PG Diploma in Cyber Security

Eligibility: Graduation | Fees: Rs. 1,50,000 | Duration: 1 Year

SEMESTER ISEMESTER II
1. Introduction to Ethical Hacking Module17. Business & Technical Logistics of Pen Testing
2. Linux Fundamentals18. Linux Fundamentals Module
3. Protocols Module19. Information Gathering Module
4. Cryptography20. Detecting Live Systems
5. Password Cracking Module21. Enumeration
6. Malware22. Vulnerability Assessments
7. Security Devices23. Malware Goes Undercover
8. Information Gathering – Passive Reconnaissance24. Windows Hacking
9. Social Engineering25. Hacking UNIX/Linux
10. Active Reconnaissance Module26. Advanced Exploitation Techniques
11. Vulnerability Assessment27. Pen Testing Wireless Networks Module
12. Network Attacks28. Networks, Sniffing and IDS
13. Hacking Servers29. Injecting the Database
14. Hacking Web Technologies Module30. Attacking Web Technologies
15. Hacking Wireless Technologies Module31. Project Documentation
16. Maintaining Access and Covering Tracks32. Securing Windows w/ Powershell
33. Pen Testing with Powershell

SPECIALIZATION

OPTION 1 – DIGITAL FORENSICOPTION 2 – CLOUD SECURITY
1. Digital Evidence Concepts1. Introduction to Cloud Computing and Architecture
2. Network Evidence Challenges2. Cloud Risks
3. Network Forensics Investigative Methodology3. ERM and Governance
4. Network-Based Evidence4. Legal Issues
5. Network Principles Module5. Virtualization
6. Internet Protocol Suite6. Data Security
7. Physical Interception7. Data Center Operations
8. Traffic Acquisition Software8. Interoperability and Portability
9. Live Acquisition9. Traditional Security
10. Analysis10. BCM and DR
11. Layer 2 Protocol11. Incident Response
12. Wireless Access Points12. Application Security
13. Wireless Capture Traffic and Analysis13. Encryption and Key Management
14. Wireless Attacks14. Identity, Entitlement and Access Management
15. NIDS_Snort15. Auditing and Compliance
16. Centralized Logging and Syslog
17. Investigating Network Devices Module
18. Web Proxies and Encryption
19. Network Tunneling
20. Malware Forensics
OPTION 3 – WEB APPLICATION SECURIY
1. Web Application Security
2. OWASP TOP 10
3. Threat Modeling & Risk Management
4. Application Mapping
5. Authentication and Authorisation attacks
6. Session Management attacks
7. Application Logic attacks
8. Data Validation
9. AJAX attacks
10. Code Review and Security Testing
11. Web Application Penetration Testing
12. Secure SDLC
13. Cryptography
Note:
  • Fees once paid, are not refundable under any cicumstances.
Apply Now
© 2024 | K. C. College of Management Studies