Your cart is currently empty.
This Executive Post Graduate Certification in Ethical Hacking is designed to provide professionals with the skills and techniques they need to kick starting their careers in the field of ethical hacking. Also, get a chance to win big with our course! The top 2 performers from each batch may get a fellowship worth Rs. 80,000, plus the opportunity to showcase their startup ideas and secure incubation support of up to Rs. 50 Lakhs for their startup from iHUB DivyaSampark, IIT Roorkee. Undergraduate studentsRead More..
Watch
Course PreviewLearning Format
Online Bootcamp
Live Classes
11 Months
Executive PG
Certification
Campus Immersion
IIT Roorkee
500+
Hiring Partners
This Executive Post Graduate Certification Program in Ethical Hacking by iHUB DivyaSampark, IIT Roorkee, offers 10 modules and a career-accelerating capstone project to elevate your professional journey. This course will help you gain expertise in Networks, SOC, Application Security, Risk Analysis, and Mitigation via live classes by Industry Expert and master classes by IIT faculty.
About iHUB DivyaSampark, IIT Roorkee
iHUB DivyaSampark aims to enable an innovative ecosystem in new age technologies like AI, ML, Drones, Robots, and data analytics (often called CPS technologies) and become the source for the next generation of digital technologies, products, and services by promoting, enhancing core competencies,Read More..
Key Achievements of IIT Roorkee:
Upon the completion of this program, you will receive:
About the EC-Council
This American organization offers education, training, and services on ethical hacking. The certification by the EC-Council validates the various ethical hacking skills that the learners will be trained in through the program.
Benefits for students from EC-Council
The CISO is responsible for overseeing the organization’s overall cybersecurity strategy and ensuring the implementation of effective security measures. They develop policies, manage risk, and lead incident response efforts.
Security analysts monitor and analyze systems, networks, and applications for potential security threats. They investigate security incidents, perform risk assessments, and implement security controls to protect company assets.
Security engineers design and implement security solutions, including firewalls, encryption systems, and intrusion detection systems. They conduct vulnerability assessments, develop secure architectures, and respond to security incidents.
Network administrators manage and maintain the organization’s computer networks. They configure network devices, monitor network performance, and implement security measures to protect against unauthorized access.
Security architects design and develop security frameworks, policies, and procedures for the organization. They collaborate with stakeholders to define security requirements and ensure that systems are designed with security in mind.
SOC analysts monitor the organization’s systems and networks for security events, triage incidents, and escalate as needed. They analyze security logs, investigate potential threats, and provide real-time responses to security incidents.
Ethical Hacking
Cryptography
Cyber Security
Networks
Application Security
Risk Analysis and Mitigation
1.1 Introduction to Linux OS fundamentals
1.2 Linux Basics – file handling, data extraction, etc.
1.3 Hands-on-Sessions and assignments for practice purpose
2.1 Networking basics- Switches, routers, and wireless access points
3.1 Introduction to Kali Linux
3.2 Services in Kali (HTTP, SSH)
3.3 Command-line utilities (Wget, curl, grep, awk, and many more)
3.4 Key concepts and basics of scripting (Piping, Redirection and Bash Scripting)
3.5 Tools and utilities in Kali Linux ( Netcat, Socat, Powercat, Powershell, etc.)
4.1 Introduction to Ethical Hacking
4.2 Footprinting and Reconnaissance
4.3 Scanning Networks
4.4 Enumeration
4.5 Vulnerability Analysis
4.6 System Hacking
4.7 Malware Threats
4.8 Sniffing
4.9 Social Engineering
4.10 Denial-of-Service
4.11 Session Hijacking
4.12 Evading IDS, Firewalls, and Honeypots
4.13 Hacking Web Servers
4.14 Hacking Web Applications
4.15 SQL Injection
4.16 Hacking Wireless Networks
4.17 Hacking Mobile Platforms
4.18 IoT and OT Hacking
4.19 Cloud Computing
4.20 Cryptography
4.21 Working with Kali Linux 2021.1
5.1 What is Cyber Security
5.2 Overview
5.3 Need and Importance
5.4 Different verticals
6.1 Domain One – Security and Risk Management
6.2 Domain Two – Asset Security
6.3 Domain Three – Security Architecture and Engineering
6.4 Domain Four – Communication and Network Security
6.5 Domain Five – Identity and Access Management (IAM)
6.6 Domain Six – Security Assessment and Testing
6.7 Domain Seven – Security Operations
6.8 Domain Eight – Software Development Security
7.1 SecOps: Protecting, Managing, responding and Monitoring
7.2 Cyber Security threat intelligence salary
7.3 Security data management – Event Logging
7.4 Improved Identification of Incidents using Threat Intelligence
7.5 Incident Response
8.1 Overview of Azure Security
8.2 Active Directory (AD) of Azure for Workloads
8.3 Network Security for the Protection of the Platform
8.4 Host Security for the Protection of the Platform
8.5 Security and Containers
8.6 Role-based Access Control (RBAC) and Security Operations
8.7 Data Services Security
8.8 Security of Storage
This module will teach you how to safeguard a web application against being hacked, along with key considerations when making an app secure. Your capstone project will give you exposure to both sides, giving an understanding of both working environments.
Python Basics
Learn all these concepts along with real time hands on sessions and practice assignments.
All the projects included in this program are aligned with the industry demands and standards. These industry-oriented projects will test your level of knowledge in the Ethical Hacking domain and also help you get exposure to real-life scenarios.
Practice 20+ Essential Tools
Designed by Industry Experts
Get Real-world Experience
Over 10+ live interactive sessions with an industry expert to gain knowledge and experience on how to build skills that are expected by hiring managers. These will be guided sessions and that will help you stay on track with your up skilling objective.
Get assistance in creating a world-class resume & LinkedIn Profile from our career services team and learn how to grab the attention of the hiring manager at profile shortlisting stage
Students will go through a number of mock interviews conducted by technical experts who will then offer tips and constructive feedback for reference and improvement.
Attend one-on-one sessions with career mentors on how to develop the required skills and attitude to secure a dream job based on a learners’ educational background, past experience, and future career aspirations.
Guaranteed 3 job interviews upon movement to the placement pool after clearing the Placement Readiness Test ( PRT). Get interviewed by our 400+ hiring partners.
Exclusive access to our dedicated job portal and apply for jobs. More than 400 hiring partners’ including top start-ups and product companies hiring our learners. Mentored support on job search and relevant jobs for your career growth.
Via Intellipaat PeerChat, you can interact with your peers across all classes and batches and even our alumni. Collaborate on projects, share job referrals & interview experiences, compete with the best, make new friends – the possibilities are endless and our community has something for everyone!
Admission Details
The application process consists of three simple steps. An offer of admission will be made to selected candidates based on the feedback from the interview panel. The selected candidates will be notified over email and phone, and they can block their seats through the payment of the admission fee.
Submit Application
Tell us a bit about yourself and why you want to join this program
Application Review
An admission panel will shortlist candidates based on their application
Admission
Selected candidates will be notified within 1–2 weeks
Total Admission Fee
Admissions are closed once the requisite number of participants enroll for the upcoming cohort. Apply early to secure your seat.
Next Cohorts
Date | Time | Batch Type | |
---|---|---|---|
Program Induction | 27th Apr 2024 | 08:00 PM - 11:00 PM IST | Weekend (Sat-Sun) |
Regular Classes | 27th Apr 2024 | 08:00 PM - 11:00 PM IST | Weekend (Sat-Sun) |
The program provides a holistic education in ethical hacking. The advanced certification offered by iHUB DivyaSampark, IIT Roorkee is aligned with industry requirements and will enable you to interview with leading MNCs.
Intellipaat provides career services that include guaranteed interviews for all learners enrolled in this course. iHUB DivyaSampark, IIT Roorkee is not responsible for career services.
You will be taught by the best practitioners in the industry and the course has been developed in consultation with IIT faculty.
If you miss a live class, you will receive the recording of the class within the next 12 hours. If you need assistance, you’ll also have access to our 24/7 support team to help you with any questions you may have.
To complete this program, it is recommended that you spend approximately 6-8 hours per week studying.
The career service is provided by Intellipaat, where you are guaranteed three interviews upon successful completion of the course. iHUB DivyaSampark, IIT Roorkee issues a certificate upon completion of the course.
Yes. You may contact course advisors to learn more about scholarship opportunities.
This advanced certification program is conducted online for 11 months and is accompanied by several live sessions with instructors.
To be included in the placement pool, the learner must complete the course and submit all projects and assignments. He/she must then pass the PRT (Placement Readiness Test) to be accepted into the placement pool and gain access to our job portal and career mentoring sessions.
From each batch, 2 candidates may get a fellowship of up to Rs. 80,000. Candidates will have to meet certain performance criteria to get selected. The selection of candidates who receive the fellowship will be at the discretion of the iHUB DivyaSampark, IIT Roorkee team. All the students will be informed about the performance criteria during the tenure of the program.
All candidates who apply for this course will be eligible to receive an equity based seed funding and incubation support for their startup from iHUB DivyaSampark, IIT Roorkee. Candidates who enroll will get the chance to pitch their ideas to the iHUB DivyaSampark team. Ideas that get shortlisted may receive funding up to Rs. 50 Lakh and incubation support for their startup.
This Executive Post Graduate Certification in Ethical Hacking will help you pass the Certified Ethical Hacker Certification for CEH v12, Certified Information System Security Professional Certification & Microsoft Certified: Azure Security Engineer Associate (Exam AZ 500).
Please note that the course fees is non-refundable and we will be at every step with you for your upskilling and professional growth needs.
Due to any reason you want to defer the batch or restart the classes in a new batch then you need to send the batch defer request on [email protected] and only 1 time batch defer request is allowed without any additional cost.
Learners can request for batch deferral to any of the cohorts starting in the next 3-6 months from the start date of the initial batch in which the student was originally enrolled for. Batch deferral requests are accepted only once but you should not have completed more than 20% of the program. If you want to defer the batch 2nd time then you need to pay batch defer fees which is equal to 10% of the total course fees paid for the program + Taxes.
What is included in this course?