Certification Program Cyber Security Eict IIT Guwahati

  • Home
  • Certification Program Cyber Security Eict IIT Guwahati
Certification Program Cyber Security Eict IIT Guwahati
Certification Program Cyber Security Eict IIT Guwahati
Certification Program Cyber Security Eict IIT Guwahati
Certification Program Cyber Security Eict IIT Guwahati
logo

Certification program in Cyber security

Ethical Hacking & Penetration Testing

logo

Certification

Certification program in

Ethical Hacking & Penetration Testing

Program Highlights and Advantages

Comprehensive Curriculum

Practical learning and Real-world exposure

Expert ο»ΏGuidance

Placement Assistance

About the program

This advanced certification program in Cyber Security – Ethical Hacking and Penetration Testing is specially designed to impart comprehensive skills and hands-on expertise required to perform legal and authorized penetration testing and security audits. The curriculum is carefully curated to ensure learners receive training in cutting-edge tools and technologies as per global industry standards. Over the course of 3 months, learners will undergo rigorous training under the guidance of expert faculty and mentors.

The program will help learners understand security concepts, penetration testing methodology and develop practical skills to secure networks and prevent cyber threats. Learners will be trained in techniques to simulate unethical hacking and learn how to secure systems from vulnerabilities. The training also involves individual and teamed projects to test skills in different real-world scenarios. Upon completing the projects and assignments, learners will earn a prestigious international certification in Ethical Hacking and Penetration Testing.

Get in touch

Eligibility Criteria

  • Candidates must have a Bachelor’s degree in Engineering/Technology or equivalent from a recognized university.
  • Professionals with relevant work experience in IT fields like networking, programming etc. can also apply.
  • Would have graduated a bachelor’s degree with 50% Marks minimum

Who Can Apply?

  • Cyber Security Professionals looking to advance their skills.
  • Network and System Administrators wanting to enhance security profiles.
  • Engineers, Developers interested in security domain.
  • Fresh graduates seeking a career in the booming cyber security field.
  • Professionals from allied domains like forensics, law enforcement.

Applicants should have:

  • Basic Computer Fundamentals: Operating Systems, Hardware Components etc.
  • Network Fundamentals: Networking Protocols, Devices, Services etc.
  • Network Devices Fundamentals: Routers, Firewalls, Switches functioning knowledge.
  • Soft Skills: Effective communication and security awareness.
  • Continuous Learning: Interest in staying updated with Cybersecurity trends and technologies.

Key Learning Outcomes:

In summary, the program imparts deep expertise across domains like network, web, mobile and cloud pen\etration testing along with practical experience on industry-standard tools and technologies. Learners will be able to secure systems by applying ethical hacking techniques legally and help organizations strengthen security postures.

Mobile Penetration Testing:

  • Testing mobile applications for vulnerabilities, insecure authentication, sensitive data exposure etc. using tools like MobiSEC, AndroZap etc.
  • Attacking mobile devices for privileged escalation and persistence like jailbroken iOS devices assessments.

Network Penetration Testing

  • Scanning networks, services and hosts using tools like Nmap, Nikto, Whatweb for open ports and vulnerability identification.
  • Exploiting identified vulnerabilities to gain access or deny services using Metasploit framework.

Web Application Penetration Testing

  • Assessment of web apps like CMS, e-commerce for vulnerabilities like SQLI, XSS flaws using Burp Suite, ZAP etc.
  • Techniques to abuse functionality and bypass authentication in web apps.

Web Penetration Testing

  • Understanding Web Application Architectures.
  • Familiarity with Common Web Vulnerabilities.
  • Proficiency with Web Penetration Testing Tools.
  • Knowledge of Authentication and Authorization Mechanisms.
  • Experience with Manual Testing Techniques.
  • Report Writing Skills.

Wireless Network Hacking

  • Attacking wireless networks by capturing data with Wireshark and decrypting WEP/WPA security to spoof MAC or inject traffic.
  • Bypassing security mechanisms on common wireless standards like 802.11, Bluetooth etc.

Cloud Security Testing:

  • Testing security of IaaS, PaaS and SaaS cloud services deployed on Amazon AWS, Microsoft Azure etc. platforms.
  • Identifying misconfigurations, account takeovers and insecure deployment practices.

Through our comprehensive training programs, students gain in-depth knowledge and hands-on experience needed to excel in challenging roles across the industry. Some of the most popular career paths pursued by our alumni include:

Application Security Engineer :

Responsible for analyzing application vulnerabilities and building robust architecture. Junior engineers assess vulnerabilities while senior engineers lead security reviews of complex systems.

Network Security Engineer :Β 

Evaluate network security architecture which includes firewalls, intrusion prevention, VPNs and more. Hardening network perimeter defense and ensuring infrastructure compliance.

Mobile Security Engineer :

Conduct security evaluations of iOS and Android apps to identify exploits. Provide remediation guidance and custom assessment automation. Lead research on new mobile threats and proofs of concept.

Security Consultant :

Leverage expertise to advise clients on policies, procedures and compliance needs. Perform audits, architecture reviews, penetration tests and customize roadmaps for continuous improvement.

Penetration Testing Manager :

Oversee security test projects from kick-off to reporting. Develop testing frameworks, coordinate stakeholders and ensure high quality deliverables.

Red Team Specialist :

Simulate advanced attacks to challenge defenses through emerging techniques. Work with blue teams to strengthen overall security and maturity of organizations.

Who’s this program is for?

This program is designed to fulfill the upskilling requirements of undergraduate and graduating students specializing in BFSI, cybersecurity, and fintech fields who already have a basic technical understanding of cybersecurity. It is especially beneficial for those aspiring to pursue job roles/positions such as, but not limited to:

1.Β Ethical hacker

2.Β Network Security Consultants

3.Β Threat Hunters

4.Β Risk Assessment Analysts

5.Β Security Analysts

6.Β Junior Penetration Testers

7.Β Security Architects

8.Graduate students & working professionals

Application Submission:Β Step 1

Apply for the program by completing the application with one page cover letter stating your Interest and Qualifications for the program.

Application Review: Step 2

Admission Counselors will review applications and cover letter to Qualify your Application.

Admission:

Candidates admission will be confirmed by paying the program fee upon proper indication by the counselor or concern team/person.

Welcome to the Academy

Partnering with prestigious institutions like E&ICT Academy, IIT Guwahati and Securium Academy offers top-tier training opportunities that combine academic rigor with real-world relevance. These collaborations not only enhance the quality of the educational experience but also provide participants with credentials that are highly respected in the industry. Through its comprehensive training programs, hands-on learning approach, and strong industry connections, Securium Academy is committed to shaping the next generation of cybersecurity professionals and leaders.

Choose Your Preferred Learning Mode

Securium Academy

Flexibility Is Key

With student needs in mind, we provide multiple learning avenues and formats:

Securium Academy

Virtual Instructor-Led Training

Live online sessions at your convenience on our customizable training schedules.

Securium Academy

corporate-training

Recorded video lessons for on-demand access from any location

Course curriculum

Fundamentals and Essential Terminologies

Network Devices and Fundamentals

Introduction to Cyber Security & Information Security

Fundamentals of Ethical hacking Concepts

Understanding Ethical Hacking Concepts

CIA Triad, Hacker Terminologies

Hacking Phases,

Standards and Cyber Laws

Open Source Intelligence and Information Gathering

Active and Passive Information Gathering Techniques

Scanning Concepts

Scanning Techniques and Tools

Scanning beyond Firewall

Countermeasures

Enumeration Concepts

Enumeration Techniques

Enumeration Tools and Hands on

Windows and Linux Exploitation

Exploit Making

Windows exploitation

Linux Exploitation

Privilege Escalation

File Extraction Techniques

Clearing Tracks

Buffer Over Flow

Introduction to Malware Threats

Virus and Worm Making

Introduction to Trojans and RAT

Encoding and Obfuscation

Malware Analysis

Static Malware Analysis

Dynamic Malware Analysis

Network Attacks

Man in the Middle Attacks

Attacking Methodology – ARP Poisoning,

Dns Poisoning, SSL Stripping, DHCP Starvation Attacks

DOS Attack & DDOS Attack

Evading Firewall, IDS and Honeypots

Network Penetration Testing

Introduction to Internal Penetration Testing

Introduction to External Penetration Testing

Enumeration Concepts

Vulnerability Assessment

Exploit Research

Exploitation and Validation

Application Security Assessment/Penetration Testing

Introduction to Web Application, Web server Architecture

Fundamentals of Application and Application server

Information Gathering Techniques of Web Application

Introduction to Burpsuite and information gathering tools

Introduction to Application Security Standards

[OWASP, SANS, NIST]

Mobile Device Hacking

Mobile Hacking Techniques

Mobile Hacking Vectors

ADB

BYOD Policy

Cryptography and Fundamentals

Difference Between Encryption, Encoding

Different Encryption Techniques

Encryption at Rest

Encryption at Transit

Encryption Tools and Platforms

Bonus Module

Fundamentals of Reverse Engineering

Reverse Engineering by Algorithm Reversing

Reverse Engineering By File manipulation

Program Certification

  • Focuses on foundational concepts in cybersecurity.
  • Includes hands-on labs and real-world case studies.
certificate

Frequently Asked Questions

The advanced certification program is structured over 12 weeks, with a total estimated study time of 3 months.

Upon meeting all requirements, you will receive an Advanced Certification in Cybersecurity jointly issued by Electronics and ICT Academy at IIT Guwahati .

Classes are held in a blended flexible format – weekday evenings and weekends – to accommodate working schedules. You can also access recordings anytime on our learner portal.

To earn the certification, you must attend a minimum of 75% of all live sessions and submit all graded assignments by the due dates.

In case you are unable to join live, recordings of all sessions are available for on-demand viewing within 24 hours on our learning management system.

Interactive live classes facilitated by IIT Guwahati faculty and industry experts are held periodically on evenings and weekends through video conferencing.

Comprehensive course notes, textbooks, case studies, virtual labs, tools, and a curated reading list are accessible online for self-paced learning.

You will have access to class recordings, faculty notes, tools, and reference materials on our integrated online learning portal, ensuring you can review and study at your convenience.

Students can request a full refund within 15 calendar days from the enrollment date, as per our terms of service.

Please enable JavaScript in your browser to complete this form.
Name