Advanced Certification in Cyber Security 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

ADVANCED CERTIFICATION IN

CYBERSECURITY
Master Cybersecurity and Ethical Hacking skills and take

your career to the next level!

10 Million 1:1 Personlized 55% Average

Learners Mentorship Salary Hike

IND: +91 7022374614 US: 1-800-216-8930 [email protected] www.intellipaat.com


Advanced Certification in
Cybersecurity
This advanced certification program has been designed to help professionals learn the
skills and techniques needed for excelling in their career in Cyber Security. The
curriculum has been curated to help you kick start your Cyber Security journey under the
guidance of the IIT Guwahati faculty. Develop a rewarding career in the IT industry with
this Advanced certification program.

Hottest Job of 21st Century


1.9 Million Job Postings i e eo
Sk ll D v l pm ent
There is a global estimate of 1.9 million job Cybersecurity professionals are equipped
postings for cybersecurity roles by 2022 with various relevant skills, fetching lucrative
job offers

G rowing Cybersecurity Industry F uture-oriented Career


38% CAGR in Indian Cybersecurity Cybersecurity is a budding field; a head start
Industry will prove to be beneficial

o u r e ree
P p la D g i
H gh D ma d e n in India
46% of Cybersecurity professionals have By 2022, India will face a demand-supply gap
a Master’s Degree of 450,000 Cybersecurity professionals

Our Credentials
10 Million+ 1,000+ 400+
Aspiring Active Students Industry-expert Instructors Hiring Partners

500+ 55% 155+


Corporates Upskilled Average Salary Hike Countries’ Learners

Page - 1

IND: +91 7022374614 US: 1-800-216-8930 [email protected] www.intellipaat.com


About Program
The program aims at helping you gain expertise and knowledge in Cyber Security. The IIT
Guwahati faculty will help you cover all the required Cyber Security skills such as
cryptography, ethical hacking, application security, etc. Also, you will get to master tools
such as Linux, SQL, Nikto, and Microsoft Baseline, among others.

Learning Format 9 Months Career Services E&ICT IIT G


Online Bootcamp Live Classes By Intellipaat Certification

Key Highlights
600 Hrs of Applied Learning 100+ Live sessions across months 9

Learn from IIT Guwahati Faculty & Industry Experts 50+ Industry Projects & Case Studies

One-on-One with Industry Mentors 24*7 Support

Dedicated Learning Management Team Designed for working Professionals & Fresher's

1:1 Mock Interview Certification from EICT, IIT Guwahati

N o Cost EMI Option Resume Preparation and LinkedIn Profile eview R

Placement Assistance 2 Days campus immersion at IIT Guwahati

Pr o gram P agog
ed y

A
In ttstr tor
end i l lass
uc L ve C T
- ed rais i g en n Ha o atho
Innck
vati s ve
n LMS

Fromtrained
Get worldsby
toptopaculty an experts
industry
F d
or effective
Get
F
a sense ofonline
how Learnin
real pro ects are built
g

Industry experts experience

Le
Ded c
ari at oi ar
n by D n
ed Le
g i g a ag m t n n M n e en
PP rr
ee
ee
tt or
Ne w
Ne w or ii gg a
k n
k n nd G ro up Le ar i g
n n
H
Te amon exercises, pro ect work,
ands j For effective
Improve youronline Learninnetwork and learn from
professional g

qui , capstone
To help
z
you withpro ects
your learning needs
j experience
peers

P rso ali ar i g ami i ar i g


l ona exercises,
i proos ect work, amitrough
i ar i g an
1:1 e n zed Le n n G f ed Le n n

H ands
Se f-p ced v de
j Learn
G
ackathons
f ed Le
H
n n
d

Learn
qui at your own
, capstone
z propace
ects with j
Get involved
Group in group activities to
Learning
world-class content solve real-world problems

24*7 Supp ort


Pro
H tsexercises,
ands on a
j ec r isectswork,
pro
nd Exe c j e 1:1 P rso ali
e n zed Le ar i g
n n

qui
Get ,real-world
capstone pro
z ects through
experience j Hands-on exercises, pro ect work, j

pro ects
j qui es, and capstone pro ects
zz j

Page - 2

IND: +91 7022374614 US: 1-800-216-8930 [email protected] www.intellipaat.com


Who Can Apply for the Course?
Anyone with a Bachelor’s degree

Anyone in their last year of their Bachelor’s program

IT professionals with a Bachelor’s degree

Freshers willing to pursue advanced training in this domain

Anyone aspiring to pursue Cyber Security

Application Process
The application process consists of three simple steps. Candidates have to submit their application.
An offer of admission will be made to the selected candidates, and their application will be accepted
upon the payment of the admission fee.

SUBMIT APPLICATION
1 Tell us a bit about yourself and why you want to join

ADMISSION TEST & APPLICATION REVIEW


2 Clear the admission test and have a personal interview

with our interview panel

ADMISSION LETTER
3
Shortlisted candidates would be offered the admission letter

Page - 3

IND: +91 7022374614 US: 1-800-216-8930 [email protected] www.intellipaat.com


Learning Path

Live Courses Live Courses

Self-paced

Industry Expert

Academy Faculty

Start of the Course


1
Preparatory Sessions –

Python & Linux Foundation

2 3 4
Introduction to Cyber
Working with Kali
Network Security
Security & Information
Linux 2021.1
Security

7 6 5
Identity and Access
Security Operations
Incident Detection with
Management (IAM) and Management Security Information and
Event Management
(SIEM)

8 9 10
Web Application
Malware Analysis Ethical Hacking
Penetration Testing

13 12 11
Capstone Project Software Development
Cloud Security
Security Master Classes

Advanced Certification in

Cyber Security

Page - 4

IND: +91 7022374614 US: 1-800-216-8930 [email protected] www.intellipaat.com


Program Curriculum

Module 1 Module 5
Preparatory Sessions – Python & Linux Incident Detection with Security Information and
Python Event Management (SIEM)
Introduction to Python and IDEs
Understand the Basic Concepts of Security Information and
Python Basics
Event Management (SIEM)

Object Oriented Programming


Discuss the Different SIEM Solutions

Hands-on Sessions And Assignments for Practice Understand the SIEM Deployment

Linux Learn Different Use Case Examples for Application-level


Incident Detection
Introduction to Linux

Learn Different Use Case Examples for Insider Incident Detection

Linux Basics

Learn Different Use Case Examples for Network-Level Incident


Hands-on Sessions And Assignments for Practice
Detection

Learn Different Use Case Examples for Host-Level Incident


Module 2
Detection

Introduction to Cybersecurity & Information


Learn Different Use Case Examples for Compliance

Security
Understand the Concept of Handling Alert Triaging and Analysis
What is Cybersecurity?

Overview

Module 6
Need and Importance

Different verticals
Security Operations and Management
Understand SOC Fundamentals

Module 3 Discuss the Components of SOC: People, Processes, and


Technology

Working with Kali Linux 2021.1

Understand the Implementation of SOC


Introduction to Kali Linux

Services in Kali (HTTP, SSH)

Module 7
Wget, curl, grep, awk, tail, head, watch, find, locate

Identity and Access Management (IAM)


Piping and Redirection

Logical/Physical Access to Assets Management

Python and Bash Scripting

Authentication and Identification Management

Netcat, Socat, Powercat, Powershell, Wireshark, tcpdump

Integrating Identity as a Third-party Service

Note taking
Mechanism of Authorization

Module 4 Provisioning Life Cycle’s Identity and Access

Network Security

Module 8
Security Controls

W eb Application Penetration Testing


Networking Concepts

OWASP Tools and Methodologies

Traffic Analysis

Insecure Deserialization

Packet Analysers

Clickjacking

Sniffers

Black Box Testing

Firewalls

White Box Testing

SIEM

F uzzing

V LAN

Cryptograph

V PN
Symmetric/Asymmetric Cryptography

Hashing

Digital Signatures

API Security

Patch Management
Page - 5

IND: +91 7022374614 US: 1-800-216-8930 [email protected] www.intellipaat.com


Program Curriculum

Module 9 Module 13
Malware Analysis Capstone Project
Types
In this module, you will learn how to prevent a web application
Ransomware
from being hacked as well as what key points to be considered
Detection
for making an web application secure. This capstone project
Analysis will give you exposure of both blue team and red team work
profile and help you gain exposure on both the sides.
Module 10
Ethical Hacking Job Readiness
Introduction
Job Search Strategy

Foot Printing and Reconnaissance


Resume Building

Scanning Networks
Linkedin Profile Creation

Enumeration
Interview Preparation Sessions by Industry Experts

Vulnerability Analysis
Mock Interviews

System Hacking

Placement opportunities with 400+ hiring partners


Sniffing

upon clearing the Placement Readiness Test.


Social Engineering

Denial-of-Service

Session Hijacking
Skills to Master
Evading IDS

Firewalls and Honeypots


Ethical Hacking
Networks

Hacking Web Servers


Cryptography
Application Security

SQL Injection

Cybersecurity
Risk Analysis and Mitigation

Hacking – Wireless Networks

Mobile Platforms

IoT
Tools to Master
Module 11
Cloud Security Master Classes
Infrastructure Security: Network level security, Host level
security, Application-level security

Data security and Storage: Data privacy and security


Issues, Jurisdictional issues raised by Data location

Access Control

Trust, Reputation, Risk

Authentication in cloud computing, Client access in cloud,


Cloud contracting Model, Commercial and business
considerations

Module 12
Software Development Security
Security Controls for the Development Environment

Life Cycle Security

Impact of Acquired Software Security

Effectiveness of Software Security

Page - 6

IND: +91 7022374614 US: 1-800-216-8930 [email protected] www.intellipaat.com


Course Projects

Projects cover the following industries:

etai
R l ia
Soc edia
l M ain
Supply Ch E ntre rene r
p i
u sh p E-co mmer ec Ban ing
k Healthcare In su ran ec

Beginner Beginner
Removing and Retrieving Files S QL I njection
This project allows you to retreive your deleted files In this S QL Injection cybersecurity attack, you will be
and know the location of deleted files existing in the making a report on the S QL vulnerability and submit
system or database. As part of this project you will it. This can be an interesting project for candidates
also create a report of all the available Data having good knowledge of Python.
Recovery tools.

Beginner Intermediate
Password Strength Packet Sniffing
This project equips learners with the right skills and In the project, you will be analyzing network traffic to
knowledge to make a password analyzer software. keep surviellance on all the outgoing and incoming
Going one step ahead, you can also suggest a data packets. You will build a network analyzer and
strong password to a user, that is not prone to submit a report.
attacks.

Intermediate Intermediate

Hacking an Offline Device C redit ard Fra d Detection


C u

W hile performing this project, you will need to collect In this project, you will be working on a system that
information on the number of ways that an intruder can analyzes users transactions and their behaviors.

illegally access an offline device. You will submit a B ased on this research, your system will ascertain
report containing methods to secure devices such as parameters for any unusual behavior in the system
mobile phones, laptops, etc. like false passwords.

A d an e
v c A d an e
v c

Preventing Phishing ttacks on oting A V


Byp ass lient side ontrols and
C - C

S stems sing is al r togra h


y u V u C yp p y
A ttack thentication
Au

In this project, you will learn to bypass some of the


This project allows you to use visual cryptography
client-side controls placed in web applications to
and learn how to integrate fingerprint techniques in
limit user inputs. You will also learn to disrupt
the voting system to uniquely identify every user.
authentication functions in the attacking
authentication sessions.

A d an e
v c

I ntr sion Detection S stem with Self


u y -

p rogramming F nctionalit u y

In this project, you will learn to detect any intrusion


on the system and also create a fake program to
create a fake system. You will create fake
countermeasures to prevent and secure the original
application and track the attack pattern.

Page - 7

IND: +91 7022374614 US: 1-800-216-8930 [email protected] www.intellipaat.com


Course Advisors / Faculty

Dhruva Raj Pudel


Associate Director Cyber Security at KPMG India
Certified in CISSP and CCSP by (ISC)², and Cyber security Risk management by Harvard University,he
carries 14+ yrs of experience with a focus on SIEM solutions & Host Based instruction detection
systems,etc., and has worked with top MNCs like Wipro and IBM.

Gaurav Ranade
Chief Technology Officer at RAH Infotech Pvt Ltd
Mr. Ranade is the CTO at RAH Infotech Pvt Ltd. He has over 25 years of experience in Techno Commercial,
Solution Designing & managing Big Accounts for Cyber Security. His successful profile demonstrates self-
motivation, entrepreneurial drive, and creativity.

Illyas Kooliyankal
Member of BCI (MBCI)
Mr. Kooliyankal is a Member of BCI (MBCI). He is the executor of many successful Information & Cyber
Security Transformation Programs for banks and other institutions. He has 20+ years of core experience in
Information Security and 25+ years altogether.

Yogendra Deoskar
Associate Director - Cyber Security at Accenture
Mr. Deoskar, who has 23 years of experience in the field of Cyber Security, is currently working at Accenture
as the Associate Director of Cyber Security. He is skilled in solutions architecture and has served eminent
companies like Infosys and Ernst & Young.

Page - 8

IND: +91 7022374614 US: 1-800-216-8930 [email protected] www.intellipaat.com


Meet the Batch

Industries Our Learners Come From

20% - BFSI

45% Information Technology


5% - Healthcare

10% - Consulting

20% - Others

Work Experience

12%

12+ years Some of their current employers include

12%
12%

9-12 years

12%

18%

6-9 years
18%

22%

3-6 years
22%

36%

0-3 years
36%

Page - 9

IND: +91 7022374614 US: 1-800-216-8930 [email protected] www.intellipaat.com


Intellipaat

Career Services
500+ 600+ 400+ 55%
Webinars Job Shares Hiring Partners Avg. Salary Hike
*

What Makes Us T ick


Career-oriented Sessions Assured Interviews
Attend 10+ career-oriented sessions Get job Opportunities with Top MNC's
by industry mentors and prepare & Startups upon movement to
your career trajectory Placement Pool**

Profile Building Dedicated Job Portal Access


Craft a Cybersecurity resume and Get exclusive access to 200 job
LinkedIn profile to make an postings per month on Intellipaat’s
impression on top employers job portal

Mock Interview Preparation Job Fairs


Prepare with mock interviews Job fairs are conducted regularly to
including most asked questions by introduce learners to major
top employers
organizations

1:1 Mentoring Sessions Hackathons


Get 1:1 guidance at every step in Work in teams and get exclusive
your career transition to access to hackathons
Cybersecurity

Learner R eviews

Kunduru Nagaraju
Koundinya Sanagala Abhimanyu Bose
Network Security Engineer at
CTF player at TryHackMe Associate at Cognizant
Fortinet

I gained proficiency in Network I'm very happy to have been a part The best thing about Intellipaat is the
Security, post Intellipaat’s training. The of Intellipaat. The material and experienced trainers. They are very
trainers are experts and the content is lectures provided by them are good and very helpful. They make the
aligned as per the industry's demand. amazing. I'm pretty confident in sessions engaging and clarify all our
The real-life projects helped me gain what I have learned. A big thanks to doubts patiently. Good job, Intellipaat.
practical experience. the entire Intellipaat team.

* Past record is no guarantee of future job prospects | ** Placement Assistance doesn’t guarantee you a job Page - 10

IND: +91 7022374614 U S: 1-800-216-8930 [email protected] www.intellipaat.com


Program Partners

About Intellipaat

Intellipaat is one of the leading online training providers with more than 1.2 million learners

in over 155 countries. We are on a mission to democratize education as we believe that

everyone has the right to quality education.

We create courses in collaboration with top universities and MNCs for employability like

EICT IIT Roorkee, EICT IIT Guwahati, IITM Pravartak, IIM Ranchi, IIT Jammu, IU, LSBU, University

of Essex, University of Liverpool, IBM, Microsoft, etc.

Our courses are delivered by SMEs & our pedagogy enables quick learning of difficult

topics. 24/7 technical support & career services help learners to jump-start their careers.

About IIT Guwahati

IIT Guwahati is the sixth IIT established in India. Since 1994, the institute has been at the

forefront of engineering and technology education globally. E&ICT, IIT Guwahati is an

initiative of MeitY (Ministry of Electronics and Information Technology, Govt of India). E&ICT,

IIT Guwahati was inaugurated by PM Modi in 2016.

Achievements - IIT Guwahati

Ranked in the top 7 by NIRF India Rankings 2021 - NIRF

It also holds a global rank of 41 in Economic Times 2021 Rankings - Economic Times

Upon the completion of this program, you will:


Advanced certificate in Cybersecurity by E&ICT, IIT Guwahati

Page - 11

IND: +91 7022374614 US: 1-800-216-8930 [email protected] www.intellipaat.com


2 Million Learners & 500+ Corporates across 155+ countries

upskilling on Intellipaat Platform

Contact Us
INDIA

AMR Tech Park 3, Ground Floor, Tower B, Hongasandra Village,
Bommanahalli, Hosur Road, Bangalore, Karnataka 560068, India

Phone No: +91-7022374614


USA

100 Church Street, New York City, NY

[email protected]

www.intellipaat.com

You might also like