This is your path to a career in Cybersecurity. In this certificate program, you’ll learn in-demand skills that can have you job-ready in less than a month. No coding or experience required.

Skills from this course: security analysis, security administration, ethical hacking, penetration testing and vulnerability management.

What you’ll learn

Module Session Topics Sub-topics Duration (days/per day -8 hrs)
1 8hrs x 3 Fundamentals of Networking Basic concepts of networking 3

Network ports, Network protocols, Types of network devices and key networking terminologies

Basics of ping & traceroute and types of network

Fundamental concepts of OSI model

Network sharing and subnetting

Fundamental concepts of network infrastructure

Practical Exercises: Understanding router model

Assigning IP address
2 8hrs x 1 Network Security Techniques Firewalls and Intrusion Detection/Prevention Systems 1

Virtual Private Networks (VPNs) and Remote Access Security

Practical Exercises: Configuring firewall rules, setting up a VPN connection
3 8hrs x 1 Advanced Network Security Network Segmentation and Micro-Segmentation 1

Network Access Control (NAC) and VLAN Security

Practical Exercises: Configuring VLANs, designing network segmentation
4 8hrs x 1 Introduction to Advanced Network Management & Administration Understanding Network Architecture and Protocols 1

Network Monitoring and Performance Optimization

Practical Exercises: Wireshark packet analysis, bandwidth monitoring
5 8 hrs x 2 Fundamental of Cyber Security Cyber security and its importance 2

Different disciplines of cyber security

Cyber security threats and their types

Cyber security attacks and their applications

Ways to use various commands
6 8 hrs x 2 Basics of Security testing Basics of security testing and its importance 2

Basics of vulnerability scanning

Penetration testing and risk assessment

Risk assessment test

Security Audit and Posture Assessment Test

Ethical Hacking and Network Monitoring

Security Testing Tools

Practical Exercises: Installing and using various tools

Information gathering

Perform and analyse various attacks
7 8 hrs x 2 Advanced Application Security Secure Software Development Lifecycle (SDLC) 2

Web Application Security and OWASP Top Ten

Practical Exercises: Code review, identifying vulnerabilities in sample applications
8 8hrs x 2 Cloud Security Essentials Cloud Service Models (IaaS, PaaS, SaaS) and Deployment Models 1

Identity and Access Management (IAM) in the Cloud

Practical Exercises: Setting up IAM policies, exploring cloud security groups
9 8hrs x 1 Fundamentals of Access Management Basics of Identity and Access Management & its Importance 1

Basic concepts of User Identification, Authentication and Authorization

User Identification and Access Management Policies

Tools used for Identity and Access Management in a public cloud platform

Access Control Models

Security Authorization And Encryption

Single Sign-On and Access Management Best Practices

Practical Exercises: Demonstrate how to perform MFA in AWS

Demonstrate the ways to
10 8hrs x 2 Fundamentals of Incident Management and Response Basics of security controls 2

Security Policy and Frameworks

Basics of Incident Management and Incident Response

Basics of Incident Response Plan and Incident Communications Plan

Fundamental Concepts of Incident Monitoring and Identification

Disaster Mitigation and Containment

Business Continuity Planning and Disaster Recovery

Cyber Security Investigation

Basics of a Backup and Recovery Plan

Basic concepts of RTO (Recovery Time Objective) and RPO (Recovery Point Objective)

Practical Exercises: Disaster recovery plan

Describe service replication and how it can be performed
11 8hrs x 2 Fundamentals of security operations Basics of security forensics & its types 2

Understanding of system logging and security monitoring

Fundamentals of Continuous Security Monitoring

Techniques for Continuous Security Monitoring

Basics of Data Loss Prevention and its importance

Basic understanding of change and configuration management

Security monitoring tools

Practical Exercises: Installing & Configuring various tools

Creating rules & understand security logs
Operational Resilience Frameworks Understanding Operational Resilience and Its Importance 1

Developing Resilience Policies and Strategies
Practical Implementation and Exercises Hands-on Labs for Network Security Components

Simulated Cyber Attack Scenarios and Response Drills

  • Nagarjuna

    After completing the cybersecurity course, I feel more confident in my ability to handle cybersecurity challenges. It's a great confidence booster for anyone entering the field.

  • Ashrith

    Whether you're a beginner or have some experience in cybersecurity, this course caters to all levels. It's a great resource for those looking to deepen their understanding of the subject.

  • Karthik

    The practical focus of the course made the content immediately applicable. I appreciated that the lessons were not just theoretical but had real-world relevance. Highly recommended for anyone serious about cybersecurity.


Enrol Now

Complete Live Classes

This course includes

  • Cloud based Lab Excersies
  • Realtime projects on enterprise technologies
  • Certificate of Completion