0% found this document useful (0 votes)
74 views1 page

Cyber Security Zen Class-Compressed

This document provides information about a cybersecurity and ethical hacking certification course offered by SkillsDA in collaboration with GUVI and IIT Madras. The 5-month online course focuses on providing hands-on training through virtual labs and smart city simulators to teach skills like vulnerability analysis and penetration testing. It guarantees 100% job placement and offers a pre-placement letter upon completion. SkillsDA is accredited and works with government, academic and industry partners to deliver high-quality cybersecurity training.

Uploaded by

Gaurav Gayake
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views1 page

Cyber Security Zen Class-Compressed

This document provides information about a cybersecurity and ethical hacking certification course offered by SkillsDA in collaboration with GUVI and IIT Madras. The 5-month online course focuses on providing hands-on training through virtual labs and smart city simulators to teach skills like vulnerability analysis and penetration testing. It guarantees 100% job placement and offers a pre-placement letter upon completion. SkillsDA is accredited and works with government, academic and industry partners to deliver high-quality cybersecurity training.

Uploaded by

Gaurav Gayake
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Cyber Security Brochure

Master Cybersecurity & Ethical


Hacking
Guaranteeing 100% Job Placement, this Cybersecurity and
Ethical Hacking Certification Course focuses on training on live
cybersecurity scenarios & upskilling with hands-on Virtual Labs
and Smart City Simulators. Grab first-hand proven experience in
vulnerability analysis and penetration testing from real-time
simulations. Master the cybersecurity skills to detect and
mitigate cyber threats and other malicious attacks promptly,
thereby securing organizations & personal property.

Duration Live Pre-Placement

5 Months Online Classes Offer Letter

About IIT MADRAS & GUVI

The Indian Institute of Technology Madras or IIT Madras is a


public Technical and Research University established by the
Government of India. IIT-M is recognized globally and holds the
laureate of being the No.1 Engineering University in India. With a
faculty of international fame, bolstered with a highly motivated
and profound student community, IIT Madras stands true as an
Institute of Eminence.

Grab Ur Vernacular Imprint-GUVI (an IIT-Madras Incubated


Company) is World’s First Vernacular Ed-Tech Learning Platform.
Introduced by Ex PayPal Employees, GUVI empowers students to
master programming skills with the comfort of their native
language. Its mission is to impart technical skills to all through
focussed pedagogical tools.

About SkillsDA
SkillsDA is a uni ue platform that brings academia, industry, and
q

skilled staff together to delight the end customers. Skills takes DA

pride in training & upskilling eco-system that caters to all 4

stakeholders across several sectors that are in dire need of high-


q uality experience. Skills is accredited by TUV SU ISO 001 DA D 9

Certified Training Company & Training Partner of N SSCOM IT A –

ITeS SSC. Skills is also associated with the ll India Council for
DA A

Technical Education ( ICTE), National Security atabase (NS ),


A D D

National Critical Information Infrastructure Protection Centre


(NCIIPC), and IS C. In addition, they have collaborated with
A

Cyberange and aim at training & upskilling eco-system that


caters to all stakeholders across several sectors that are in dire
4

need of high- uality experience q .

Skills is a part of the ecosystem with Cyberange and IS C


DA A

that has a PPP with NCIIPC and MOUs with ICTE and CERT and A

N SSCOM Futureskills for capacity building in cyber security as


A

part of the Nation’s Security.

Skills aims at delivering the best cybersecurity skills by


DA

hands-on training with uni ue pedagogical concepts o q

Smart city simulators


Virtual labs &
Live Im lementations of Cybersecurity scenarios
p

GUVI In Collaboration W ith SkillsDA


A lways on a new venture, GUVI, an IIT-M incubated company
driven by Industry-Experts and tech Geeks, has collaborated
with Skills , the Centre for dvanced Training. Visioning skills
DA A

development, this collaboration intends to upskill the aspirants


in Cybersecurity and other emerging technology, thereby
delivering a secure digital India. GUVI, in association with Skills , DA

aims at improving the hands-on capability and efficiency of all


cyber security professionals and thereby providing skilled
Cybersecurity Professionals to the tech industry.

Chosen Vendor and Training artner p

BECIL roadcast Engineering Consultants India


(B

Limited )

Skills has been chosen as the partner empaneled to


DA

provide training to government employees P N India in A

Cyber Security and Cyber Forensics.

L&T Limited
L&T has chosen us to Identify Train eploy students for – –D

their re uirement on cyber defense as well as the smart


q

world project and UNMS army project, where we are to train


20,000 army officers in cyber security.

W p i ro Limited
Wipro has chosen us to train freshers in cyber security and
evaluate their skills in order to onboard the candidates
selected from various colleges.

CIT COE
CIT cyber CoE in Coimbatore, with the mandate from TCS
to train and provide students in various Cyber security
verticals. Skills is a sponsor and knowledge partner in CIT
DA

COE.

NASSCOM Futureskills Prime


N SSCOM Futureskills Prime under MeitY Skills is the
A – DA

partner for developing and delivering foundation and NOS


courses in Cyber Security, IoT, and BlockChain
Technologies.

Descri tion p

Master Cybersecurity & Ethical Hacking is the only course in the


market that rewards a Pre Placement-Offer-Letter (100 %
Confirmation of Job from TOP MNC’s), right after the first pre-
Bootcamp screening. This leading-edge Technological Program is
aligned to the Competency Standards developed by SSC
N SSCOM in collaboration with Industry and approved by the
A

Government.

Our Essential Cybersecurity Program delivers the top-notch


cybersecurity skills inevitable in the current tech industry.
Instructed by industry’s best subject matter experts at Skills , DA

Centre for dvanced Training, and incorporated by GUVI- an IIT-


A

Madras incubated company, this Certification Program imparts


all-around skills in Cybersecurity .

The program follows a one-of-a-kind, step-by-step process as


follows:

Identify
IDENTIFY the under Graduates to teach them the
necessity and Significance of Cyber security.

Train
TRAIN the students on the Skills platform and DA

provide hands-on training to make them Industry


ready.

De loy p

DEPLOY the certified students on Secure Skills


re uired by the corporate partner on Virtual labs and
q

SIMUL TOR-based training.


A

Spot the Right Skills at the Right Time

from the Right Place

The program is a foundation for many other job roles including


Security Information and Event Management (SIEM), Computer
Forensics, Web pplication Security, ISO 27001 Compliance, PCI-
A

DSS, Internal IT Security udit, etc. A

Take your learnings to the next ste p

Get Hands-on
training with
W orld's 1st
Virtual Lab

Get trained in World Class Simulators from the World’s 1st Virtual
Lab. Grab a first-hand experience in understanding a hack
attack, malware creation, network intrusion/exploitation, web
exploitation, and more. This comprehensive program intends to
provide deliberate insights on how various IT infrastructures are
laid, helping you underline the possible loopholes or
vulnerabilities in every system. It ensures to provide competency
to be able to detect and mitigate cyber security threats
promptly. lso, develop a foundation in Cybersecurity with
A

hands-on proven experience in vulnerability analysis and


penetration testing.

Get Hands-on
training with
Virtual Smart
City Simulator
Setu p

Get trained in World Class Simulators from the World’s 1st Virtual
Lab. Grab a first-hand experience in understanding a hack
attack, malware creation, network intrusion/exploitation, web
exploitation, and more. This comprehensive program intends to
provide deliberate insights on how various IT infrastructures are
laid, helping you underline the possible loopholes or
vulnerabilities in every system. It ensures to provide competency
to be able to detect and mitigate cyber security threats
promptly. lso, develop a foundation in Cybersecurity with
A

hands-on proven experience in vulnerability analysis and


penetration testing.

Pre-Program Phase

Candidate Registration

B ook a Seat with ₹5000

(100% Refundable)

Attend Foundation Session Pre-Program ( )

Take Assessment & Pass Score Eligibility

Pre Placement-Offer-Letter

(100 % Confirmation of Job from TOP MNC’s )

Proceed to Cybersecurity &

Ethical Hacking Program

with

₹1,18,000 Course Fee - ₹5000 ooking Fee =


( ) (B )

₹1,13,000 Remaining Fee)

Pay 25% of the Program Fee while you study &


remaining 75% while you are in job

Master Cybersecurity & Ethical


Hacking Program

Pre-assessment in Foundation Session

Pre Placement-Offer-Letter

5 month LIVE Classes

Hands-on with live Cybersecurity Im lementations, p

Smart City Simulators & Virtual Labs + i-weekly B

Hackathons

Technical Mentorshi by Industry Ex erts + p p

Periodic Meetu s p

Practise on Coding Practise Platforms

CodeKata | ebKata | MicroArc & Live


W

Cybersecurity Im lementations and scenarios p

To skills you’ll learn!


p

Learn how to gather information & secure it

Master Social Engineering

Learn System Security

Guarantee safe work lace with assword security p p

Gain an understanding of malware

Pick u skills in vulnerability Analysis


p

Achieve roficiency in conducting web security audits &


p

network audits

W atch overex loitation p

B ecome a ro in creating Professional Re orts


p p

Program Curriculum

Python - asi B

Why python ?
Python I E D

Hello World Program


Variables & Names
String Basics
List
Tuple
ictionaries
D

Conditional Statement
For and While Loo
Function
Numbers and Math Function
Common Errors in Python

Python - Advance
Functions as rgument A

List Comprehensio
File Handlin
ebugging in Pytho
D

Class and Object


Lambda, Filters and Map
Regular Expressions
Python PIP
Read Excel ata in Python D

Python MySQL
Iterators
Pickling
Python JSON

Algorithmic thinking with Pytho


Introduction to lgorithmic Thinking A

lgorithm Efficiency and time complexity


A

Example algorithms - binary search, Euclid’s algorithm


ata structures - stack, heap, and binary trees
D

Memory
Management/Technologies
Best Practices Keeping it simple, dry code, naming

Conventions, Comments, and docs.


ssessment
A

A W

Introduction to WS. A

How to register/create a WS account. A

Best practices on your account, security issues, I M ( A

identity & access managemnt)


How to create users, roles and assign policies to them.
Overview on the Networking services, VPC, subnets, security
groups, Route53 and CertificateManager
ComputingServices: EC2
Storage: S3

Fundamental of Cyber Securit


Cyber security and its importance
Different disciplines of cyber security
Cyber security threats and their types
Cyber security attacks and their applications

Fundamentals of Networking - eLearning & La


Basic concepts of networking
Network ports, Network protocols, Types of network devices
and key networking terminologie
Basics of ping & traceroute and types of networ
Fundamental concepts of OSI mode
Network sharing and subnettin
Fundamental concepts of network infrastructure

La
The module demonstrates how to set up a L N (Local rea A A

Network) network using a standard router and 3- personal 4

computers installed with Windows/ Linux based operating


system.
Demonstrates how to look for IP ddress and M C addresses A A

of devices connected in the network.


Explains how to change the IPv / IPv6 addresses of devices 4

and systems connected to the network.

Basics of Security Testing - eLearning & La


Basics of security testing and its importanc
Basics of vulnerability scannin
Penetration testing and risk assessmen
Risk assessment test
Security udit and Posture ssessment Test
A A

Ethical Hacking and Network Monitorin


Security Testing Tools

La
The module demonstrates how to penetrate a dummy
website using standard web penetration tool. nd, A

demonstrates how to scan for vulnerabilities in the website


using a standard vulnerability assessment tool.

Fundamentals of Access Management - eLearning & La


Basics of Identity and ccess Management & its Importanc A

Basic concepts of User Identification, uthentication and A

Authorizatio
User Identification and ccess Management Policie A

Tools used for Identity and ccess Management in a public A

cloud platform
Access Control Models
Security uthorization nd Encryptio
A A

Single Sign-On and ccess Management Best Practices


A

La
The module demonstrates Identity and ccess Management A

in practise using standards tools provided by a public cloud


platform provider (such as WS, zure, Google Cloud etc.). A A

A lso, demonstrates the method to create access policies and


enable or disable access for specific users.

Fundamentals of Incident Management and Res onse - p

eLearning & La
Basics of security controls
Security Policy and Frameworks
Basics of Incident Management and Incident Response
Basics of Incident Response Plan and Incident
Communications Plan
Fundamental Concepts of Incident Monitoring and
Identification
isaster Mitigation and Containment
D

Business Continuity Planning and isaster Recovery D

Cyber Security Investigation


Basics of a Backup and Recovery Plan
Basic concepts of RTO (Recovery Time Objective) and RPO
(Recovery Point Objective)

La
The module demonstrates how to create a disaster recovery
plan for a web application where the database server is
affected by a malware. lso, explains the use of standard A

software, tools, and packages such as MySQL, Linux, pache A

etc. to create the web application and back-up for the web
application’s database.

Fundamentals of Security O erations - elearning & La p

Basics of security forensics & its types


Understanding of system logging and security monitoring
Fundamentals of Continuous Security Monitoring
Techni ues for Continuous Security Monitoring
q

Basics of ata Loss Prevention and its importance


D

Basic understanding of change and configuration


management
Security monitoring tools

Introduction to IA
Course Overview
Introduction to I M
A

What is I M
A

Components of I M A

Importance of I M
A

Why is I M Important
A

What does I M Provide to the Enterprise

How I M Works?
A

I M’s Role in Organizational Security

I M and Complianc
A

Basics & Terminologies and Concepts in I M


A

Basics

Terminologies

Security ssertion Markup Language

O uth
A

OpenI Connect
D

Lightweight irectory ccess Protocol


D A

ctive irectory
A D

Advanced conce ts in IA p

I M in Enterprise and Cloud Environments

What is and Enterprise?

What is a Cloud?

Enterprise and Cloud

I M in Enterprise Cloud

I M and Compliance in Cloud

I M and irectory Services in Cloud


A D

I M rchitecture

A A

Challenges of I M
A

I M rchitecture

A A

I M rchitecture Typical Implementation

A A –

I M Services to Enterprises

I M Practices

I M rchitecture Example

A A

I M rchitecture Implementation
A A

I M Lifecycle

What is Lifecycle

Lifecycle of I M
A

Centralization of I M A

User & Privilege Access Managemen


User ccess Management

Users of Enterprise

Roles in Enterprise

Typical Roles in an Enterprise

Basics of User ccess Management


A

Effective User ccess Management


A

Examples of User ccess Management


A

User ccess Management etails

A D

SSO and User ccess Management


A

MF and User ccess Management

A A

S ML and User ccess Management

A A

ctive irectory and User ccess Managemen


A D A

Privilege ccess Management


A

What are Privileges?

What is Privilege ccess Management


A

Workings of P M
A

How is P M different from I M?

A A

Benefits of P M A

Access Provisioning & Multi-factor Authentication


ccess Provisionin
A

What is ccess Provisioning? A

Types of ccess Provisioning A

ccess Provisioning via S ML, SSO, O uth or OpenI


A A A D

Connect
Comparing and Contrasting SSO, S ML, O uth and A A

OpenI Connec D

ccess Provisioning Best Practice


A

Multi-factor uthenticatio A

Importance of MF A

Methods of Multi-Factor uthentication A

Process and Cons of Factors in MF Best Practice A

Session Management & Monitorin


What is Session Management?
What is Privileged Session Management?
ctive Session Monitoring

Tools for Session Monitorin


Best Practice
User ctivity Complianc
A

What is User ctivity Compliance? A

Benefits of User ctivity Compliance A

User ctivity Monitoring Tools


A

Best Practice
Case Studie
Case Study 1
Case Study
Summar
Conclusion

SAILPOINT IDENTITY IQ Tool Trainin


PREVIEW ON I ENTITY IQ D

PRO UCT RCHITECTURE INST LL TION & EPLOYMENT


D A – A A D

INTRO UCTION TOD PPLIC TION ON-BO R ING, A A A D

CORREL TION A

CONCEPTS OF RISKS & POLICIES


CERTIFIC TIONS A

BOUT ROLES
A

CONCEPTS OF TROUBLESHOOTING, EBUG, CONSOLE D

INTRO UCTION TO RULES, T SKS, PI


D A A

REPORTING
OVERVIEW TO LIFECYCLE M N GER A A

INTRO UCTION TO WORKFLOW


D

INTRO UCTION TO PROVISIONING BROKER & ENGINE


D

OVERVIEW ON PERFORM NCE A

KEY C P BILITIES OF THE S ILPOINT


A A A

COMPLI NCE M N GER A A A

LIFECYCLE M N GER A A

USER PROVISIONING
I ENTITY
D

INTELLIGENCE

W hy GUVI’s Cybersecurity & Ethical


Hacking Program?
100% Job Placement in To MNC’s p

175% Highest Hike

₹21 Lakhs Highest Salary

40% Hike in Demand

200+ Hiring Partners

360+ est Industry Ex erts


B p

Hear it from our learners

“They are very approachable and friendly when “I have attended several classes conducted by
we ask any doubt or any clarification. Before Guvi. It is really helpful to gain knowledge as it is
joining guvi I have already done a course in different from other online courses. Here, we
another institution. When comparing these two have mentors in live sessions, so we will be more
institutions, there is a lot of difference in concentrated than other online courses where
teaching.I love that the mentor who is teaching we watch pre recorded videos. lso we are A

the course is not only a mentor but a getting weekly tasks that would make us learn
professional too. This is a very uni ue thing q even if there is no class.

about guvi. I will rate 5/5 to Guvi.” I am thankful for all the people in Guvi for
building up such a valuable program for our
career.”

Vishally Gokul

“GUVI is one of the best platforms to start a new “GUVI is one of the best platforms to start a new
course and a new career.
course and a new career.

GUVI is one of the best Platform Where users are GUVI is one of the best Platform Where users are
been trained with industry experts. It has its own been trained with industry experts. It has its own
software to practise and a huge number of software to practise and a huge number of
exercises to master any topic.” exercises to master any topic.”

Gokila Tejas Samantha udi p

“Guvi offers a cordial, supportive and friendly “The course is very good, the concepts are
environment to learners. With excellent support being explained in a crisp manner. The
and 2 *7 assistance from the mentors guvi does
4 instructors have good depth in the subject and
not leave any stone unturned to improvise your solve every doubt one might have. Thanks to
learning. Thanks for being such an inspiration to GUVI for setting a great structured program.”
us.”
Diliban Sibi
Gokak Mohd Ishtiyaque

“Hello folks, if you are thinking of a career “I always liked coding but I didn't really get a
transition then, “GUVI” is the best platform to good platform to learn things as per industrial
get nourished, indulged and protruded in this re uirements. When I was in search I got to know
q

upcoming field and also, it doesn’t matter from about Guvi, I really felt trustworthy by their
which engineering background you are or response When I joined the course the weekend
whether you are a working fellow. The best thing I live classes and recorded course videos has
found here is you will always get motivated made learning easy to me. Eventually I started
unknowingly and become curious to learn more spending more time practicing in Codekata. I
& more from the tutorial videos conducted by loved the way Guvi took care of clarifying doubts
the IITM professors. GUVI helps me to think asap. Thank you!.”
about the problem in multidimensional ways.
Thanks to the GUVI team”

Shubham Nehete Sonia kola

“The course videos help you to learn the tools by “This course is designed being dynamic,
yourself and you can track the progress.The interactive and range of materials to refer. This is
mentors are very patient and ensure that very well structured in such a way that it makes
students understand the concept, sometimes the participants to perform, discuss, and to
going the extra mile and explaining. Sometimes participate in assessments that will help the
the mentors try to teach in your native language, participants to maximize the utilization. This
if needed. The practice platforms are easy to program is suitable for all students, freshers and
learn and practice. working professionals. . I enjoyed seeing videos
in GUVI website from experts that also explains
the concepts in a detailed manner.”

Sridharan K Anbazhagan

W e are Accredited by

Placement Highlights & Su pp ort


Ensuring our learners reach their full potential & land their dream
job through

100% Job Placement with re-offer letter p

Dedicated mentorshi with 24/7 Doubt p

clarification su ort pp

Revision Sessions + New Technology addition in


the course syllabus

Activity analysis through coding latforms - p

CodeKata, ebKata & MicroArc W

Periodic Assessments with com ensation p

management

Our learners in well-known MNCs

& more

Program Details
PROGRAM DURATION AND FORMAT
5-Month Live Online Classes

PROGRAM START DATES


Please contact our Cybersecurity & Ethical Hacking Coordinator:

Mr. Dee ak: +91 9344419057


p

PROGRAM FEE

₹1,18,000
(Total Course Fee)

- ₹5000
(Pre-BootCamp Booking Fees)

= ₹1,13,000 (Remaining Fee)

Pay y Onl ro 25% (App o th or x Rs 29,000 - Rs 4900/ M n f 6

M o th o the ro r
n s ) ee hi e you tu y
f p y re t o the
g am f w l s d & Pa s f

75% (App ro o th or o th o
x Rs 89,000 - Rs 4900 / M n f 18 M n s ) f

the ro rp ee hi e you re o your ob


g am f w l a n J .



Now become a Cybersecurity & Ethical Hacking Professional at


Affordable Installments! Master Cybersecurity & Ethical Hacking
at just Rs 4900 per Month

A vailable EMI options: 24 Months

W ho can take this course?


Eligibility Criteria for the course
ny Graduates from & above 201 passed outs
A 9

ny working professional from IT or Non-IT


A

Current Final years students


CGP should be above 6.
A

Candidates seeking jobs but have to meet the eligibility


criteria belo w

Note:

Must have eligibility: No arrears, not more than a year gap in


work, should attend the program with 0% more attendance 9

& should successfully complete all assessment & Evaluation.


lso, the candidates who don't fit in any of the above


A

eligibility but are willing to study the tools & get skilled can
join. However, for this category alone, a job placement
guarantee will not be assured.

Pre- Qualification added advantage ( )

Understanding of OS Concepts
Exposure to Python will be an added advantage
Knowledge of networking concepts such as NS, TCP/ IP D

Comfortable with command-line tools


Basics of using Linux
Keen interest in new technologies with the research approach

Master Cybersecurity & Ethical


Hacking & Secure Your usiness! B

Accelerate your Skill Develo ment Journey Today! p

You might also like