This collaborative Industrial Program with Alcheringa, IIT Guwahati and partner companies is tailored to empower you with essential skills for mastering the fast-evolving domain of Cyber Security. Covering the latest trends, it delves into ethical hacking, Windows & Linux installation, password cracking, data concealment, cloud computing, and constructing resilient systems to thwart cyber threats, safeguarding confidential data from malicious exploitation.
What Will I Learn ?
All About Cyber Security
✓ Introduction to Cyber Security
✓ Importance of Cyber Security in Today’s Digital World
✓ Key Threats and Vulnerabilities
✓ Best Practices for Cyber Protection
Understanding Pillars of Cyber Security
✓ The CIA Triad: Confidentiality, Integrity, Availability
✓ Risk Management in Cyber Security
✓ Security Models and Principles
✓ Importance of Authentication and Access Control
Cyber Security Domains
✓ Network Security
✓ Application Security
✓ Information Security
✓ Cloud Security and its Challenges
✓ Identity and Access Management (IAM)
AntiVirus Fundamentals
✓ Understanding Malware and its Types
✓ Role of Antivirus Software
✓ Detection Techniques: Signature-based and Heuristic
✓ Limitations and Strengths of Antivirus Solutions
✓ Best Practices for Antivirus Protection
Ethical Hacking
✓ Definition and Role of Ethical Hackers
✓ Legal Aspects of Ethical Hacking
✓ Difference between White Hat, Black Hat, and Grey Hat Hackers
✓ Tools and Techniques for Ethical Hacking
Phases of Ethical Hacking
✓ Reconnaissance (Footprinting)
✓ Scanning and Enumeration
✓ Gaining Access
✓ Maintaining Access
✓ Covering Tracks
Advance Internship Projects
1. Build your own Hacking Environment
✓ Setting up Virtual Machines and Kali Linux
✓ Tools for Penetration Testing (Nmap, Metasploit, etc.)
✓ Safe and Legal Hacking Labs
✓ Configuring Networking for Ethical Hacking
2. Footprinting with NMAP
✓ Overview of NMAP and its Usage
✓ Types of Scanning Techniques (TCP, SYN, UDP)
✓ Identifying Open Ports and Vulnerabilities
✓ Network Mapping and Host Discovery
3. Tor to Protect your System
✓ How the Tor Network Works
✓ Importance of Anonymity and Privacy
✓ Setting Up and Using Tor
✓ Risks and Limitations of Using Tor
✓ Protecting Your System with Encryption and VPNs
Career Opportunities
✓ Network Security Engineer
✓ Cyber Security Analyst
✓ Chief Security Manager
✓ Chief Information Security Officer
✓ Information Security Analyst
✓ Ethical Hacker