Book Your Free Demo Class Now!

Course Detail

By : E&ICT, IIT Guwahati E&ICT, IIT Guwahati

Programme in Advanced Certification in Cyber Security (E&ICT Academy IIT Guwahati)

Join India’s largest E&ICT, IIT Guwahati program, running over 8 years with 10,000+ learners. Elevate your career with E&ICT, IIT Guwahati

Price

Starts at Rs. 225000

Start Date

2024 Dec 20

Duration

12 Months Months

Apply Now
Hurry! 320 people have already applied in the last 1 month
For enquiries call: 1800 210 2020
banner image

Your Pathway to Advanced Certification in Cyber Security (E&ICT Academy IIT Guwahati)

Key Program Highlights

2

Specialisations

15+

Hands-on Projects

20+

Tools

  • 2 Months Complimentary Programming Bootcamp For Beginners
  • Solve 60+ Real-World Case Studies
  • 6 Practical Hands-on Capstone Projects
  • Leverage the hottest advanced certification in cyber security (e&ict academy iit guwahati)
  • Create and deploy advanced certification in cyber security (e&ict academy iit guwahati)
  • Dedicated Career Assistance
Program Highlights

Key Program Description

 

Module 1: Preparatory Sessions – Python & Linux Foundation

 

  • Python Environment Setup and Essentials
  • Python Language Basic Constructs
  • Introduction to Linux and File Managements

 

 

Module 2: Introduction to Cyber Security & Information Security

 

2.1 What is Cyber Security

 

2.2 Overview

2.3 Need and Importance

2.4 Different Verticals

 

Module 3: Working with Kali Linux 2021.1

 

3.1 Introduction to Kali Linux

 

3.2 Services in Kali (HTTP, SSH)

3.3 Wget, curl, grep, awk, tail, head, watch, find, locate

3.4 Piping and Redirection

3.5 Python and Bash Scripting

3.6 Netcat, Socat, Powercat, Powershell, Wireshark, tcpdump

3.7 Note taking

 

Module 4: Network Security

 

4.1 Security Controls

 

4.2 Networking Concepts

4.3 Traffic Analysis

4.4 Packet Analyzers

4.5 Sniffers

4.6 Firewalls

4.7 SIEM

4.8 VLAN

4.9 VPN

 

Module 5: Incident Detection with Security Information and Event Management (SIEM)

 

5.1 Understand the Basic Concepts of Security Information and Event

 

Management (SIEM)

5.2 Discuss the Different SIEM Solutions

5.3 Understand the SIEM Deployment

5.4 Learn Different Use Case Examples for Application-Level Incident

Detection

5.5 Learn Different Use Case Examples for Insider Incident Detection

5.6 Learn Different Use Case Examples for Network Level Incident

Detection

5.7 Learn Different Use Case Examples for Host Level Incident Detection

5.8 Learn Different Use Case Examples for Compliance

5.9 Understand the Concept of Handling Alert Triaging and Analysis

 

Module 6: Security Operations and Management

 

6.1 Understand the SOC Fundamentals

 

6.2 Discuss the Components of SOC: People, Processes and Technology

6.3 Understand the Implementation of SOC

Module 7: Identity and Access Management (IAM)

7.1 Logical/Physical Access to Assets Management

7.2 Authentication and Identification Management

7.3 Integrating Identity as a Third-Party Service

7.4 Mechanism of Authorization

7.5 Provisioning Life Cycle’s Identity and Access.

 

Module 8: Web Application Penetration Testing

 

8.1 OWASP Tools and Methodologies

 

8.2 Insecure Deserialization

8.3 Clickjacking

8.4 Black Box Testing

8.5 White Box Testing

8.6 Fuzzing

8.7 Cryptograph

8.8 Symmetric/Asymmetric Cryptography

8.9 Hashing

8.10 Digital Signatures

8.11 API Security

8.12 Patch Management

Module 9: Malware Analysis

9.1 Types

9.2 Ransomware

9.3 Detection

9.4 Analysis

 

Module 10: Ethical Hacking

 

10.1 Introduction

 

10.2 Foot Printing and Reconnaissance

10.3 Scanning Networks

10.4 Enumeration

10.5 Vulnerability Analysis

10.6 System Hacking

10.7 Sniffing

10.8 Social Engineering

10.9 Denial-of-Service

10.10 Session Hijacking

10.11 Evading IDS

10.12 Firewalls and Honeypots

10.13 Hacking Web Servers

10.14 SQL Injection

10.15 Hacking – Wireless Networks

10.16 Mobile Platforms

10.17 IoT.

 

Module 11: Cloud Security

 

11.1 Infrastructure Security: Network level security, Host level security,

 

Application-level security

11.2 Data security and Storage: Data privacy and security Issues,

Jurisdictional issues raised by Data location

11.3 Access Control

11.4 Trust, Reputation, Risk

11.5 Authentication in cloud computing, Client access in cloud, Cloud

contracting Model, Commercial and business considerations

 

Module 12: Software Development Security

 

12.1 Security Controls for The Development Environment

 

12.2 Life Cycle Security

12.3 Impact of Acquired Software Security

12.4 Effectiveness of Software Security.

 

Capstone Project

 

In this module, you will learn how to prevent a web application from being

 

hacked as well as what key points to be considered for making an web

application secure. This capstone project will give you exposure of both blue

team and red team work profile and help you gain exposure on both the sides.

Curriculum

Certification

Earn and Share Your Certificate

Official & Verifiable

Receive a signed and verifiable e-certificate from EICT IITG upon successfully completing the course.

Share Your Achievement

Post your certificate on LinkedIn or add it to your resume! You can even share it on Instagram or Twitter.

Stand Out to Recruiters

Use your certificate to enhance your professional credibility and stand out among your peers!

Certification Image

Book Your Free Demo Classes

E&ICT, IIT Guwahati Course Admissions

How To Apply

Following are 3 simple steps in the admission process for the Advanced Certification in Cyber Security (E&ICT Academy IIT Guwahati)

Please chat with our team An admin will respond within a few minutes.
Hello, is there anything we can assist you with?
Type a message