Programs

PG Diploma in Cyber Security


Eligibility: Graduation | Fees: Rs. 1,50,000 | Duration: 1 Year



SEMESTER I SEMESTER II
1. Introduction to Ethical Hacking Module 17. Business & Technical Logistics of Pen Testing
2. Linux Fundamentals 18. Linux Fundamentals Module
3. Protocols Module 19. Information Gathering Module
4. Cryptography 20. Detecting Live Systems
5. Password Cracking Module 21. Enumeration
6. Malware 22. Vulnerability Assessments
7. Security Devices 23. Malware Goes Undercover
8. Information Gathering - Passive Reconnaissance 24. Windows Hacking
9. Social Engineering 25. Hacking UNIX/Linux
10. Active Reconnaissance Module 26. Advanced Exploitation Techniques
11. Vulnerability Assessment 27. Pen Testing Wireless Networks Module
12. Network Attacks 28. Networks, Sniffing and IDS
13. Hacking Servers 29. Injecting the Database
14. Hacking Web Technologies Module 30. Attacking Web Technologies
15. Hacking Wireless Technologies Module 31. Project Documentation
16. Maintaining Access and Covering Tracks 32. Securing Windows w/ Powershell
33. Pen Testing with Powershell

SPECIALIZATION

OPTION 1 - DIGITAL FORENSIC OPTION 2 - CLOUD SECURITY
1. Digital Evidence Concepts 1. Introduction to Cloud Computing and Architecture
2. Network Evidence Challenges 2. Cloud Risks
3. Network Forensics Investigative Methodology 3. ERM and Governance
4. Network-Based Evidence 4. Legal Issues
5. Network Principles Module 5. Virtualization
6. Internet Protocol Suite 6. Data Security
7. Physical Interception 7. Data Center Operations
8. Traffic Acquisition Software 8. Interoperability and Portability
9. Live Acquisition 9. Traditional Security
10. Analysis 10. BCM and DR
11. Layer 2 Protocol 11. Incident Response
12. Wireless Access Points 12. Application Security
13. Wireless Capture Traffic and Analysis 13. Encryption and Key Management
14. Wireless Attacks 14. Identity, Entitlement and Access Management
15. NIDS_Snort 15. Auditing and Compliance
16. Centralized Logging and Syslog
17. Investigating Network Devices Module
18. Web Proxies and Encryption
19. Network Tunneling
20. Malware Forensics
OPTION 3 - WEB APPLICATION SECURIY
1. Web Application Security
2. OWASP TOP 10
3. Threat Modeling & Risk Management
4. Application Mapping
5. Authentication and Authorisation attacks
6. Session Management attacks
7. Application Logic attacks
8. Data Validation
9. AJAX attacks
10. Code Review and Security Testing
11. Web Application Penetration Testing
12. Secure SDLC
13. Cryptography




Note:
  • Fees once paid, are not refundable under any cicumstances.