POPULAR
immersive learning
600 Hours
NASSCOM CYBER SECURITY PROGRAM
In an increasingly digital world, cyber security is crucial for protecting sensitive information and maintaining the integrity of computer systems and networks. It prevents unauthorized access to personal data, financial records, and intellectual property, ensuring that critical information remains secure. Effective cyber security measures also ensure business continuity by minimizing disruptions and financial losses caused by cyber attacks. Additionally, it helps maintain trust and reputation with customers and stakeholders, who expect their data to be handled securely. Compliance with regulatory requirements is another key reason why cyber security is essential, as it helps organizations avoid legal penalties and adhere to industry standards. Ultimately, robust cyber security is vital for safeguarding digital assets, supporting operational resilience, and upholding trust in the digital age.
OUR KNOWLEDGE PARTNERS
600 Hours Nasscom Certified CYBER SECURITY PROGRAM
Cyber security is the practice of protecting systems, networks, and programs from digital attacks. In today’s digital landscape, with the increasing frequency and sophistication of cyber threats, mastering cyber security is more critical than ever. The NASSCOM Cyber Security Program is essential in equipping individuals with the knowledge and skills to combat these threats.
The 600-hour intensive curriculum covers a wide array of topics, including Python and Linux, information security, attack methodologies, web technologies, cryptography, network concepts, and incident handling. Participants delve into practical applications through hands-on modules on vulnerability assessment, penetration testing, security operations, and compliance. The program also includes specialized chapters on device log correlation, data management, and risk assessment, ensuring a comprehensive understanding of cyber security practices and principles. This robust training prepares individuals to effectively protect and manage digital infrastructures, making it an invaluable resource for aspiring cyber security professionals.
Program Structure
- 70 hour Pre-Learning: Before you embark on the live academic session, get ready for the Program. You will get a series of online recorded tutorials to understand the structure of Cyber security to know about the fundamentals which would enrich your future learning experience.
- 195 hours Program: Here, you will get execution-based learning experience on Python , Linux, information security, attack methodologies, web technologies, cryptography, network concepts, and incident handling.
- 20 hours Post Program:Learning does not stop here. After completing the modular training, you will work on Domain-specific Project , Assignments. Doubt clearing is also provided. You will be working on different capstone projects from a huge repository of data sets.
- 120-hours Capstone Project:After completing the main program, you will dedicate 120 hours to designing and developing your capstone project. This will allow you to apply all the skills and knowledge acquired throughout the course in a comprehensive, practical project.
lEARN WITH A WORLD CLASS CURRICULUM
Module 1. Python and Linux
- Day 1: Introduction to python, conditional statement, variables, data types, data structures, functions, request, OS, exception handling, file handling. .
- Day 2: Numpy, and Pandas .
- Day 3: What is Machine Learning, types of machine learning, scikit learn.
- Day 4: What is Natural Language Processing, stop words, Tokenization, Lemmatization, NLTK library.
- Day 5: Introduction to Attributes, scrapy Installation, spider building with scrapy, xpath.
- Day 6: Beautiful soup / Selenium, Installation and scrapping..
- Day 7: Twisted, nmap.
- Day 8: Pymetasploit.
- Day 9: Mechaniz.
- Day 10: Cryptography Library.
- Day 11: Basics of Linux, file permission, ownership, editors.
- Day 12: ftp, Apache.
- Day 13: samba, nfs .
- Day 14: shell scripting.
-
📚No. of Lectures: 14
-
⏳Duration of Lecture: 42 Hour
-
📝Assessment: 3
-
🌟Assignment: 3
Module 2. Information Security and Attack
- Day 15:
What is Hacking ? , Computer Security Threats, Goals of Ethical Hacking, Skills and Tools required for Ethical Hackers,
Process of Ethical Hacking, Process of Ethical Hacking – Demonstration Part 1,Process of Ethical Hacking
– Demonstration Part 2. - Day 16: Information Gathering Concepts, Foot printing, Reconnaissance, Active Passive Scanning
. - Day 17:
CIA (Confidentiality, Integrity & Availability) Threat, Vulnerabilities, Threat Actor, Risk etc definitions & concept.
Advanced Cyber Security – Threats and Governance, What are Threats?, Types of threats (spoofing, tampering, repudiation,
information breach, DOS, elevation of privilege),GitHub DDos Attack,. - Day 18: Types of attack(DOS, Phishing, Ransomware).
- Day 19: Introduction and importance to information security, elements of information security (purpose, audience and scope,
security objective-CIA, Authority and access control, data classification (level 1-5), support and operation, security
awareness, responsibilities rights and duty. Principle of Information security (Confidentiality, Integrity, Availability). - Day 20: Introduction to data security, types of data security (Encryption, Data Erasure, Data Masking, Data Resiliency),
data security strategy (Physical security of servers and user devices, Access management and controls, Backups).
- 📚No. of Lectures: 6
- ⏳Duration of Lecture: 18 Hours
- 📝Assessment: 2
- 🌟Assignment: 1
- Day 21: Practical on Metasploit and bwap .
- Day 22: bWAPP Features, Why should you learn bWAPP?, bwapp prct.
- Day 23: Dvwa feature and use.
- Day 24:Kali Linux (tool) Demonstration – Web Application attack: Broken Authentication, Demonstration – Web Application attack: Blind SQL Injections, Demonstration – Web Application attack: Cross site scripting.
- Day 25: Web Application Domain, Web Application Domain: Common Attacks, Hacking Methodology,.
- Day 26: “Mobile Application Domain, Mobile Application Domain: Types of Android Attacks, steps of Incident preventation, network reconnaissance incidents (host detection, port enumeration, vulnerability assessment), DoS, Malicious Code,”.
- Day 27:“Information gathering (Spiders, Robots and Crawlers/Search Engine Discovery/Reconnaissance/Testing Web Application Fingerprint/. Analysis of Error Codes:)” .
-
📚No. of Lectures: 7
-
⏳Duration of Lecture: 21 Hours
-
📝Assessment: 2
-
🌟Assignment: 1
- Day 28: “Remediation Planning, Encryption, What is Encryption?, Prerequisites for Encryption, How does Encryption work?, Vulnerability Assessment”.
- Day 29:“What is Decryption? , Encryption Vs Decryption, Types of Encryption, Encryption Algorithms and Protocols, Web application architecture, Web application attacks, Web server architecture, Web server attacks”.
-
📚No. of Lectures: 2
-
⏳Duration of Lecture: 6 Hours
-
📝Assessment: 1
-
🌟Assignment: 1
- Day 30: “Introduction to information security controls, types of controls (organizational control, people control, physical control, technological control), preventive, corrective and digestive control,”.
- Day 31: OSI concept, Protocols, ARP, SMTP, ICMP, TCP, 3 way Handshaking.
- Day 32: “Security Market Outlook, Computer Networks – Architecture, Layered architecture, Open Systems Interconnect (OSI) Model, Transmission Control Protocol/Internet Protocol (TCP/IP), Network Scanning, Enumeration, Common Network Threats/Attacks, Packet Inspection,”.
- Day 33: Deep Packet Inspection(Intrusions detection system and Intrusion Prevention, System), IP Security, ICMP attacks.
- Day 34: “TCP and UDP Security. Attacking Availability: Denial-of-Service, attacks, Distributed DOS attacks, SSL/TLS Data/Application Security: confidentiality, Integrity, availability, authorization, authentication, identification, non-repudiation, types of control (preventive, detective, corrective, deterrent, recovery, compensating), access control, Security Vulnerability Management”.
- Day 35: “Network devices (Hub, Switch, Router, Bridge, Gateway, Modem, Repeater, Access Point), Configuration of network devices, Network configuration tool, Firewall, Firewall configuration,”.
-
📚No. of Lectures: 6
-
⏳Duration of Lecture: 18 Hours
-
📝Assessment: 2
-
🌟Assignment: 2
- Day 36: “Introduction to data leakage (direct losses and indirect losses.), Types of Data Leakage, NPI (e.g. Customer Data), Confidentiality Info, PHI (e.g. Patient’s Records),Intellectual Property, Data Leak Vector :- HTTP, Email, Networked Printer, End Point, Internal Mail,”.
- Day 37: IM, Webmail, Data Classification, types of data classification, steps and process of data classification,.
- Day 38: “Content awareness, Content analysis techniques (rule based, data based finger printing, partial document matching, lexicon), DLP (data in motion, data in rest, data in use), DLP limitation, DLP using DRM,”.
- Day 39: “DEFINITION OF EVENT CORRELATION, EVENT CORRELATION USE CASES AND TECHNIQUES, BENEFITS OF EVENT CORRELATION, Event log,”.
- Day 40: “Key concept of log management (log, event, incidents), log management process and challenges, configuration of windows event log, SIEM, Remote Software Access, Web Proxies, Firewall, Routers.”.
- Day 41: “What is Data backup, Importance of data backup, why to backup, RPO, RTO, Types (Mirror, Full, Differential, incremental backup, Cloud Backup, FTP backup,),”.
- Day 42: “Storage types (local or USB Disks, Network Shares and NAS, Data Backup to Tapes, Cloud Storage, ), Backup Procedures,”.
-
📚No. of Lectures: 7
-
⏳Duration of Lecture: 21 Hours
-
📝Assesment: 2
-
🌟Assignment: 2
- Day 43:
“Information Security Policy, Top Information Security Threats (Unsecure or Poorly Secured Systems,
Social Media Attacks, Social Engineering, Malware on Endpoints, Lack of Encryption,”. - Day 44:
Security Misconfiguration, Active and Passive Attack, Cyber Security Regulations, Roles of International Law, the state and Private Sector in Cyberspace, Cyber Security Standards. The INDIAN Cyberspace, National Cyber Security Policy 2013. Elements of an information security policy (Purpose, scope, Objective, authorization and access control, classification, data support operation, Security standard and guideline(COSO, COBIT,ITIL, NIST, NSA, ISO, IT act, Copyright, Patent law, IPR), Laws of Indian Govt.,. - Day 45:
Cyber Security Landscape Cyber security Policy Management , Cyber Security Policy Ecosystem, Cyber Security Policy ,Management Design, Cyber Security FrameWorks, ISMS Environment, Frameworks, ISO27001 Standard. - Day 46:
“Security Metrics, Types of Security Metrics (Strategic security metrics, Security management metrics,Operational security
metrics), Mean-Time-to-Detect and Mean-Time-to-Respond, Number of systems with known vulnerabilities, Number of
SSL certificates configured incorrectly,Volume of data transferred using the corporate network,”. - Day 47:
“Number of communication ports open during a period of time, Frequency of review of third-party accesses, frequency of
access to critical enterprise systems by third parties, Percentage of business partners with effective cybersecurity policies”. - Day 48:
“Introduction to Risk Assessment, Identification of Risk assessment, Risk assessment model (Identification, Assessment,
Mitigation, Preventation), role and need of risk assessment”.
- 📚No. of Lectures: 6
- ⏳Duration of Lecture: 18 Hours
- 📝Assesment: 1
- 🌟Assignment: 1
- Day 49: “Hierarchy of Information security (Board of Director, CIO, CISO, CEO, System Architect, System Engineer, Security Director, System Admin, Security Analyst, IS Auditor, DB Admin), Importance of information security policy, element of information security (purpose, audience, CIA, encryption policy, data backup policy,”.
-
📚No. of Lectures: 1
-
⏳Duration of Lecture: 3 Hours
-
📝Assesment: 0
-
🌟Assignment: 0
Module 3. Configuration and Incident Handling
- Day 50:“Incidents, types of Incidents, Impact of incidents, Information (alert,logs, network flow), Phases of incident handling, incident response life cycle”.
-
📚No. of Lectures: 1
-
⏳Duration of Lecture: 3 Hour
-
📝Assessment: 1
-
🌟Assignment: 0
- Day 51: “Firewall, why firewall, DMZ, troubleshooting Cisco IOS Firewall, troubleshooting routers, , anti virus and anti spam ware, incident response process (identification, recording, response, communication, containment, classification, investigation),”.
- Day 52: Unauthorized Access Incidents, Traffic filtering( NAT-Network Address Translation, VPN- Virtual Private Network.
- Day 53: “IDP-Intrusion Detection & Prevention, CISCO IOS Firewall IDS Configuration Initializing Cisco IOS Firewall IDS , Initializing the Post Office, Configuring and Applying Audit Rules, Verifying the Configuration),”.
- Day 54: IPS configuration, IPS Tuning, SNMP Configuration, Configuration of MoD Security,.
- Day 55: Patch Management (windows Server Update Services).
-
📚No. of Lectures: 5
-
⏳Duration of Lecture: 15 Hours
-
📝Assessment: 1
-
🌟Assignment: 1
Module 4. Security Operation
- Day 56: What is Vulnerability, Need of Vulnerability, Types of Vulnerability assessment (Host assessment, Network and wireless assessment, Database assessment, Application scans, active, passive, internal, external), Vulnerability Assessment Process, Vulnerability Classification (Misconfigurations).
- Day 57: Default installations, Buffer overflows, Unpatched servers, Default passwords, Open services, Application flaws, Open system flaws, Design flaws).
- Day 58: Demonstration – SQL Injection, WordPress Plugin SQL Vulnerability.
- Day 59: Buffer Overflow & Vulnerabilities Case Study: WhatsApp Attack, VA tools (Nmap, Nessus, Whisker, Enum.Firewalk).
-
📚No. of Lectures: 4
-
⏳Duration of Lecture: 12 Hour
-
📝Assessment: 1
-
🌟Assignment: 1
- Day 60: “Configuration Management, Server, Server Hardening, Server and attack prevention, SecCM planning, Penetration Testing, CM tools (Solar Wind),Benefits of Configuration Management,”.
-
📚No. of Lectures: 1
-
⏳Duration of Lecture: 3 Hours
-
📝Assessment: 0
-
🌟Assignment: 0
- Day 61: “What is and Why penetration testing, Stages (pre attack, attack phase, post attack), Planning and reconnaissance, Scanning, Gaining Access, Maintaining access Analysis, SIEM, SySLog, Social Engineering”.
-
📚No. of Lectures: 1
-
⏳Duration of Lecture: 3 Hours
-
📝Assessment: 1
-
🌟Assignment: 1
- Day 62: “SQL Injection threat, Malware, Password attack, Zero-day attack), virus, worm, trojan, what are Vulnerabilities?, Vulnerability Categorization, SQL Injection Anatomy, Cross Site Scripting Anatomy,”.
-
📚No. of Lectures: 1
-
⏳Duration of Lecture: 3 Hours
-
📝Assessment: 0
-
🌟Assignment: 0
- Day 63: “Information Security Audit, what is IT Security Audit? ,Scope of audit, Benefit and Types of Audit(Approach Based, Methodology Based(Penetration Tests, Compliance Audits, Risk Assessments, Vulnerability Tests, Due Diligence Questionnaires),case studies of security audit”.
- Day 64: “conduct an IT security audit using (Metasploit Framework, OWASP), Phases of audit, audit methodology, role, responsibility, skills , ethics of auditor,”.
- Day 65: “4 phases of information gathering, what is internal and external security audit and their steps, firewall security audit, types of firewalls, Intrusion Detection System, ISD security audit steps, social engineering audit.”.
-
📚No. of Lectures: 3
-
⏳Duration of Lecture: 9 Hours
-
📝Assessment: 1
-
🌟Assignment: 1
Module 5. CAPSTONE PROJECT
- Keylogger Software
- Network Traffic Analyser
- Password Analyser and many more
SKILLS YOU WILL POSSESS
✔️ Python and Linux
✔️ Data Analysis
✔️ Web Scraping and Automation
✔️ Information Security and Ethical Hacking
✔️ Web Technologies and OWASP
✔️ CryptographyNetwork Security
✔️ Data Management and DLP
✔️ Compliance and Risk Management
✔️ Incident Handling and Security Operations
✔️ Information Security Audit
PROGRAM BENEFITS
✔️ Cutting Edge Curriculum: Hand crafted Course content made by Experts from various Industries. Learn through Practical case studies and multiple projects.
✔️ On the Go Learning: Online accessible E-learning Material, recorded lectures, case studies and Research Paper through our system.
✔️ Build Solid Foundation: 195 hours focused course on CYBER SECURITY.
✔️ Industry Mentorship: Get 1 to 1 guidance from Industry experts and start your career in Cyber Security.
✔️ Earn a Government of India approved & globally recognized certificate by NASSCOM IT- ITes SSC by clearing NASSCOM assessment examination.
Course Certificates
Career Services By emergingindiagroup
Placement Assistance
Exclusive access
Mock Interview Preparation
1 on 1 Career Mentoring Sessions
Career Oriented Sessions
Resume & LinkedIn Profile Building
Real World Projects
Projects will be a part of Our 600 Hours Nasscom Certified Full Stack Cyber Security Program to solidify your learning. They ensure you have real-world experience in Development and Operations.
- Practice 25+ Essential Tools
- Designed by Industry Experts
- Get Real-world Experience
Our Alumni Works At
Learners thought about us
Admission Details
Submit Application
Tell us a bit about yourself and why you want to join this program
Application Review
An admission panel will shortlist candidates based on their application
Admission
Selected candidates will be notified within 1week.