Powered by:
Powered by:
IBM
IBM
Cyber Security
Cyber Security
Become a Digital Guardian: Master Cyber Security & Protect Your World (From Hackers to Heroes)
Become a Digital Guardian: Master Cyber Security & Protect Your World (From Hackers to Heroes)
Become a Digital Guardian: Master Cyber Security & Protect Your World (From Hackers to Heroes)
DURATION
3 months
Intensive
MODE
LIVE Online
Intensive
FORMAT
Hybrid
Hands-on, Theoretic
STARTING
June, 2024
Program Details
Program Details
Program Details
Empower yourself to protect the digital world! Our Cyber Security Pre-graduation program equips you with the most sought-after cybersecurity skills. Dive deep into advanced penetration testing frameworks, incident response with industry-standard forensics suites like EnCase and Wireshark, and learn to design secure architectures. Master threat intelligence platforms like ThreatConnect, automate security tasks, and navigate cloud security tools like AWS Security Hub. Additionally, gain proficiency in encryption methods and scripting languages like Python and Bash – the foundations for powerful security automation. Don't wait – graduate with the knowledge and skills to become a cybersecurity leader!
Empower yourself to protect the digital world! Our Cyber Security Pre-graduation program equips you with the most sought-after cybersecurity skills. Dive deep into advanced penetration testing frameworks, incident response with industry-standard forensics suites like EnCase and Wireshark, and learn to design secure architectures. Master threat intelligence platforms like ThreatConnect, automate security tasks, and navigate cloud security tools like AWS Security Hub. Additionally, gain proficiency in encryption methods and scripting languages like Python and Bash – the foundations for powerful security automation. Don't wait – graduate with the knowledge and skills to become a cybersecurity leader!
Empower yourself to protect the digital world! Our Cyber Security Pre-graduation program equips you with the most sought-after cybersecurity skills. Dive deep into advanced penetration testing frameworks, incident response with industry-standard forensics suites like EnCase and Wireshark, and learn to design secure architectures. Master threat intelligence platforms like ThreatConnect, automate security tasks, and navigate cloud security tools like AWS Security Hub. Additionally, gain proficiency in encryption methods and scripting languages like Python and Bash – the foundations for powerful security automation. Don't wait – graduate with the knowledge and skills to become a cybersecurity leader!
Who should enroll?
Who should enroll?
Who should enroll?
- You want to start learning cyber security from scratch.
- You have an interest in understanding how to protect digital information.
- You aim to build a foundation in cyber security to enhance your career prospects.
- You want to develop skills that are highly valued in today's job market.
- You want to start learning cyber security from scratch.
- You have an interest in understanding how to protect digital information.
- You aim to build a foundation in cyber security to enhance your career prospects.
- You want to develop skills that are highly valued in today's job market.
Join our community to learn, connect with like-minded peers, and get updates on the scholarship test
Limited Seats in the Cohort
APPLY NOW
ENROLL NOW
TEACHING PLAN (3 Month Program)
Week 1
Session 1: Introduction to CyberSecurity
- Overview of Cyber Security
- Importance of Cyber Security
- Key Concepts and Terminology
- Common Cyber Attacks
Session 2: Expectations & Career Aspects
- Cyber Security Career Paths
- Skills Required for Cyber Security Professionals
- Certifications and Training
- Industry Demand and Job Opportunities
Session 3: Offensive vs Defensive Security, Malware, Threats & Vulnerabilities
- Offensive Security Techniques
- Defensive Security Strategies
- Types of Malware
- Identifying and Mitigating Threats
- Understanding Vulnerabilities
- Best Practices for CyberSecurity
Week 1
Session 1: Introduction to CyberSecurity
- Overview of Cyber Security
- Importance of Cyber Security
- Key Concepts and Terminology
- Common Cyber Attacks
Session 2: Expectations & Career Aspects
- Cyber Security Career Paths
- Skills Required for Cyber Security Professionals
- Certifications and Training
- Industry Demand and Job Opportunities
Session 3: Offensive vs Defensive Security, Malware, Threats & Vulnerabilities
- Offensive Security Techniques
- Defensive Security Strategies
- Types of Malware
- Identifying and Mitigating Threats
- Understanding Vulnerabilities
- Best Practices for CyberSecurity
Week 1
Session 1: Introduction to CyberSecurity
- Overview of Cyber Security
- Importance of Cyber Security
- Key Concepts and Terminology
- Common Cyber Attacks
Session 2: Expectations & Career Aspects
- Cyber Security Career Paths
- Skills Required for Cyber Security Professionals
- Certifications and Training
- Industry Demand and Job Opportunities
Session 3: Offensive vs Defensive Security, Malware, Threats & Vulnerabilities
- Offensive Security Techniques
- Defensive Security Strategies
- Types of Malware
- Identifying and Mitigating Threats
- Understanding Vulnerabilities
- Best Practices for CyberSecurity
Week 2
Session 4: CIA Triad & Cyber Kill Chain
- Introduction to CIA Triad (Confidentiality, Integrity, Availability)
- Importance of the CIA Triad in Cyber Security
- Understanding the Cyber Kill Chain
- Stages of the Cyber Kill Chain
- Applying the Cyber Kill Chain to Real-world Scenarios
Session 5: Understanding the Pillars of Cyber Security & Phases of a Cyber Attack
- Overview of Cyber Security Pillars
- Key Principles and Best Practices
- Identifying Phases of a Cyber Attack
- Reconnaissance
- Weaponization
- Delivery
- Exploitation
- Installation
- Command and Control (C2)
- Actions on Objectives
Session 6: Mitre ATT&CK Framework & NICE Framework
- Introduction to Mitre ATT&CK Framework
- Navigating and Using the Mitre ATT&CK Framework
- Mapping Attacks to the Framework
- Overview of the NICE Framework
- Categories and Specialty Areas of the NICE Framework
- Applying the NICE Framework to Career Development
Week 2
Session 4: CIA Triad & Cyber Kill Chain
- Introduction to CIA Triad (Confidentiality, Integrity, Availability)
- Importance of the CIA Triad in Cyber Security
- Understanding the Cyber Kill Chain
- Stages of the Cyber Kill Chain
- Applying the Cyber Kill Chain to Real-world Scenarios
Session 5: Understanding the Pillars of Cyber Security & Phases of a Cyber Attack
- Overview of Cyber Security Pillars
- Key Principles and Best Practices
- Identifying Phases of a Cyber Attack
- Reconnaissance
- Weaponization
- Delivery
- Exploitation
- Installation
- Command and Control (C2)
- Actions on Objectives
Session 6: Mitre ATT&CK Framework & NICE Framework
- Introduction to Mitre ATT&CK Framework
- Navigating and Using the Mitre ATT&CK Framework
- Mapping Attacks to the Framework
- Overview of the NICE Framework
- Categories and Specialty Areas of the NICE Framework
- Applying the NICE Framework to Career Development
Week 2
Session 4: CIA Triad & Cyber Kill Chain
- Introduction to CIA Triad (Confidentiality, Integrity, Availability)
- Importance of the CIA Triad in Cyber Security
- Understanding the Cyber Kill Chain
- Stages of the Cyber Kill Chain
- Applying the Cyber Kill Chain to Real-world Scenarios
Session 5: Understanding the Pillars of Cyber Security & Phases of a Cyber Attack
- Overview of Cyber Security Pillars
- Key Principles and Best Practices
- Identifying Phases of a Cyber Attack
- Reconnaissance
- Weaponization
- Delivery
- Exploitation
- Installation
- Command and Control (C2)
- Actions on Objectives
Session 6: Mitre ATT&CK Framework & NICE Framework
- Introduction to Mitre ATT&CK Framework
- Navigating and Using the Mitre ATT&CK Framework
- Mapping Attacks to the Framework
- Overview of the NICE Framework
- Categories and Specialty Areas of the NICE Framework
- Applying the NICE Framework to Career Development
Week 3
Session 7: Virtual Environment & Kali Linux Setup
- Introduction to Virtual Machines and VirtualBox
- Installing Kali Linux on VirtualBox
- Configuring Network Settings for Virtual Labs
- Updating and Upgrading Kali Linux
- Essential Tools and Utilities in Kali Linux
Session 8: Introduction to Penetration Testing
- Understanding Penetration Testing Methodologies
- Types of Penetration Testing (Black Box, White Box, Gray Box)
- Legal and Ethical Considerations in Penetration Testing
- Setting Up Target Systems for Testing
- Documenting and Reporting Penetration Test Results
Session 9: Introduction to OWASP Top 10
- Overview of OWASP and its Mission
- Detailed Analysis of OWASP Top 10 Vulnerabilities
- Injection
- Broken Authentication
- Sensitive Data Exposure
- XML External Entities (XXE)
- Broken Access Control
- Strategies for Mitigating OWASP Top 10 Vulnerabilities
Week 3
Session 7: Virtual Environment & Kali Linux Setup
- Introduction to Virtual Machines and VirtualBox
- Installing Kali Linux on VirtualBox
- Configuring Network Settings for Virtual Labs
- Updating and Upgrading Kali Linux
- Essential Tools and Utilities in Kali Linux
Session 8: Introduction to Penetration Testing
- Understanding Penetration Testing Methodologies
- Types of Penetration Testing (Black Box, White Box, Gray Box)
- Legal and Ethical Considerations in Penetration Testing
- Setting Up Target Systems for Testing
- Documenting and Reporting Penetration Test Results
Session 9: Introduction to OWASP Top 10
- Overview of OWASP and its Mission
- Detailed Analysis of OWASP Top 10 Vulnerabilities
- Injection
- Broken Authentication
- Sensitive Data Exposure
- XML External Entities (XXE)
- Broken Access Control
- Strategies for Mitigating OWASP Top 10 Vulnerabilities
Week 3
Session 7: Virtual Environment & Kali Linux Setup
- Introduction to Virtual Machines and VirtualBox
- Installing Kali Linux on VirtualBox
- Configuring Network Settings for Virtual Labs
- Updating and Upgrading Kali Linux
- Essential Tools and Utilities in Kali Linux
Session 8: Introduction to Penetration Testing
- Understanding Penetration Testing Methodologies
- Types of Penetration Testing (Black Box, White Box, Gray Box)
- Legal and Ethical Considerations in Penetration Testing
- Setting Up Target Systems for Testing
- Documenting and Reporting Penetration Test Results
Session 9: Introduction to OWASP Top 10
- Overview of OWASP and its Mission
- Detailed Analysis of OWASP Top 10 Vulnerabilities
- Injection
- Broken Authentication
- Sensitive Data Exposure
- XML External Entities (XXE)
- Broken Access Control
- Strategies for Mitigating OWASP Top 10 Vulnerabilities
Week 4
Session 10: Understanding OWASP Web Top 10
- Introduction to OWASP
- Overview of the OWASP Top 10
- Injection Attacks
- Broken Authentication
- Sensitive Data Exposure
Session 11 & 12: Hands-On Exploitation Techniques
- XML External Entities (XXE)
- Broken Access Control
- Security Misconfiguration
- Cross-Site Scripting (XSS)
- Insecure Deserialization
Week 4
Session 10: Understanding OWASP Web Top 10
- Introduction to OWASP
- Overview of the OWASP Top 10
- Injection Attacks
- Broken Authentication
- Sensitive Data Exposure
Session 11 & 12: Hands-On Exploitation Techniques
- XML External Entities (XXE)
- Broken Access Control
- Security Misconfiguration
- Cross-Site Scripting (XSS)
- Insecure Deserialization
Week 4
Session 10: Understanding OWASP Web Top 10
- Introduction to OWASP
- Overview of the OWASP Top 10
- Injection Attacks
- Broken Authentication
- Sensitive Data Exposure
Session 11 & 12: Hands-On Exploitation Techniques
- XML External Entities (XXE)
- Broken Access Control
- Security Misconfiguration
- Cross-Site Scripting (XSS)
- Insecure Deserialization
Week 5
Session 13: Fundamentals of Networking
- Networking Basics & OSI Model
- Various Networking Devices and their functions
- IPS, IDS, Firewall, NGFW, Antivirus
- Network Devices & Protocols implemented across the layers
Session 14: Deep Dive into the OSI Model
- In-Depth understanding of Layers of OSI Model
- Layer 1 (Physical Layer) – Functions and Devices
- Layer 2 (Data Link Layer) – Functions and Protocols
- Layer 3 (Network Layer) – Functions and Protocols
Session 15: Network Security and Advanced Concepts
- Layer 4 (Transport Layer) – Functions and Protocols
- Layer 5-7 (Session, Presentation, Application Layers) – Functions and Protocols
- Detailed Study of Firewall, NGFW, IPS, IDS
- Advanced Security Measures – Antivirus and Network Security Best Practices
Week 5
Session 13: Fundamentals of Networking
- Networking Basics & OSI Model
- Various Networking Devices and their functions
- IPS, IDS, Firewall, NGFW, Antivirus
- Network Devices & Protocols implemented across the layers
Session 14: Deep Dive into the OSI Model
- In-Depth understanding of Layers of OSI Model
- Layer 1 (Physical Layer) – Functions and Devices
- Layer 2 (Data Link Layer) – Functions and Protocols
- Layer 3 (Network Layer) – Functions and Protocols
Session 15: Network Security and Advanced Concepts
- Layer 4 (Transport Layer) – Functions and Protocols
- Layer 5-7 (Session, Presentation, Application Layers) – Functions and Protocols
- Detailed Study of Firewall, NGFW, IPS, IDS
- Advanced Security Measures – Antivirus and Network Security Best Practices
Week 5
Session 13: Fundamentals of Networking
- Networking Basics & OSI Model
- Various Networking Devices and their functions
- IPS, IDS, Firewall, NGFW, Antivirus
- Network Devices & Protocols implemented across the layers
Session 14: Deep Dive into the OSI Model
- In-Depth understanding of Layers of OSI Model
- Layer 1 (Physical Layer) – Functions and Devices
- Layer 2 (Data Link Layer) – Functions and Protocols
- Layer 3 (Network Layer) – Functions and Protocols
Session 15: Network Security and Advanced Concepts
- Layer 4 (Transport Layer) – Functions and Protocols
- Layer 5-7 (Session, Presentation, Application Layers) – Functions and Protocols
- Detailed Study of Firewall, NGFW, IPS, IDS
- Advanced Security Measures – Antivirus and Network Security Best Practices
Week 6
Session 16: Basics of IPv4 Addressing
- Understanding IPv4 Address
- How IP Addresses are classified
- Learn to build IP addresses from Binary
- Classful vs Classless IP Addresses
Session 17: Advanced IP Addressing Techniques
- CIDR (Classless Inter-Domain Routing)
- VLSM (Variable Length Subnet Mask)
- VLAN (Virtual Local Area Network)
- Subnetting and Supernetting Concepts
Session 18: Practical Application and Implementation
- Implementing CIDR in Networks
- Configuring VLSM for Efficient IP Allocation
- Setting up and Managing VLANs
- Real-world IP Addressing Scenarios and Solutions
Week 6
Session 16: Basics of IPv4 Addressing
- Understanding IPv4 Address
- How IP Addresses are classified
- Learn to build IP addresses from Binary
- Classful vs Classless IP Addresses
Session 17: Advanced IP Addressing Techniques
- CIDR (Classless Inter-Domain Routing)
- VLSM (Variable Length Subnet Mask)
- VLAN (Virtual Local Area Network)
- Subnetting and Supernetting Concepts
Session 18: Practical Application and Implementation
- Implementing CIDR in Networks
- Configuring VLSM for Efficient IP Allocation
- Setting up and Managing VLANs
- Real-world IP Addressing Scenarios and Solutions
Week 6
Session 16: Basics of IPv4 Addressing
- Understanding IPv4 Address
- How IP Addresses are classified
- Learn to build IP addresses from Binary
- Classful vs Classless IP Addresses
Session 17: Advanced IP Addressing Techniques
- CIDR (Classless Inter-Domain Routing)
- VLSM (Variable Length Subnet Mask)
- VLAN (Virtual Local Area Network)
- Subnetting and Supernetting Concepts
Session 18: Practical Application and Implementation
- Implementing CIDR in Networks
- Configuring VLSM for Efficient IP Allocation
- Setting up and Managing VLANs
- Real-world IP Addressing Scenarios and Solutions
Download Complete 3 Months Plan
Download Complete 3 Months Plan
CAREER DEVELOPMENT TRACK
Pregrad Career Assist Access
Mentoring
career-specific resume tailoring
Personal Branding
Build and showcase your skills in public
Strategic LinkedIn profiling
Community Session
Strengthen Communication
Improve presentation skills
Interview Preparation
Mock community sessions & GD
Art of negotiation
Domain workshops/Masterclasses
Masterclasses from professionals
HR Session
Career Kick-start
Internship/Freelance/ Applications & Interview
Placement assistance in final year
Total Fee of the Program
₹ 20060/- Including tax
(Non-refundable)
0% cost EMI Option Available*
EMI options for admission will not be available on discounted Fee or admission through scholarship
Live Learning delivered by Industry veteran
Sessions Backup
Hands-On Projects & Challenges
Global Certifications
Access to Career Assist cell*
Payment gateway Razorpay
FAQ
Is this course for Beginner, Intermediate, and Advanced level?
What is the duration of this Program?
Is it possible to shift my batch?
Is this course for Beginner, Intermediate, and Advanced level?
What is the class schedule for the Program?
Will I be provided with recordings of classes and how long will we have access to it?
What is the role of the mentor?
What are the profiles of the mentors?
How often does the new Batch start?
When will we be getting internship opportunities?
How is placement at Pregrad?
What is the success rate of the Pregrad's Pre-graduation Program?
Is this course for Beginner, Intermediate, and Advanced level?
What is the duration of this Program?
Is it possible to shift my batch?
Is this course for Beginner, Intermediate, and Advanced level?
What is the class schedule for the Program?
Will I be provided with recordings of classes and how long will we have access to it?
What is the role of the mentor?
What are the profiles of the mentors?
How often does the new Batch start?
When will we be getting internship opportunities?
How is placement at Pregrad?
What is the success rate of the Pregrad's Pre-graduation Program?
Is this course for Beginner, Intermediate, and Advanced level?
What is the duration of this Program?
Is it possible to shift my batch?
Is this course for Beginner, Intermediate, and Advanced level?
What is the class schedule for the Program?
Will I be provided with recordings of classes and how long will we have access to it?
What is the role of the mentor?
What are the profiles of the mentors?
How often does the new Batch start?
When will we be getting internship opportunities?
How is placement at Pregrad?
What is the success rate of the Pregrad's Pre-graduation Program?