 1.5 million such professionals.

This 240-hours Post Graduate Certificate program in Cyber Security is your gateway to future-proof your career.

 

Who Should Attend?
  • Fresh Engineering Graduates(Any branch)
  • BCA, MCA, BSc-IT, MSc-IT Grads
  • IT Professionals
Course Duration

240 Hours (6 months)

Course Fee

60,000 + GST

Loan facility available

Eligibility

Graduation with at least 50% marks

Pedagogy

Virtual instructor-led training (VILT)

Certified / Accredited By

TeamLease EdTech

Placement Assistance

Placement assistance available



Learning Outcomes
 
Build expertise in Cyber Security and Cyber Defense
Define security concepts, technologies and tools that support secure application development
Recognize security flaws and use alternative solutions to solve Cyber Security problems
Examine the security infrastructure and validate security architecture
Demonstrate their analytical skills for cryptography, security policies and information exchange protocols in secured communication
Propose security best practices for Cyber Security with modern tools, offensive security frameworks, metasploit, develop exploits and penetration distro


Topics Covered
 
  • Fundamentals of Programming Language with Data Structures (Java)
  • Networking Essentials
  • Linux Administration
  • Python Programming
  • Fundamentals of Cyber Security
  • Information Security Architecture and Applied Cryptography
  • Forensics of Cyber Security
  • Network and Communications Security Web
  • Application Security
  • Intrusion Detection and Prevention System
  • IOT Security
  • Digital Data Acquisition, Recovery and Analysis
  • Ethical Hacking and VAPT
  • Cyber Laws and Regulations
  • Capstone Project


Post Graduate Certificate Program in Cyber Security

Complete the program successfully to obtain this valuable certificate.

 

Kind of Jobs Available After the Course

Cyber Security is one of the most in-demand skills, trending in the job market today. Studies point out that there will be nearly 3.5 million unfilled cybersecurity jobs globally by 2022. The National Association of Software and Services Companies (NASSCOM) estimated that India will need 1 million cybersecurity professionals by 2022. India alone has reported over 67,000 job openings.

Popular Job Roles in India in Offensive Cyber Security
  • Network Security Engineer
  • Cyber Security Analyst
  • Security Architect
  • Cyber Security Manager
  • Cyber Security Consultant
  • Chief Information Security Officer (CISO)

Course Curriculum


Fundamentals of Java and its basic building blocks
Stack, Trees and Graphs
Objects and Classes
Arrays and Array Lists
Exception Handling and Applets
Advanced Algorithm Design and Analysis
Introduction, History and Importance of Computer Networking
Computer Networking OSI reference model and its layers
TCP/IP Suite and its applications
Computer network topologies and types
IP address – versions (IPV4 & IPV6), Classes and Subnetting
Firewalls and IDS, IPS
Troubleshooting
Linux Fundamentals
User, Group and Permission
Creating and Editing Text files
Memory Partitioning
SElinux
FTP, DHCP client-server configuration
Linux Boot Process
Network Communication with firewall
Introduction to Python Programming Language
Data Collections and Language Component
Object and Classes
Functions and Modules
I/O and Error Handling in Python
Python Programming LAB
Introduction to Cyber Security
Cyber Security Concepts and Security in Evolving Technologies
Information and Network Security
Cyber Attacks
Cyber Laws and Forensics
Introduction to Security Architecture & Engineering
OS Fundamentals and Security
Cryptography and Encryption
Cryptographic Key Management, Message Digests and Digital Signatures
Identity Access Management
Understanding Security Operation
Incident Response Process
Logging, Monitoring and Auditing
Principles and Components of Network Security and Spoofing
Types of Attack
Fundamentals of Connections, Requests, Ports and Packets with Wireshark
Packet Inspection and attack against availability
Design and Configure Firewalls
Network Access Control
Define and Configure IDS
IPSec Protocols
SIEM tools and additional security measures
Overview of Web Application
Web Applications Security Fundamentals
Web Application and associated Vulnerabilities
Cookies and Tracking
Data and Database Security
Injection Flaws
Phishing and other attacks on Identity
Client-side and Server-side security
Cloud Application Security
Regulation, Compliance and Risk Management
Cyber Forensic and Cyber Crimes and types
Investigation and Acquiring Evidence
Windows and Linux Artifacts Analysis and Document Forensics
Electronic / Digital Evidence laws & cases Laws
History of Intrusion detection, Audit
Intrusion Prevention Systems
Introduction to Snort, Snort Modes
Working with Snort Rules
Using ACID and Snort Snarf with Snort
IOT Security Overview
IOT Security and Vulnerability Issues
Secured Protocols for IOT
Securing IOT Environment
IOT Attacks – Case Studies
Data Acquisition
Data Loss
Data Recovery and Backup
Data Encryption
Ethical Hacking
Footprinting
ARP Poisoning, Spoofing
Vulnerability Assessment
Penetration Testing
IT Act – Evolution and Salient features
Cyber Space Jurisdiction
E – commerce and Laws in India
Intellectual Property Rights
Sensitive Personal Data or Information (SPDI) in Cyber Law
Following suggested project to be completed:
Demonstrate your knowledge and skills by working on capstone projects using Cuckoo Sandbox tool for malware analysis, Homomorphic Encryption methods and Network Intrusion Detection Systems.