Advanced Certification Program in Cyber Security and Ethical Hacking IHUB IITR
Advanced Certification Program in Cyber Security and Ethical Hacking IHUB IITR
Program in
Our Credentials
10 Million+ 1,000+ 400+
Aspiring Active Students Industry-expert Instructors
Hiring Partners
Page - 1
Key Highlights
168 Hrs of live classes 60+ Live sessions across 7 months
Master Classes from IIT Faculty 25+ Industry Projects & Case Studies
One-on-One with Industry Mentors Weekend batches available
24*7 Support Dedicated Learning Management Team
1:1 Mock Interview Designed for working Professionals & Fresher's
Placement Assistance Resume Preparation and LinkedIn Profile Review
Free Career Counselling iHUB DivyaSampark, IIT Roorkee Certification
2 Days Campus Immersion at IIT Roorkee
Program Pedagogy
Instructor-led Training Hackathons
Get trained by top industry experts Get a sense of how real projects are built
Page - 2
IND: +91 7022374614 US: 1-800-216-8930 [email protected] www.intellipaat.com
Who Can Apply for the Course?
Anyone who has a bachelor’s degree
IT professionals
Application Process
The application process consists of three simple steps. Candidates have to submit their application.
An offer of admission will be made to the selected candidates, and their application will be accepted
upon the payment of the admission fee.
SUBMIT APPLICATION
1
Tell us a bit about yourself and why you want to join
ADMISSION LETTER
3
Shortlisted candidates would be offered the admission letter
Page - 3
Live Courses
Live Courses Self-paced
Industry Expert
Academy Faculty
Start of the
1 Course
Preparatory Session
Linux Foundation
2 3 4
Fundamentals Working with Kali Certified Ethical
of Networking Linux 2021.1 Hacking by EC Council
7 6 5
Capstone Project Certified Information Introduction to Cyber
System Security Security & Information
Professional (CISSP) Security
Page - 4
Module 1 Module 5
Preparatory Sessions Linux Foundation Introduction to Cyber Security & Information Security
Linux What is Cyber Security
Introduction to Linux
Overview
Linux Basics
Need and Importance
Module 6
Module 2
Certified Information System Security
Fundamentals of Networking
Professional (CISSP)
Domain One – Security and Risk Management
Module 3
Domain Two – Asset Security
Note taking
Module 7
Capstone Project
Module 4
Certified Ethical Hacking by EC Council In this module, you will learn how to prevent a web application
from being hacked as well as what key points to be considered
Introduction to Ethical Hacking
will give you exposure to both blue team and red team work
Scanning Networks
Vulnerability Analysis
System Hacking
Electives
Malware Threats
Sniffing
Module 8
Social Engineering
Python
Denial-of-Service
Introduction to Python and IDEs
Session Hijacking
Python Basics
SQL Injection
Skills to Master
Hacking Mobile Platforms
Ethical Hacking
Networks
Cryptography
Application Security
Cloud Computing
Cryptography
Cybersecurity
Risk Analysis and Mitigation
Page - 5
Retail Social Media Supply Chain Entrepreneurship E-commerce Banking Healthcare Insurance
Beginner Beginner
Removing and Retrieving Files SQL Injection
This project allows you to retreive your deleted files In this SQL Injection cybersecurity attack, you will be
and know the location of deleted files existing in the making a report on the SQL vulnerability and submit
system or database. As part of this project you will it. This can be an interesting project for candidates
also create a report of all the available Data having good knowledge of Python.
Recovery tools.
Beginner Intermediate
Password Strength Packet Sniffing
This project equips learners with the right skills and In the project, you will be analyzing network traffic to
knowledge to make a password analyzer software. keep surviellance on all the outgoing and incoming
Going one step ahead, you can also suggest a data packets. You will build a network analyzer and
strong password to a user, that is not prone to submit a report.
attacks.
Intermediate Intermediate
Advance Advance
Advance
Intrusion Detection System with Self-
programming Functionality
In this project, you will learn to detect any intrusion
on the system and also create a fake program to
create a fake system. You will create fake
countermeasures to prevent and secure the original
application and track the attack pattern.
Page - 6
Manish Anand
CEO at iHUB IIT Roorkee
Manish Anand is an IIT Kanpur alumnus with an MBA in Technology and innovation management from
Korea Advanced Institute of Science and Technology (KAIST), Seoul. He currently heads iHUB DivyaSampark,
a Technology Innovation Hub hosted at IIT Roorkee.
Dr. Balasubramanian R
Professor at IIT Roorkee
Dr. Balasubramanian R, is currently working as Professor at IIT Roorkee. He has completed his PhD from IIT
Madras in Mathematics and Computer Science and has more than 20 years of teaching experience. HIs
areas of interest include computer vision, machine learning, pattern recognition, deep learning, etc.
Gaurav Ranade
lg vL
Chief Techno o y Officer at RAH Infotech P t td
Mr. Ranade is the CTO at RAH Infotech Pvt Ltd. He has over 25 years of experience in Techno Commercial,
Solution Designing & managing Big Accounts for Cyber Security. His successful profile demonstrates self-
motivation, entrepreneurial drive, and creativity.
Page - 7
Illyas Kooliyankal
Member of BCI (MBCI)
Mr. Kooliyankal is a Member of BCI (MBCI). He is the executor of many successful Information & Cyber
Security Transformation Programs for banks and other institutions. He has 20+ years of core experience in
Information Security and 25+ years altogether.
Yogendra Deoskar
Associate Director - Cyber Security at Accenture
Mr. Deoskar, who has 23 years of experience in the field of Cyber Security, is currently working at Accenture
as the Associate Director of Cyber Security. He is skilled in solutions architecture and has served eminent
companies like Infosys and Ernst & Young.
Page - 8
20% - BFSI
10% - Consulting
20% - Others
Work Experience
12%
12%
12%
9-12 years
12%
18%
6-9 years
18%
22%
3-6 years
22%
36%
0-3 years
36%
Page - 9
Attend 10+ career-oriented sessions Placement opportunities are provided once the
by industry mentors and prepare learner is moved to the placement pool upon
Mock I nter v w
ie Pre p
aration Job Fairs
Prepare yourself w ith mock intervie w s Job fairs are conducted regularly to
by top employers
organizations
Get 1:1 guidance at every step in Work in teams and get exclusive
Security
Learner R v w e ie s
* Past record is no guarantee of future job prospects | ** Placement Assistance doesn’t guarantee you a job Page - 10
I ND 9 7
: + 1 022 3746 4 1 US: 1- 8 00-21 6 893
- 0 sales @ intellipaat com . www. .
intellipaat com
Program Partners
About Intellipaat
Intellipaat is one of the leading online training providers with more than 10 million learners
in over 155 countries. We are on a mission to democratize education as we believe that
everyone has the right to quality education.
We create courses in collaboration with top universities and MNCs for employability like
EICT IIT Roorkee, EICT IIT Guwahati, IITM Pravartak, IIM Ranchi, IIT Jammu, IU, LSBU, University
of Essex, University of Liverpool, IBM, Microsoft, etc.
Our courses are delivered by SMEs & our pedagogy enables quick learning of difficult
topics. 24/7 technical support & career services help learners to jump-start their careers.
Page - 11
Contact Us
INDIA
6th Floor, Primeco Towers, Arekere Gate Junction, Bannerghatta
Main Road, Bengaluru, Karnataka 560076, India
WILMINGTON, DE 19801
www.intellipaat.com