Your cart is currently empty.
This PG certification in Cyber Security & Ethical Hacking by E&ICT Academy, MNIT Jaipur in collaboration with the EC-Council aims to provide extensive training on Cyber Security concepts including risk analysis and mitigation, data security, cloud-based security, ethical hacking, etc. The course is designed by the top faculty at MNIT & Industry expert to help you gain relevant skills required by the Industry and land you in your dream job!
In collaboration with
Upskill for Your Dream Job
E&ICT MNIT Jaipur
This PG certification course in Cyber Security and Ethical Hacking will help you build up and strengthen your academic foundation to help you excel in the domain and gain industry exposure. The skills that you will be learning in this course are all designed to meet the demands of the industry, thus paving the path for your career to grow successfully.
Free Career Counselling
We are happy to help you 24/7
About E&ICT Academy MNIT, Jaipur
Electronics & ICT Academy MNIT, Jaipur (E&ICT MNIT, Jaipur) is an initiative supported by MeitY, Govt of India. The courses provided by us lay an emphasis on bridging the gap between industry demand and academic approach to learning and provide a foundation to build your career in top IT companies.
In this program, you will:
Achievements by MNIT:
About the EC-Council
This American organization offers education, training, and services on Cyber Security. The certification by the EC-Council validates the various cybersecurity skills that the learners will be trained in through the programme.
Benefits for students from EC-Council
They are experts at reverse engineering and exploit vulnerabilities and threats to offer insightful analysis and protect systems.
They perform settings analysis of operating systems and find problems in configurations and fix them.
These professionals monitor client systems and networks to detect and respond to attacks, vulnerabilities, and threats.
These experts are capable of performing user analysis to find trends, patterns, churn, segmentation, behavior, customer value, etc.
Ethical Hackers design security controls, standards, policies, and procedures for the organization’s security.
They oversee computer network systems to prevent potential security breaches as well as maintain system and security updates.
Security and Risk Management
Footprinting and Reconnaissance
Firewalls and Honeypots
Hacking Web Servers
A fellow of IETE and Sr. member of IEEE, he has 100+ research papers and chapters in reputed journals. He has guided 10 PhD theses and many UG/PG dissertations. His research area includes Trust, Integrity & Resilience in Hardware, pedagogy etc.
With 23 yrs in teaching, his research area includes Security, Privacy and Forensics, Cloud Computing,Blockchain etc.He has co-authored “ Fundamentals of Network Forensics” for Springer and is a senior member of the CCICI, IEEE and ACM
Having worked in companies like ICICI, Reliance, Apollo, Murli carries ground level expertise in Information security and Risk management, and has been instrumental in setting up Information security divisions for premier institutions in India.
Vinod carries 18+ years of experience specifically in Identity and Access Management, Cyber Security, Digital Security and Cyber Law. He is also a Certified CISSP, CISA, CISM, and has worked in organizations like PWC, Oracle, TCS and Standard Chartered.
Certified in CISSP and CCSP by (ISC)², and Cyber security Risk management by Harvard University,he carries 14+ yrs of experience with a focus on SIEM solutions & Host Based instruction detection systems,etc. and has worked with top MNCs like Wipro, IBM.
Module 1 – Preliminary Course - Linux Foundation
In this preliminary Linux Foundation course, you will get to learn all the fundamentals of Linux that will help you to move ahead and complete the Cyber Security and Ethical Hacking course successfully.
Hands-on Exercise – Executing basic Linux commands, installing CentOS 8 on VirtualBox and adding guest additions to the installed OS.
Hands-on Exercise – Using VIM, creating users and groups, creating files and directories, assigning file permissions and ownership using chmod and chown, editing files in VIM.
Hands-on Exercise – Executing ps and kill commands on running services, monitoring the OS using top.
Hands-on Exercise – Creating a shell script, writing and executing the shell script, creating a local and a global variable, taking input from the user in a shell script.
Hands-on Exercise – Executing IF, IF-ELSE, Nested IF statements, executing WHILE, UNTIL and FOR statements, executing the case…..esac statement, creating a function in multiple ways, calling a function in a file, calling a function from another file.
Hands-on Exercise – Executing commands using GREP, executing commands using SED, executing commands using AWK, mounting a folder in the Windows OS to the Linux OS, installing VirtualBox guest additions on CentOS 8, extracting zipped files.
Hands-on Exercise – Starting, stopping and restarting Daemon processes, scheduling jobs using cron and crontab, scheduling a one-time task using AT, managing scheduled tasks using ATQ and ATRM.
Hands-on Exercise – Using Top to monitor the OS, installing Htop, using Htop to monitor the OS, filtering and sorting using Htop, installing inotify tools, monitoring a folder using inotifywait, monitoring a folder only for certain events, using the FREE command.
Hands-on Exercise – Downloading and installing MySQL, connecting to MySQL from terminal, querying directly from the terminal, pushing the query result inside a file, CRUD operations from a shell script.
Hands-on Exercise – Executing all the networking commands, using iptables and firewalld, adding and removing ports, resolving IP address in /etc/hosts, looking into a websites IP and nameservers using nslookup and dig.
Module 2 – Certified Ethical Hacking by EC Council
2.1 Introduction to Ethical Hacking
2.2 Footprinting and Reconnaissance
2.3 Scanning Networks
2.5 Vulnerability Analysis
2.6 System Hacking
2.7 Malware Threats
2.9 Social Engineering
2.11 Session Hijacking
2.12 Evading IDS, Firewalls, and Honeypots
2.13 Hacking Web Servers
2.14 Hacking Web Applications
2.15 SQL Injection
2.16 Hacking Wireless Networks
2.17 Hacking Mobile Platforms
2.18 IoT Hacking
2.19 Cloud Computing
Module 3 – Information Systems Security
3.1 Security and Risk Management
3.2 Asset Security
3.3 Security Architecture and Engineering
3.4 Communication and Network Security
3.5 Identity and Access Management (IAM)
3.6 Security Assessment and Testing
3.7 Security Operations
3.8 Software Development Security
Module 4 – Secure Applications, Network & Devices
4.1 Risk Management
4.3 Identity and Access Management
4.4 Tools of the Trade
4.5 Securing Individual Systems
4.6 The Basic LAN
4.7 Beyond the Basic LAN
4.8 Secure Protocols
4.9 Testing Your Infrastructure
4.10 Dealing with Incidents
Module 5 - Capstone Project
Our Cyber Security and Ethical Hacking capstone project will allow you to implement your knowledge and skills gained during this training. Under the guidance of dedicated mentors, you will become capable of solving industry-grade problems through this project. Also, it will mark as the last step towards learning the course and showcasing your skills and knowledge in Ethical Hacking and Cyber Security to your future recruiters.
The application is free and takes just 10-15 minutes to complete.
You will get to work on these following projects:
Practice 100+ Essential Tools
Designed by Industry Experts
Get Real-world Experience
Install LAMP Stack on Centos7 and create a Database for WordPress
Create an account on WordPress as a part of the project, using Flush Privileges to flush its database. Also, learn to successfully install a PHP module. Learners can get the package from the default repositories of CentOS directly.
The learners will be offered cases, where, as a part of the Ethical Hacking team, you need to detect threats and data breaches through in-depth strategies to predict and protect your company from cybercrimes.
Get hands-on learning experience in how to crack wifi passwords. As a core requirement of the project, learners will have to use various tools, techniques, and technologies to effectively crack the WPA/WPA2 Wifi routers.
The project is based on Security Improvement and as IT professionals, learners need to make necessary improvements in the security branches by implementing physical security and performing security control testing.
Security Architectural Requirements
Analyze the current security architectural requirements of the organization through effectively checking the software security effectiveness, security architecture vulnerability, and also the various security requirements.
Business Process Analysis
As an important requirement of the project, implement the BCP along with performing the various business tasks which include job scheduling in order to effectively analyze the various business processes of the e-commerce website.
Improvement of Auditing in the Restaurant
Make necessary improvements in a restaurant’s auditing system using PKI implementation, system resiliency, and more.
The project allows practical know-how to maintain strategic flexibility along with successfully working with numerous cloud services, strategy around unavailability, and various methods of digital marketing strategies.
Data Security of a BPO Firm
Work with the business process outsourcing firms’ machine-generated data in order to look for suspicious activities, anomalies, and the suspected threats. Also, deploy the Splunk SIEM tool to comb through huge volumes of data.
Via Intellipaat PeerChat, you can interact with your peers across all classes and batches and even our alumni. Collaborate on projects, share job referrals & interview experiences, compete with the best, make new friends – the possibilities are endless and our community has something for everyone!
Career Oriented SessionsThroughout the course
Over 20+ live interactive sessions with an industry expert to gain knowledge and experience on how to build skills that are expected by hiring managers. These will be guided sessions and that will help you stay on track with your up skilling objective.
Resume & LinkedIn Profile BuildingAfter 70% of course completion
Get assistance in creating a world-class resume & Linkedin Profile from our career services team and learn how to grab the attention of the hiring manager at profile shortlisting stage.
Mock Interview PreparationAfter 80% of the course completion.
Students will go through a number of mock interviews conducted by technical experts who will then offer tips and constructive feedback for reference and improvement.
1 on 1 Career Mentoring SessionsAfter 90% of the course completion
Attend one-on-one sessions with career mentors on how to develop the required skills and attitude to secure a dream job based on a learners’ educational background, past experience, and future career aspirations.
3 Guaranteed InterviewsAfter 80% of the course completion
Guaranteed 3 job interviews upon submission of projects and assignments. Get interviewed by our 400+ hiring partners.
Exclusive access to Intellipaat Job portalAfter 80% of the course completion
Exclusive access to our dedicated job portal and apply for jobs. More than 400 hiring partners’ including top start-ups and product companies hiring our learners. Mentored support on job search and relevant jobs for your career growth.
The application process consists of three simple steps. An offer of admission will be made to selected candidates based on the feedback from the interview panel. The selected candidates will be notified over email and phone, and they can block their seats through the payment of the admission fee.
Tell us a bit about yourself and why you want to join this program
An admission panel will shortlist candidates based on their application
Selected candidates will be notified within 1 weeks
Total Admission Fee
Get a chance to win a early bird discount of up to $ 99/-
Admissions are closed once the requisite number of participants enroll for the upcoming cohort. Apply early to secure your seat.
|Program Induction||26th Sep 2021||08:00 PM IST||Weekend (Sat-Sun)|
|Regular Classes||26th Sep, 2021||08:00 PM IST||Weekend (Sat-Sun)|
Our Cyber Security and Ethical Hacking online PG course will give you hands-on experience in mastering the concepts of Cyber Security and Ethical Hacking. You will master various topics like system hacking practices, Ethical Hacking enumeration, foot printing, and many more advanced concepts. After completing the course, you will be awarded with PG certification from E&ICT MNIT, Jaipur.
As part of this course, you will work on several real-time projects and assignments that have high relevance in the corporate world. Upon completion of the course, you will be capable of applying for some of the best Cyber Security jobs in top MNCs around the world.
All our trainers are certified professionals in Cyber Security and Ethical Hacking from MNIT, Jaipur and other popular industries with over 12 years of experience in the domain. They went through a rigorous process of selection before signing up as trainers with us for this course.
To get your PG certification in Cyber Security and Ethical Hacking, you have to first sign up for our PG course. You will need to complete the training program, along with all the projects and assignments that are part of the program. Once you meet all the requirements, you will receive your PG certification.f
At Intellipaat, you will receive online training that will provide you with an in-depth understanding of all Cyber Security and Ethical Hacking concepts and you will get the chance to clear all your queries related to the training. Additionally, there are also session recordings available in case you need to refer in the future or if you happen to miss any class.
The PG certification in Cyber Security and Ethical Hacking offers a lifetime validity. You can use it to showcase your skills while applying for jobs in companies.
To get more information about this PG course, you can use the chat window that appears on the right or get in touch with our course advisors.
What is included in this course?
I’m Interested in This Program