• Have any questions?
  • +91 9606333101/2
  • support@juxhub.com


500 Hours

Content Provider:

Check Point Software Technologies Ltd

Mode of Delivery:


Course Start Date:

8th July, 2019



Cyber Security is one of the biggest threat as well as opportunity in the contemporary world. Unemployment among information security professionals sits at only 2% globally. 

The program is designed by industry leaders and professionals with the idea of cultivating high-demand industry skilled workforce. The program also enables students to achieve the highest competency level, cognition and knowledge, which results in a high compensation, thriving and lucrative career. With unlimited opportunities, a post-graduation program is the perfect investment for a successful career across the world. 

The course prepares the students to take up global certification exams like CCSA, CEH etc

On Request

Enquire Now

Key Topics Covered

    Foundation Module:

    • Programming Fundamentals & Agile Methodology Using RAPTOR
    • Java
    • Python
    • Linux

    Advanced Topics:

    • Computer Network & Defence Fundamentals
    • Infrastructure & Network Security
    • Ethical Hacking
    • Security Analytics
    • Vulnerability Assessment
    • Penetration Testing

Feature of the program

UNIVERSITY Certification along with Alumni Status - National / International

Pre Read Online Self-Paced content – Technical

Access to Career Building Soft Skill Self-Paced online Content 

Instructors (Faculty) from Industry

3-5 Industry Projects certified by companies

Well Crafted Workshops and Guest Lectures Delivered from Industry Experts 

Support to Participate in Hackathons and Hiring Challenges

Support to Publish Journals and Research Papers

24*7 LMS Support System

Placement Assistance

Who can take this program

Whether you want to acquire the right skill-set to start, grow in your current role or transition into a new role, this program is just right for you.

  • Working Professionals
  • Entrepreneurs
  • Graduates


  • Bachelor's Degree with a minimum of 50% aggregate marks in graduation or equivalent (e.g. B.E/B. Tech/B. Sc/BCA)
  • Preferably with - Computer Science / Electronics / Telecommunications / Electrical / Instrumentation background with adequate preparation in Mathematics, Statistics and Computer Programming.


1.Computer Network & Defense Fundamentals (Infrastructure & Network Security)
    • Network Security Threats, Vulnerabilities, & Attacks
    • Network Security Controls, Protocols, & Devices 
    • Network Security Policy Design & Implementation
    • Physical Security 
    • Host Security
    • Secure Firewall Configuration & Management
    • Secure IDS Configuration & Management
    • Secure VPN Configuration & Management
    • Wireless Network Defence
    • Network Traffic Monitoring and Analysis
    • Network Risk and Vulnerability Management
    • Data Backup and Recovery
    • Network Incident Response and Management
2.Ethical Hacking
    • Introduction to Ethical Hacking
    • Foot printing and Reconnaissance
    • Scanning Networks
    • Enumeration
    • System Hacking
    • Malware Threats
    • Sing
    • Social Engineering
    • Denial of Service
    • Session Hijacking
    • Hacking Web servers
    • Hacking Web Applications
    • SQL Injection
    • Hacking Wireless Networks
    • Hacking Mobile Platforms
    • Evading IDS, Firewalls, and Honeypot
    • Cloud Computing
    • Cryptography
3.Security Analysis (Vulnerability Assessment & Penetration Testing)
    • Security Analysis and Penetration Testing Methodologies
    • TCP IP Packet Analysis
    • Pre-penetration Testing Steps
    • Information Gathering Methodology
    • Vulnerability Analysis
    • External Network Penetration Testing Methodology
    • Internal Network Penetration Testing Methodology
    • Firewall Penetration Testing Methodology
    • IDS Penetration Testing Methodology
    • Web Application Penetration Testing Methodology
    • SQL Penetration Testing Methodology
    • Database Penetration Testing Methodology
    • Wireless Network Penetration Testing Methodology
    • Mobile Devices Penetration Testing Methodology
    • Cloud Penetration Testing Methodology
    • Report Writing and Post Test Actions

Industry Projects

Learn through real-life industry projects sponsored by top companies across industries

Tools & Applications


Mr. Venugopal N

Director – Security Engineering, Check Point Software Technologies (India) Ltd.

Mr. Shaik J. Ahmed

Senior Director – Head Cyber Security, Consulting & Advisory Services, Virtusa.

Mr. Ashok Sharma

Co-Founder & CTO, QOS Technology

Mr. Sunil Chandrasekhar

Head of Platform Engineering, McAfee Software India Private Limited

Mr. Sridhar Govardhan

Chief Information Security Officer, Wipro Limited

Ms. Satyavathi Divadari

Director - Cyber Security, Cognizant Technology Solutions

Mr. Ram Kumar G

Strategic Information Security Leader - India


Why should I join this program?
The program is interactive and engaging, designed specifically to master Cyber Security skills and accelerate entry into Cyber Security career.
How is this course structured?
The course will be delivered through weekend classroom sessions and expect to carry out several industry-relevant scenarios and projects.
What is the mode of assessment?
Assessment will be conducted via practicals and written examination.

Suitable Job Roles

  • Penetration Tester
  • Security Systems Administrator
  • Ethical Hacker
  • Cyber Security Consultant
  • Information Security Analyst
  • Malware Analyst
  • Forensic Analyst
  • Security Engineer On Mobile Devices
  • Security Auditor
  • Security Manager


MS. Rashmi K

As I reviewed most of the courses from many other universities this was the only course which was giving two programming languages (python and Java) which are relevant to today's situation. Key feature of this course is going to be in depth knowledge of Cyber Security training and basics of networking. This course also contains vocational training which will help us in our future career

Security Operations Professional at IBM

Mr. Ronald

Mr. Ronald (international student from Ivory Coast), pursing PG Diploma in Cyber Security “I am finding the Post Graduate Diploma of Information Technology as a good opportunity for me to learn and get experience through internship in company. I am grateful for this opportunity offered by Jain University and I hope that future candidates will get more benefit from this program.”

ABIBA Systems

Mr. Hitesh Bhardwaj

Pursing PG Diploma in Cyber Security “This program has opened up my thinking of the broad and vast industry requirements. I'm thankful for the University for providing the Faculty from the industry who know what to teach and they advised me about what can be done after the course. They are always motivating us to learn more to meet upto the industry expectations.”

TSB Bank – Analyst

Mr.Sathya Vamshi

Pursing PG Diploma in Cyber Security “A flexible, working professional friendly, modern day program focused on industry oriented knowledge in Information Technology and which boosts the skills and uplifts the overall profile”

Security Analyst, Wipro Technologies

Mr.Aravind Sai

Pursing PG Diploma in Cyber Security “I found the course interesting and challenging. I learnt a lot by following the programme it has been a truly valuable experience for me and i have learnt so much from all your constructive input and guidance.”    


Ask us everything about the program

Full Name
Mobile No.