0% found this document useful (0 votes)
56 views13 pages

Cybersecurity - The Checklist

This 9-month online certification program in advanced cybersecurity provides 600+ hours of applied learning from IIT Guwahati faculty and industry experts. The program covers key skills like ethical hacking, network security, cloud security, and penetration testing using tools like Linux, SQL, and Microsoft Baseline. Upon completion, students receive a certification from E&ICT, IIT Guwahati and help with career services and placement assistance. The application process involves submitting an application, taking an admission test, and interview.

Uploaded by

ínnochan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views13 pages

Cybersecurity - The Checklist

This 9-month online certification program in advanced cybersecurity provides 600+ hours of applied learning from IIT Guwahati faculty and industry experts. The program covers key skills like ethical hacking, network security, cloud security, and penetration testing using tools like Linux, SQL, and Microsoft Baseline. Upon completion, students receive a certification from E&ICT, IIT Guwahati and help with career services and placement assistance. The application process involves submitting an application, taking an admission test, and interview.

Uploaded by

ínnochan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

ADVANCED CERTIFICATION IN

CYBERSECURITY
Master Cybersecurity and Ethical Hacking skills and take

your career to the next level!

2 Million 1:1 Personlized 55% Average

Learners Mentorship Salary Hike

IND: +91 7022374614 US: 1-800-216-8930 [email protected] www.intellipaat.com


Advanced Certification in

Cybersecurity
This advanced certification by E&ICT, IIT Guwahati and Intellipaat is designed to help

learners gain the skills and techniques required for excelling in the field of

cybersecurity. The curriculum is vetted by IIT Guwahati faculty and industry experts.

Hottest Job of 21st Century

1 .9 M ll
i ion Job P g
ostin s Sk ll D v l pm
i e e o ent

There is a global estimate of 1.9 million j ob Cybersecurity professionals are equipped

postings for cybersecurity roles by 2022 with various relevant skills, fetching lucrative

j ob offers

G w g
ro in Cybersecurity I d
n ustry F uture - oriente d a C reer

38% CAGR in Indian Cybersecurity Cybersecurity is a budding field ; a head start

Industry will prove to be beneficial

P p la D g
o u r e ree H gh D ma d
i e n in I da
n i

46% of Cybersecurity professionals have B y 2022, India will face a demand-supply gap

a M ’
aster s Degree of 4 5
0,000 Cybersecurity professionals

Our Credentials

2 Million+ 1,000+ 400+

Aspiring Active Students Industry-expert Instructors Hiring Partners

500+ 55% 155+

Corporates Upskilled Average Salary Hike Countries’ Learners

Page - 1

IND: +91 7022374614 US: 1-800-216-8930 [email protected] www.intellipaat.com


About Program
This program helps you master skills such as Network Security, Ethical Hacking,
Cryptography, SOC, Penetration Testing, IAM, Cloud Security, and more.You will master tools
such as Linux, SQL, Nikto, Microsoft Baseline, and others. The program provides robust
hands-on exposure to help your career transition in the cybersecurity domain.

Learning Format 9 Months Career Services E&ICT IIT G


Online Bootcamp Live Classes By Intellipaat Certification

Key Highlights
600 Hrs of Applied Learning 100+ Live sessions across 9 months

Learn from IIT Guwahati Faculty & Industry Experts 50+ Industry Projects & Case Studies

One-on-One with Industry Mentors 24*7 Support

Dedicated Learning Management Team Designed for working Professionals & Fresher's

1:1 Mock Interview Certification from EICT, IIT Guwahati

No Cost EMI Option Resume Preparation and LinkedIn Profile Review

Placement Assistance 2 Days campus immersion at IIT Guwahati

Pr ogram Pedagogy
A end
Inttstr Liveled
u tor cClass en
rai-s i ngT Inn
Ha okvatho
c ativensLMS
From
G
worldsby
et trained top Faculty
top and
experts
industry For
Geteffective online
a sense of real prog
jects are built
how Learnin
Industry experts experience

Le
Dedarin at
byed
c
Doi
Lenar
g ning Management Pee
P eerr Ne
Nettwork
workiin
ngg and Group Learning
eamon exercises, project work,
Hands
T For effective online Learning

Improve your professional network and learn from


q z, capstone
Touihelp pro
you with jects
your learning needs experience
peers

1:1 Personalized Learning G amified Learning


Se l pon
Handsf- ed videpro
a exercises,
c os ject work, Gamified Learning
Learn trough Hackathons and

Learn
q at your own
uiz, capstone propace
jects with G
G
et involved
roup in group activities to
Learning
world-class content solve real-world problems

24*7 Support
Pro e on
Handsj and epro
tsexercises,
c r is eswork,
ject
Ex c 1:1 Personalized Learning
qui
Getz,real-world
capstone pro jects through
experience Hands-on exercises, project work,
projects quizzes, and capstone projects

Page - 2

IND: +91 7022374614 US: 1-800-216-8930 [email protected] www.intellipaat.com


Who Can Apply for the Course?
Anyone with a Bachelor’s degree

Anyone in their last year of their Bachelor’s program

IT professionals with a Bachelor’s degree

Freshers willing to pursue advanced training in this domain

Anyone aspiring to pursue Cyber Security

Application Process
The application process consists of three simple steps. Candidates have to submit their application.
An offer of admission will be made to the selected candidates, and their application will be accepted
upon the payment of the admission fee.

SUBMIT APPLICATION
1 Tell us a bit about yourself and why you want to join

ADMISSION TEST & APPLICATION REVIEW


2 Clear the admission test and have a personal interview

with our interview panel

ADMISSION LETTER
3 Shortlisted candidates would be offered the admission letter

Page - 3

IND: +91 7022374614 US: 1-800-216-8930 [email protected] www.intellipaat.com


Learning Path

Live Courses

Start of the Course


1
Preparatory Sessions –

Python & Linux Foundation

2 3 4
Introduction to Cyber
Working with Kali
Network Security
Security & Information
Linux 2021.1
Security

7 6 5
Identity and Access
Security Operations
Incident Detection with
Management (IAM) and Management Security Information and
Event Management
(SIEM)

8 9 10
Web Application
Malware Analysis Ethical Hacking
Penetration Testing

13 12 11
Capstone Project Software Development
Cloud Security
Security

Advanced Certification in

Cyber Security

Page - 4

IND: +91 7022374614 US: 1-800-216-8930 [email protected] www.intellipaat.com


Program Curriculum

Module 1 Module 5
Preparatory Sessions – Python & Linux Incident Detection with Security Information and
Python Event Management (SIEM)
Introduction to Python and IDEs
Understand the Basic Concepts of Security Information and
Python Basics
Event Management (SIEM)

Object Oriented Programming


Discuss the Different SIEM Solutions

Hands-on Sessions And Assignments for Practice Understand the SIEM Deployment

Linux Learn Different Use Case Examples for Application-level


Incident Detection
Introduction to Linux

Learn Different Use Case Examples for Insider Incident Detection

Linux Basics

Learn Different Use Case Examples for Network-Level Incident


Hands-on Sessions And Assignments for Practice
Detection

Learn Different Use Case Examples for Host-Level Incident


Module 2
Detection

Introduction to Cybersecurity & Information


Security Learn Different Use Case Examples for Compliance

What is Cybersecurity?
Understand the Concept of Handling Alert Triaging and Analysis

Overview

Module 6
Need and Importance

Different verticals Security Operations and Management


Understand SOC Fundamentals

Module 3 Discuss the Components of SOC: People, Processes, and

Working with Kali Linux 2021.1 Technology

Understand the Implementation of SOC


Introduction to Kali Linux

Services in Kali (HTTP, SSH)

Module 7
Wget, curl, grep, awk, tail, head, watch, find, locate

Piping and Redirection

Identity and Access Management (IAM)


Logical/Physical Access to Assets Management

Python and Bash Scripting

Authentication and Identification Management

Netcat, Socat, Powercat, Powershell, Wireshark, tcpdump

Integrating Identity as a Third-party Service

Note taking
Mechanism of Authorization

Module 4 Provisioning Life Cycle’s Identity and Access


Network Security
Module 8
Security Controls

Web Application Penetration Testing


Networking Concepts

OWASP Tools and Methodologies

Traffic Analysis

Insecure Deserialization

Packet Analysers

Clickjacking

Sniffers

Black Box Testing

Firewalls

White Box Testing

SIEM

Fuzzing

VLAN

Cryptograph

VPN
Symmetric/Asymmetric Cryptography

Hashing

Digital Signatures

API Security

Patch Management
Page - 5

IND: +91 7022374614 US: 1-800-216-8930 [email protected] www.intellipaat.com


Program Curriculum

Module 9 Module 13
Malware Analysis Capstone Project
Types
In this module, you will learn how to prevent a web application
Ransomware
from being hacked as well as what key points to be considered
Detection
for making an web application secure. This capstone project
Analysis will give you exposure of both blue team and red team work
profile and help you gain exposure on both the sides.
Module 10
Ethical Hacking
Introduction
Skills to Master
Foot Printing and Reconnaissance

Ethical Hacking
Networks

Scanning Networks

Enumeration
Cryptography
Application Security

Vulnerability Analysis
Cybersecurity
Risk Analysis and Mitigation

System Hacking

Sniffing

Social Engineering
Tools to Master
Denial-of-Service

Session Hijacking

Evading IDS

Firewalls and Honeypots

Hacking Web Servers

SQL Injection

Hacking – Wireless Networks

Mobile Platforms

IoT

Module 11
Cloud Security
Infrastructure Security: Network level security, Host level
security, Application-level security

Data security and Storage: Data privacy and security


Issues, Jurisdictional issues raised by Data location

Access Control

Trust, Reputation, Risk

Authentication in cloud computing, Client access in cloud,


Cloud contracting Model, Commercial and business
considerations

Module 12
Software Development Security
Security Controls for the Development Environment

Life Cycle Security

Impact of Acquired Software Security

Effectiveness of Software Security

Page - 6

IND: +91 7022374614 US: 1-800-216-8930 [email protected] www.intellipaat.com


Course Projects

Projects cover the following industries:

etai
R l ia
Soc edia
l M ain
Supply Ch E ntre rene r
p i
u sh p E-co mmer ec Ban ing
k Healthcare In su ran ec

Beginner Beginner
Removing and Retrieving Files S QL I njection
This project allows you to retreive your deleted files In this S QL Injection cybersecurity attack, you will be
and know the location of deleted files existing in the making a report on the S QL vulnerability and submit
system or database. As part of this project you will it. This can be an interesting project for candidates
also create a report of all the available Data having good knowledge of Python.
Recovery tools.

Beginner Intermediate
Password Strength Packet Sniffing
This project equips learners with the right skills and In the project, you will be analyzing network traffic to
knowledge to make a password analyzer software. keep surviellance on all the outgoing and incoming
Going one step ahead, you can also suggest a data packets. You will build a network analyzer and
strong password to a user, that is not prone to submit a report.
attacks.

Intermediate Intermediate

Hacking an Offline Device C redit ard Fra d Detection


C u

W hile performing this project, you will need to collect In this project, you will be working on a system that
information on the number of ways that an intruder can analyzes users transactions and their behaviors.

illegally access an offline device. You will submit a B ased on this research, your system will ascertain
report containing methods to secure devices such as parameters for any unusual behavior in the system
mobile phones, laptops, etc. like false passwords.

A d an e
v c A d an e
v c

Preventing Phishing ttacks on oting A V


Byp ass lient side ontrols and
C - C

S stems sing is al r togra h


y u V u C yp p y
A ttack thentication
Au

In this project, you will learn to bypass some of the


This project allows you to use visual cryptography
client-side controls placed in web applications to
and learn how to integrate fingerprint techniques in
limit user inputs. You will also learn to disrupt
the voting system to uniquely identify every user.
authentication functions in the attacking
authentication sessions.

A d an e
v c

I ntr sion Detection S stem with Self


u y -

p rogramming F nctionalit u y

In this project, you will learn to detect any intrusion


on the system and also create a fake program to
create a fake system. You will create fake
countermeasures to prevent and secure the original
application and track the attack pattern.

Page - 7

IND: +91 7022374614 US: 1-800-216-8930 [email protected] www.intellipaat.com


Course Advisors / Faculty

Murli Nambiar
Senior Vice President, Head Cyber security at Reserve Bank of India
Having worked in companies like ICICI, Reliance, Apollo; Murli carries ground level expertise in Information
Security and Risk Management, and has been instrumental in setting up Information Security Divisions for
premier institutions in India.

Dhruva Raj Pudel


Associate Director Cyber Security at KPMG India
Certified in CISSP and CCSP by (ISC)², and Cyber security Risk management by Harvard University,he
carries 14+ yrs of experience with a focus on SIEM solutions & Host Based instruction detection
systems,etc., and has worked with top MNCs like Wipro and IBM.

Page - 8

IND: +91 7022374614 US: 1-800-216-8930 [email protected] www.intellipaat.com


Meet the Batch

Industries Our Learners Come From

20% - BFSI

45% Information Technology


5% - Healthcare

10% - Consulting

20% - Others

Work Experience

12%

12+ years Some of their current employers include

12%
12%

9-12 years

12%

18%

6-9 years
18%

22%

3-6 years
22%

36%

0-3 years
36%

Page - 9

IND: +91 7022374614 US: 1-800-216-8930 [email protected] www.intellipaat.com


Intellipaat
Career Ser v ices

500+ 600+ 400+ 55%


Webinars Job Shares Hiring Partners Avg. Salary Hike*

What Makes Us T ick

Career-oriented Sessions Placement Assistance

Attend 10+ career-oriented sessions Placement opportunities are provided once

by industry mentors and prepare the learner is moved to the placement pool.

your career trajectory Get noticed by our 400+ hiring partners.**

Profile Building Dedicated Job Portal Access

Craft a Cybersecurity resume and Get exclusive access to 200 job

LinkedIn profile to make an postings per month on Intellipaat’s

impression on top employers job portal

Mock I nter v w
ie Pre p
aration Job Fairs

Prepare w ith mock intervie w s Job fairs are conducted regularly to

including most asked questions by introduce learners to major

top employers
organizations

1:1 Mentoring Sessions Hackathons

Get 1:1 guidance at every step in Work in teams and get exclusive

your career transition to access to hackathons

Cybersecurity

Learner R v w e ie s

Kunduru Nagaraju Koundinya Sanagala Abhimanyu Bose


Network Security Engineer at CTF player at TryHackMe Associate at Cognizant
Fortinet
I gained proficiency in N w
et ork '
I m very happy to have been a part T he best thing about Intellipaat is the

S ,
ecurity post Intellipaat’s training. T he of Intellipaat. T he material and experienced trainers. T hey are very

trainers are experts and the content is lectures provided by them are good and very helpful. T hey make the

aligned as per the industry s demand. ' '


amazing. I m pretty confident in sessions engaging and clarify all our

T he real-life projects helped me gain w hat I have learned. A big thanks to ,


doubts patiently. Good job Intellipaat.

practical experience. the entire Intellipaat team.

* Past record is no guarantee of future job prospects | ** Placement Assistance doesn’t guarantee you a job Page - 10

I ND 9 7
: + 1 022 37 6
4 14 US : 1- 8 00-21 6 893- 0 sales @ intellipaat.com www .intellipaat.com
Program Partners

About Intellipaat

Intellipaat is one of the leading online training providers with more than 1.2 million learners

in over 155 countries. We are on a mission to democratize education as we believe that

everyone has the right to quality education.

We create courses in collaboration with top universities and MNCs for employability like IIT

Madras, University of Essex, University of Liverpool, IIT Roorkee, IIT Guwahati, SPJIMR, IBM,

Microsoft, etc.

Our courses are delivered by SMEs & our pedagogy enables quick learning of difficult

topics. 24/7 technical support & career services help learners to jump-start their careers.

About IIT Guwahati

IIT Guwahati is the sixth IIT established in India. Since 1994, the institute has been at the

forefront of engineering and technology education globally. E&ICT, IIT Guwahati is an

initiative of MeitY (Ministry of Electronics and Information Technology, Govt of India). E&ICT,

IIT Guwahati was inaugurated by PM Modi in 2016.

Achievements - IIT Guwahati

Ranked in the top 7 by NIRF India Rankings 2021 - NIRF

It also holds a global rank of 41 in Economic Times 2021 Rankings - Economic Times

U o o
p n the c mpleti n o of this pr og ram , yo u will :
A v
d anced certificate in C u
ybersec rity by E& C , Guw
I T IIT ahati

Page - 11

IND: +91 7022374614 US: 1-800-216-8930 [email protected] www.intellipaat.com


1.2 Million Learners & 200+ Corporates across 155+ countries

upskilling on Intellipaat Platform

Contact Us
INDIA

AMR Tech Park 3, Ground Floor, Tower B, Hongasandra Village,
Bommanahalli, Hosur Road, Bangalore, Karnataka 560068, India

Phone No: +91-7022374614


UK

Flat 16 Bluepoint Court, 203 Station Road, Harrow,

Middlesex HA1 2TS, UK


USA

1219 E. Hillsdale Blvd. Suite 205, Foster City, CA 94404

Phone No: 1-800-216-8930

[email protected]

www.intellipaat.com

You might also like