Search
PG Diploma in Cyber Security
Eligibility: Graduation | Fees: Rs. 1,50,000 | Duration: 1 Year
SEMESTER I | SEMESTER II |
---|---|
1. Introduction to Ethical Hacking Module | 17. Business & Technical Logistics of Pen Testing |
2. Linux Fundamentals | 18. Linux Fundamentals Module |
3. Protocols Module | 19. Information Gathering Module |
4. Cryptography | 20. Detecting Live Systems |
5. Password Cracking Module | 21. Enumeration |
6. Malware | 22. Vulnerability Assessments |
7. Security Devices | 23. Malware Goes Undercover |
8. Information Gathering – Passive Reconnaissance | 24. Windows Hacking |
9. Social Engineering | 25. Hacking UNIX/Linux |
10. Active Reconnaissance Module | 26. Advanced Exploitation Techniques |
11. Vulnerability Assessment | 27. Pen Testing Wireless Networks Module |
12. Network Attacks | 28. Networks, Sniffing and IDS |
13. Hacking Servers | 29. Injecting the Database |
14. Hacking Web Technologies Module | 30. Attacking Web Technologies |
15. Hacking Wireless Technologies Module | 31. Project Documentation |
16. Maintaining Access and Covering Tracks | 32. Securing Windows w/ Powershell |
33. Pen Testing with Powershell |
SPECIALIZATION
OPTION 1 – DIGITAL FORENSIC | OPTION 2 – CLOUD SECURITY |
---|---|
1. Digital Evidence Concepts | 1. Introduction to Cloud Computing and Architecture |
2. Network Evidence Challenges | 2. Cloud Risks |
3. Network Forensics Investigative Methodology | 3. ERM and Governance |
4. Network-Based Evidence | 4. Legal Issues |
5. Network Principles Module | 5. Virtualization |
6. Internet Protocol Suite | 6. Data Security |
7. Physical Interception | 7. Data Center Operations |
8. Traffic Acquisition Software | 8. Interoperability and Portability |
9. Live Acquisition | 9. Traditional Security |
10. Analysis | 10. BCM and DR |
11. Layer 2 Protocol | 11. Incident Response |
12. Wireless Access Points | 12. Application Security |
13. Wireless Capture Traffic and Analysis | 13. Encryption and Key Management |
14. Wireless Attacks | 14. Identity, Entitlement and Access Management |
15. NIDS_Snort | 15. Auditing and Compliance |
16. Centralized Logging and Syslog | |
17. Investigating Network Devices Module | |
18. Web Proxies and Encryption | |
19. Network Tunneling | |
20. Malware Forensics |
OPTION 3 – WEB APPLICATION SECURIY |
---|
1. Web Application Security |
2. OWASP TOP 10 |
3. Threat Modeling & Risk Management |
4. Application Mapping |
5. Authentication and Authorisation attacks |
6. Session Management attacks |
7. Application Logic attacks |
8. Data Validation |
9. AJAX attacks |
10. Code Review and Security Testing |
11. Web Application Penetration Testing |
12. Secure SDLC |
13. Cryptography |
Note:
- Fees once paid, are not refundable under any cicumstances.