Search
PG Diploma in Cyber Security
Eligibility: Graduation | Fees: Rs. 1,50,000 | Duration: 1 Year
| SEMESTER I | SEMESTER II |
|---|---|
| 1. Introduction to Ethical Hacking Module | 17. Business & Technical Logistics of Pen Testing |
| 2. Linux Fundamentals | 18. Linux Fundamentals Module |
| 3. Protocols Module | 19. Information Gathering Module |
| 4. Cryptography | 20. Detecting Live Systems |
| 5. Password Cracking Module | 21. Enumeration |
| 6. Malware | 22. Vulnerability Assessments |
| 7. Security Devices | 23. Malware Goes Undercover |
| 8. Information Gathering – Passive Reconnaissance | 24. Windows Hacking |
| 9. Social Engineering | 25. Hacking UNIX/Linux |
| 10. Active Reconnaissance Module | 26. Advanced Exploitation Techniques |
| 11. Vulnerability Assessment | 27. Pen Testing Wireless Networks Module |
| 12. Network Attacks | 28. Networks, Sniffing and IDS |
| 13. Hacking Servers | 29. Injecting the Database |
| 14. Hacking Web Technologies Module | 30. Attacking Web Technologies |
| 15. Hacking Wireless Technologies Module | 31. Project Documentation |
| 16. Maintaining Access and Covering Tracks | 32. Securing Windows w/ Powershell |
| 33. Pen Testing with Powershell |
SPECIALIZATION
| OPTION 1 – DIGITAL FORENSIC | OPTION 2 – CLOUD SECURITY |
|---|---|
| 1. Digital Evidence Concepts | 1. Introduction to Cloud Computing and Architecture |
| 2. Network Evidence Challenges | 2. Cloud Risks |
| 3. Network Forensics Investigative Methodology | 3. ERM and Governance |
| 4. Network-Based Evidence | 4. Legal Issues |
| 5. Network Principles Module | 5. Virtualization |
| 6. Internet Protocol Suite | 6. Data Security |
| 7. Physical Interception | 7. Data Center Operations |
| 8. Traffic Acquisition Software | 8. Interoperability and Portability |
| 9. Live Acquisition | 9. Traditional Security |
| 10. Analysis | 10. BCM and DR |
| 11. Layer 2 Protocol | 11. Incident Response |
| 12. Wireless Access Points | 12. Application Security |
| 13. Wireless Capture Traffic and Analysis | 13. Encryption and Key Management |
| 14. Wireless Attacks | 14. Identity, Entitlement and Access Management |
| 15. NIDS_Snort | 15. Auditing and Compliance |
| 16. Centralized Logging and Syslog | |
| 17. Investigating Network Devices Module | |
| 18. Web Proxies and Encryption | |
| 19. Network Tunneling | |
| 20. Malware Forensics |
| OPTION 3 – WEB APPLICATION SECURIY |
|---|
| 1. Web Application Security |
| 2. OWASP TOP 10 |
| 3. Threat Modeling & Risk Management |
| 4. Application Mapping |
| 5. Authentication and Authorisation attacks |
| 6. Session Management attacks |
| 7. Application Logic attacks |
| 8. Data Validation |
| 9. AJAX attacks |
| 10. Code Review and Security Testing |
| 11. Web Application Penetration Testing |
| 12. Secure SDLC |
| 13. Cryptography |
Note:
- Fees once paid, are not refundable under any cicumstances.