Advanced Certification Program in
Cyber Security
Advanced Certification Program in
Cyber Security
Master Cyber Security from IIT Roorkee
Mode of Training
Live Online Training
Class Schedule
Saturday & Sunday
Duration
6 months
Advanced Certification Program in Cyber Security
Master Cyber Security from IIT Roorkee
Application Deadline :
Mode of Training
Live Online Training
Class Schedule
Saturday & Sunday
Duration
6 months
Our Alumni work at
About Our Advanced Certification Program in Cyber Security
Our Advanced Certification Program in Cyber Security will prepare you for an exciting cyber security career by teaching you networking and information security fundamentals, ethical hacking, cloud security, application security and incident handling. Created in partnership with CEC, IIT Roorkee, this program will equip you with the most in-demand security tools and skills. With rigorous lab sessions on real-world problems throughout the course, you will explore the world of ethical hacking, cloud security, application security and network security.
#6
#7
Discover premium education standards that set you apart:
Live training by IIT faculty
Campus immersion at IIT Roorkee
Certification from IIT faculty
Curriculum design by IIT Roorkee
Trusted By Millions Of Learners Around The World
Curriculum Highlights
Module 1
- Networking Topology and Types of Networks
- TCP/IP Models and OSI Layers
- Routing and Switching
- Static Routing
- Dynamic Routing
- VLAN
- ACL
Module 2
- Virtualisation
- Operating Systems and OS Process & Resource Management
- Windows Basics
- Linux Basics
Module 3
- Basic of Internet and Web Applications
- HTTP Protocol, HTTPS - TLS/SSL
- Cookies
- Sessions
- Tokens
- Cryptography Basics
- Public Key Infrastructure (PKI)
- Email Encryption
- Disk Encryption
- Cryptanalysis
- Tracking and Privacy
- Laws and Compliance
Module 4
- Cloud Computing Concepts
- Cloud Building Blocks
- AWS Cloud Tour
- Cloud Architecture Security
- AWS Well Architected Framework
- AWS Well Architected Framework: Security Pillar
- Cloud Data Security
- Entry Points on AWS To Maintain the Security
- Cloud Application Security
- Cloud Computing Security Issues
- Zero Trust Security Architecture
Module 5
- Ethical Hacking Introduction
- Cyber Kill Chain
- Information Gathering and Scanning
- Footprinting through Web Services
- Footprinting through Social Networking Sites
- Website Footprinting
- Email Footprinting
- Whois Footprinting
- Host Discovery
- Port and Service Discovery
- OS Discovery (Banner Grabbing/OS Fingerprinting)
- Scanning Beyond IDS and Firewall
- Vulnerability Analysis
- Weaponisation
- Delivery
- Sniffing and Spoofing
- Network and System Exploitation
- Command and Control
- Privilege Escalation
- Post Exploitation
- Steganography
Module 6
- Application Penetration Testing
- Authentication Testing
- Authorisation Testing
- Client Side Attacks
- Server Side Attacks
- Network Penetration Testing
- Mobile Application Penetration Testing
Module 7
- Social Engineering Concepts
- Social Engineering Techniques
- Phishing Attacks
- Insider Threats
- Impersonation on Social Networking Sites
- Identity Theft
Module 8
- Broken Access Control
- Cryptographic Failures
- SQL, OS, XSS and CMD Injections
- Insecure Application Design
- Security Misconfiguration
- File Path Traversal
- Testing for Vulnerable and Outdated Components
- XML External Entity Injection
- Identification and Authentication Failures
- Server-Side Request Forgery (SSRF)
Module 9
- Wireless Concepts
- Wireless Encryption
- Wireless Threats
- Wireless Hacking Methodology
- Wireless Hacking Tools
- Bluetooth Hacking
- Wireless Security Tools
Module 10
- Data Forensics
- Incident Handling Process
- Computer Forensics Investigation Process
- Hard Disks and File Systems
- Operating System Forensics
- Anti-Forensics Techniques
- Eradication and Recovery
Module 11
- Capstone Project and Evaluation
- Resume-building
- Mock Interview
- Career Mentorship
Learn Before You Leap
Get equipped with the requisite knowledge before you get trained
Get premium access to Linkedin Learning for six months:
The moment you opt for this learning, some exciting perks await you, which shall:
- Introduce you to subject matter from intellectual domain experts
- Familiarise you with Linkedin Learning offering basic concepts before your actually learn
- Offer you the flexibility to learn at your pace
Webinars:
Your participation in monthly webinars with profound industry experts allows:
- 1:1 conversation with business experts
- Insightful learning about recent industry trends
- An improved professional growth
Tools Covered
Projects that you will work on
You will work on various real-world business projects throughout the course to learn how to apply cyber security techniques and technology. The following are some examples of potential projects.
Design automated operating detector on the network
Recognise Operating System present at devices in a network. Using TCP/IP stack fingerprinting by crafting custom TCP and UDP packets and analysing their responses. It can also be used for analyzing vendor name, OS name, OS generation, device type etc.
Build port scanner
Building a port scanner that can probe a server or host for open ports. This application should have capabilities to verify the security policies of the networks and identify network services running on a host.
Automated browser/ system credential dumper hardware
An automated tool that can be planted on HID device to retrieve lots of passwords stored on a local computer. Each software stores its passwords using different techniques (plaintext, APIs, custom algorithms, databases, etc.).
Keylogger
Developing Keylogger that should not be detected by security program in the world. Keyloggers are programs used to silently record keystrokes that can be part of a parental control program or as a nefarious program used by remote hackers to steal information.
What Can I Become?
Get 6 months access to one of the most premium job portals offering sophisticated job search tools and resources that give you a competitive edge to find your dream job faster and more efficiently.
Will i get certified?
Upon successfully completing this program, you’ll earn an Advanced Certification Program in Cyber Security co-branded by CEC, IIT Roorkee. This advanced certification in cyber security will add considerable value to your professional credentials.
Faculty
Program Fee
1,40,000
(Inclusive Of All Taxes)
Instalments
EMI Options
Registration Fees
20,000+GST
1st Instalment
45,000+GST
2nd Instalment
40,000+GST
3rd Instalment
35,000+GST
We Develop The Leaders Of Tomorrow
Read about a few success stories that were created with Imarticus Learning.
Achutt Nair
Cyber Security
Subhali Chatterjee
Cyber Security