Your cart is currently empty.
This advanced certification program has been designed to help professionals learn the skills and techniques needed for excelling in their career in Cyber Security. The curriculum has been curated to help you kick start your Cyber Security journey under the guidance of the IIT Guwahati faculty. Develop a rewarding career in the IT industry with this Advanced certification program.
Upskill for Your Dream Job
About the Program
The program aims at helping you gain expertise and knowledge in Cyber Security. The IIT Guwahati faculty will help you cover all the required Cyber Security skills such as cryptography, ethical hacking, application security, etc. Also, you will get to master tools such as Linux, SQL, Nikto, and Microsoft Baseline, among others.
Free Career Counselling
We are happy to help you 24/7
About E&ICT, IIT Guwahati
IIT Guwahati is the 6th IIT established in India. Since 1994, the institute has been at the forefront of engineering and technology education globally. This advanced certification program is in partnership with E&ICT Academy, IIT Guwahati. E&ICT, IIT Guwahati is an initiative of MeitY (Ministry of Electronics and Information Technology, Govt. of India) andRead More..
They analyze and assess vulnerabilities in the infrastructure, detect vulnerabilities, and recommend solutions and best practices.
These professionals perform security monitoring and investigations and utilize new technologies and processes to enhance security capabilities.
They use encryption to secure information or build security software. They can also develop stronger encryption algorithms.
Designs a security system or major components of a security system, and heads a security design team building in a new security system.
These professionals Install and manage organization-wide security systems.
They develop security software and integrate or implement security into applications software.
Risk Analysis and Mitigation
He holds a Ph.D from Jadavpur University and has been associated with IIT-G for almost 20 years now. His research area includes Microwave Engineering, Electromagnetics, Wireless communications, Microstrip Antennas etc.
A Ph.D from IIT-Bombay, Prof.Gaurav Trivedi has been with IIT-G since 2011. He has published multiple articles and journals in the domain & his research areas includes Computer Architecture, high performance computing, Machine Learning, etc.
Having worked in companies like ICICI, Reliance, Apollo, Murli carries ground level expertise in Information security and Risk management, and has been instrumental in setting up Information security divisions for premier institutions in India.
Certified in CISSP and CCSP by (ISC)², and Cyber security Risk management by Harvard University,he carries 14+ yrs of experience with a focus on SIEM solutions & Host Based instruction detection systems,etc. and has worked with top MNCs like Wipro, IBM.
2.1 What is Cyber Security
2.3 Need and Importance
2.4 Different verticals
3.1 Introduction to Kali Linux
3.2 Services in Kali (HTTP, SSH)
3.3 Wget, curl, grep, awk, tail, head, watch, find, locate
3.4 Piping and Redirection
3.5 Python and Bash Scripting
3.6 Netcat, Socat, Powercat, Powershell, Wireshark, tcpdump
3.7 Note taking
4.1 Security Controls
4.2 Networking Concepts
4.3 Traffic Analysis
4.4 Packet Analysers
5.1 Understand the Basic Concepts of Security Information and Event Management (SIEM)
5.2 Discuss the Different SIEM Solutions
5.3 Understand the SIEM Deployment
5.4 Learn Different Use Case Examples for Application-Level Incident Detection
5.5 Learn Different Use Case Examples for Insider Incident Detection
5.6 Learn Different Use Case Examples for Network Level Incident Detection
5.7 Learn Different Use Case Examples for Host Level Incident Detection
5.8 Learn Different Use Case Examples for Compliance
5.9 Understand the Concept of Handling Alert Triaging and Analysis
6.1 Understand the SOC Fundamentals
6.2 Discuss the Components of SOC: People, Processes and Technology
6.3 Understand the Implementation of SOC
7.1 Logical/Physical Access to Assets Management
7.2 Authentication and Identification Management
7.3 Integrating Identity as a Third-Party Service
7.4 Mechanism of Authorization
7.5 Provisioning Life Cycle’s Identity and Access
8.1 OWASP Tools and Methodologies
8.2 Insecure Deserialization
8.4 Black Box Testing
8.5 White Box Testing
8.8 Symmetric/Asymmetric Cryptography
8.10 Digital Signatures
8.11 API Security
8.12 Patch Management
10.2 Foot Printing and Reconnaissance
10.3 Scanning Networks
10.5 Vulnerability Analysis
10.6 System Hacking
10.8 Social Engineering
10.10 Session Hijacking
10.11 Evading IDS
10.12 Firewalls and Honeypots
10.13 Hacking Web Servers
10.14 SQL Injection
10.15 Hacking – Wireless Networks
10.16 Mobile Platforms
11.1 Infrastructure Security: Network level security, Host level security, Application-level security
11.2 Data security and Storage: Data privacy and security Issues, Jurisdictional issues raised by Data location
11.3 Access Control
11.4 Trust, Reputation, Risk
11.5 Authentication in cloud computing, Client access in cloud, Cloud contracting Model, Commercial and business considerations
12.1 Security Controls for The Development Environment
12.2 Life Cycle Security
12.3 Impact of Acquired Software Security
12.4 Effectiveness of Software Security.
In this module, you will learn how to prevent a web application from being hacked as well as what key points to be considered for making an web application secure. This capstone project will give you exposure of both blue team and red team work profile and help you gain exposure on both the sides.
The application is free and takes only 5 minutes to complete.
All the projects included in this program are aligned with the industry demands and standards. These industry-oriented projects will test your level of knowledge in the Cyber Security domain and also help you get exposure to real-life scenarios.
This project allows you to retrieve your deleted files and know the location of deleted files existing in the system or database. As part of this project, you will also create a report of all the available Data Recovery tools.
In this SQL Injection Cyber Security attack, you will be making a report on the SQL vulnerability and submit it. This can be an interesting project for candidates having good knowledge of Python.
This project equips the candidate with the right skills and knowledge to make a password analyzer software. Going one step ahead, you can also suggest a strong password to the user that is not prone to attacks.
Using the logic behind the cipher, you will develop a small web app that can decrypt the Caesar cipher. This project is easy and will boost your confidence to take up advanced-level projects in Cyber Security.
In this project, you will be analyzing network traffic to keep surveillance on all the outgoing and incoming data packets. You will build a network analyzer and will submit a report.
While performing this project, you need to collect information on the number of ways that an intruder can illegally access from an offline device. You will submit the report containing methods to secure devices like mobile phones, laptops, etc.
In this project, you will be working on a system that analyzes users’ transactions and their behaviors. Based on this research, your system will ascertain parameters for any unusual behavior in the system like false passwords.
Using basic programming skills, you can develop your own keylogger and capture keystrokes on a system. This project also allows you to learn to manually search a keylogger by digging into the system to end the keylogging process
This project allows you to use visual cryptography and you will also learn to integrate fingerprint techniques in the voting system to uniquely identify every user.
In this project, you will learn to bypass some of the client-side controls placed in the web application to limit the user inputs. You will also learn to disrupt authentication functions in the attacking authentication sessions.
In this project, you will learn to detect any intrusion on the system and also create a fake program to create a fake system. You will create fake countermeasures to prevent and secure the original application and track the attack pattern.
Via Intellipaat PeerChat, you can interact with your peers across all classes and batches and even our alumni. Collaborate on projects, share job referrals & interview experiences, compete with the best, make new friends – the possibilities are endless and our community has something for everyone!
Over 20+ live interactive sessions with an industry expert to gain knowledge and experience on how to build skills that are expected by hiring managers. These will be guided sessions and that will help you stay on track with your up skilling objective.
Get assistance in creating a world-class resume & Linkedin Profile from our career services team and learn how to grab the attention of the hiring manager at profile shortlisting stage
Students will go through a number of mock interviews conducted by technical experts who will then offer tips and constructive feedback for reference and improvement.
Attend one-on-one sessions with career mentors on how to develop the required skills and attitude to secure a dream job based on a learners’ educational background, past experience, and future career aspirations.
Guaranteed 3 job interviews upon submission of projects and assignments. Get interviewed by our 400+ hiring partners.
Exclusive access to our dedicated job portal and apply for jobs. More than 400 hiring partners’ including top start-ups and product companies hiring our learners. Mentored support on job search and relevant jobs for your career growth.
The application process consists of three simple steps. An offer of admission will be made to selected candidates based on the feedback from the interview panel. The selected candidates will be notified over email and phone, and they can block their seats through the payment of the admission fee.
Tell us a bit about yourself and why you want to join this program
An admission panel will shortlist candidates based on their application
Selected candidates will be notified within 1–2 weeks
Total Admission Fee
Admissions are closed once the requisite number of participants enroll for the upcoming cohort. Apply early to secure your seat.
|Program Induction||4th Dec 2021||08:00 PM IST||Weekend (Sat-Sun)|
|Regular Classes||4th Dec 2021||08:00 PM IST||Weekend (Sat-Sun)|
The program offers holistic training in Cyber Security. The advanced certification, offered by E&ICT, IIT Guwahati is aligned with the industry requirements and will enable you to crack interviews at top MNCs.
You will be taught by the top industry practitioners and the course has been designed in consultation with the IIT Guwahati faculty.
In circumstances where you miss a live class, you will be given the recording of the class within the next 12 hours. Also, if you need any support, you will have access to our 24/7 technical support team for any sort of query resolution.
To complete this program, it is suggested to spare around 6-8 hours a week towards learning.
Career services will be provided by Intellipaat in which you will receive guaranteed three interviews upon successful completion of the course. E&ICT Academy, IIT Guwahati will provide the certificate upon completion of the course.
Yes. you can reach out to the course advisors to know more about scholarship opportunities.
This advanced certification program is conducted online for 9 months led by multiple live instructor-led sessions.
There will be a 2-day campus immersion module at E&ICT Academy, IIT-Guwahati during which learners will visit the campus. You will learn from the faculty as well as interact with your peers. However, this is subject to COVID-19 situation and guidelines provided by the Institute. The cost of travel and accommodation will be borne by the learners. However, the campus immersion module is optional.
What is included in this course?
I’m Interested in This Program