Your cart is currently empty.
This Advanced Certificate program has been designed to help professionals learn the skills and techniques needed for excelling in their career in Cyber Security. The curriculum has been curated to help you kick start your Cyber Security journey. Develop a rewarding career in the IT industry with this Advanced certification program.
Upskill for Your Dream Job
About the Program
Free Career Counselling
We are happy to help you 24/7
About E&ICT, IIT Guwahati
IIT Guwahati is the 6th IIT established in India. Since 1994, the institute has been at the forefront of engineering and technology education globally. This advanced certification program is in partnership with E&ICT Academy, IIT Guwahati. E&ICT, IIT Guwahati is an initiative of MeitY (Ministry of Electronics and Information Technology, Govt. of India) andRead More..
Achievements- IIT Guwahati
Upon the completion of this program, you will receive:
They analyze and assess vulnerabilities in the infrastructure, detect vulnerabilities, and recommend solutions and best practices.
These professionals perform security monitoring and investigations and utilize new technologies and processes to enhance security capabilities.
They use encryption to secure information or build security software. They can also develop stronger encryption algorithms.
Designs a security system or major components of a security system, and heads a security design team building in a new security system.
These professionals Install and manage organization-wide security systems.
They develop security software and integrate or implement security into applications software.
Risk Analysis and Mitigation
Module 1: Introduction to Cyber Security
1.1 What is Cyber Security
1.3 Need and Importance
1.4 Different verticals
Module 2: Network Security
2.1 Security Controls
2.2 Networking Concepts
2.3 Traffic Analysis
2.4 Packet Analysers
Module 3: Identity and Access Management (IAM)
3.1 Logical/Physical Access to Assets Management
3.2 Authentication and Identification Management
3.3 Integrating Identity as a Third-Party Service
3.4 Mechanism of Authorization
3.5 Provisioning Life Cycle’s Identity and Access
Module 4: Web Application Penetration Testing
4.1 OWASP Tools and Methodologies
4.2 Insecure Deserialization
4.4 Black Box Testing
4.5 White Box Testing
4.8 Symmetric/Asymmetric Cryptography
4.10 Digital Signatures
4.11 API Security
4.12 Patch Management
Module 5: Malware Analysis
Module 6: Ethical Hacking
6.2 Foot Printing and Reconnaissance
6.3 Scanning Networks
6.5 Vulnerability Analysis
6.6 System Hacking
6.8 Social Engineering
6.10 Session Hijacking
6.11 Evading IDS
6.12 Firewalls and Honeypots
6.13 Hacking Web Servers
6.14 SQL Injection
6.15 Hacking – Wireless Networks
6.16 Mobile Platforms
Module 7: Software Development Security
7.1 Security Controls for The Development Environment
7.2 Life Cycle Security
7.3 Impact of Acquired Software Security
7.4 Effectiveness of Software Security.
Module 8: Cloud Security
At a Glance
The application is free and takes just 10-15 minutes to complete.
All the projects included in this program are aligned with the industry demands and standards. These industry-oriented projects will test your level of knowledge in the Cyber Security domain and also help you get exposure to real-life scenarios.
Removing and Retrieving Files
This project allows you to retrieve your deleted files and know the location of deleted files existing in the system or database. As part of this project, you will also create a report of all the available Data Recovery tools.
In this SQL Injection Cyber Security attack, you will be making a report on the SQL vulnerability and submit it. This can be an interesting project for candidates having good knowledge of Python.
This project equips the candidate with the right skills and knowledge to make a password analyzer software. Going one step ahead, you can also suggest a strong password to the user that is not prone to attacks.
Break A Caesar Cipher
Using the logic behind the cipher, you will develop a small web app that can decrypt the Caesar cipher. This project is easy and will boost your confidence to take up advanced-level projects in Cyber Security.
In this project, you will be analyzing network traffic to keep surveillance on all the outgoing and incoming data packets. You will build a network analyzer and will submit a report.
Hacking an Offline Device
While performing this project, you need to collect information on the number of ways that an intruder can illegally access from an offline device. You will submit the report containing methods to secure devices like mobile phones, laptops, etc.
Credit Card Fraud Detection
In this project, you will be working on a system that analyzes users’ transactions and their behaviors. Based on this research, your system will ascertain parameters for any unusual behavior in the system like false passwords.
Using basic programming skills, you can develop your own keylogger and capture keystrokes on a system. This project also allows you to learn to manually search a keylogger by digging into the system to end the keylogging process
Preventing Phishing Attacks on Voting Systems Using Visual Cryptography
This project allows you to use visual cryptography and you will also learn to integrate fingerprint techniques in the voting system to uniquely identify every user.
Bypass Client-Side Controls and Attack Authentication
In this project, you will learn to bypass some of the client-side controls placed in the web application to limit the user inputs. You will also learn to disrupt authentication functions in the attacking authentication sessions.
Intrusion Detection System with Self-programming Functionality
In this project, you will learn to detect any intrusion on the system and also create a fake program to create a fake system. You will create fake countermeasures to prevent and secure the original application and track the attack pattern.
Via Intellipaat PeerChat, you can interact with your peers across all classes and batches and even our alumni. Collaborate on projects, share job referrals & interview experiences, compete with the best, make new friends – the possibilities are endless and our community has something for everyone!
Career Oriented SessionsThroughout the course
Over 20+ live interactive sessions with an industry expert to gain knowledge and experience on how to build skills that are expected by hiring managers. These will be guided sessions and that will help you stay on track with your up skilling objective.
Resume & LinkedIn Profile BuildingAfter 70% of course completion
Get assistance in creating a world-class resume & Linkedin Profile from our career services team and learn how to grab the attention of the hiring manager at profile shortlisting stage
Mock Interview PreparationAfter 80% of the course completion.
Students will go through a number of mock interviews conducted by technical experts who will then offer tips and constructive feedback for reference and improvement.
1 on 1 Career Mentoring SessionsAfter 90% of the course completion
Attend one-on-one sessions with career mentors on how to develop the required skills and attitude to secure a dream job based on a learners’ educational background, past experience, and future career aspirations.
3 Guaranteed InterviewsAfter 80% of the course completion
Guaranteed 3 job interviews upon submission of projects and assignments. Get interviewed by our 400+ hiring partners.
Exclusive access to Intellipaat Job portalAfter 80% of the course completion
Exclusive access to our dedicated job portal and apply for jobs. More than 400 hiring partners’ including top start-ups and product companies hiring our learners. Mentored support on job search and relevant jobs for your career growth.
The application process consists of three simple steps. An offer of admission will be made to selected candidates based on the feedback from the interview panel. The selected candidates will be notified over email and phone, and they can block their seats through the payment of the admission fee.
Tell us a bit about yourself and why you want to join this program
An admission panel will shortlist candidates based on their application
Selected candidates will be notified within 1–2 weeks
Total Admission Fee
Get a chance to win a scholarship of up to 40%
Admissions are closed once the requisite number of participants enroll for the upcoming cohort. Apply early to secure your seat.
|Program Induction||26th Sep 2021||08:00 PM IST||Weekend (Sat-Sun)|
|Regular Classes||03rd Oct 2021||08:00 PM IST||Weekend (Sat-Sun)|
The program offers holistic training in Cyber Security. The advanced certification, offered by E&ICT, IIT Guwahati is aligned with the industry requirements and will enable you to crack interviews at top MNCs.
You will be taught by the top industry practitioners and the course has been designed in consultation with the IIT Guwahati faculty.
In circumstances where you miss a live class, you will be given the recording of the class within the next 12 hours. Also, if you need any support, you will have access to our 24/7 technical support team for any sort of query resolution.
To complete this program, it is suggested to spare around 6-8 hours a week towards learning.
Career services will be provided by Intellipaat in which you will receive guaranteed three interviews upon successful completion of the course. E&ICT Academy, IIT Guwahati will provide the certificate upon completion of the course.
Yes. you can reach out to the course advisors to know more about scholarship opportunities.
This advanced certification program is conducted online for 9 months led by multiple live instructor-led sessions.
What is included in this course?
I’m Interested in This Program