Post Graduate Program in Cyber Security
Talk to our Course Advisor
Our Alumini Work At






About the course
Key Highlights
- Designed for Working Professionals
- 100+ Hours of Recorded Video Tutorials
- 5+ In-class & Capstone projects
- Live Classes- 5 days in a week & one day doubt clearing session
- 50+ Hours Career assistance videos
- Placement Assistance (Job Opportunities Portal, Hiring Drives, Resume Building & more)
- EMI Option Available
- Post Graduate Program Certification from IIBM Institute along with Internship Certificate

- Course Duration: 6 Months
- Eligibility: Any Bachelors degree with 50% or equivalent at graduation, No minimum work experience required
CURRICULUM HIGHLIGHTS
Cyber Security & CEH | Network Security | Cloud Security |
Application Security | Wireless Security | System Security |
Security incident and Event Management SIEM | MultiFactor
Authentication 2FA/3FA | Security and Risk Management |
Network Security–Practical (Gateway Level Security)
VPN (Remote Access VPN, Site to Site VPN, Secure Shell (SSH),
OpenVPN | IT Framework- ISO 27K, ITIL, COBIT, TOGAF, SOX.
PCI-DSS etc. | AWS, Azure, Google, Cloud Concepts, Architecture,
.and Design, Data Security. Hacking Web Servers, Hacking Wireless
Networks, Cloud Computing, SQL Injection, Cryptography |
web application security, common web vulnerabilities and WAF
controls | networking tools like Nmap, curl and Wireshark |
common network security protocols such as TLS/ SSL and Kerberos
concepts involving public keys, certicates and digital signatures
common security tools, like Metasploit, Jon the Ripper, and Mimi
Katz | Routing Protocols, BGP, MPLS, OSPF, ISIS, EIGRP
Firewall, endpoint, Policy, Security | Practicle, Wireshark, NNMAP,
Kali Linux, Metaspolite, openvas | VAPT | NIST, ISO27k, COBIT All
Framework | Digital Evidence | Network Forensics
Understanding Hard Disks and File Systems |
Operating system Ubuntu, Windows, understanding Security
PROGRAMMING LANGUAGES AND TOOLS





Capstone Projects
LMS Capstone Projects
Python Project for Beginners – Alarm Clock with GUI
Unified Threat Management Project
Student Database Management (DBMS) Projects using Oracle
Password Generator Python Project
User Management Project(Security )
Authentication , Authorization and Integrity Project
Hotel Management Project Single Sign-on
CERTIFICATION
On completion of the Post Graduate Program Certification in Cyber Security, aspirants will receive an Industry-endorsed Certificate along with Internship Certificate.
MENTORSHIP
TRAINER

MOHAMMED ZEESHAN FAROOQ
B.Tech (CSIT)
PLACEMENT MENTORS

ANOOP MATHEW
M.Tech (power electronics), MBA-HR, PhD in power quality improvement
