About the Program
The Cyber Security program is dedicated to training professionals in safeguard_x0002_ing computer systems, networks, and sensitive data from cyber threats and unauthorized access. Participants will learn to develop comprehensive strategies, implement protective measures, and effectively respond to security incidents. This program is crucial in maintaining the integrity of digital assets and ensuring the security of sensitive information in our ever-connected world. Graduates of this program will play a pivotal role in safeguarding organizations against evolving cyber threats, making them indispensable in today's digital landscape.
Courses
-
Credits Semester
- Linux Administration 3 III
- Secure Networking 3 IV
- Application Security 3 V
- Ethical Hacking and Penetration Testing 3 V
- Cyber Forensic 3 VI
- Malware Analysis and Governance, Risk and Compliance 3 VII
- Project Work - The Cyber Security Capstone: Exploring Network Protection to Network Security 3 VIII
-
Credits Semester
- IT World Essentials: Your Digital Entrypoint 3 I
- Critical Thinking, Design Thinking, Leadership and Teamwork 3 II
- Project Work - The Cyber Security Capstone: Exploring Network Protection to Network Security 3 VIII
-
Credits Semester
- Critical Thinking, Design Thinking, Leadership and Teamwork 3 II
- Career Readiness in Digital Era 3 VI
Mode of Delivery
- Self-paced learning – 10 hours
- VILT sessions – 28 hours
- Project work – 7 hours
- Face-to-face instructor led sessions / VILT sessions (including project work) – 45 hours
- Self-paced learning + Expert session – 30 hours
- Project work – 15 hours
Job Roles
- Network Engineer/Administrator
- Information Security Analyst
- Security Consultant
- Information Security Auditor
- Ethical Hacker
- Information Security Crime Investigator
- Security Engineer
- Penetration Tester
- Security Architect
- SOC Analyst
- Malware Analyst
Software Tools
- Linux
- Burpsuite
- Nessus
- Cuckoo Sandbox
- Cisco Packet Tracer
- Autopsy
- REMnux
- OWASP
- Kali Linux
- Metasploit
- Wireshark
- Nmap
- Oracle VirtualBox
Skills
- Administering Linux systems securely, including implementing SELinux and iptables.
- Designing and implementing secure network architectures with firewalls, IDS/IPS, and VPNs.
- Conducting secure code reviews and implementing OWASP best practices in the SDLC.
- Identifying vulnerabilities and exploiting them using tools like Metasploit and Burp Suite.
- Conducting digital investigations using tools like Autopsy and FTK for evidence collection and analysis.
- Analyzing malware behavior using sandbox environments and aligning security processes with GRC frameworks like ISO 27001.
