Postgraduate Program in Cybersecurity
Dive into the world of Cyber Security with our Job Assurance Program
In collaboration with
Our Alumni Work At
Unlock Cybersecurity Expertise
The 6-month PG Program in Cyber Security has been designed in collaboration with industry leaders to provide the best learning outcome to aspiring Cyber Security professionals. You will learn incident handling, ethical hacking, cloud security, application security and network security through practical application.
100% Job Assurance
Our program comes with 100% Job Assurance that offers you a chance to get placed in a trending Cybersecurity role.
Industry-approved Curriculum
Our curriculum has been uniquely designed for fresh graduates at entry-level roles in Cyber Security. It has been reviewed and approved by industry experts, making it relevant to the current and future hiring demands.
Career Services
We provide rigorous career services to help you prepare for your placement opportunities. It includes resume building, interview workshops, mock interviews and much more.
Get Mentored by Industry Experts
Attend 1:1 mentoring sessions to learn about an exciting Cyber Security career from industry experts. Get answers to all your career-related queries.
Experiential Learning & Impressive Project Portfolio
Industry experts teach you key job-relevant skills through rigorous in-class exercises and real-world security projects.Create your project portfolio to impress your future employers. Participate in CTF - Catch the Flag competition - to test and prove your skills.
Get EC-Council CEH Practical Certification & iLabs
We have partnered with EC-Council to integrate their Certified Ethical Hacker Practical certification with this program. This certification will help you impress your future employers. You will also get iLabs to practice on hundreds of Cyber Security problems for Ethical Hacking.
*Applicable once you opt for EC-Council certification
Why Join the PG Program in Cyber Security?
Curriculum
A progressive curriculum and learning methodology make our program ideal for those seeking positions in top companies requiring cyber security skills.
The fundamentals of networking in cybersecurity encompass the essential principles and concepts related to computer networks that are vital for understanding and implementing effective cybersecurity measures.
Topics
What is network/networking ?
Types of network
Network Topology
Types of communication
Networking devices
OSI Model and its Layers
TCP/IP model
IPV4/IPV6
Sub-netting
MAC address
HTTP & HTTPS
NAT
Static routing
Dynamic routing
Switching
Spanning Tree Protocol
VLAN
The fundamentals of operating systems in cybersecurity encompass the core principles and concepts that are crucial for comprehending and implementing robust cybersecurity measures within operating systems.
Topics
Introduction to Operating Systems
32-bit vs. 64-bit Operating Systems
Mobile Operating Systems
Memory Management
Process Management
Storage Management
Types of Windows
Navigating the System
Types of Installations
Boot Methods
Basic commands
Filesystems
Basic Network Configuration
Users and Permissions
Windows Registry
Logs
Types of Linux
Navigating the System
Types of Installations
Boot Methods
Basic commands
Basic commands + Filesystems
Basic Network Configuration
Users and Permissions
Package and Software Management
Personalization & Logs
Information security concepts in cybersecurity refer to the fundamental principles and ideas that guide the protection of information assets from unauthorised access, use, disclosure, disruption, modification, or destruction.
Topics
Introduction to Cyber Security
CIA triad
Privacy
Identification
Authentication
Authorization
Accountability
Vulnearbilities, Threat, Attack
Threat Modeling concepts
Security Policies, Procedure, standard & Guidelines
How the internet works
Type of web applications
HTTP Protocol, HTTPS - TLS/SSL
Cookies
Sessions
Tokens
Cryptography Concepts
Encryption Algorithms
Hashing
Encoding
Digital Signatures
Firewall, IDS, IPS
Physical & Environmental Security
What is Security, Risk & Threat?
Risk Analysis
Data Classification
Asset Identification
Prioritize asset
Risk Identification
Risk Mitigation
BCDR
Computer based Crime
Cyber laws
Intellectual Property Rights
Fundamentals of Cloud Security in cybersecurity refer to the foundational principles and practices that are crucial for protecting cloud-based systems, data, and infrastructure from potential threats and vulnerabilities.
Topics
Introduction to Cloud
Cloud Building Blocks
Emerging techonologies in Cloud
AWS Cloud tour
Virtualization Basics
Basics of Cloud Architecture
AWS Well Architected Framework
AWS Well Architected Framework: Security Pillar
Best Practices
Understanding Diffrent Concerns & Possible Solutions over Diffrent Layers of Cloud
Understanding All the Entry Points on AWS To maintain the Security
Exploring What are the Different Laws & Regulations Exist to Protect Data Over Cloud
Understanding AWS Shared responsibility model
Understanding AWS Managed Services (AMS)
What is cloud application security?
Cloud Computing Security Issues
Best Practices
Cloud Security Architecture
Cloud access security broker (CASB)
Zero Trust Security Architecture
The Certified Ethical Hacker (CEH) certification, based on the EC-Council CEH syllabus, is a professional credential that validates an individual's skills and knowledge in identifying and assessing vulnerabilities in computer systems and networks.
Topics
Introduction security overview
Cyber Kill Chain
Hacking Concepts
Ethical Hacking Concepts
Information security Controls
Information security Laws and Standards
Footprinting Concepts
Footprinting through Search Engines
Footprinting through Web Services
Footprinting through Social Networking Sites
Website Footprinting
Email Footprinting
Whois Footprinting
DNS Footprinting
Network Footprinting
Footprinting through Social Engineering
Footprinting Tools
Footprinting Countermeasures
Network Scanning Concepts
Scanning Tools
Host Discovery
Port and Service Discovery
OS Discovery (Banner Grabbing/OS Fingerprinting)
Scanning Beyond IDS and Firewall
Draw Network Diagrams
Enumeration Concepts
NetBIOS Enumeration
SNMP Enumeration
LDAP Enumeration
NTP and NFS Enumeration
SMTP and DNS Enumeration
Other Enumeration Techniques
Enumeration Countermeasures
Vulnerability Assessment Concepts
Vulnerability Classification and Assessment Types
Vulnerability Assessment Solutions and Tools
Vulnerability Assessment Reports
System Hacking Concepts
Gaining Access
Escalating Privileges
Maintaining Access
Clearing Logs
Malware Concepts
APT Concepts
Trojan Concepts
Virus and Worm Concepts
Fileless Malware Concepts
Malware Analysis
Countermeasures
Anti-Malware Software
Sniffing Concepts
Sniffing Technique: MAC Attacks
Sniffing Technique: DHCP Attacks
Sniffing Technique: ARP Poisoning
Sniffing Technique: Spoofing Attacks
Sniffing Technique: DNS Poisoning
Sniffing Tools
Countermeasures
Sniffing Detection Techniques
Social Engineering Concepts
Social Engineering Techniques
Insider Threats
Impersonation on Social Networking Sites
Identity Theft
Countermeasures
DoS/DDOS Concepts
DoS/DDOS Attack Techniques
Botnets
DDOS Case Study
DoS/DDOS Attack Tools
Countermeasures
DoS/DDOS Protection Tools
IDS, IPS, Firewall, and Honeypot Concepts
IDS, IPS, Firewall, and Honeypot Solutions
Evading IDS
Evading Firewalls
IDS/Firewall Evading Tools
Detecting Honeypots
IDS/Firewall Evasion Countermeasures
Web Server Concepts
Web Server Attacks
Web Server Attack Methodology
Web Server Attack Tools
Countermeasures
Patch Management
Web Server Security Tools
Web Application Concepts
GET & POST Requests
Web Application Security
Web Application Threats
Web Application Hacking Methodology
Security Testing Tools
Password Security
Intro & Brute force attack
Intro & Dictionary attack
Vulnerability Assessment
Types of Vulnerability Assessment
Penetration Testing
Types of Penetration Test
OWASP Top 10
SQL Injection Concepts
Types of SQL Injection
SQL Injection Methodology
SQL Injection Tools
Evasion Techniques
Countermeasures
Session Hijacking Concepts
Application Level Session Hijacking
Network Level Session Hijacking
Session Hijacking Tools
Countermeasures
Web API, Webhooks, and Web Shell
Cyber Kill Chain
Application security best practices
Secure software development
Wireless Concepts
Wireless Encryption
Wireless Threats
Wireless Hacking Methodology
Wireless Hacking Tools
Bluetooth Hacking
Countermeasures
Mobile Platform Attack Vectors
Hacking Android OS
Hacking iOS
Mobile Device Management and Mobile Application Management
Mobile Security Guidelines and Tools
Cloud Computing Concepts
Container Technology
Serverless Computing
Cloud Computing Threats
Cloud Hacking
Cloud Security
Cryptography Tools
Public Key Infrastructure (PKI)
Email Encryption
Disk Encryption
Cryptanalysis
Countermeasures
Incident handling in cybersecurity refers to the structured and organised approach taken to detect, respond to, and manage security incidents within an organisation.
Topics
Need for Incident Handling
Cyber Incident Statistics
Role of Incident Handler
Common Terminologies
Types of Incidents
Events, Incidents and Disasters
Formation of Incident Handling Team
Goals of Incident Response
Identifying possible Incidents
Preparing Incident Response Plans
Incident Response and Handling Steps
Step 1: Identification
Step 2: Incident Recording
Step 3: Initial Response
Step 4: Communicating the Incident
Step 5: Containment
Step 6: Formulating a Response Strategy
Step 7: Incident Classification
Step 8: Incident Investigation
Step 9: Data Collection
Step 10: Forensic Analysis
Step 11: Evidence Protection
Step 12: Notify External Agencies
Step 13: Eradication
Step 14: Systems Recovery
Step 15: Incident Documentation
Step 16: Incident Damage and Cost Assessment
Step 17: Review and Update the Response Policies
Call Tree
User reported incidents
Log Analysis
Log Analysis Tools
External/Third Party Incident Reporting
Initial Incident Analysis
Activation incident response plan
Incident Containment
Strategies
Isolation
Indicators of compromise
Imaging the infected system
Verifying backup
Handling Insider Threats
Insider Threats
Anatomy of an Insider Attack
Insider Risk Matrix
Insider Threats Detection
Insider Threats Response
Insider’s Incident Response Plan
Guidelines for Detecting and Preventing Insider Threats
Human Resources
Network Security
Access Controls
Security Awareness Program
Administrators and Privileged Users
Backups
Audit Trails and Log Monitoring
Preparing for forensic analysis
Performing forensic analysis
Root causes analysis
Computer Forensics
Objectives of Forensics Analysis
Role of Forensics Analysis in Incident Response
Forensic Readiness
Forensic Readiness And Business Continuity
Types of Computer Forensics
Computer Forensic Investigator
People Involved in Computer Forensics
Computer Forensics Process
Digital Evidence
Characteristics of Digital Evidence
Collecting Electronic Evidence
Challenging Aspects of Digital Evidence
Forensic Policy
Forensics in the Information System Life Cycle
Forensic Analysis Guidelines
Forensics Analysis Tools
Incident Recovery
Principles of Incident Recovery
Planning for eradication and recovery
Incident Recovery Steps
Contingency/Continuity of Operations Planning
Business Continuity Planning
Incident Recovery Plan
Incident Recovery Planning Process
Fixing the infected system
Trusted system recovery
Business Impact Analysis
Verifying eradication and recovery completion
Importance of incident reports
Why to Report an Incident
Whom to Report an Incident
How to Report an Incident
Writing incident reports
Incident Reporting Guidelines
Sample Incident Reporting Form
Sample Post Incident Report Form
Lessons learnt
Updating incident response plans
Importance of SOC
SOC Capabilities
SOC Models
SOC - Roles and Responsibilities
SOC Analyst
Incident Responder
CISO
SOC – Process
SOC – Technology
G1-SOC
G2-SOC
G3-SOC
G4-SOC
G5-SOC
Next G-SOC
Gathering, Analyzing, Validating
Understand the Network & host Level Attacks
Discuss the Attacker’s Hacking Methodology
Reporting
Responding
Documentation
SIEM Introduction
SIEM Basics
Log Aggregation
Log Evaluation, Log Analysis
Centralized Logging & Local Logging
Incident Detection
Threat Intelligence
SIEM Tools
SIEM Tools extended
Developing SOC Strategy
Design and Deploy SOC Solution
Use Cases in SOC
Assess, Report and Evaluate
SOC Implementation Challenges
Best Practices in Operating SOC
Understand How Threat Intelligence Strategy is Developed
New technologies and cybersecurity refer to the impact and challenges posed by emerging technologies in the field of cybersecurity. As technology evolves and new innovations emerge, it brings both opportunities and risks in terms of security.
Topics
Introduction to Internet of Things (IoT)
IoT Architecture
IoT Protocols
IoT Use cases
Principles of IoT Security
IoT Attack Areas
IoT Vulnerabilities
IoT Attacks
IoT Hacking Methodology
loT Hacking Tools
Countermeasures
IoT standards and frameworks
Introduction to Big Data
3V's of Big Data
Big Data technologies
Hadoop overview
Security concerns in Big Data
Best practices
Security Challenges in Industrial Networks
Security Regulations, Frameworks & Standards
Security vulnerabilities in OT/ICS
ICS/OT security tools
ICS/OT Attacks and Hacking Methodology
ICS/OT security monitoring and incident response
Security Best Practices and Countermeasures
Introduction to GenAI (OpenAI, Google Gemini) - Fraud Detection
Security concerns of AI
Implications of AI on privacy
Using Artificial Intelligence Tools to Enhance Security
Introduction to DevOps
Introduction to Secure DevOps
Challenges for Security in DevOps
Continuous Integration
Continuous Delivery
Infrastructure As Code
Continuous Monitoring
Tools & Technologies Covered
Note: Actual tools may way as we strive to use the latest tools available to achieve the objective.
Projects that you will work on?
The PG program comes with more than 10 industry-level projects to help you get 360-degree learning. These projects have been hand-picked to help you prepare for the Cyber Security job roles. Some of the indicative projects covered in the program are shown here.
Note: The projects mentioned are indicative projects and will be updated on time to time basis for effective learning.
What is EC-Council’s iLabs?
It is the most comprehensive and feature-rich virtual learning environment where you get pre-configured targets, networks, and also attack tools necessary for you to practice. You will get access to practice simulations on Ethical Hacking, Penetration Testing & more! The best part of iLabs is that it's very easy to start learning on the platform even if you are a beginner and it is completely customizable to your needs. You will get access to iLabs for 6 months.
Here are some examples of the simulations
Session Hijacking
Evading IDS Firewalls and Honeypots
Hacking Web Servers
Hacking Web Applications
SQL Injection
Hacking Wireless Networks
Hacking Mobile Platforms
Cloud Computing
Cryptography
Note: EC-Council *CEH | Practical Exam Certification cost is not part of the program
Your Learning Journey
Trainer Profiles
Grow with Imarticus learning
Aptitude Training
We provide aptitude training that will help you excel in the aptitude tests taken by employers to assess your problem-solving abilities.
Profile Enhancement
Interview Prep
Placement
1:1 Mentorship
Capture the Flag
The course is ideal for
Will I Get Certified?
Upon successfully completing this program, you’ll earn a Postgraduate Program in Cyber Security certificate. This certification will add considerable value to your professional credentials.
What Can I Become?
Offensive Security
Defensive Security
Program Directors
Hear it from who have experienced it
Program Fee
₹ 1,50,000
(Just +10,000 For EC-Council CEH Practical Exam Voucher - Discounted Price!)
We recommend you opt for the Global CEH | Practical Exam voucher. You are saving more than 75% of the actual certification price of $550.
Admission Process
Moments of Honour
In our EdTech journey of more than a decade, we have received numerous awards.
Some of the recent notable awards we have received in analytics are:
The Successprenuer Award 2023 for being the best analytics edtech business
Most Promising Digital Learning Platform 2023 for being one of the most promising digital learning platforms
FAQs
About the Program
This PG program is a thoroughly engaging, full-time course dedicated to helping you get a high-paying job in the Cybersecurity industry. The faculty will cover every Cybersecurity concept from scratch, and help you practice what you learn with rigorous security exercises and hands-on projects throughout the course.
You will get recorded lectures and reference materials that will prepare you for a Cybersecurity career. You will be expected to finish all your assignments on time. To truly boost your skills, we will organise a competitive CTF, where aspirants will participate and compete with each other.
The duration of the program is 6 months. Tuesday to Friday - 4 hours every day.
If you are a fresh graduate with 50% marks - Bachelor’s degree in IT/Computer Science, Engineers – this course is for you. This course is also suitable for early career professionals with up to 3 years of work experience – Tester, Systemadmin, IT support, Networking staff, Early Programmers, etc. You should have basic computer and programming skills. There will be an admission test to shortlist the candidates.
The core learning will happen via classroom or online live lectures. In addition, you will get recordings of the lectures to review at your convenience. You will also have access to student notes, practice projects, additional study material and quizzes on our fully-integrated online learning portal.
CEH Practical is a six-hour, rigorous exam that requires you to demonstrate the application of ethical hacking techniques such as threat vector identification, network scanning, OS detection, vulnerability analysis, system hacking, web app hacking, etc. to solve a security audit challenge. This program will prepare you for the CEH syllabus and you will get access to iLabs for practice. Once you pass the CEH Practical exam, you will get a CEH Practical certificate from EC-Council.
Capture The Flags or CTFs, are a kind of computer security competition. Teams of competitors (or just individuals) are pitted against each other in a test of cyber security skills. The hiring companies give preference to CTF winners for job interviews. We have CTF included in this program.
To be eligible for job placement, candidates must meet the following criteria:
- Final grades should be at least 60%
- Pass all Imarticus mock interviews and project evaluation
- Have an average attendance of at least 80% for each module
- Show decent behaviour throughout the course, meeting the expectation set by Imarticus
To know more about the Imarticus Refund policy Click here.