Advanced Certification in Cyber Security 1
Advanced Certification in Cyber Security 1
Advanced Certification in Cyber Security 1
CYBERSECURITY
Master Cybersecurity and Ethical Hacking skills and take
o u r e ree
P p la D g i
H gh D ma d e n in India
46% of Cybersecurity professionals have By 2022, India will face a demand-supply gap
a Master’s Degree of 450,000 Cybersecurity professionals
Our Credentials
10 Million+ 1,000+ 400+
Aspiring Active Students Industry-expert Instructors
Hiring Partners
Page - 1
Key Highlights
600 Hrs of Applied Learning 100+ Live sessions across months 9
Learn from IIT Guwahati Faculty & Industry Experts 50+ Industry Projects & Case Studies
Dedicated Learning Management Team Designed for working Professionals & Fresher's
Pr o gram P agog
ed y
A
In ttstr tor
end i l lass
uc L ve C T
- ed rais i g en n Ha o atho
Innck
vati s ve
n LMS
Fromtrained
Get worldsby
toptopaculty an experts
industry
F d
or effective
Get
F
a sense ofonline
how Learnin
real pro ects are built
g
Le
Ded c
ari at oi ar
n by D n
ed Le
g i g a ag m t n n M n e en
PP rr
ee
ee
tt or
Ne w
Ne w or ii gg a
k n
k n nd G ro up Le ar i g
n n
H
Te amon exercises, pro ect work,
ands j For effective
Improve youronline Learninnetwork and learn from
professional g
qui , capstone
To help
z
you withpro ects
your learning needs
j experience
peers
H ands
Se f-p ced v de
j Learn
G
ackathons
f ed Le
H
n n
d
Learn
qui at your own
, capstone
z propace
ects with j
Get involved
Group in group activities to
Learning
world-class content solve real-world problems
qui
Get ,real-world
capstone pro
z ects through
experience j Hands-on exercises, pro ect work, j
pro ects
j qui es, and capstone pro ects
zz j
Page - 2
Application Process
The application process consists of three simple steps. Candidates have to submit their application.
An offer of admission will be made to the selected candidates, and their application will be accepted
upon the payment of the admission fee.
SUBMIT APPLICATION
1 Tell us a bit about yourself and why you want to join
ADMISSION LETTER
3
Shortlisted candidates would be offered the admission letter
Page - 3
Self-paced
Industry Expert
Academy Faculty
2 3 4
Introduction to Cyber
Working with Kali
Network Security
Security & Information
Linux 2021.1
Security
7 6 5
Identity and Access
Security Operations
Incident Detection with
Management (IAM) and Management Security Information and
Event Management
(SIEM)
8 9 10
Web Application
Malware Analysis Ethical Hacking
Penetration Testing
13 12 11
Capstone Project Software Development
Cloud Security
Security Master Classes
Advanced Certification in
Cyber Security
Page - 4
Module 1 Module 5
Preparatory Sessions – Python & Linux Incident Detection with Security Information and
Python Event Management (SIEM)
Introduction to Python and IDEs
Understand the Basic Concepts of Security Information and
Python Basics
Event Management (SIEM)
Hands-on Sessions And Assignments for Practice Understand the SIEM Deployment
Linux Basics
Security
Understand the Concept of Handling Alert Triaging and Analysis
What is Cybersecurity?
Overview
Module 6
Need and Importance
Different verticals
Security Operations and Management
Understand SOC Fundamentals
Module 7
Wget, curl, grep, awk, tail, head, watch, find, locate
Note taking
Mechanism of Authorization
Network Security
Module 8
Security Controls
Traffic Analysis
Insecure Deserialization
Packet Analysers
Clickjacking
Sniffers
Firewalls
SIEM
F uzzing
V LAN
Cryptograph
V PN
Symmetric/Asymmetric Cryptography
Hashing
Digital Signatures
API Security
Patch Management
Page - 5
Module 9 Module 13
Malware Analysis Capstone Project
Types
In this module, you will learn how to prevent a web application
Ransomware
from being hacked as well as what key points to be considered
Detection
for making an web application secure. This capstone project
Analysis will give you exposure of both blue team and red team work
profile and help you gain exposure on both the sides.
Module 10
Ethical Hacking Job Readiness
Introduction
Job Search Strategy
Scanning Networks
Linkedin Profile Creation
Enumeration
Interview Preparation Sessions by Industry Experts
Vulnerability Analysis
Mock Interviews
System Hacking
Denial-of-Service
Session Hijacking
Skills to Master
Evading IDS
SQL Injection
Cybersecurity
Risk Analysis and Mitigation
Mobile Platforms
IoT
Tools to Master
Module 11
Cloud Security Master Classes
Infrastructure Security: Network level security, Host level
security, Application-level security
Access Control
Module 12
Software Development Security
Security Controls for the Development Environment
Page - 6
etai
R l ia
Soc edia
l M ain
Supply Ch E ntre rene r
p i
u sh p E-co mmer ec Ban ing
k Healthcare In su ran ec
Beginner Beginner
Removing and Retrieving Files S QL I njection
This project allows you to retreive your deleted files In this S QL Injection cybersecurity attack, you will be
and know the location of deleted files existing in the making a report on the S QL vulnerability and submit
system or database. As part of this project you will it. This can be an interesting project for candidates
also create a report of all the available Data having good knowledge of Python.
Recovery tools.
Beginner Intermediate
Password Strength Packet Sniffing
This project equips learners with the right skills and In the project, you will be analyzing network traffic to
knowledge to make a password analyzer software. keep surviellance on all the outgoing and incoming
Going one step ahead, you can also suggest a data packets. You will build a network analyzer and
strong password to a user, that is not prone to submit a report.
attacks.
Intermediate Intermediate
W hile performing this project, you will need to collect In this project, you will be working on a system that
information on the number of ways that an intruder can analyzes users transactions and their behaviors.
’
illegally access an offline device. You will submit a B ased on this research, your system will ascertain
report containing methods to secure devices such as parameters for any unusual behavior in the system
mobile phones, laptops, etc. like false passwords.
A d an e
v c A d an e
v c
A d an e
v c
p rogramming F nctionalit u y
Page - 7
Gaurav Ranade
Chief Technology Officer at RAH Infotech Pvt Ltd
Mr. Ranade is the CTO at RAH Infotech Pvt Ltd. He has over 25 years of experience in Techno Commercial,
Solution Designing & managing Big Accounts for Cyber Security. His successful profile demonstrates self-
motivation, entrepreneurial drive, and creativity.
Illyas Kooliyankal
Member of BCI (MBCI)
Mr. Kooliyankal is a Member of BCI (MBCI). He is the executor of many successful Information & Cyber
Security Transformation Programs for banks and other institutions. He has 20+ years of core experience in
Information Security and 25+ years altogether.
Yogendra Deoskar
Associate Director - Cyber Security at Accenture
Mr. Deoskar, who has 23 years of experience in the field of Cyber Security, is currently working at Accenture
as the Associate Director of Cyber Security. He is skilled in solutions architecture and has served eminent
companies like Infosys and Ernst & Young.
Page - 8
20% - BFSI
10% - Consulting
20% - Others
Work Experience
12%
12%
12%
9-12 years
12%
18%
6-9 years
18%
22%
3-6 years
22%
36%
0-3 years
36%
Page - 9
Career Services
500+ 600+ 400+ 55%
Webinars Job Shares Hiring Partners Avg. Salary Hike
*
Learner R eviews
Kunduru Nagaraju
Koundinya Sanagala Abhimanyu Bose
Network Security Engineer at
CTF player at TryHackMe Associate at Cognizant
Fortinet
I gained proficiency in Network I'm very happy to have been a part The best thing about Intellipaat is the
Security, post Intellipaat’s training. The of Intellipaat. The material and experienced trainers. They are very
trainers are experts and the content is lectures provided by them are good and very helpful. They make the
aligned as per the industry's demand. amazing. I'm pretty confident in sessions engaging and clarify all our
The real-life projects helped me gain what I have learned. A big thanks to doubts patiently. Good job, Intellipaat.
practical experience. the entire Intellipaat team.
* Past record is no guarantee of future job prospects | ** Placement Assistance doesn’t guarantee you a job Page - 10
About Intellipaat
Intellipaat is one of the leading online training providers with more than 1.2 million learners
We create courses in collaboration with top universities and MNCs for employability like
EICT IIT Roorkee, EICT IIT Guwahati, IITM Pravartak, IIM Ranchi, IIT Jammu, IU, LSBU, University
Our courses are delivered by SMEs & our pedagogy enables quick learning of difficult
topics. 24/7 technical support & career services help learners to jump-start their careers.
IIT Guwahati is the sixth IIT established in India. Since 1994, the institute has been at the
initiative of MeitY (Ministry of Electronics and Information Technology, Govt of India). E&ICT,
It also holds a global rank of 41 in Economic Times 2021 Rankings - Economic Times
Page - 11
Contact Us
INDIA
AMR Tech Park 3, Ground Floor, Tower B, Hongasandra Village,
Bommanahalli, Hosur Road, Bangalore, Karnataka 560068, India
www.intellipaat.com