Advanced Certificate in
Cybersecurity and Blockchain
By E&ICT IIT Guwahati
Unlock Cyber Resilience & Blockchain Excellence with E&ICT Academy IIT G and EC-Council
Introducing the Advanced Certificate in Cybersecurity and Blockchain with E&ICT Academy IIT Guwahati
Our programme delves into the dynamic realms of cybersecurity, cryptography, and blockchain, mirroring industry practices. Our curriculum and pedagogy are your roadmap to mastering critical skills and preparing you for a secure and innovative future where you will learn to fortify against cyber threats, harness encryption for data security, and uncover blockchain's transformative influence on various sectors. Additionally, gain access to EC-Council-aligned content and practice on EC-Council iLabs and receive an exam voucher to attempt the EC-Council CEH exam for accomplished learning.
Designed by IIT Guwahati & Industry Experts
Meticulously crafted and designed by IIT Guwahati faculty and industry specialists, the curriculum focuses on networking fundamentals, ethical hacking, vulnerability analysis, blockchain, and overall network security.
Hands-On Learning with Industry-Prevalent Tools
Participate in immersive hands-on lab sessions and learn to utilise industry-prevalent tools such as VMware, Kali OS, Wireshark, Nessus, Nmap, and more. This will demonstrate your practical proficiency in cybersecurity techniques and methodologies.
Live with IIT Guwahati Faculty & Industry Experts
Participate in live interactive sessions led by cybersecurity academicians from IIT Guwahati and industry experts, where you will explore networking, ethical hacking principles, vulnerability assessment, blockchain concepts & much more.
3-day Campus Immersion at IIT Guwahati
Enjoy a 3-day campus immersion at IIT Guwahati. This will not only foster networking opportunities among peers, faculty members, and industry professionals but will also help you gain real-world insights.
Certified Ethical Hacker @ EC Council | CEHv12
Gain practical ethical hacking skills, counter diverse attack vectors, and earn the CEH credential. Essential for an ethical hacker role, enhancing organisational security through specialised training.
Holistic Development and Real-World Applications
Gain a comprehensive understanding of cybersecurity nuances, from networking basics to advanced ethical hacking. It will help you navigate the real-world cyber challenges effectively.
Why Join the Advanced Certificate in Cybersecurity and Blockchain?
Why Choose E&ICT Academy IIT Guwahati for Strengthening Your Skills?
Meet Our Expert Faculty
Trusted By Millions Of Learners Around The World
Curriculum Highlights
Gain accurate understanding with the help of a state-of-the-art curriculum that offers conceptual and practical implications for the cybersecurity industry.
Grasp essential networking concepts like OSI model, TCP/IP protocols, IP addressing, and diverse network devices.
Topics
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Introduction to Networking & OSI Model
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
TCP/IP Protocol Suite
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
IP Addressing and Subnetting
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Network Devices and Topologies
Explore ethical hacking foundations, security insights, and footprinting techniques for a comprehensive understanding.
Topics
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Introduction to Ethical Hacking
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Information Security Overview
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Hacking Methodologies and Frameworks
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Hacking Concepts
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Ethical Hacking Concepts
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Information Security Controls
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Information Security Laws and Standards
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Footprinting Concepts
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Footprinting through Web Services
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Footprinting through Social Networking Sites
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Website Footprinting
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Email Footprinting
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Whois Footprinting
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
DNS Footprinting
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Network Footprinting
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Techniques to Prevent Footprinting
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Security Measures for Organizations
Learn network scanning tools, techniques, and countermeasures for threat detection and prevention.
Topics
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Network Scanning Concepts
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Scanning Tools
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Host Discovery
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Port and Service Discovery
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
OS Discovery (Banner Grabbing/OS Fingerprinting)
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Scanning Beyond IDS and Firewall
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Network Scanning Countermeasures
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Enumeration Concepts
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
NetBIOS Enumeration
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
SNMP Enumeration
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
LDAP Enumeration
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
NTP and NFS Enumeration
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
SMTP and DNS Enumeration
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Other Enumeration Techniques
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Enumeration Countermeasure
Understand vulnerability assessment, gaining access, and erasing digital footprints for effective system security.
Topics
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Vulnerability Assessment Concepts
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Vulnerability Classification and Assessment Types
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Vulnerability Assessment Tools
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Vulnerability Assessment Reports
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Gaining Access
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Escalating Privileges
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Maintaining Access
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Clearing Logs
Comprehend malware types, countermeasures, and advanced sniffing techniques for heightened cybersecurity awareness.
Topics
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Malware Concepts
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
APT Concepts
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Trojan Concepts
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Worm Makers
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Fileless Malware Concepts
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Malware Analysis
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Malware Countermeasures
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Anti-Malware Software
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Sniffing Concepts
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Sniffing Technique: MAC Attacks
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Sniffing Technique: DHCP Attacks
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Sniffing Technique: ARP Poisoning
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Sniffing Technique: Spoofing Attacks
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Sniffing Technique: DNS Poisoning
Delve into social engineering, web server intricacies, attacks, and protective measures against potential threats.
Topics
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Social Engineering Concepts
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Social Engineering Techniques
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Insider Threats
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Impersonation on Social Networking Sites
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Identity Theft
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Social Engineering Countermeasures
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Web Server Concepts
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Web Server Attacks
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Web Server Attack Methodology
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Web Server Attack Countermeasures
Master web application complexities, hacking methodologies, and pivotal SQL injection countermeasures for robust security.
Topics
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Web Application Concepts
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Web Application Threats
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Web Application Hacking Methodology
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Web API, Webhooks, and Web Shell
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Web Application Security
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
SQL Injection Concepts
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Types of SQL Injection
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
SQL Injection Methodology
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
SQL Injection Tools
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Injection Countermeasures
Navigate wireless network intricacies, mobile platform vulnerabilities, and establish strong security protocols.
Topics
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Wireless Concepts
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Wireless Encryption
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Wireless Threats
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Wireless Hacking Methodology
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Wireless Hacking Tools
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Bluetooth Hacking
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Wireless Attack Countermeasures
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Mobile Platform Attack Vectors
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Hacking Android OS
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Hacking iOS
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Mobile Device Management
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Mobile Security Guidelines and Tools
Explore IoT hacking concepts, attacks, and the intersection of IoT and OT, ensuring secure interconnected device environments.
Topics
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
IoT Hacking
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
IoT Concepts
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
IoT Attacks
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
IoT Hacking Methodology
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
OT Hacking
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
OT Concepts
Learn session hijacking concepts, tools, and effective countermeasures, including evading IDS, firewalls, and honeypots.
Topics
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Session Hijacking Concepts
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Application-Level Session Hijacking
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Network-Level Session Hijacking
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Session Hijacking Tools
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Session Hijacking Countermeasures
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
IDS, IPS, Firewall, and Honeypot Concepts
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
IDS, IPS, Firewall, and Honeypot Solutions
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Evading IDS
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Evading Firewalls
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Evading NAC and Endpoint Security
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
IDS/Firewall Evading Tools
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Detecting Honeypots
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
IDS/Firewall Evasion Countermeasures
Understand fundamental cryptography concepts, encryption algorithms, digital signatures, SSL/TLS, and blockchain applications for data protection.
Topics
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Cryptography Concepts
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Encryption Algorithms
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Cryptography Tools
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Hash Functions and Message Authentication Codes (MACs)
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Public Key Infrastructure (PKI)
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Digital Signatures
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Secure Sockets Layer/Transport Layer Security (SSL/TLS)
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Key Exchange and Distribution
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Post-Quantum Cryptography
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Blockchain and Cryptography
Explore blockchain basics, encompassing architecture, smart contracts, security, and diverse use cases for comprehensive understanding.
Topics
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Introduction to Blockchain
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Blockchain Architecture
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Smart Contracts
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Decentralized Applications (DApps)
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Blockchain Security
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Blockchain Use Cases
Get into advanced cryptography techniques, uncover the realms of cryptocurrency and tokenization, explore blockchain interoperability, and understand its applications in government and supply chain sectors.
Topics
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Advanced Cryptography Techniques
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Cryptocurrency and Tokenization
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Blockchain Interoperability
![](https://cdn.pegasus.imarticus.org/Fsd/P.webp)
Blockchain in Government and Supply Chain
Ace Sessions
Programme Certification
Upon successfully completing the program, you'll earn an Advanced Certificate in Cybersecurity and Blockchain By E&ICT Academy IIT Guwahati.
Grow with Imarticus learning
We’re focused on giving you an integrated learning experience. With our one-of-its-kind career support services, we continue to support you as you take a step into your career with a renewed perspective.
Access to IIMJobs and Hirist
IIMJobs & Hirist Pro-membership, Job Insights, Recruiter Action Status, Follow-up, Chat feature, Improved visibility.
Profile Enhancement
We assist you in building a robust portfolio to ensure that your profile always catches the eye of prospective employers.
Resume Building
Redesign your resume with professional help and highlight your strengths in the best possible way.
Interview Prep
We’ve analysed the most commonly asked interview questions and built a training module that confidently prepares you for job interviews.
Admission Process
Program Fee
2,00,000 + GST
FAQs
About the Programme
The duration of the course is 10 months and 230 hours of training.
Upon successfully completing the programme, you'll earn an Advanced Certificate in Cybersecurity and Blockchain By E&ICT IIT Academy Guwahati
The classes are designed to fulfil the requirements of a working professional, and hence the classes are scheduled during the weekends. All live interactive classes will happen online on the Zoom platform.
We recommend that you attend all of the classes. However, you can request a live recorded session if you miss a session. You can gain insights by watching the uploaded session on the learning platform.
You are required to attend at least 80% of the live sessions, to be eligible for the certification.
After completing the course, you can participate in a 3-day campus immersion programme at IIT Guwahati. During your visit, you will have the opportunity to meet the IIT faculty members and peers. You will get an excellent chance to establish a valuable industry network. However, the students will be responsible for their own transportation and lodging.
The 3-hour live sessions will be scheduled on weekends, Saturdays, and Sundays.
Yes, the IIT faculty will train you and help you build a solid foundation of the blockchain concepts. Industry experts will provide valuable insights to start your cybersecurity journey along with hands-on learning through projects and exercises.
As your core learning is happening via online live-interactive lectures, you will get recordings of the classes that you can review at your convenience. You will get access to our LMS, from which you can access all of the study materials. You will also get access to practice projects, additional study material and quizzes on our fully integrated online learning portal.
Eligibility
Aspiring Cyber security professional with STEM background with 0-5 years of experience.
- Bachelor's/Master’s degrees in Computer Science/Engineering/Math /Statistics/Economics
- Minimum of 50% marks in graduation
- Basic programming knowledge is required
Admission Process
Our programme counsellors will capture your academic and professional details. Your profile will be reviewed and you will be invited for the pre-admission interview. Once you get shortlisted, you will get an offer letter. You can then pay the registration fee and enrol for the programme.
It is a non-refundable amount that needs to be paid to reserve your seat in the batch. However, you can pay the total fee on a later due date and reserve your seat.
Placement Support
The placement assistance will be offered by Imarticus Learning. E&ICT Academy, IIT Guwahati will certify the candidates.
Placement support will be provided by Imarticus Learning. We will help you prepare for trending job roles in Cyber Security, through our career services which include:
- Resume and LinkedIn profile Building Session
- Mock Interviews
- Career Mentorship
Note: Imarticus Learning does not guarantee a placement. However, we will provide the support.
Payment
Yes, we have scholarships available based on merit and experience. Please reach out to your programme advisor for more details.
You can book your seat by paying INR 25,000 + GST registration fee. For the rest of the programme fee, you will get three options:
- One-time full payment
Check View Plans for details on the payment options and structures.
For more about the Imarticus Refund Policy,click here.