IIT Guwahati Post Graduate Certificate Program in Cybersecurity

IIT Guwahati Post Graduate Certificate Program in Cybersecurity

Programme Start Date: 28th May, 2022 | Admission: Open

Apply Now


Live online instructor-led sessions (Direct-to-Device)


9 Months


22nd May, 2022


₹2,00,000 + GST


Saturday & Sunday – 2:00 p.m. to 4:00 p.m.


hiring partner
hiring partner
hiring partner
hiring partner
hiring partner
hiring partner


in QS World University Rankings 2022


in NIRF 2021 – Overall


in NIRF 2021 – Engineering Category


in NIRF 2021 – Research Category


in India Today Ranking 2021 – Engineering Category


in The Week Ranking 2021 – Engineering Category


in Outlook-ICARE Engineering Ranking 2021


in QS Asia University Ranking 2021

Course Highlights


Contextually designed 9 months programme for professionals from IT background


Designed for working executives with weekend lectures


Comprehensive curriculum covering fundamental to advanced topics


Live online classes via Direct-2-Device (D2D) mode


Demonstrative capstone project & real business use cases


5 days of campus immersion

Apply Now

Career Support

1:1 Industry mentorship

based on individual profile

Industry expert speak

to learn first-hand from industry practitioners

Online Portfolio Builder

to showcase your projects

LinkedIn profile review

for creating an impressive profile

AI powered resume builder and resume reviews

enabling easy application to various job opportunities

250+ recruitment partners
11,000+ learners placed
25,000+job opportunities generated in the last 3 years




  • Any Bachelor’s degree with a minimum of 50% aggregate marks
  • Working professional with a minimum of two years of experience in IT/Software Development

Programme Duration

Programme Delivery

  • Sessions will be conducted via a state-of-the-art Interactive Learning (IL) platform and delivered in Direct-to-Device (D2D) mode that can be accessed by learners on their desktop, laptop, tablet or smartphone.

Programme Roadmap


  • Introduction to Linux
  • Linux concepts
  • Linux system start up
  • Command Line Interface
  • Command line operations
  • File Operations
  • Network Operations
  • Shell Scripting"
    Learning Outcome

  • Learning and understanding the Linux Operating system is the key essential factor.
  • You will learn the Linux File system, Linux Command Line operations, File operations, Linux Shell Script Programming, Linux Network Configurations, User and Group Creations.


  • What is information security?
  • Identification & Authentication
  • Access Control
  • Security Architecture and Engineering
    Learning Outcome

  • Knowledge of Cyber Security for every individual and organization to keep the resources secured from attacks. In this module, you will get to know the best practices and standards of Information security like CIA, Access Control mechanism.


  • Foundations of encryption
  • Classical Cryptosystem
  • Data Encryption Standards (DES)
  • Stream Cipher
  • Public Key Cryptosystems
  • Knapsack Cryptosystem, RSA Cryptosystem
  • Hash functions
  • Universal hashing, cryptographic hash functions, SHA
    Learning Outcome

  • Cryptography is one of the key integrating factor in contributing to information security. In this module you will learn various cryptographic primitives and standards that includes cryptographic algorithms, protocols, Hash functions and their applications.


  • Key distribution
  • Transport layer security
  • Internet protocol security
  • Wireless security
  • Email security
  • Network Monitoring / Intrusion detection system
  • Virtual private network and firewall (SP)
    Learning Outcome

  • Network security is essential to reduce the risk of data loss, theft and preventing the cyber attacks on network resources. In this module you will learn factors which drives the network security. Identify and classify the examples of the attacks, various protocols and its importance.


  • Common web security vulenrabilitites
  • SQL injection
  • DDoS
  • Cross Site Scripting
  • Data breach
  • Web application firewall
  • DDoS mitigation
  • DNS security
  • Use of encryption
    Learning Outcome

  • Securing any application from the attacker is most important as per as data is concerned. In this module you will learn various types of vulnerabilities, types of attack and its mitigation techniques.


  • Hacking and ethical hacking concepts
  • hands-on labs on information security testing, penetration testing
  • Information security Laws & Regulations
    Learning Outcome

  • Information about the ethical hacking is important to explore its application in Cyber Security. In this module you will get to know basic concept of hacking, its lab demonstration also the information about Cyber Laws.


  • Cyberphysical system security
  • IoT security
  • Cyberforensics
  • Cloudsecurity
    Learning Outcome

  • Its utmost important to know latest trends and tricks the attackers are using to breach the information or data security. In this module you will learn basic information of various emerging threats and its preventive measures.


  • Variables and Data types, Strings, Operators
  • Introduction to OOPs concepts: Abstraction, Encapsulation, Inheritance, Polymorphism
  • Classes and Objects, Methods, Inbuilt classes
  • Conditions & Loops: If-else, For, While, do while, Switch
  • Arrays
  • Interfaces
  • Error handling
  • Collection interface
  • Files :input output stream, reading and writing files

Case Study Project
1. Linux Bash shell Programming.
2. Linux Programming w.r.t. kernel modules and OS Services.
3. Hands on experience of Types of Attacks, Threats, and mitigation.
4. Identification of Security Risks and security policies.
5. Implementation of cryptographic algorithms and functions.
6. Cryptographic Hash Functions and applications.
7. Network Architecture, Cyber-attack patterns and their mitigation.
8. Penetration testing for DoS and DDoS attack.
9. Web Application and Web Server attack methods, Pen Testing and Security Tools.
10. Cyber Security Threat Hunting.
11. Understanding of Cyber Crimes and Cyber Laws.
12. IoT hacking methodology, hacking tools and Pen Testing.
13. Cyber Forensics Investigation of the Compromised computer System

Disclaimer: ‘*IIT Guwahati/Times TSW reserves the right to modify, amend or change the structure of module delivery & the curriculum/tools.


Months course



Faculty Profiles

Dr. Parmeswar K. Iyer

Professor, Department of Chemistry & Center for Nanotechnology, IIT Guwahati

Dr. Iyer received his PhD in Chemistry from the CSIR-CSMCRI, Bhavnagar, India, in 1999. In 2004, he joined as a Faculty at IIT Guwahati. His research interests include the design and development of functional materials and their applications in photovoltaics, LED, transistors, etc. He has more than 200 International Journal Publications and received several National and Internationl Awards.

Dr. Sushanta Karmakar

Associate Professor, Department of Computer Science and Engineering, IIT Guwahati

Sushanta Karmakar received his PhD in Computer Science and Engineering from IIT Kharagpur, India, in 2009. He received his B.E. and M.E., both in Computer Science and Engineering from Jadavpur University, Kolkata, in 2001 and 2004, respectively. He is an Associate Professor in the Department of Computer Science and Engineering at IIT Guwahati, India, since April 2016. His research interest lies in distributed graph algorithms and algorithms for various networks. He is a member of the ACM.

Dr. Manas Khatua

Assistant Professor, Department of Computer Science and Engineering, IIT Guwahati

Dr. Manas Khatua is working as Assistant Professor in the Dept. of Computer Science and Engineering, Indian Institute of Technology Guwahati, India, since May 2018. Prior to that, he was an Assistant Professor in the Dept. of Computer Science and Engineering, Indian Institute of Technology Jodhpur, from 2016 to 2018, and was a Postdoctoral Research Fellow at Singapore University of Technology and Design, Singapore, from 2015 to 2016. He completed his PhD in Wireless Networks from the Indian Institute of Technology Kharagpur, India. He passed M.Tech. in Information Technology from Bengal Engineering and Science University, Shibpur, India, and B.Tech. in Computer Science & Engineering from the University of Kalyani, India. He was associated with Tata Consultancy Services (India) for two and half years and worked as a Lecturer at Bankura Unnayani Institute of Engineering, India, for more than two years. His research interests include Performance Evaluation of Communication Protocols, Internet of Things, Wireless Networks, Sensor Networks, Network Security, Cloud and Edge Computing, and Cyber Physical Systems. He is the author of many reputed international journals and conference publications. He is a member of IEEE and ACM.

Post Graduate Certificate Program in Cybersecurity

Certificate of Completion from IIT Guwahati

Joint certification from IIT Guwahati and TSW
Minimum 50% score to be secured for certification


250+ Hiring Partners

hiring partner
hiring partner
hiring partner
hiring partner
hiring partner
hiring partner
hiring partner

About IIT Guwahati

About IIT Guwahati

About TSW

About TSW

Programme Fees

Note: "In case the candidate rejects the offer from the Institute then the processing fees will be not refunded."

You agree to our terms and conditions and our privacy policy.
Disclaimer: By submitting my contact details here, I override my NDNC registration and authorise TimesTSW and its authorised representatives can contact me