IIT Jammu Post Graduate Diploma in Cyber Security offered by TimesPro
- Private Institute
- Estd. 2013
IIT Jammu Post Graduate Diploma in Cyber Security at TimesPro Overview
Duration | 12 months |
Total fee | ₹2.56 Lakh |
Mode of learning | Online |
Official Website | Go to Website |
Course Level | PG Diploma |
IIT Jammu Post Graduate Diploma in Cyber Security at TimesPro Highlights
- Earn a certificate & alumni status from IIT Jammu
- Campus immersion module of 5 days (Optional)
- Live online sessions by IIT Jammu faculty and experts
- Comprehensive curriculum covering fundamental to advanced topics of Cyber Security
IIT Jammu Post Graduate Diploma in Cyber Security at TimesPro Course details
- For individuals who are from Software Engineering and IT backgrounds and would like to get skilled in the area of Cyber Security
- For those who have an interest in exploring/working in the domain of Cyber Security and are looking for a domain shift
- For Individuals in various IT & Engineering job roles who wish to acquire the knowledge required to perform secure technology design & development, security analysis of systems, networks, and applications, etc
- Understand in-demand cyber security fundamentals, key terms, and technologies
- Understand CIA principles, cyber kill chain, threats, attacks and vulnerabilities, and various security principles
- Explore the concepts of Confidentiality, Integrity, and Availability in various Network Security Models, System Security Models, and Frameworks
- Learn to identify and investigate data breaches and cyber attacks
- Cyber security is the practise of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks
- The number of data breaches each year is increasing as the global cyber threat develops quickly
- Businesses collect financial and medical data, which makes them more appealing to cybercriminals
- Global spending on cybersecurity solutions is unavoidably increasing as it is anticipated that the severity of the cyber threat will increase and that this will lead to a high demand for cyber security experts in the near future
- This course provides a comprehensive overview of cyber security and the necessary skills to help you establish a benchmark in your cyber security career through a combination of theory, hands-on learning, and practical projects
- Class Timings: Saturday and/or Sunday First session: 10:00 a.m. to 11:30 a.m. Second session 11:15 a.m. to 1:15 p.m.
IIT Jammu Post Graduate Diploma in Cyber Security at TimesPro Curriculum
Module 1: Mathematical Foundations and Cryptography
Divisibility, Modular Arithmetic, Algorithms for Integer Operations
Prime Numbers, Congruence, Solving Congruences, Fermat’s Little Theorem
Sets, Relations and Mapping, Closure property, Monoied, Group.
Rings and Fields, Operations on Finite Field, Polynomials over Finite Field.
Random Variable and Sample Space, Expectation and Variance
Classical Encryption Scheme and their Cryptanalysis: Shift Cipher
Block Ciphers and Stream Ciphers: Substitution Permutation Networks, Linear Cryptanalysis
Asymmetric Cryptography: RSA, Diffie Hellman, Elliptic Curve
Hash Function, Message Authentication, and Digital Signature schemes
Module 2: Computer Networking
History of Computer Networking, Packet and Circuit Switching, Delays, Protocol Layers
Application Layer, Network Application Architecture, Web and HTTP, FTP, SMTP, DNS
Transport Layer, Multiplexing and Demultiplexing, UDP, Reliable Data Delivery Principles, TCP
Network Layer, Virtual Circuit and Datagram Networks, IP, Routing and Forwarding, Router
Link Layer, Error Detection and Correction, Multiple Access Control, Ethernet 802.
Switching, Switches, VLANs
Wireless Links, 802.11 Architecture and Protocols, Bluetooth and Zigbe
Physical Layer – Wireless Propagation and Performance Analysis
Module 3: Operating System Theory
Introduction to Operating Systems: OS Evolution, Services, System Calls, Operating System Structure and Architecture, System Programme, OS Booting
Process Concepts and Scheduling, Inter-process Communication, Threads, and Multithreading Concepts
CPU Scheduling, Scheduling Algorithms, Multiprocessor Scheduling, Process Synchronization, Monitors, Semaphores, Deadlocks
Memory Management: Paging, Memory Allocation, Swapping, Virtual Memory, Thrashing
Storage Management: File Concepts, Directory Concepts, Allocation Methods, Free Space Management, Disk Management, and Scheduling
Access Control and Authentication, Memory Protection Concepts, Programme Threats, Malware Analysis
Module 4: Introduction to Cyber Security
Introduction to Cyber Security- What is Cyber Security, Cyber Threats, CIA Principles, OSI Security Architecture
Cyber Kill Chain/Hacking methodologies, MITRE Attack Framework
Multilevel Security Models: Bell LaPadula Model and Biba Model
Security Design Concepts: Principle of Least Privilege, Defense in Depth, Compartmentalization
Cyber Attacks Case Study and Discussions, Cyber Security Resources and References
Module 5: Technical Seminar
Identify and choose issues of practical importance in the area of security
Learn how to get systematic literature on a technical subject and perform critical thinking, aims and motivation
Learn components of a good technical presentation/report, soft skills
Learn comparative analysis, how to identify gaps, practical implementation, verification and validation of technical content
Final presentation, feedbacks and discussion
Module 6: Web Application and Network Security
Introduction to Web Application Security: OWASP security risks, XSS, CSRF, SSRF Attacks and Countermeasures
Symmetric Key Distribution Techniques, Public Key Infrastructure and Applications, HTTPS, TLS, X.509
DNS and Email Security: Cache Poisoning, Reflection, Tunneling, Spoofing, DNSSEC
Attacks on Transport Layer, Network Layer and Data Link Layer and their countermeasures, Network Programming Concepts
Intrusion Detection Systems, Firewalls, Proxies, Caches, Honeypots, Case Studies
Module 7: Multimedia and Digital Forensics
Fundamentals of Digital Forensics
Multimedia Forensics, Format Based Forensics, Pixel-based Forensics, Statistical Based Forensics, Camera Based Forensics, Homomorphic Encryption
Framework for Digital Forensics Evidence Collection and Processing, Incident Response
Disk and Mobile Forensic techniques, Mobile Device Security Analysis, Incident Response
Module 8: Systems and Software Security
Fundamentals of Linux and Windows OS
Programme Binary Formats, Libraries Linkers and Loaders, Process Layout, Stack Layout, Heap Layout and Customisation
Programming Language Weakness, Stack Smashing Heap Spray, Return Oriented Programming
Principles of Defences, Address Space Randomization, Stack Canaries, Data Execution Prevention
Vulnerability Analysis and Standardization, Scanners, Binary Diffing, Malwares and Analysis
Reverse Engineering, Use Cases and Examples
Software Security Issues and Best Practices
Module 9: Special Topics in Cyber Security
OWASP Cloud Security Risks, Virtualization and related setbacks, Co Residency Attacks and Countermeasures
Hyperjacking, Rootkits, Hypervisor Vulnerabilities, XEN, KVM and Related Case Studies, Defenses in Azure, AWS, Data Security
IoT and SDN Security Issues and Challenges
Machine Learning for Security- Application of Machine Learning in Solving Various Problems in The Domain of Security, Deep Fake Detection
Data Security and Privacy issues; Frameworks and Standards, Cyber Security Laws
Module 10: Applied Cyber Security Project
Problem Statement Discussion and Literature Survey
Research Gaps Identification, Architecture The Solution
Experimentations and Analysis
Article or Publication Writing and Demonstrations
IIT Jammu Post Graduate Diploma in Cyber Security at TimesPro Faculty details
IIT Jammu Post Graduate Diploma in Cyber Security at TimesPro Entry Requirements
IIT Jammu Post Graduate Diploma in Cyber Security at TimesPro Admission Process
Important Dates
Other courses offered by TimesPro
Student Forum
IIT Jammu Post Graduate Diploma in Cyber Security at TimesPro News & Updates
IIT Jammu Post Graduate Diploma in Cyber Security at TimesPro Contact Information
18th floor, F Wing, Lotus Corporate Park, Off Western Express Highway
Mumbai ( Maharashtra)