PG Diploma in
Cyber Security
PG Diploma in Cyber Security
Duration of COURSE – 6 Months
- Eligibility
- Highlight
- What Will you Study
- Careers
Contact
Information
Eligibility
Bachelor’s Degree in Science, Engineering & Technology in any field with minimum 55% marks in the qualifying examinations.
Highlight
Comprehensive Curriculum: The course covers a wide range of topics, including ethical hacking, network security, digital forensics, and cyber laws, ensuring students are well-equipped with the knowledge and skills needed in the field.
Industry-Relevant Projects: Students have the opportunity to work on real-world projects, gaining hands-on experience and practical skills that are directly applicable in the cyber security industry.
Career Support: Upon completion of the course, students receive career support services, including job placement assistance and resume building workshops, to help them launch successful careers in cyber security.
What will you study
MODULE 1 – Ethical Hacking
Introduction to Ethical Hacking, Foot printing and Reconnaissance, Scanning Networks, Enumeration, Vulnerability Analysis, System Hacking, Malware Threats, Sniffing, Social Engineering, Denial-of-Service, Session Hijacking, Evading IDS and Firewalls and Honeypots, Hacking Web Servers, Hacking Web Applications, SQL Injection, Hacking Wireless Networks, Hacking Mobile Platforms, loT Hacking, Cloud Computing, Cryptography.
MODULE 2 – Mobile Concepts & Security
Chapter I: Introduction to Mobile Concepts & Security Mobile Security Model, Enterprise Mobile Environment, Mobile Crypto Algorithm.
Chapter II: Mobile System Technology Mobile Devices – features and security concerns, Platforms, Applications – development, testing and delivery.
Chapter III: Mobile Networks Cellular Network – baseband processor and SIM card, GSM encryption and authentication and other attacks, VOLTE and its working, WIFI Networks – public hotspots and enterprise WLANS, SSL/TLS, Web Technologies – server-side and client-side web applications. Chapter IV: Mobility Management (15 Periods) Enterprise Mobility Program, Transactions Security, File Synchronization and Sharing, Vulnerability Assessments, BYOD Device Backup, Data Disposal/Sanitization, NAC for BYOD, Container Technologies, Exchange ActiveSync (EAS), Mobile Authentication, Mobile Management Tools. Unit V: Scenario Testing (10 Periods) Cellular Attacks, Attacking Web Interface, Wireless Attacks, SSL attacks, Android, iOS.
MODULE 3 – Cyber Crime, Laws & Forensic Investigation
A. Cyber Crime & Issues: Introduction and Overview of Cyber Crime, Nature and Scope of Cyber Crime, Types of Cyber Crime: Social Engineering, Categories of Cyber Crime, Property Cyber Crime. Unauthorized Access to Computers, Computer Intrusions, White collar Crimes, Viruses and Malicious Code, Internet Hacking and Cracking, Virus Attacks, Software Piracy, Intellectual Property, Mail Bombs, Exploitation, Stalking and Obscenity in Internet, Digital laws and legislation, Law Enforcement Roles and Responses, Ethical issues in IT, Ethical Conducts, technology trends that raise ethical issues.
B. Security Policies: Need for an Information Security Policy, Information Security Standards-ISO, WWW policy, Email Security policy, corporate policy, sample security policy, Policy Review Process.
MODULE 4 – Cyber Laws
Cyber Laws: Need for Cyber Laws, Copyright Act, Patent Law, IPR, Intellectual Property Law.
MODULE 5 – Regulatory Framework
Regulatory Framework: Digital Signature, E Signature, Electronic Records, Electronic Evidence and Electronic Governance. Controller, Certifying Authority and Cyber Appellate Tribunal. (Rules announced under the Act).
MODULE 6 – Cyber Forensics Investigation
Cyber Forensics Investigation: Introduction to Cyber Forensic Investigation, Investigation Tools, eDiscovery, Digital Evidence Collection, Evidence Preservation, E-Mail Investigation, E-Mail Tracking, IP Tracking, E-Mail Recovery, Encryption and Decryption methods, Search and Seizure of Computers, Recovering deleted evidences, Password Cracking, Cracking with GPU Systems, Hash cat. Work on open Source, Commercial tools and Cyber range.
MODULE 7 – Fundamentals of Cyber Security – 60Hrs.
A. Cyber Security: Introduction to cyber security, information security, network security, application and system security, Threats to Information Systems, Information Assurance, Security Risk Analysis, Security Principles or Security Goals (CIA Principle), Security Services, Security Mechanism, Security Technique: Cryptography & Steganography, Active & Passive Attacks. Hardware & network Basics, Basic terminologies in cyber security: Cloud, Software, Domain, VPN, IP Address, Exploit, Breach, Firewall, Malware, Virus, Ransomware, Trojan Horse, Worm, Bot/Botnet, Spyware, Rootkit, DDOS, Phishing/Spear Phishing, Encryption. Security Threats – Viruses, Worms, Trojan Horse, Bombs, Trapdoors, Spoofs, E-mail viruses, Macro viruses, Malicious Software, Network and Denial of Services Attack.
B. System & Application security: System Hacking Concepts: Gaining access, cracking passwords, vulnerability exploitation, escalating privileges, hiding files, clearing logs, Data Security Considerations: Backups, Archival Storage and Disposal of Data Security Technologies: Firewall and VPNs, Intrusion Detection, Access Control Security.
C. Web Security: Introduction- A web security forensic lesson, Introduction to different web attacks. Overview of N-tier web applications, Web Hacking Basics HTTP & HTTPS URL, Web under the Cover Overview of Java security Reading the HTML source, Applet Security Servlets Security Symmetric and Asymmetric Encryptions.
D. Cloud Security: Introduction to Cloud Computing, migrating into a Cloud, Enriching the ‘Integration as a Service’ Paradigm for the Cloud Era, The Enterprise Cloud Computing Paradigm. Cluster: Admin Server & Managed Server Infrastructure as a Service (IAAS) & Platform and Software as a Service (PAAS / SAAS) Virtual machines provisioning and Migration services, On the Management of Virtual machines for Cloud Infrastructures, Enhancing Cloud Computing Environments using a cluster as a Service, Secure Distributed Data Storage in Cloud Computing, Aneka, Comet Cloud, T-Systems’, Workflow Engine for Clouds, Understanding Scientific Applications for Cloud Environments.
Career
A career in Cyber Security can go in many directions. Learn about five popular career paths. Pursuing a career in Cyber Security means joining a booming industry where available jobs outnumber qualified candidates. According to the US Bureau of Labour Statistics (BLS), the number of Cyber Security jobs is expected to increase by 32 percent between 2022 and 2032. The COVID-19 pandemic has only accelerated this demand.
As Cyber Security continues to grow in importance, more specialized roles are emerging. Starting as a Cyber Security analyst creates opportunities to follow your interests within the world of information security and create a career path that’s right for you. Learn about five common career paths within this high-demand field.
Before you apply for your first Cyber Security role, take some time to develop core IT skills, including programming, networks and systems administration, and cloud computing. While you don’t necessarily need a degree to get a job in Cyber Security, having some form of structured training might accelerate your path toward a job.
The Microsoft Cyber Security Analyst Professional Certificate is designed to introduce the skills and knowledge you’ll need for an entry-level role as a Cyber Security analyst.
CAREER OPPORTUNITIES
HCL , NETFLIX , ΤΑΤΑ CONSULTANCY SERVICES
AMAZON , WIPRO , COGNIZANT , GOOGLE
FACULTY
largest institute in online
learning in
CAREERS OF TOMORROW