Join India’s largest E&ICT, IIT Guwahati program, running over 8 years with 10,000+ learners. Elevate your career with E&ICT, IIT Guwahati
Price
Starts at Rs. 225000
Start Date
2024 Dec 20
Duration
12 Months Months
Key Program Highlights
Specialisations
Hands-on Projects
Tools
Key Program Description
Module 1: Preparatory Sessions – Python & Linux Foundation
Module 2: Introduction to Cyber Security & Information Security
2.1 What is Cyber Security
2.2 Overview
2.3 Need and Importance
2.4 Different Verticals
Module 3: Working with Kali Linux 2021.1
3.1 Introduction to Kali Linux
3.2 Services in Kali (HTTP, SSH)
3.3 Wget, curl, grep, awk, tail, head, watch, find, locate
3.4 Piping and Redirection
3.5 Python and Bash Scripting
3.6 Netcat, Socat, Powercat, Powershell, Wireshark, tcpdump
3.7 Note taking
Module 4: Network Security
4.1 Security Controls
4.2 Networking Concepts
4.3 Traffic Analysis
4.4 Packet Analyzers
4.5 Sniffers
4.6 Firewalls
4.7 SIEM
4.8 VLAN
4.9 VPN
Module 5: Incident Detection with Security Information and Event Management (SIEM)
5.1 Understand the Basic Concepts of Security Information and Event
Management (SIEM)
5.2 Discuss the Different SIEM Solutions
5.3 Understand the SIEM Deployment
5.4 Learn Different Use Case Examples for Application-Level Incident
Detection
5.5 Learn Different Use Case Examples for Insider Incident Detection
5.6 Learn Different Use Case Examples for Network Level Incident
Detection
5.7 Learn Different Use Case Examples for Host Level Incident Detection
5.8 Learn Different Use Case Examples for Compliance
5.9 Understand the Concept of Handling Alert Triaging and Analysis
Module 6: Security Operations and Management
6.1 Understand the SOC Fundamentals
6.2 Discuss the Components of SOC: People, Processes and Technology
6.3 Understand the Implementation of SOC
Module 7: Identity and Access Management (IAM)
7.1 Logical/Physical Access to Assets Management
7.2 Authentication and Identification Management
7.3 Integrating Identity as a Third-Party Service
7.4 Mechanism of Authorization
7.5 Provisioning Life Cycle’s Identity and Access.
Module 8: Web Application Penetration Testing
8.1 OWASP Tools and Methodologies
8.2 Insecure Deserialization
8.3 Clickjacking
8.4 Black Box Testing
8.5 White Box Testing
8.6 Fuzzing
8.7 Cryptograph
8.8 Symmetric/Asymmetric Cryptography
8.9 Hashing
8.10 Digital Signatures
8.11 API Security
8.12 Patch Management
Module 9: Malware Analysis
9.1 Types
9.2 Ransomware
9.3 Detection
9.4 Analysis
Module 10: Ethical Hacking
10.1 Introduction
10.2 Foot Printing and Reconnaissance
10.3 Scanning Networks
10.4 Enumeration
10.5 Vulnerability Analysis
10.6 System Hacking
10.7 Sniffing
10.8 Social Engineering
10.9 Denial-of-Service
10.10 Session Hijacking
10.11 Evading IDS
10.12 Firewalls and Honeypots
10.13 Hacking Web Servers
10.14 SQL Injection
10.15 Hacking – Wireless Networks
10.16 Mobile Platforms
10.17 IoT.
Module 11: Cloud Security
11.1 Infrastructure Security: Network level security, Host level security,
Application-level security
11.2 Data security and Storage: Data privacy and security Issues,
Jurisdictional issues raised by Data location
11.3 Access Control
11.4 Trust, Reputation, Risk
11.5 Authentication in cloud computing, Client access in cloud, Cloud
contracting Model, Commercial and business considerations
Module 12: Software Development Security
12.1 Security Controls for The Development Environment
12.2 Life Cycle Security
12.3 Impact of Acquired Software Security
12.4 Effectiveness of Software Security.
Capstone Project
In this module, you will learn how to prevent a web application from being
hacked as well as what key points to be considered for making an web
application secure. This capstone project will give you exposure of both blue
team and red team work profile and help you gain exposure on both the sides.
Curriculum
Receive a signed and verifiable e-certificate from EICT IITG upon successfully completing the course.
Post your certificate on LinkedIn or add it to your resume! You can even share it on Instagram or Twitter.
Use your certificate to enhance your professional credibility and stand out among your peers!
Book Your Free Demo Classes
How To Apply
Following are 3 simple steps in the admission process for the Advanced Certification in Cyber Security (E&ICT Academy IIT Guwahati)