Cyber Security

The world relies on technology more than ever before. As a result, digital data creation has surged. Today, businesses and governments store a great deal of data on computers and transmit it across networks to other computers. Traditionally cyber security is cantered around the implementation of defensive measures around a defined perimeter to protect the data. This course showcases real life applications of Cyber Security (CyS). The program features hands-on assessments of cyber vulnerabilities, attacks, and defenses. Students devise actionable plans to address real-time CyS challenges in their own organizations. The program has been specifically designed with a strong emphasis on ‘experiential learning’ taught by industry experts catering to the needs of learners with different job roles across various industries for better career growth. The course is provided with Assignments, Case Studies and project works for better understanding of the concepts.

Course Start Date

10th August 2020

Duration

6 Months

Mode of Delivery

Online Instructor Led

About the Program

6 Course in One Programs
About Course

Traditionally cyber security is cantered around the implementation of defensive measures around a defined perimeter to protect the data.

6 Course in One Programs
Dedicated Career Assistance

Get 1:1 career counselling and mock interview sessions with hiring managers. Further your career with our 1000+ hiring partners.

6 Course in One Programs
Curated Mentorship

Work with a dedicated student mentor providing support with every step of the way. Get expert advice on the right career path

Key Highlights

1
Get Certified from Jain (Deemed-to-be university)
2
Curriculum designed by Academia & Industry
3
Instructors from Jain (Deemed-to-be University) and Industry
4
Master Classes – Well Crafted Webinars and Workshops delivered by Industry Experts
5
Access to the latest tools and techniques along with their business applications
6
Weekly Assignments for better understanding of concepts
7
30 Hours of Project Work
8
Curated Mentorship
9
24*7 LMS Support
10
Access to 30 Hours of Career Building Soft Skill Self-Paced Content
11
Dedicated Career Assistance – Webinars on Personality Development & 1:1 Career Counselling Sessions
12
100% Placement Assistance

Who Can Take This Program

Graduates who want to start a career or entry level working professionals who want to upskill and add to their expertise can join this course.

  • Working Professionals (upto 2 years of work experience)
  • Graduate

Curriculum

  • Introduction to Network Security
  • Design and configuration of various enterprise infrastructure 
  • Defending network from attacks
  • Security benchmarks and regulatory requirements 
  • Device- and network-based attacks.
  • Firewall and IDS configuration
  • Securing Windows and Active Directory against specific attacks
  • Overview of securing Private and Public Cloud Infrastructure against common attacks.
  • Case study - Study a recent network breach to identify attack vector and network vulnerabilities
  • Project – Configure and secure network infrastructure using network simulation tools.
  • Introduction to Penetration Testing Concepts
  • Penetration Testing Scoping and Rules of Engagement
  • Online Reconnaissance and Offensive Counterintelligence
  • Network Mapping and Scanning Techniques
  • Enterprise Vulnerability Scanning
  • Network Exploitation Tools and Techniques
  • Web Application Exploitation Tools and Techniques
  • Post-Exploitation and Pivoting
  • OS and Application Exploit Mitigations
  • Reporting and Debriefing
  • Social Engineering
  • Case study – Understand a recent hacking/attack scenario
  • Project – Given a website/web application, exercise the stages of penetration testing to find vulnerabilities with it.
  • Digital Forensics Fundamentals
  • Chain of custody and Forensics report writing
  • Introduction to Incident response digital forensics
  • Network/Internet forensic and anti-forensics
  • Windows/Linux forensics analysis
  • Windows registry investigation steps and technologies
  • Malware and Cloud forensics
  • Advanced artefacts - Loadable kernel module rootkits Steganography hiding, detection and analysis
  • Case study – Forensic analysis of a recent cybercrime investigation and understand the methodology.
  • Project – forensic investigation on an image capture, malware or packet capture and come up with evidence
JUx LEARNING HUB. LEARN THE MOST IN-DEMAND SKILLS

Download Brochure for more information about the program

Course Outcome

Impart the required knowledge that ensures understanding of fundamental concepts, design and controls strategy, technical architecture, tools and techniques to secure information.

Use both application-oriented and student-centric learning to help expand students’ body of knowledge in information protection.

Emphasize the importance of adherence to a high standard of ethical behavior.

Provide a platform for students to not only familiarize themselves in CyS concepts and technologies but also an opportunity to learn some advances in this important area of study.

Create a learning environment that stimulates interest in considering entrepreneurial Avenues.

Career Support

Attend innovative job fairs organised every 2 months across the country. Join in our recruitment drives with top tech companies looking for highly trained professionals.

Program Fee

Payments

Net Banking

Debit / Credit card

Demand Draft

Financial Aid

*Condition Apply. Please reach out to the admissions team for more details

Orientation and Batch Start Date

Online Instructor Led Mode

Batch Start

10th August 2020

Our Hiring Partners

We collaborate with top companies spanning various industrial segments, business models, and sectors.
Our 500+ hiring partners offer students job openings across multiple job roles to suit their skills.

Suitable Job Roles

Are you still confused
about selecting the right course?

We are here to assist you. Submit the form with all your details, and our
career counselors will get back to you at the earliest.