Indian Institute Of Management Lucknow
EC Council
Advanced Certificate in

Cybersecurity and Blockchain
By E&ICT IIT Guwahati

Unlock Cyber Resilience & Blockchain Excellence with E&ICT Academy IIT G and EC-Council
Program Duration
10 Months
Program Mode of Learning
Live Interactive Online + 3 Days Of Campus Immersion
Download Brochure
Apply Now
Indian Institute Of Management Lucknow

Introducing the Advanced Certificate in Cybersecurity and Blockchain with E&ICT Academy IIT Guwahati

Our programme delves into the dynamic realms of cybersecurity, cryptography, and blockchain, mirroring industry practices. Our curriculum and pedagogy are your roadmap to mastering critical skills and preparing you for a secure and innovative future where you will learn to fortify against cyber threats, harness encryption for data security, and uncover blockchain's transformative influence on various sectors. Additionally, gain access to EC-Council-aligned content and practice on EC-Council iLabs and receive an exam voucher to attempt the EC-Council CEH exam for accomplished learning.

-

Designed by IIT Guwahati & Industry Experts

Meticulously crafted and designed by IIT Guwahati faculty and industry specialists, the curriculum focuses on networking fundamentals, ethical hacking, vulnerability analysis, blockchain, and overall network security.

-

Hands-On Learning with Industry-Prevalent Tools

Participate in immersive hands-on lab sessions and learn to utilise industry-prevalent tools such as VMware, Kali OS, Wireshark, Nessus, Nmap, and more. This will demonstrate your practical proficiency in cybersecurity techniques and methodologies.

Live with IIT Guwahati Faculty & Industry Experts

Participate in live interactive sessions led by cybersecurity academicians from IIT Guwahati and industry experts, where you will explore networking, ethical hacking principles, vulnerability assessment, blockchain concepts & much more.

3-day Campus Immersion at IIT Guwahati

Enjoy a 3-day campus immersion at IIT Guwahati. This will not only foster networking opportunities among peers, faculty members, and industry professionals but will also help you gain real-world insights.

Certified Ethical Hacker @ EC Council | CEHv12

Gain practical ethical hacking skills, counter diverse attack vectors, and earn the CEH credential. Essential for an ethical hacker role, enhancing organisational security through specialised training.

Holistic Development and Real-World Applications

Gain a comprehensive understanding of cybersecurity nuances, from networking basics to advanced ethical hacking. It will help you navigate the real-world cyber challenges effectively.

Enrol Now

Why Join the Advanced Certificate in Cybersecurity and Blockchain?

Learn to Identify Potential Risks

Build Cybersecurity Proficiencies

Make your Organisation Cyber Resilient

Navigate Real-world Challenges

Spot and Secure Potential Risks

Build Essential Cybersecurity Proficiencies

Why Choose E&ICT Academy IIT Guwahati for Strengthening Your Skills?

-
-

About IIT Guwahati

The 6th member of the IIT fraternity, the Indian Institute of Technology Guwahati, was founded in 1994, and its academic programme began in 1995.

The institute has 11 departments, 7 interdisciplinary academic centres, and 5 schools

The courses developed by IIT Guwahati aim to prepare the participants to learn the ever-evolving business landscape. It also strengthens their skills to face the challenges and rule the modern world.

IIM Udaipur
-
EC Council
EC-Council CEH Preparation - Promising Pathway to Your Cybersecurity Journey
Dive into our program's comprehensive partnership with EC-Council, designed to empower participants with the knowledge, skills, and readiness required to excel in EC-Council certifications and thrive in the cybersecurity industry.
Curriculum for Global Certifications
Curriculum for Global Certifications
Our program is intricately designed to align with EC-Council CEH (Certified Ethical Hacker) standards, ensuring participants are well-prepared to excel in cybersecurity. Each module closely mirrors essential components tested in the CEH exam, guaranteeing confidence and readiness for success.
Access to EC-Council iLabs
Access to EC-Council iLabs
Participants enjoy exclusive access to EC-Council iLabs, a virtual cyber range providing hands-on experience in a simulated environment. Immerse yourself in realistic scenarios, tackle various cybersecurity challenges, and explore comprehensive tools and techniques to enhance your skills.
Exam Voucher Inclusion
Exam Voucher Inclusion
Prepare for the EC-Council CEH v12 exam without any additional charges. As part of our commitment to your success, each participant receives an exam voucher upon program completion, eliminating financial barriers and streamlining your certification journey.
Accelerate Your Career Aspirations
Accelerate Your Career Aspirations
This unique learning experience is your gateway to a thriving cybersecurity career. Armed with dual certifications and practical expertise gained through EC-Council iLabs, you'll stand out in the competitive job landscape, accelerating your career aspirations with confidence and distinction.

Meet Our Expert Faculty

Srinivasan Krishnaswamy

Assistant Professor | IIT Guwahati

Dr. Srinivasan Krishnaswamy, an accomplished Assistant Professor at IIT Guwahati, specializes in Electrical Engineering and Cryptography. With 13 Journal Articles, 10 Conference Papers, and 51 Citations spanning 2012-2024, his innovative contributions demonstrate expertise. His research, including "IEMS3" and "Lattice-Based Homomorphic Encryption,"...See More

Saubhagya Tripathi

Industry Expert

With over 7 years of experience in cybersecurity, Mr. Saubhagya leverages his industry expertise to train enthusiasts. As a former Partner at Blue9 Technologies, he spearheaded DevSecOps, ensuring the highest level of information security. Since 2018, in his role as a Cybersecurity Trainer, he has delivered impactful sessions to both B2B and B2C au...See More

Srinivasan Krishnaswamy

Assistant Professor | IIT Guwahati

Dr. Srinivasan Krishnaswamy, an accomplished Assistant Professor at IIT Guwahati, specializes in Electrical Engineering and Cryptography. With 13 Journal Articles, 10 Conference Papers, and 51 Citations spanning 2012-2024, his innovative contributions demonstrate expertise. His research, including "IEMS3" and "Lattice-Based Homomorph...See More

Saubhagya Tripathi

Industry Expert

With over 7 years of experience in cybersecurity, Mr. Saubhagya leverages his industry expertise to train enthusiasts. As a former Partner at Blue9 Technologies, he spearheaded DevSecOps, ensuring the highest level of information security. Since 2018, in his role as a Cybersecurity Trainer, he has delivered impactful sessions to both...See More

Trusted By Millions Of Learners Around The World

Curriculum Highlights

Gain accurate understanding with the help of a state-of-the-art curriculum that offers conceptual and practical implications for the cybersecurity industry.

Grasp essential networking concepts like OSI model, TCP/IP protocols, IP addressing, and diverse network devices.

Topics

Introduction to Networking & OSI Model

TCP/IP Protocol Suite

IP Addressing and Subnetting

Network Devices and Topologies

Explore ethical hacking foundations, security insights, and footprinting techniques for a comprehensive understanding.

Topics

Introduction to Ethical Hacking

Information Security Overview

Hacking Methodologies and Frameworks

Hacking Concepts

Ethical Hacking Concepts

Information Security Controls

Information Security Laws and Standards

Footprinting Concepts

Footprinting through Web Services

Footprinting through Social Networking Sites

Website Footprinting

Email Footprinting

Whois Footprinting

DNS Footprinting

Network Footprinting

Techniques to Prevent Footprinting

Security Measures for Organizations

Learn network scanning tools, techniques, and countermeasures for threat detection and prevention.

Topics

Network Scanning Concepts

Scanning Tools

Host Discovery

Port and Service Discovery

OS Discovery (Banner Grabbing/OS Fingerprinting)

Scanning Beyond IDS and Firewall

Network Scanning Countermeasures

Enumeration Concepts

NetBIOS Enumeration

SNMP Enumeration

LDAP Enumeration

NTP and NFS Enumeration

SMTP and DNS Enumeration

Other Enumeration Techniques

Enumeration Countermeasure

Understand vulnerability assessment, gaining access, and erasing digital footprints for effective system security.

Topics

Vulnerability Assessment Concepts

Vulnerability Classification and Assessment Types

Vulnerability Assessment Tools

Vulnerability Assessment Reports

Gaining Access

Escalating Privileges

Maintaining Access

Clearing Logs

Comprehend malware types, countermeasures, and advanced sniffing techniques for heightened cybersecurity awareness.

Topics

Malware Concepts

APT Concepts

Trojan Concepts

Worm Makers

Fileless Malware Concepts

Malware Analysis

Malware Countermeasures

Anti-Malware Software

Sniffing Concepts

Sniffing Technique: MAC Attacks

Sniffing Technique: DHCP Attacks

Sniffing Technique: ARP Poisoning

Sniffing Technique: Spoofing Attacks

Sniffing Technique: DNS Poisoning

Delve into social engineering, web server intricacies, attacks, and protective measures against potential threats.

Topics

Social Engineering Concepts

Social Engineering Techniques

Insider Threats

Impersonation on Social Networking Sites

Identity Theft

Social Engineering Countermeasures

Web Server Concepts

Web Server Attacks

Web Server Attack Methodology

Web Server Attack Countermeasures

Master web application complexities, hacking methodologies, and pivotal SQL injection countermeasures for robust security.

Topics

Web Application Concepts

Web Application Threats

Web Application Hacking Methodology

Web API, Webhooks, and Web Shell

Web Application Security

SQL Injection Concepts

Types of SQL Injection

SQL Injection Methodology

SQL Injection Tools

Injection Countermeasures

Navigate wireless network intricacies, mobile platform vulnerabilities, and establish strong security protocols.

Topics

Wireless Concepts

Wireless Encryption

Wireless Threats

Wireless Hacking Methodology

Wireless Hacking Tools

Bluetooth Hacking

Wireless Attack Countermeasures

Mobile Platform Attack Vectors

Hacking Android OS

Hacking iOS

Mobile Device Management

Mobile Security Guidelines and Tools

Explore IoT hacking concepts, attacks, and the intersection of IoT and OT, ensuring secure interconnected device environments.

Topics

IoT Hacking

IoT Concepts

IoT Attacks

IoT Hacking Methodology

OT Hacking

OT Concepts

Learn session hijacking concepts, tools, and effective countermeasures, including evading IDS, firewalls, and honeypots.

Topics

Session Hijacking Concepts

Application-Level Session Hijacking

Network-Level Session Hijacking

Session Hijacking Tools

Session Hijacking Countermeasures

IDS, IPS, Firewall, and Honeypot Concepts

IDS, IPS, Firewall, and Honeypot Solutions

Evading IDS

Evading Firewalls

Evading NAC and Endpoint Security

IDS/Firewall Evading Tools

Detecting Honeypots

IDS/Firewall Evasion Countermeasures

Understand fundamental cryptography concepts, encryption algorithms, digital signatures, SSL/TLS, and blockchain applications for data protection.

Topics

Cryptography Concepts

Encryption Algorithms

Cryptography Tools

Hash Functions and Message Authentication Codes (MACs)

Public Key Infrastructure (PKI)

Digital Signatures

Secure Sockets Layer/Transport Layer Security (SSL/TLS)

Key Exchange and Distribution

Post-Quantum Cryptography

Blockchain and Cryptography

Explore blockchain basics, encompassing architecture, smart contracts, security, and diverse use cases for comprehensive understanding.

Topics

Introduction to Blockchain

Blockchain Architecture

Smart Contracts

Decentralized Applications (DApps)

Blockchain Security

Blockchain Use Cases

Get into advanced cryptography techniques, uncover the realms of cryptocurrency and tokenization, explore blockchain interoperability, and understand its applications in government and supply chain sectors.

Topics

Advanced Cryptography Techniques

Cryptocurrency and Tokenization

Blockchain Interoperability

Blockchain in Government and Supply Chain

Ace Sessions

Ethical Hacker
Ethical Hacker
How to Crack CEH Exam
Guided session on successfully preparing for and cracking the Certified Ethical Hacker (CEH) exam. We will discuss key exam topics, study strategies, and practical tips to enhance chances of success to clear the exam swiftly. After this, the Student can attempt the EC-Council CEH v12 Exam.
Bug Bounty
Bug Bounty
How to do Bug Bounty
An interactive session focused on navigating the world of Bug Bounty programs. Students will learn effective methodologies for identifying and responsibly disclosing security vulnerabilities in web applications. They will get to know about bug hunting techniques, tools of the trade, and best practices to kickstart their Bug Bounty journey.

Programme Certification

Upon successfully completing the program, you'll earn an Advanced Certificate in Cybersecurity and Blockchain By E&ICT Academy IIT Guwahati.

IIMC Certificate
Zoom In

Grow with Imarticus learning

We’re focused on giving you an integrated learning experience. With our one-of-its-kind career support services, we continue to support you as you take a step into your career with a renewed perspective.

ImarticusLogo

Access to IIMJobs and Hirist

IIMJobs & Hirist Pro-membership, Job Insights, Recruiter Action Status, Follow-up, Chat feature, Improved visibility.

ImarticusLogo

Profile Enhancement

We assist you in building a robust portfolio to ensure that your profile always catches the eye of prospective employers.

ImarticusLogo

Resume Building

Redesign your resume with professional help and highlight your strengths in the best possible way.

ImarticusLogo

Interview Prep

We’ve analysed the most commonly asked interview questions and built a training module that confidently prepares you for job interviews.

ImarticusLogo

Access to IIMJobs and Hirist

IIMJobs & Hirist Pro-membership, Job Insights, Recruiter Action Status, Follow-up, Chat feature, Improved visibility.

ImarticusLogo

Profile Enhancement

We assist you in building a robust portfolio to ensure that your profile always catches the eye of prospective employers.

ImarticusLogo

Resume Building

Redesign your resume with professional help and highlight your strengths in the best possible way.

ImarticusLogo

Interview Prep

We’ve analysed the most commonly asked interview questions and built a training module that confidently prepares you for job interviews.

Learn Before You Leap

Get equipped with the requisite knowledge before you get trained

Get premium access to Linkedin Learning for six months:

The moment you opt for this learning, some exciting perks await you, which shall:

  • Unplug a treasure trove of high-quality, exclusive content tailored specifically for you.
  • Help with gaining invaluable insights from influential global visionaries.
  • Help you stay ahead of the competition by accessing cutting-edge skill development courses at your own pace.

Engage in Webinars

  • Your participation in our monthly webinars will enable remarkable opportunities for unparalleled growth and insights.
  • Leverage the power of exclusive 1:1 conversations with distinguished business experts
  • Unearth transformative insights from cutting-edge trends, reshaping business landscapes.
  • Handpicked and thoughtfully curated webinars, meticulously designed to elevate your learning experience throughout the course.

Admission Process

Program Fee

2,00,000 + GST

Fee Structure Instalment

Amount

Registration fees

25,000 + GST

Instalment 1 (Day 0)

65,000 + GST

Instalment 2 (Day 30)

55,000 + GST

Instalment 3 (Day 60)

55,000 + GST

FAQs

About the Programme

The duration of the course is 10 months and 230 hours of training.

    Upon successfully completing the programme, you'll earn an Advanced Certificate in Cybersecurity and Blockchain By E&ICT IIT Academy Guwahati

      The classes are designed to fulfil the requirements of a working professional, and hence the classes are scheduled during the weekends. All live interactive classes will happen online on the Zoom platform.

        We recommend that you attend all of the classes. However, you can request a live recorded session if you miss a session. You can gain insights by watching the uploaded session on the learning platform.

          You are required to attend at least 80% of the live sessions, to be eligible for the certification.

            After completing the course, you can participate in a 3-day campus immersion programme at IIT Guwahati. During your visit, you will have the opportunity to meet the IIT faculty members and peers. You will get an excellent chance to establish a valuable industry network. However, the students will be responsible for their own transportation and lodging.

              The 3-hour live sessions will be scheduled on weekends, Saturdays, and Sundays.

                Yes, the IIT faculty will train you and help you build a solid foundation of the blockchain concepts. Industry experts will provide valuable insights to start your cybersecurity journey along with hands-on learning through projects and exercises.

                  As your core learning is happening via online live-interactive lectures, you will get recordings of the classes that you can review at your convenience. You will get access to our LMS, from which you can access all of the study materials. You will also get access to practice projects, additional study material and quizzes on our fully integrated online learning portal.

                    Eligibility

                    Aspiring Cyber security professional with STEM background with 0-5 years of experience.

                    • Bachelor's/Master’s degrees in Computer Science/Engineering/Math /Statistics/Economics
                    • Minimum of 50% marks in graduation
                    • Basic programming knowledge is required

                    Admission Process

                    Our programme counsellors will capture your academic and professional details. Your profile will be reviewed and you will be invited for the pre-admission interview. Once you get shortlisted, you will get an offer letter. You can then pay the registration fee and enrol for the programme.

                      It is a non-refundable amount that needs to be paid to reserve your seat in the batch. However, you can pay the total fee on a later due date and reserve your seat.

                        Placement Support

                        The placement assistance will be offered by Imarticus Learning. E&ICT Academy, IIT Guwahati will certify the candidates.

                          Placement support will be provided by Imarticus Learning. We will help you prepare for trending job roles in Cyber Security, through our career services which include:

                          • Resume and LinkedIn profile Building Session
                          • Mock Interviews
                          • Career Mentorship

                          Note: Imarticus Learning does not guarantee a placement. However, we will provide the support.

                            Payment

                            Yes, we have scholarships available based on merit and experience. Please reach out to your programme advisor for more details.

                              You can book your seat by paying INR 25,000 + GST registration fee. For the rest of the programme fee, you will get three options:

                              • One-time full payment

                              Check View Plans for details on the payment options and structures.

                                For more about the Imarticus Refund Policy,click here.

                                  Imarticus Logo
                                  Follow Us

                                  GLOBAL PRESENCE

                                  INDIA

                                  UAE

                                  Executive Programs