DELIVERY TYPE
Live online instructor-led sessions (Direct-to-Device)
COURSE DURATION
9 Months
DEADLINE TO APPLY
22nd May, 2022
COURSE FEE
₹2,00,000 + GST
CLASS TIMINGS
Saturday & Sunday – 2:00 p.m. to 4:00 p.m.
TOP RECRUITMENT PARTNERS
in QS World University Rankings 2022
in NIRF 2021 – Overall
in NIRF 2021 – Engineering Category
in NIRF 2021 – Research Category
in India Today Ranking 2021 – Engineering Category
in The Week Ranking 2021 – Engineering Category
in Outlook-ICARE Engineering Ranking 2021
in QS Asia University Ranking 2021
Course Highlights
Contextually designed 9 months programme for professionals from IT background
Designed for working executives with weekend lectures
Comprehensive curriculum covering fundamental to advanced topics
Live online classes via Direct-2-Device (D2D) mode
Demonstrative capstone project & real business use cases
5 days of campus immersion
Career Support
1:1 Industry mentorship
based on individual profile
Industry expert speak
to learn first-hand from industry practitioners
Online Portfolio Builder
to showcase your projects
LinkedIn profile review
for creating an impressive profile
AI powered resume builder and resume reviews
enabling easy application to various job opportunities
250+ recruitment partners
11,000+ learners placed
25,000+job opportunities generated in the last 3 years
Tools
Eligibility
- Any Bachelor’s degree with a minimum of 50% aggregate marks
- Working professional with a minimum of two years of experience in IT/Software Development
Programme Duration
Programme Delivery
- Sessions will be conducted via a state-of-the-art Interactive Learning (IL) platform and delivered in Direct-to-Device (D2D) mode that can be accessed by learners on their desktop, laptop, tablet or smartphone.
Programme Roadmap
-
Topics
- Introduction to Linux
- Linux concepts
- Linux system start up
- Command Line Interface
- Command line operations
- File Operations
- Network Operations
- Shell Scripting"
-
Learning Outcome
- Learning and understanding the Linux Operating system is the key essential factor.
- You will learn the Linux File system, Linux Command Line operations, File operations, Linux Shell Script Programming, Linux Network Configurations, User and Group Creations.
-
Topics
- What is information security?
- Identification & Authentication
- Access Control
- Security Architecture and Engineering
-
Learning Outcome
- Knowledge of Cyber Security for every individual and organization to keep the resources secured from attacks. In this module, you will get to know the best practices and standards of Information security like CIA, Access Control mechanism.
-
Topics
- Foundations of encryption
- Classical Cryptosystem
- Data Encryption Standards (DES)
- Stream Cipher
- Public Key Cryptosystems
- Knapsack Cryptosystem, RSA Cryptosystem
- Hash functions
- Universal hashing, cryptographic hash functions, SHA
-
Learning Outcome
- Cryptography is one of the key integrating factor in contributing to information security. In this module you will learn various cryptographic primitives and standards that includes cryptographic algorithms, protocols, Hash functions and their applications.
-
Topics
- Key distribution
- Transport layer security
- Internet protocol security
- Wireless security
- Email security
- Network Monitoring / Intrusion detection system
- Virtual private network and firewall (SP)
-
Learning Outcome
- Network security is essential to reduce the risk of data loss, theft and preventing the cyber attacks on network resources. In this module you will learn factors which drives the network security. Identify and classify the examples of the attacks, various protocols and its importance.
-
Topics
- Common web security vulenrabilitites
- SQL injection
- DDoS
- Cross Site Scripting
- Data breach
- Web application firewall
- DDoS mitigation
- DNS security
- Use of encryption
-
Learning Outcome
- Securing any application from the attacker is most important as per as data is concerned. In this module you will learn various types of vulnerabilities, types of attack and its mitigation techniques.
-
Topics
- Hacking and ethical hacking concepts
- hands-on labs on information security testing, penetration testing
- Information security Laws & Regulations
-
Learning Outcome
- Information about the ethical hacking is important to explore its application in Cyber Security. In this module you will get to know basic concept of hacking, its lab demonstration also the information about Cyber Laws.
-
Topics
- Cyberphysical system security
- IoT security
- Cyberforensics
- Cloudsecurity
-
Learning Outcome
- Its utmost important to know latest trends and tricks the attackers are using to breach the information or data security. In this module you will learn basic information of various emerging threats and its preventive measures.
-
Topics
- Variables and Data types, Strings, Operators
- Introduction to OOPs concepts: Abstraction, Encapsulation, Inheritance, Polymorphism
- Classes and Objects, Methods, Inbuilt classes
- Conditions & Loops: If-else, For, While, do while, Switch
- Arrays
- Interfaces
- Error handling
- Collection interface
- Files :input output stream, reading and writing files
Case Study Project
1. Linux Bash shell Programming.
2. Linux Programming w.r.t. kernel modules and OS Services.
3. Hands on experience of Types of Attacks, Threats, and mitigation.
4. Identification of Security Risks and security policies.
5. Implementation of cryptographic algorithms and functions.
6. Cryptographic Hash Functions and applications.
7. Network Architecture, Cyber-attack patterns and their mitigation.
8. Penetration testing for DoS and DDoS attack.
9. Web Application and Web Server attack methods, Pen Testing and Security Tools.
10. Cyber Security Threat Hunting.
11. Understanding of Cyber Crimes and Cyber Laws.
12. IoT hacking methodology, hacking tools and Pen Testing.
13. Cyber Forensics Investigation of the Compromised computer System
Disclaimer: ‘*IIT Guwahati/Times TSW reserves the right to modify, amend or change the structure of module delivery & the curriculum/tools.
Months course
Hours
Faculty Profiles
Post Graduate Certificate Program in Cybersecurity
Certificate of Completion from IIT Guwahati
Joint certification from IIT Guwahati and TSW
Minimum 50% score to be secured for certification
250+ Hiring Partners
About IIT Guwahati
About TSW
Programme Fees
Note: "In case the candidate rejects the offer from the Institute then the processing fees will be not refunded."