Linux – FDP
Cyber Security – FDP
This cybersecurity course provides a solid foundation in information security, ethical hacking, cryptography, and cybercrime. Covering essentials such as security risk management, cryptographic methods, ethical hacking techniques, and types of cyber threats, the course prepares students with hands-on knowledge for tackling modern security challenges. Whether you’re aiming for CISSP certification, understanding encryption, or exploring cyber-attack prevention, this course delivers core skills and insights essential for a career in cybersecurity.
Programming in Python
This course is a concise yet comprehensive program tailored for B.Tech/MCA/BCA/M.Tech students and corporate professionals. Covering Python fundamentals, control flow, functions, file handling, and object-oriented concepts, participants gain hands-on experience to code, analyze data, and develop applications efficiently. No prior experience required, making it ideal for beginners and experienced programmers alike.
Program Duration
18 hours
Learning Format
Self-Paced Learning
Course Price
₹499 (Inc. GST)
Our Alumni Work At
Course Curriculum
- Course Introduction
- Security and Risk Management Part-1
- Security and Risk Management Part-2
- Asset Security
- Security Architecture and Engineering – Part 1
- Security Architecture and Engineering – Part 2
- Communication and Network Security
- Spotlight Video One
- Identity and Access Management(IAM)
- Security Assessment and Testing
- Security Operations
- Software Development and Security
- Spotlight Video Two
- Quiz
- What is Cryptography?
- Symmetric and Asymmetric Key for Cryptography
- Hashing
- DES and AES Algorithms
- Digital Signature Algorithm
- Rivet-Shamir-Adleman Encryption
- MD5 Algorithm
- Secure Hash Algorithm
- SSL Handshake
- Frequently-Asked Interview Questions
- Importance of Ethical Hacking
- What is Ethical Hacking?
- Types of Hackers
- Who is an Ethical Hacker?
- Why we need Ethical Hackers
- Skills of an Ethical Hacker
- Ethical Hacking Tools
- Kali Linux Installation
- Metasploit Attack
- Who is a certified Ethical Hacker?
- Why CEH Certification
- Ethical Hacking Certifications
- Ethical Hacking Career
- Areas of Ethical Hacking
- What is Cybersecurity?
- Basic Network Terminologies
- The Rise of Cybercrimes
- What is a Cybersecurity Threat
- Different types of Cyber Attack
- SQL Injection Attack
- Denial-Of-Service(DDOS) Attack
- Insider Threat and other Cyber Attacks
- Brute Force Attack
- Ways to prevent Cyber Attacks
Program Outcomes
Understand key information security principles and frameworks.
Utilize cybersecurity tools for
practical security
operations.
Explain and apply basic cryptographic techniques and algorithms.
Prepare for careers in cybersecurity with knowledge of certifications and roles.
Identify various cybercrime types and associated threats.
Demonstrate foundational skills in ethical hacking and security assessments.
Certification Benfits
- Enhanced career opportunities
- E&ICT Adacemy, IIT Kanpur Certification
- Recognition and credibility in the industry
- Skill development and professional growth
Prerequisites
- No experience is required. But fundamental knowledge of C/C++ and statistics would be helpful.
Admission Closes on 5 March
Skills Covered
- Business Strategic & Analytics
- Operations Management
- Decision Making Tools
- Finance & Economics
- Marketing Management
- Organizational Behavior and Design
- Human Resource Management
- Breakthrough Management
- Management Communication
- Green Manufacturing
- Ethics & Values in Business
- Interpersonal Skills & Leadership
- Vision to Execution Entrepreneurship
- Micro and Macro Economics
- Leadership & Decision Making
- Frontier Technologies in Manufacturing
- Strategies for Managing Innovation
- Technology Management
- Advance Materials
- Automation & Robotics in Manufacturing
- Computer Integrated Manufacturing Systems
Know your faculty
Prof. Amey Karakare
Prof. Amey Karakare is a Head Of The Department (HOD) for CSE branch at IIT Kanpur. Developed and maintains Prutor, a renowned Learning Management System (LMS) for programming courses, enhancing the learning experience for students and streamlining tasks for instructors since 2013. Recognized with prestigious awards including the 1989 Batch Faculty Award from IITK Alumni Association and the Best Faculty of the Year 2018 award from the Computer Society of India’s Mumbai Chapter. Offers popular online Python courses that have garnered significant popularity among Indian students and faculty members. Conducts Faculty Development Workshops on diverse topics, including Python programming, Machine Learning, and High-Performance Computing, contributing to educational advancement. Key involvement in high-impact projects sponsored by government agencies, such as setting up Rashtriya Avishkar Labs in over 150 schools and leading the Electronics and ICT Academy at IIT Kanpur, dedicated to training faculty and students.
How this course Benefits you :
- Career Advancement: Gain essential skills and knowledge that enhance your employability in the rapidly growing field of cybersecurity.
- Certification Preparation: Equip yourself with the foundational knowledge needed to pursue CISSP and other cybersecurity certifications.
- Hands-On Experience: Develop practical skills through real-world scenarios and tools, preparing you for immediate application in the workplace.
- Comprehensive Understanding: Build a robust understanding of cyber threats, vulnerabilities, and prevention strategies to protect organizations effectively.
- Networking Opportunities: Connect with like-minded individuals and professionals in the cybersecurity community, fostering potential collaborations and career opportunities.
Who is this course for :
- Individuals looking to start a career in cybersecurity, including recent graduates and career changers.
- Those already working in IT who want to expand their knowledge and skills in cybersecurity principles and practices.
- Professionals seeking to understand cybersecurity fundamentals to enhance organizational security posture and make informed decisions.
College or university students pursuing degrees in computer science, information technology, or related fields who wish to deepen their knowledge in cybersecurity.
- Individuals responsible for ensuring that organizations comply with security regulations and managing cybersecurity risks.
Hobbyists or enthusiasts who want to learn more about protecting themselves and their data in a digital world.
Course Fee
TOTAL PROGRAM FEE
₹ 499 (Inc. GST)
- Course Type: Self-Paced Learning
- Skill Level: Beginner
- Certificate: Yes
Data Science Course Fee
- A bachelor's degree with an average score of at least 50%
- Prior knowledge or experience in programming and mathematics
- 2+ years of formal work experience (preferred)
Best Suited For
- Software Engineers
- Freshers
- BI Developers
Important Dates
22nd September, 2022 (Thursday)
- Online portal for application opens
18th November, 2022 (Friday)
- Online portal for application closes
18th November, 2022 (Friday)
- Receipt of letters of recommendation by Referees closes
23rd November, 2022 (Wednesday)
- Last date of receipt of physical applications
26th November, 2022 (Saturday)
- Shortlisting candidates for written test
11th December, 2022 (Sunday) (tentative)
- Written test at 4 locations (Delhi, Calcutta, Mumbai, Chennai)
14th December, 2022 (Wednesday)
- Shortlisted candidates for personal interview
1st January, 2023 (Sunday)
- Personal interview at IIT Kanpur
03rd January, 2023 (Tuesday)
- Selected candidates for admission
Apply Now
FAQs
E&ICT Academy, IIT K Certification is considered highly valuable and with hands on experience, getting a job would become that much more easy.
- B.Tech/MCA/BCA/M.Tech Students
- Working Professionals from Corporate
No