Cybersecurity - The Checklist
Cybersecurity - The Checklist
CYBERSECURITY
Master Cybersecurity and Ethical Hacking skills and take
Cybersecurity
This advanced certification by E&ICT, IIT Guwahati and Intellipaat is designed to help
learners gain the skills and techniques required for excelling in the field of
cybersecurity. The curriculum is vetted by IIT Guwahati faculty and industry experts.
1 .9 M ll
i ion Job P g
ostin s Sk ll D v l pm
i e e o ent
postings for cybersecurity roles by 2022 with various relevant skills, fetching lucrative
j ob offers
G w g
ro in Cybersecurity I d
n ustry F uture - oriente d a C reer
P p la D g
o u r e ree H gh D ma d
i e n in I da
n i
46% of Cybersecurity professionals have B y 2022, India will face a demand-supply gap
a M ’
aster s Degree of 4 5
0,000 Cybersecurity professionals
Our Credentials
Page - 1
Key Highlights
600 Hrs of Applied Learning 100+ Live sessions across 9 months
Learn from IIT Guwahati Faculty & Industry Experts 50+ Industry Projects & Case Studies
Dedicated Learning Management Team Designed for working Professionals & Fresher's
Pr ogram Pedagogy
A end
Inttstr Liveled
u tor cClass en
rai-s i ngT Inn
Ha okvatho
c ativensLMS
From
G
worldsby
et trained top Faculty
top and
experts
industry For
Geteffective online
a sense of real prog
jects are built
how Learnin
Industry experts experience
Le
Dedarin at
byed
c
Doi
Lenar
g ning Management Pee
P eerr Ne
Nettwork
workiin
ngg and Group Learning
eamon exercises, project work,
Hands
T For effective online Learning
Learn
q at your own
uiz, capstone propace
jects with G
G
et involved
roup in group activities to
Learning
world-class content solve real-world problems
24*7 Support
Pro e on
Handsj and epro
tsexercises,
c r is eswork,
ject
Ex c 1:1 Personalized Learning
qui
Getz,real-world
capstone pro jects through
experience Hands-on exercises, project work,
projects quizzes, and capstone projects
Page - 2
Application Process
The application process consists of three simple steps. Candidates have to submit their application.
An offer of admission will be made to the selected candidates, and their application will be accepted
upon the payment of the admission fee.
SUBMIT APPLICATION
1 Tell us a bit about yourself and why you want to join
ADMISSION LETTER
3 Shortlisted candidates would be offered the admission letter
Page - 3
Live Courses
2 3 4
Introduction to Cyber
Working with Kali
Network Security
Security & Information
Linux 2021.1
Security
7 6 5
Identity and Access
Security Operations
Incident Detection with
Management (IAM) and Management Security Information and
Event Management
(SIEM)
8 9 10
Web Application
Malware Analysis Ethical Hacking
Penetration Testing
13 12 11
Capstone Project Software Development
Cloud Security
Security
Advanced Certification in
Cyber Security
Page - 4
Module 1 Module 5
Preparatory Sessions – Python & Linux Incident Detection with Security Information and
Python Event Management (SIEM)
Introduction to Python and IDEs
Understand the Basic Concepts of Security Information and
Python Basics
Event Management (SIEM)
Hands-on Sessions And Assignments for Practice Understand the SIEM Deployment
Linux Basics
What is Cybersecurity?
Understand the Concept of Handling Alert Triaging and Analysis
Overview
Module 6
Need and Importance
Module 7
Wget, curl, grep, awk, tail, head, watch, find, locate
Note taking
Mechanism of Authorization
Traffic Analysis
Insecure Deserialization
Packet Analysers
Clickjacking
Sniffers
Firewalls
SIEM
Fuzzing
VLAN
Cryptograph
VPN
Symmetric/Asymmetric Cryptography
Hashing
Digital Signatures
API Security
Patch Management
Page - 5
Module 9 Module 13
Malware Analysis Capstone Project
Types
In this module, you will learn how to prevent a web application
Ransomware
from being hacked as well as what key points to be considered
Detection
for making an web application secure. This capstone project
Analysis will give you exposure of both blue team and red team work
profile and help you gain exposure on both the sides.
Module 10
Ethical Hacking
Introduction
Skills to Master
Foot Printing and Reconnaissance
Ethical Hacking
Networks
Scanning Networks
Enumeration
Cryptography
Application Security
Vulnerability Analysis
Cybersecurity
Risk Analysis and Mitigation
System Hacking
Sniffing
Social Engineering
Tools to Master
Denial-of-Service
Session Hijacking
Evading IDS
SQL Injection
Mobile Platforms
IoT
Module 11
Cloud Security
Infrastructure Security: Network level security, Host level
security, Application-level security
Access Control
Module 12
Software Development Security
Security Controls for the Development Environment
Page - 6
etai
R l ia
Soc edia
l M ain
Supply Ch E ntre rene r
p i
u sh p E-co mmer ec Ban ing
k Healthcare In su ran ec
Beginner Beginner
Removing and Retrieving Files S QL I njection
This project allows you to retreive your deleted files In this S QL Injection cybersecurity attack, you will be
and know the location of deleted files existing in the making a report on the S QL vulnerability and submit
system or database. As part of this project you will it. This can be an interesting project for candidates
also create a report of all the available Data having good knowledge of Python.
Recovery tools.
Beginner Intermediate
Password Strength Packet Sniffing
This project equips learners with the right skills and In the project, you will be analyzing network traffic to
knowledge to make a password analyzer software. keep surviellance on all the outgoing and incoming
Going one step ahead, you can also suggest a data packets. You will build a network analyzer and
strong password to a user, that is not prone to submit a report.
attacks.
Intermediate Intermediate
W hile performing this project, you will need to collect In this project, you will be working on a system that
information on the number of ways that an intruder can analyzes users transactions and their behaviors.
’
illegally access an offline device. You will submit a B ased on this research, your system will ascertain
report containing methods to secure devices such as parameters for any unusual behavior in the system
mobile phones, laptops, etc. like false passwords.
A d an e
v c A d an e
v c
A d an e
v c
p rogramming F nctionalit u y
Page - 7
Murli Nambiar
Senior Vice President, Head Cyber security at Reserve Bank of India
Having worked in companies like ICICI, Reliance, Apollo; Murli carries ground level expertise in Information
Security and Risk Management, and has been instrumental in setting up Information Security Divisions for
premier institutions in India.
Page - 8
20% - BFSI
10% - Consulting
20% - Others
Work Experience
12%
12%
12%
9-12 years
12%
18%
6-9 years
18%
22%
3-6 years
22%
36%
0-3 years
36%
Page - 9
by industry mentors and prepare the learner is moved to the placement pool.
Mock I nter v w
ie Pre p
aration Job Fairs
top employers
organizations
Get 1:1 guidance at every step in Work in teams and get exclusive
Cybersecurity
Learner R v w e ie s
S ,
ecurity post Intellipaat’s training. T he of Intellipaat. T he material and experienced trainers. T hey are very
trainers are experts and the content is lectures provided by them are good and very helpful. T hey make the
* Past record is no guarantee of future job prospects | ** Placement Assistance doesn’t guarantee you a job Page - 10
I ND 9 7
: + 1 022 37 6
4 14 US : 1- 8 00-21 6 893- 0 sales @ intellipaat.com www .intellipaat.com
Program Partners
About Intellipaat
Intellipaat is one of the leading online training providers with more than 1.2 million learners
We create courses in collaboration with top universities and MNCs for employability like IIT
Madras, University of Essex, University of Liverpool, IIT Roorkee, IIT Guwahati, SPJIMR, IBM,
Microsoft, etc.
Our courses are delivered by SMEs & our pedagogy enables quick learning of difficult
topics. 24/7 technical support & career services help learners to jump-start their careers.
IIT Guwahati is the sixth IIT established in India. Since 1994, the institute has been at the
initiative of MeitY (Ministry of Electronics and Information Technology, Govt of India). E&ICT,
It also holds a global rank of 41 in Economic Times 2021 Rankings - Economic Times
U o o
p n the c mpleti n o of this pr og ram , yo u will :
A v
d anced certificate in C u
ybersec rity by E& C , Guw
I T IIT ahati
Page - 11
Contact Us
INDIA
AMR Tech Park 3, Ground Floor, Tower B, Hongasandra Village,
Bommanahalli, Hosur Road, Bangalore, Karnataka 560068, India
www.intellipaat.com