Corporate Training Hire From Us Explore Courses
University Logo

Advanced Certification Program in Cyber Security and Ethical Hacking

507 Ratings

Learn from IIT Faculty & Industry Experts.
Campus Immersion at IIT Roorkee.

This advanced certification program in cyber security and ethical hacking is designed to provide professionals with the skills and techniques who are looking forward to kickstarting their careers in the field of ethical hacking. Enrol in this advanced certification program in Cyber Security and Ethical Hacking, conducted by iHUB DivyaSampark, IIT Roorkee and Intellipaat, and learn all the necessary skills needed to master the field. This advanced course has been designed by the experienced IIT faculty and Industry experts to provide the mostRead More..

In collaboration with

Apply Now Download Brochure


Course Preview

Learning Format

Online Bootcamp

Live Classes

7 Months

Campus Immersion

IIT Roorkee




Hiring Partners

trustpilot review 3332
sitejabber review 1429
mouthshut review 24068

About Program

This advanced certification program in cyber security and ethical hacking by iHUB DivyaSampark, IIT Roorkee offers 8 modules and a career-accelerating capstone project to elevate your professional journey. This course will help you gain expertise in Networks, SQL, Application Security, Risk Analysis, and Mitigation via live classes by IIT professors.

Key Highlights

168 Hrs of live classes
60+ Live sessions across 7 months
Learn from IIT Faculty & Industry Experts
25+ Industry Projects & Case Studies
One-on-One with Industry Mentors
Weekend batches available
24*7 Support
Dedicated Learning Management Team
Designed for working Professionals & Fresher's
1:1 Mock Interview
iHUB DivyaSampark, IIT Roorkee Certification
Resume Preparation and LinkedIn Profile Review
Placement Assistance
Free Career Counselling
2 Days Campus Immersion at IIT Roorkee

About iHUB DivyaSampark, IIT Roorkee

iHUB DivyaSampark aims to enable innovative ecosystem in new age technologies like AI, ML, Drones, Robots, data analytics (often called CPS technologies) and becoming the source for the next generation of digital technologies, products and services by promoting, enhancing core competencies, capacity building,Read More..

Key Achievements of IIT Roorkee:

Certificate Click to Zoom

Who can apply for the course?

  • Anyone who has a bachelor’s degree
  • Anyone who is in the final year of their bachelor’s degree program
  • IT professionals
  • Anyone who wants to pursue ethical hacking
Who can aaply

What roles can an ethical hacker play?

Chief Information Security Officer (CISO)

The CISO is responsible for overseeing the organization’s overall cybersecurity strategy and ensuring the implementation of effective security measures. They develop policies, manage risk, and lead incident response efforts.

Security Analyst

Security analysts monitor and analyze systems, networks, and applications for potential security threats. They investigate security incidents, perform risk assessments, and implement security controls to protect company assets.

Security Engineer

Security engineers design and implement security solutions, including firewalls, encryption systems, and intrusion detection systems. They conduct vulnerability assessments, develop secure architectures, and respond to security incidents.

Network Administrator

Network administrators manage and maintain the organization’s computer networks. They configure network devices, monitor network performance, and implement security measures to protect against unauthorized access.

Security Architect

Security architects design and develop security frameworks, policies, and procedures for the organization. They collaborate with stakeholders to define security requirements and ensure that systems are designed with security in mind.

Security Operations Center (SOC) Analyst

SOC analysts monitor the organization’s systems and networks for security events, triage incidents, and escalate as needed. They analyze security logs, investigate potential threats, and provide real-time responses to security incidents.

View More

Skills to Master

Ethical Hacking


Cyber Security


Application Security

Risk Analysis and Mitigation

View More

Meet Your Mentors


Live Course Self Paced Industry Expert Academic Faculty


  • Introduction to Linux– Establishing the fundamental knowledge of how linux works and how you can begin with Linux OS.
  • Linux Basics –File Handling, data extraction, etc.
  • Hands-on Sessions And Assignments for Practice– Strategically curated problem statements for you to start with Linux.
Download Brochure
Download Brochure

3.1 Introduction to Kali Linux
3.2 Services in Kali (HTTP, SSH)
3.3 Wget, curl, grep, awk, tail, head, watch, find, locate
3.4 Piping and Redirection
3.5 Python and Bash Scripting
3.6 Netcat, Socat, Powercat, Powershell, Wireshark, tcpdump
3.7 Note taking

Download Brochure

4.1 Introduction to Ethical Hacking
4.2 Footprinting and Reconnaissance
4.3 Scanning Networks
4.4 Enumeration
4.5 Vulnerability Analysis
4.6 System Hacking
4.7 Malware Threats
4.8 Sniffing
4.9 Social Engineering
4.10 Denial-of-Service
4.11 Session Hijacking
4.12 Evading IDS, Firewalls, and Honeypots
4.13 Hacking Web Servers
4.14 Hacking Web Applications
4.15 SQL Injection
4.16 Hacking Wireless Networks
4.17 Hacking Mobile Platforms
4.18 IoT and OT Hacking
4.19 Cloud Computing
4.20 Cryptography
4.21 Working with Kali Linux 2021.1

Download Brochure

5.1 What is Cyber Security
5.2 Overview
5.3 Need and Importance
5.4 Different verticals

Download Brochure

6.1 Domain One –  Security and Risk Management

  • Regulatory and legal issues
  • Confidentiality, availability, and integrity concepts
  • Principles of security governance
  • Compliance and professional ethics
  • Requirements of business continuity
  • Policies of personnel security
  • Threat modeling and risk considerations
  • Security education, awareness, and training
  • Security policies, standards, procedures, and guidelines

6.2 Domain Two – Asset Security

  • Privacy protection
  • Asset and information classification
  • Ownership
  • Data security controls and appropriate retention
  • Requirements handling

6.3 Domain Three – Security Architecture and Engineering

  • Security evaluation models
  • Fundamental concepts of security models
  • Security designs, architectures, and solution elements vulnerabilities
  • Information systems security capabilities
  • Using secure design principles for engineering processes
  • Vulnerabilities of web-based and mobile systems
  • Cryptography
  • Vulnerabilities of cyber-physical systems and embedded devices
  • Secure principles of facility and site design
  • Physical security

6.4 Domain Four – Communication and Network Security

  • Architectural design of a secure network
  • Channels for secure communication
  • Components of a secure network
  • Network attacks

6.5 Domain Five – Identity and Access Management (IAM)

  • Logical/physical access to assets management
  • Authentication and identification management
  • Integrating identity as a third-party service
  • Mechanism of authorization
  • Provisioning life cycle’s identity and access

6.6 Domain Six – Security Assessment and Testing

  • Test outputs (e.g., manual and automated)
  • Security process data (e.g., operational and management controls)
  • Vulnerabilities of security architectures
  • Testing of security control
  • Test and assessment strategies

6.7 Domain Seven – Security Operations

  • Monitoring and logging activities
  • Investigation requirements and support
  • Incident management
  • Resource provision
  • Concepts of foundational security operations
  • Recovery strategies
  • Techniques of resource protection
  • Physical security
  • Measures of prevention
  • Vulnerability and patch management
  • Processes of change management
  • Exercises and planning of business continuity
  • Personnel safety concerns
  • Plans and processes for disaster recovery

6.8 Domain Eight – Software Development Security

  • Security controls for the development environment
  • Software development life cycle security
  • Impact of acquired software security
  • Effectiveness of software security
Download Brochure

In this module, you will learn how to prevent a web application from being hacked as well as what key points to be considered for making an web application secure. This capstone project will give you exposure to both blue team and red team work profile and help you gain exposure on both sides.

Download Brochure


  • Introduction to Python and IDEs – The basics of the python programming language, how you can use various IDEs for python development like Jupyter, Pycharm, etc.
  • Python Basics – Variables, Data Types, Loops, Conditional Statements, functions, decorators, lambda functions, file handling, exception handling ,etc.
  • Object Oriented Programming – Introduction to OOPs concepts like classes, objects, inheritance, abstraction, polymorphism, encapsulation, etc.
  • Hands-on Sessions And Assignments for Practice – The culmination of all the above concepts with real-world problem statements for better understanding.
Download Brochure
View More
Intellipaat reserves the right to modify, amend or change the structure of module & the curriculum, after due consensus with the university/certification partner.

Program Highlights

60+ Live sessions across 7 months
Placement Assistance
168 Hrs of live classes
24*7 Support


All the projects included in this program are aligned with the industry demands and standards. These industry-oriented projects will test your level of knowledge in the Ethical Hacking domain and also help you get exposure to real-life scenarios.

Practice 20+ Essential Tools

Designed by Industry Experts

Get Real-world Experience


( 5 )

Hear From Our Hiring Partners

Career Services By Intellipaat

Career Services

Career Oriented Sessions

Throughout the course

Over 10+ live interactive sessions with an industry expert to gain knowledge and experience on how to build skills that are expected by hiring managers. These will be guided sessions and that will help you stay on track with your up skilling objective.

Resume & LinkedIn Profile Building

After 70% of course completion

Get assistance in creating a world-class resume & LinkedIn Profile from our career services team and learn how to grab the attention of the hiring manager at profile shortlisting stage

Mock Interview Preparation

After 80% of the course completion

Students will go through a number of mock interviews conducted by technical experts who will then offer tips and constructive feedback for reference and improvement.

1 on 1 Career Mentoring Sessions

After 90% of the course completion

Attend one-on-one sessions with career mentors on how to develop the required skills and attitude to secure a dream job based on a learners’ educational background, past experience, and future career aspirations.

Placement Assistance

Upon movement to the Placement Pool

Placement opportunities are provided once the learner is moved to the placement pool upon clearing Placement Readiness Test (PRT)

Exclusive access to Intellipaat Job portal

After 80% of the course completion

Exclusive access to our dedicated job portal and apply for jobs. More than 400 hiring partners’ including top start-ups and product companies hiring our learners. Mentored support on job search and relevant jobs for your career growth.

Our Alumni Works At

Master Client Desktop

Peer Learning

Via Intellipaat PeerChat, you can interact with your peers across all classes and batches and even our alumni. Collaborate on projects, share job referrals & interview experiences, compete with the best, make new friends – the possibilities are endless and our community has something for everyone!


Admission Details

The application process consists of three simple steps. An offer of admission will be made to selected candidates based on the feedback from the interview panel. The selected candidates will be notified over email and phone, and they can block their seats through the payment of the admission fee.

Submit Application

Submit Application

Tell us a bit about yourself and why you want to join this program

Application Review

Application Review

An admission panel will shortlist candidates based on their application



Selected candidates will be notified within 1–2 weeks

Program Fee

Total Admission Fee

$ 1,579

Apply Now

Upcoming Application Deadline 2nd Mar 2024

Admissions are closed once the requisite number of participants enroll for the upcoming cohort. Apply early to secure your seat.

Program Cohorts

Next Cohorts

Date Time Batch Type
Program Induction 2nd Mar 2024 08:00 PM IST Weekend (Sat-Sun)

Frequently Asked Questions

Why should I enroll in this advanced certification program in Ethical Hacking by iHUB DivyaSampark, IIT Roorkee?

The program provides a holistic education in ethical hacking. The advanced certification offered by iHUB DivyaSampark, IIT Roorkee is aligned with industry requirements and will enable you to interview with leading MNCs.

Intellipaat provides career services that include guaranteed interviews for all learners enrolled in this course. iHUB DivyaSampark, IIT Roorkee is not responsible for career services.

  • The global demand for cybersecurity professionals will grow by 350,000 jobs in 2023. – Cybersecurity Ventures
  • The average annual salary of a security analyst in India is ₹606,066 per annum. – Glassdoor
  • The average annual salary of a security analyst in the U.S. is $104,210. – U.S. News
  • The compound annual growth rate (CAGR) for ethical hacking jobs is expected to be 38% from 2022 to 2028.

You will be taught by the best practitioners in the industry and the course has been developed in consultation with IIT faculty.

If you miss a live class, you will receive the recording of the class within the next 12 hours. If you need assistance, you’ll also have access to our 24/7 support team to help you with any questions you may have.

To complete this program, it is recommended that you spend approximately 6-8 hours per week studying.

The career service is provided by Intellipaat, where you are guaranteed three interviews upon successful completion of the course. iHUB DivyaSampark, IIT Roorkee issues a certificate upon completion of the course.

Yes. You may contact course advisors to learn more about scholarship opportunities.

This advanced certification program is conducted online for 9 months and is accompanied by several live sessions with instructors.

To be included in the placement pool, the learner must complete the course and submit all projects and assignments. He/she must then pass the PRT (Placement Readiness Test) to be accepted into the placement pool and gain access to our job portal and career mentoring sessions.

  • Unbiased career counseling
  • Counselling based on your skills and preferences
  • No repeat calls, only as needed
  • Rigorous curriculum developed by industry experts
  • Complete this program while you work

This advanced certification program in Cyber Security and ethical hacking will help you pass the Certified Ethical Hacker Certification for CEH v12 and Certified Information System Security Professional Certification

Please note that the course fees is non-refundable and we will be at every step with you for your upskilling and professional growth needs.

Due to any reason you want to defer the batch or restart the classes in a new batch then you need to send the batch defer request on [email protected] and only 1 time batch defer request is allowed without any additional cost.

Learner can request for batch deferral to any of the cohorts starting in the next 3-6 months from the start date of the initial batch in which the student was originally enrolled for. Batch deferral requests are accepted only once but you should not have completed more than 20% of the program. If you want to defer the batch 2nd time then you need to pay batch defer fees which is equal to 10% of the total course fees paid for the program + Taxes.

View More

What is included in this course?

  • Non-biased career guidance
  • Counselling based on your skills and preference
  • No repetitive calls, only as per convenience
  • Rigorous curriculum designed by industry experts
  • Complete this program while you work