Your cart is currently empty.
This advanced certification program has been designed to help professionals learn the skills and techniques needed for excelling in their careers in cyber security. The curriculum has been curated to help you kick-start your cyber security journey under the guidance of the IIT Guwahati faculty. Develop a rewarding career in the IT industry with this advanced certification program.
Learning Format
Online Bootcamp
Live Classes
9 months
E&ICT IIT Guwahati
Certification
Career Services
by Intellipaat
500+
Hiring Partners
The program aims at helping you gain expertise and knowledge in cyber security. The IIT Guwahati faculty will help you cover all the cybersecurity skills such as cryptography, ethical hacking, application security, etc. Also, you will get to master tools such as Linux, SQL, Nikto, and Microsoft Baseline, among others.
About E&ICT, IIT Guwahati
This advanced certification program is in partnership with E&ICT Academy, IIT Guwahati. E&ICT, IIT Guwahati is an initiative of the Ministry of Electronics and Information Technology (MeitY), Govt. of India and formed with the team of IIT Guwahati professors to provide high-quality education programs.
Achievements- IIT Guwahati
Upon the completion of this program, you will receive:
About the EC-Council
This American organization offers education, training, and services on ethical hacking. The certification by the EC-Council validates the various ethical hacking skills that the learners will be trained in through the program.
Benefits for students from EC-Council
They analyze and assess vulnerabilities in the infrastructure, detect vulnerabilities, and recommend solutions and best practices.
These professionals perform security monitoring and investigations and utilize new technologies and processes to enhance security capabilities.
They use encryption to secure information or build security software. They can also develop stronger encryption algorithms.
Designs a security system or major components of a security system, and heads a security design team building a new security system.
These professionals install and manage organization-wide security systems.
They develop security software and integrate or implement security into applications software.
Skills to Master
Ethical Hacking
Cryptography
Cyber Security
Networks
Application Security
Risk Analysis and Mitigation
Tools to Master
PythonÂ
Linux
2.1 What is Cyber Security?
2.2 Overview
2.3 Need and Importance
2.4 Different Verticals
3.1 Introduction to Kali Linux
3.2 Services in Kali (HTTP, SSH)
3.3 Wget, curl, grep, awk, tail, head, watch, find, locate
3.4 Piping and Redirection
3.5 Python and Bash Scripting
3.6 Netcat, Socat, Powercat, Powershell, Wireshark, tcpdump
3.7 Note taking
4.1 Security Controls
4.2 Networking Concepts
4.3 Traffic Analysis
4.4 Packet Analysers
4.5 Sniffers
4.6 Firewalls
4.7 SIEM
4.8 VLAN
4.9 VPN
5.1 Understand the Basic Concepts of Security Information and Event Management (SIEM)
5.2 Discuss the Different SIEM Solutions
5.3 Understand the SIEM Deployment
5.4 Learn Different Use Case Examples for Application-Level Incident Detection
5.5 Learn Different Use Case Examples for Insider Incident Detection
5.6 Learn Different Use Case Examples for Network-Level Incident Detection
5.7 Learn Different Use Case Examples for Host-Level Incident Detection
5.8 Learn Different Use Case Examples for Compliance
5.9 Understand the Concept of Handling Alert Triaging and Analysis
6.1 Understand the SOC Fundamentals
6.2 Discuss the Components of SOC: People, Processes and Technology
6.3 Understand the Implementation of SOC
7.1 Logical/Physical Access to Assets Management
7.2 Authentication and Identification Management
7.3 Integrating Identity as a Third-Party Service
7.4 Mechanism of Authorization
7.5 Provisioning Life Cycle’s Identity and Access
8.1 OWASP Tools and Methodologies
8.2 Insecure Deserialization
8.3 Clickjacking
8.4 Black Box Testing
8.5 White Box Testing
8.6 Fuzzing
8.7 Cryptograph
8.8 Symmetric/Asymmetric Cryptography
8.9 Hashing
8.10 Digital Signatures
8.11 API Security
8.12 Patch Management
9.1 Types
9.2 Ransomware
9.3 Detection
9.4 Analysis
10.1 Introduction
10.2 Foot Printing and Reconnaissance
10.3 Scanning Networks
10.4 Enumeration
10.5 Vulnerability Analysis
10.6 System Hacking
10.7 Sniffing
10.8 Social Engineering
10.9 Denial-of-Service
10.10 Session Hijacking
10.11 Evading IDS
10.12 Firewalls and Honeypots
10.13 Hacking Web Servers
10.14 SQL Injection
10.15 Hacking – Wireless Networks
10.16 Mobile Platforms
10.17 IoT
11.1 Infrastructure Security: Network-level security, Host level security, Application-level security
11.2 Data security and Storage: Data privacy and security Issues, Jurisdictional issues raised by Data location
11.3 Access Control
11.4 Trust, Reputation, Risk
11.5 Authentication in cloud computing, Client access in cloud, Cloud contracting Model, Commercial and business considerations
12.1 Security Controls for The Development Environment
12.2 Life Cycle Security
12.3 Impact of Acquired Software Security
12.4 Effectiveness of Software Security.
In this module, you will learn how to prevent a web application from being hacked as well as what key points to be considered for making a web application secure. This capstone project will give you exposure to both the blue team and red teamwork profile and help you gain exposure on both sides.
All the projects included in this program are aligned with the industry demands and standards. These industry-oriented projects will test your level of knowledge in the Cyber Security domain and also help you get exposure to real-life scenarios.
Admission Details
The application process consists of three simple steps. An offer of admission will be made to selected candidates based on the feedback from the interview panel. The selected candidates will be notified over email and phone, and they can block their seats through the payment of the admission fee.
Submit Application
Tell us a bit about yourself and why you want to join this program
Application Review
An admission panel will shortlist candidates based on their application
Admission
Selected candidates will be notified within 1–2 weeks
The program offers holistic training in Cyber Security. The advanced certification, offered by E&ICT, IIT Guwahati is aligned with the industry requirements and will enable you to crack interviews at top MNCs.
Intellipaat provides career services that include Guarantee interviews for all the learners enrolled in this course. EICT IIT Guwahati is not responsible for the career services.
You will be taught by the top industry practitioners and the course has been designed in consultation with the IIT Guwahati faculty.
In circumstances where you miss a live class, you will be given the recording of the class within the next 12 hours. Also, if you need any support, you will have access to our 24/7 technical support team for any sort of query resolution.
To complete this program, it is suggested to spare around 6-8 hours a week towards learning.Â
Yes, you will receive EC Council Kit and lab access, please speak to the course advisor for the same.
Career services will be provided by Intellipaat in which you will receive guaranteed three interviews upon successful completion of the course. E&ICT Academy, IIT Guwahati will provide the certificate upon completion of the course.
Yes. you can reach out to the course advisors to know more about scholarship opportunities.
This advanced certification program is conducted online for 9 months led by multiple live instructor-led sessions.
There will be a two-day campus immersion module at E&ICT Academy, IIT-Guwahati during which learners will visit the campus. You will learn from the faculty as well as interact with your peers. However, this is subject to the COVID-19 situation and guidelines provided by the Institute. The cost of travel and accommodation will be borne by the learners. However, the campus immersion module is optional.
Please note that the course fees is non-refundable and we will be at every step with you for your upskilling and professional growth needs.
To be eligible for getting into the placement pool, the learner has to complete the course along with the submission of all projects and assignments. After this, he/she has to clear the Placement Readiness Test (PRT) to get into the placement pool and get access to our job portal as well as the career mentoring sessions.
Due to any reason you want to defer the batch or restart the classes in a new batch then you need to send the batch defer request on [email protected] and only 1 time batch defer request is allowed without any additional cost.
Learner can request for batch deferral to any of the cohorts starting in the next 3-6 months from the start date of the initial batch in which the student was originally enrolled for. Batch deferral requests are accepted only once but you should not have completed more than 20% of the program. If you want to defer the batch 2nd time then you need to pay batch defer fees which is equal to 10% of the total course fees paid for the program + Taxes.
Yes, Intellipaat certification is highly recognized in the industry. Our alumni work in more than 10,000 corporations and startups, which is a testament that our programs are industry-aligned and well-recognized. Additionally, the Intellipaat program is in partnership with the National Skill Development Corporation (NSDC), which further validates its credibility. Learners will get an NSDC certificate along with Intellipaat certificate for the programs they enroll in.
What is included in this course?