Post Graduate Program in Cyber Security

Talk to our Course Advisor

Our Alumini Work At

About the course

Key Highlights

Deskstop Animated Image

CURRICULUM HIGHLIGHTS

Introduction to Cyber Security
Introduction to Ethical Hacking
Foot Printing
Scanning and Enumeration
Hacking Web Servers & Web Applications
Session Hijacking
SQL Injection
Evading Firewalls, IDS & Honeypots What is a Firewall
Buffer Overflow
Denial of Service
Cryptography ISystem Hacking
Sniffers
Phishing
Malware
Wireless Hacking
Kali Linux
Testing
Counter Measure Techniques for Network level attacks
Counter Measure Techniques for Local Systems
Counter Measure Techniques for Malware Attacks
Comptia Network +
Introduction to Networks
The Open Systems Interconnection Specifications
Networking Topologies, Connectors, and Wiring Standards
The Current Ethernet Specifications
Networking Devices
Introduction to the Internet Protocol
IP Addressing
IP Subnetting, Troubleshooting IP
Introduction to IP Routing
Routing Protocols
Switching and Virtual LANs
Wireless Networking
Authentication and Access Control
Network Threats and Mitigation
Physical Security and Risk I Wide Area Networks
Troubleshooting Tools
Software and Hardware Tools
Network Troubleshooting
Management, Monitoring and Optimization
Comptia Security +
Attacks, Threats, and Vulnerabilities
Architecture and Design
Implementation
Operations and Incident Response
Governance, Risk, and compliance
Technologies and Tools
Python
Command line and development environment setup
Python Basics ,opeartors & calculation
All about strings
All about Conditions and loops
List
Tuplets
Dictionary and Data Modelling
Sets
List Compension
Dictionary Compension and sets Compensions
Advanced Flexible Functions
Lambada Expression
Advanced built in function I Decorator
Generator
OOP Basics I OOP Advance Working with files
Working with csv files
Python Modules
First project
Second Project
Gui Programming with Tkinter
Third Project Gui application
Fourth project Gui application
Web Scrapping
Fifth project Gui application
Data base in python
Sixth project Gui application
Seventh project Gui application
Working with pdf files
Regular expression
Cryptography
One or more Gui appilication
Oracle, SQL, PLSQL
DBMS Concepts
Introduction to Oracle
SQL(Standard Query Language)
SQL Commands
Writing the Basics of SQL Statement
Operators are used in select statements
Built in function
Method for converting detail data to summarized data
Constraints
Joins
Subqueries
Sequences I
Index
views (simple view and complex view) , Metarialized views ,synornoms
Introduction
Cursors
Exceptions
Subprograms
Types used in Packages
Bulk PLSQL Bind
Refcursor
UTL File Packages
SQL Loader Triggers
Certified Ethical Hacker (CEH)
Introduction to Ethical Hacking
Foot Printing
Scanning and Enumeration
Hacking Web Servers & Web Applications
Session Hijacking
SQL Injection
Evading Firewalls, IDS & Honeypots What is a Firewall
Buffer Overow
Denial of Service
Cryptography
System Hacking
OT Security
Sniffers
Phishing
Malware Wireless Hacking
Kali Linux
Advance pentest
Testing
Counter Measure
Techniques for Network level attacks
Counter Measure Techniques for Local Systems
Counter Measure Techniques for Malware Attacks
Certified Information Security Manager (CISM)
Information Security Governance
Information Risk Management & Compliance
Information Security Program Development & Management
Information Security Incident Management
Certified Information Systems Security Professional (CISSP) Domain
Introduction to Security and Risk Management
Asset Security
Security Architecture and Engineering
Communication and Network Security
Identity and Access Management (IAM)
Security Assessment and Testing
Security Operations
Software Development Security
Cloud Security
Fundamentals of Cloud Computing and Architectural Characteristics
Security Design and Architecture for Cloud Computing
Secure Isolation of Physical & Logical Infrastructure
Data Protection for Cloud Infrastructure and Services
Enforcing Access Control for Cloud Infrastructure based Services
Monitoring, Auditing and Management
Introduction to Cloud Design Patterns
Introduction to Identity Management in Cloud Computing
Cloud Computing Security Design Patterns – I
Cloud Computing Security Design Patterns – II
Policy, Compliance & Risk Management in Cloud Computing
Cloud Compliance Assessment & Reporting – Case Study
Cloud Service Providers – Technology Review
Wrap Up & Final Projects Review

PROGRAMMING LANGUAGES AND TOOLS

Capstone Projects

LMS Capstone Projects

Python Project for Beginners – Alarm Clock with GUI

Unified Threat Management Project

Student Database Management (DBMS) Projects using Oracle

Password Generator Python Project

User Management Project(Security )

Authentication , Authorization and Integrity Project

Hotel Management Project Single Sign-on

CERTIFICATION

On completion of the Post Graduate Program Certification in Cyber Security, aspirants will receive an Industry-endorsed Certificate along with Internship Certificate.

MENTORSHIP

TRAINER

person image

MOHAMMED ZEESHAN FAROOQ

B.Tech (CSIT)

PLACEMENT MENTORS

ANOOP MATHEW

M.Tech (power electronics), MBA-HR, PhD in power quality improvement

DEVENDRA KUMAR

M.B.A(Marketing & Finance )

Program Fees

Writing in Paper Animated Logo

Fees

INR 25,000

*18% GST Extra

Fees

USD $600

Our Faculty

Person Image

Dinesh Babu R

UrbanPro Excellence Award winner in Data Science Professional
CBAP Certified Professional
Senior Business Analyst in the MNC, Part time, Providing Business Analysis as well as Data Analysis training to both Indian as well as overseas students.
Qualification: P.hd in Data Analysis, MBA (Finance & Operation), B.Tech

Person Image

Ganesh Bhure (Management LDP Program, B.Tech/B.E. (Electronics and Telecommunication))

11yrs into training. Working on various training assignments onPython, Machine Learning, Data Analytics, Artificial Intelligence, Docker and Kubernetes, Leadership and Product Management.

Software professional with 16+yrs of experience. Handled innovation strategic roles, Technical Consultant, Technical Manager, Project Lead, Product Development, Project Management, BusinessAnalysis, Technical Design, Python, C, C++, Docker, Kubernetes, Scale Testing, Product Benchmarking, Data Analytics, Machine Learning, Artificial Intelligence, Data Science.

Person Image

Suryanarayana Murthy (MCA, B.Sc (Electronics))

9.5 Years IT Experience in Big Data Hadoop and PERL as a Developer.
5.5 Years of comprehensive experience as Big Data Developer, Practical exposure and strong knowledge in Big Data management

person image

Boddu Lingaiah (M.Tech (CS), B.Tech (CS))

5+ Year teaching experience in Full Stack Web Development.

Boddu Lingaiah has over 10+ Years of experience as Master Trainer at Edunet Foundation & worked as IT Faculty at KL University and Jain University.
Studied M.Tech at SKEC Karepalli as well as worked as Assistant Professior for 1.3 Year.

Person Image

Abhishek Srivastava (M.Tech (CS), MCA)

IIT Kanpur Certified Data Science Trainer
Teaching experience in Data science, Machine Learning, Deep Learning, Artificial Intelligence
Data Science Trainer with 5+ Years of experience executing Data Driven solution to increase effeciency, accuracy and utility of internal data processing. Experinced to give training on regression models, using predective data modeling and analysing Data scienceAlgorithm to deliver insights and implement action- oriented to business problems.

LINUX

  • Introduction to Linux
  • Root
  • Basic commands
  • Editors
  • OS installation
  • Basic system configuration and administration
  • Understanding files and directories
  • Schedulers
  • User administration
  • Software installation