Your cart is currently empty.
This advanced certification program has been designed to help professionals learn the skills and techniques needed for excelling in their career in Cyber Security. The curriculum has been curated to help you kick start your Cyber Security journey under the guidance of the IIT Guwahati faculty. Develop a rewarding career in the IT industry with this Advanced certification program.
Upskill for Your Dream Job
E&ICT IIT Guwahati
500% salary hike received by a working professional post completion of the course*
Fresher earned 30 LPA salary package on completion of the course*
53% of learners received 50% and above salary hike post completion of the program*
85% of the learners achieved their training objectives within 9 months of course completion*
95% learner satisfaction score post completion of the program/training*
About the Program
The program aims at helping you gain expertise and knowledge in Cyber Security. The IIT Guwahati faculty will help you cover all the required Cyber Security skills such as cryptography, ethical hacking, application security, etc. Also, you will get to master tools such as Linux, SQL, Nikto, and Microsoft Baseline, among others.
Free Career Counselling
We are happy to help you 24/7
About E&ICT, IIT Guwahati
This advanced certification program is in partnership with E&ICT Academy, IIT Guwahati. E&ICT, IIT Guwahati is an initiative of MeitY (Ministry of Electronics and Information Technology, Govt. of India) and formed with the team of IIT Guwahati professors to provide high-quality education programs.
Achievements- IIT Guwahati
Upon the completion of this program, you will receive:
They analyze and assess vulnerabilities in the infrastructure, detect vulnerabilities, and recommend solutions and best practices.
These professionals perform security monitoring and investigations and utilize new technologies and processes to enhance security capabilities.
They use encryption to secure information or build security software. They can also develop stronger encryption algorithms.
Designs a security system or major components of a security system, and heads a security design team building in a new security system.
These professionals Install and manage organization-wide security systems.
They develop security software and integrate or implement security into applications software.
Risk Analysis and Mitigation
Certified in CISSP and CCSP by (ISC)², and Cyber security Risk management by Harvard University,he carries 14+ yrs of experience with a focus on SIEM solutions & Host Based instruction detection systems,etc. and has worked with top MNCs like Wipro, IBM.
Mr. Ranade is the CTO at RAH Infotech Pvt Ltd. He has over 25 years of experience in Techno Commercial, Solution Designing & managing Big Accounts for Cyber Security. His successful profile demonstrates self-motivation, entrepreneurial drive, and creativity.
Mr. Kooliyankal is a Member of BCI (MBCI). He is the executor of many successful Information & Cyber Security Transformation Programs for banks and other institutions. He has 20+ years of core experience in Information Security and 25+ years altogether.
Mr. Deoskar, who has 23 years of experience in the field of Cyber Security, is currently working at Accenture as the Associate Director of Cyber Security. He is skilled in solutions architecture and has served eminent companies like Infosys and Ernst & Young.
The application is free and takes only 5 minutes to complete.
2.1 What is Cyber Security
2.3 Need and Importance
2.4 Different verticals
3.1 Introduction to Kali Linux
3.2 Services in Kali (HTTP, SSH)
3.3 Wget, curl, grep, awk, tail, head, watch, find, locate
3.4 Piping and Redirection
3.5 Python and Bash Scripting
3.6 Netcat, Socat, Powercat, Powershell, Wireshark, tcpdump
3.7 Note taking
4.1 Security Controls
4.2 Networking Concepts
4.3 Traffic Analysis
4.4 Packet Analysers
5.1 Understand the Basic Concepts of Security Information and Event Management (SIEM)
5.2 Discuss the Different SIEM Solutions
5.3 Understand the SIEM Deployment
5.4 Learn Different Use Case Examples for Application-Level Incident Detection
5.5 Learn Different Use Case Examples for Insider Incident Detection
5.6 Learn Different Use Case Examples for Network Level Incident Detection
5.7 Learn Different Use Case Examples for Host Level Incident Detection
5.8 Learn Different Use Case Examples for Compliance
5.9 Understand the Concept of Handling Alert Triaging and Analysis
6.1 Understand the SOC Fundamentals
6.2 Discuss the Components of SOC: People, Processes and Technology
6.3 Understand the Implementation of SOC
7.1 Logical/Physical Access to Assets Management
7.2 Authentication and Identification Management
7.3 Integrating Identity as a Third-Party Service
7.4 Mechanism of Authorization
7.5 Provisioning Life Cycle’s Identity and Access
8.1 OWASP Tools and Methodologies
8.2 Insecure Deserialization
8.4 Black Box Testing
8.5 White Box Testing
8.8 Symmetric/Asymmetric Cryptography
8.10 Digital Signatures
8.11 API Security
8.12 Patch Management
10.2 Foot Printing and Reconnaissance
10.3 Scanning Networks
10.5 Vulnerability Analysis
10.6 System Hacking
10.8 Social Engineering
10.10 Session Hijacking
10.11 Evading IDS
10.12 Firewalls and Honeypots
10.13 Hacking Web Servers
10.14 SQL Injection
10.15 Hacking – Wireless Networks
10.16 Mobile Platforms
11.1 Infrastructure Security: Network level security, Host level security, Application-level security
11.2 Data security and Storage: Data privacy and security Issues, Jurisdictional issues raised by Data location
11.3 Access Control
11.4 Trust, Reputation, Risk
11.5 Authentication in cloud computing, Client access in cloud, Cloud contracting Model, Commercial and business considerations
12.1 Security Controls for The Development Environment
12.2 Life Cycle Security
12.3 Impact of Acquired Software Security
12.4 Effectiveness of Software Security.
In this module, you will learn how to prevent a web application from being hacked as well as what key points to be considered for making an web application secure. This capstone project will give you exposure of both blue team and red team work profile and help you gain exposure on both the sides.
The application is free and takes only 5 minutes to complete.
All the projects included in this program are aligned with the industry demands and standards. These industry-oriented projects will test your level of knowledge in the Cyber Security domain and also help you get exposure to real-life scenarios.
This project allows you to retrieve your deleted files and know the location of deleted files existing in the system or database. As part of this project, you will also create a report of all the available Data Recovery tools.
In this SQL Injection Cyber Security attack, you will be making a report on the SQL vulnerability and submit it. This can be an interesting project for candidates having good knowledge of Python.
This project equips the candidate with the right skills and knowledge to make a password analyzer software. Going one step ahead, you can also suggest a strong password to the user that is not prone to attacks.
Using the logic behind the cipher, you will develop a small web app that can decrypt the Caesar cipher. This project is easy and will boost your confidence to take up advanced-level projects in Cyber Security.
In this project, you will be analyzing network traffic to keep surveillance on all the outgoing and incoming data packets. You will build a network analyzer and will submit a report.
While performing this project, you need to collect information on the number of ways that an intruder can illegally access from an offline device. You will submit the report containing methods to secure devices like mobile phones, laptops, etc.
In this project, you will be working on a system that analyzes users’ transactions and their behaviors. Based on this research, your system will ascertain parameters for any unusual behavior in the system like false passwords.
Using basic programming skills, you can develop your own keylogger and capture keystrokes on a system. This project also allows you to learn to manually search a keylogger by digging into the system to end the keylogging process
This project allows you to use visual cryptography and you will also learn to integrate fingerprint techniques in the voting system to uniquely identify every user.
In this project, you will learn to bypass some of the client-side controls placed in the web application to limit the user inputs. You will also learn to disrupt authentication functions in the attacking authentication sessions.
In this project, you will learn to detect any intrusion on the system and also create a fake program to create a fake system. You will create fake countermeasures to prevent and secure the original application and track the attack pattern.
If you want to learn new technologies from experts, Intellipaat is the best. The trainers are qualified and clarify all the doubts. The support team also helps in resolving any and all queries related to the course.
Intellipaat has the best experienced mentors. I am absolutely satisfied and glad that I learnt new technologies through real life scenarios that will also assist me in cracking interviews.
The training went smoothly from day one. The learning content, trainers, hands-on assignments and quizzes all are perfect. Recording facility is excellent for revising. Also, a prompt support team.
Intellipaat is crystal clear and confident in what they are delivering. The trainers are experts with experience and this helped me get industry-level knowledge to shape my career.
Intellipaat has some of the best trainers and a wonderful curriculum in the market. Amazing support team. I received assistance starting from the registration to the successful course completion.
Happy to have associated with Intellipaat through this amazing course. The learning experience was great through assignments, strong delivery, and a dedicated 24*7 support team.
The best thing that I liked about Intellipaat was the support provided by the career and mentoring team. Now coming to the sessions, they are great and power packed with a lot of information.
I would highly recommend Intellipaat. If you wish to upgrade yourself, Intellipaat is the best place to go. Apart from the quality training, I also received exceptional support from them.
The candidates from Intellipaat were very good. They are better than experienced people from the same domain. The learners had hands-on experience. The product managers were very happy with the job-ready recruits.
Over 10+ live interactive sessions with an industry expert to gain knowledge and experience on how to build skills that are expected by hiring managers. These will be guided sessions and that will help you stay on track with your up skilling objective.
Get assistance in creating a world-class resume & Linkedin Profile from our career services team and learn how to grab the attention of the hiring manager at profile shortlisting stage
Students will go through a number of mock interviews conducted by technical experts who will then offer tips and constructive feedback for reference and improvement.
Attend one-on-one sessions with career mentors on how to develop the required skills and attitude to secure a dream job based on a learners’ educational background, past experience, and future career aspirations.
Placement opportunities are provided once the learner is moved to the placement pool. Get noticed by our 400+ hiring partners.
Exclusive access to our dedicated job portal and apply for jobs. More than 400 hiring partners’ including top start-ups and product companies hiring our learners. Mentored support on job search and relevant jobs for your career growth.
Via Intellipaat PeerChat, you can interact with your peers across all classes and batches and even our alumni. Collaborate on projects, share job referrals & interview experiences, compete with the best, make new friends – the possibilities are endless and our community has something for everyone!
The application process consists of three simple steps. An offer of admission will be made to selected candidates based on the feedback from the interview panel. The selected candidates will be notified over email and phone, and they can block their seats through the payment of the admission fee.
Tell us a bit about yourself and why you want to join this program
An admission panel will shortlist candidates based on their application
Selected candidates will be notified within 1–2 weeks
Total Admission Fee
Admissions are closed once the requisite number of participants enroll for the upcoming cohort. Apply early to secure your seat.
|Program Induction||3rd June 2023||08:00 PM IST||Weekend (Sat-Sun)|
|Regular Classes||3rd June 2023||08:00 PM IST||Weekend (Sat-Sun)|
The program offers holistic training in Cyber Security. The advanced certification, offered by E&ICT, IIT Guwahati is aligned with the industry requirements and will enable you to crack interviews at top MNCs.
Intellipaat provides career services that includes Guarantee interviews for all the learners enrolled in this course. EICT IIT Guwahati is not responsible for the career services.
You will be taught by the top industry practitioners and the course has been designed in consultation with the IIT Guwahati faculty.
In circumstances where you miss a live class, you will be given the recording of the class within the next 12 hours. Also, if you need any support, you will have access to our 24/7 technical support team for any sort of query resolution.
To complete this program, it is suggested to spare around 6-8 hours a week towards learning.
Career services will be provided by Intellipaat in which you will receive guaranteed three interviews upon successful completion of the course. E&ICT Academy, IIT Guwahati will provide the certificate upon completion of the course.
Yes. you can reach out to the course advisors to know more about scholarship opportunities.
This advanced certification program is conducted online for 9 months led by multiple live instructor-led sessions.
There will be a 2-day campus immersion module at E&ICT Academy, IIT-Guwahati during which learners will visit the campus. You will learn from the faculty as well as interact with your peers. However, this is subject to COVID-19 situation and guidelines provided by the Institute. The cost of travel and accommodation will be borne by the learners. However, the campus immersion module is optional.
20% of the program fee is set aside as a non-refundable amount. The balance 80% will be refunded as per the 3-month or 6-month option undertaken by the student on a pro-rata basis. Please speak to the course advisor for more information about the same.
To be eligible for getting into the placement pool, the learner has to complete the course along with the submission of all projects and assignments. After this, he/she has to clear the PRT (Placement Readiness Test) to get into the placement pool and get access to our job portal as well as the career mentoring sessions.
What is included in this course?
I’m Interested in This Program