Chat

iimjobs

jobseeker Logo
Now Apply on the Go!
Download iimjobs Jobseeker App and get a seamless experience for your job-hunting

IIT Jammu | Post Graduate Diploma in Cyber Security (Batch 02)

Post Graduate Diploma in Cyber Security

Course Snapshot

  • FeeINR 2,56,000/- + GST
  • Work Experience5 - 30 Years
  • Duration12 Months
  • Delivery MethodOnline

Course Detail

Programme Overview

With the increasing reliance on digital technologies across various sectors, there is a growing demand for professionals who can effectively safeguard sensitive information and systems from cyber threats. The Post Graduate Diploma in Cyber Security from IIT Jammu is a comprehensive programme designed to equip learners with the knowledge, skills, and expertise required to address the complex challenges of cyber security in today's digital world.

Get ready for an interactive journey where you'll explore various symmetric and asymmetric cipher schemes through practical assignments and gain invaluable experience in applying these concepts in the real world.

Programme Highlights:

  • 12 month rigorous curriculum covering key cyber security concepts.
  • Live online learning with IIT Jammu faculty and industry experts.
  • Flexible weekend schedule.
  • Hands-on practical learning with real-world projects.
  • Five-day campus immersion for enhanced learning (optional).
  • IIT Jammu's Alumni Status.

Desired Candidate Profile

  • Qualifying degree - B.E/B.Tech/MCA or M.Sc./MS in IT, CS, ECE, EE, or any related fields are eligible.
  • No prior work experience is required.
  • Fresh graduates can register in this programme.
  • Eligibility criteria for this programme will be 60% or 6 CGPA in the qualifying degree.
  • Candidates with 10+ years of experience are eligible with 55% in their qualifying degree.

Career Support:

  • Personal Branding: Profile creation on professional networking platforms & focus on personal branding.
  • Business Communication: Role and Importance of effective communication in professional world.
  • Industry Session -1: Session by industry expert.
  • Job Search Strategy: Resume building and review.
  • Interview Preparation: Pre, In and post interview practices.
  • 1:1 Personalised Coaching: 1:1 Personalised Coaching - 45 minutes each learner.
  • Industry Session -2: Session by industry expert.

Course Modules

Semester 1

Module 1: Mathematical Foundations and Cryptography

  • Divisibility, Modular Arithmetic, Algorithms for Integer Operations.
  • Prime Numbers, Congruence, Solving Congruences, Fermat's Little Theorem.
  • Sets, Relations and Mapping, Closure Property, Monoied, Group.
  • Rings and Fields, Operations on Finite Field, Polynomials Over Finite Field.
  • Random Variable and Sample Space, Expectation and Variance.
  • Classical Encryption Scheme and their Cryptanalysis: Shift Cipher.
  • Block Ciphers and Stream Ciphers: Substitution Permutation Networks, Linear Cryptanalysis.
  • Asymmetric Cryptography: RSA, Diffie Hellman, Elliptic Curve.
  • Hash Function, Message Authentication, and Digital Signature Schemes.

Module 2: Computer Networking

  • History of Computer Networking, Packet and Circuit Switching, Delays, Protocol Layers.
  • Application Layer, Network Application Architecture, Web and HTTP, FTP, SMTP, DNS.
  • Transport Layer, Multiplexing and Demultiplexing, UDP, Reliable Data Delivery Principles, TCP.
  • Network Layer, Virtual Circuit and Datagram Networks, IP, Routing and Forwarding, Router.
  • Link Layer, Error Detection and Correction, Multiple Access Control, Ethernet 802.
  • Switching, Switches, VLANs.
  • Wireless Links, 802.11 Architecture and Protocols, Bluetooth and Zigbe.
  • Physical Layer: Wireless Propagation and Performance Analysis.

Module 3: Operating Systems Fundamental

  • Introduction to Operating Systems: OS Evolution, Services, System Calls, Operating System Structure and Architecture, System Programme, OS booting.
  • Process Concepts and Scheduling, Inter-process Communication, Threads, and Multithreading Concepts.
  • CPU Scheduling, Scheduling Algorithms, Multiprocessor Scheduling, Process Synchronisation, Monitors, Semaphores, Deadlocks.
  • Memory Management: Paging, Memory Allocation, Swapping, Virtual Memory, Thrashing.
  • Storage Management: File Concepts, Directory Concepts, Allocation Methods, Free Space Management, Disk Management, and Scheduling.
  • Access Control and Authentication, Memory Protection Concepts, Programme Threats, Malware Analysis.

Module 4: Introduction to Cyber Security

  • Introduction to Cyber Security: What is Cyber Security, Cyber Threats, CIA Principles, OSI Security Architecture.
  • Cyber Kill Chain/Hacking Methodologies, MITRE Attack Framework.
  • Multilevel Security Models: Bell LaPadula Model and Biba Model.
  • Security Design Concepts: Principle of Least Privilege, Defense in Depth, Compartmen- talisation.
  • Cyber Attacks Case Study and Discussions, Cyber Security Resources and References.

Module 5: Technical Seminar

  • Identify and Choose Issues of Practical Importance in the Area of Security.
  • Learn How to Get Systematic Literature on a Technical Subject and Perform Critical Thinking, Aims and Motivation.
  • Learn Components of A Good Technical Presentation/Report, Soft Skills.
  • Learn Comparative Analysis, How to Identify Gaps, Practical Implementation, Verification and Validation of Technical Content.
  • Final Presentation, Feedback and Discussion.

Semester 2

Module 1: Web Application and Network Security

  • Introduction to Web Application Security: OWASP Security Risks, XSS, CSRF, SSRF Attacks and Countermeasures.
  • Symmetric Key Distribution Techniques, Public Key Infrastructure and Applications, HTTPS, TLS, X.509.
  • DNS and Email Security: Cache Poisoning, Reflection, Tunnelling, Spoofing, DNSSEC
  • Attacks on Transport Layer, Network Layer, and Data Link Layer and their Countermeasures, Network Programming Concepts.
  • Intrusion Detection Systems, Firewalls, Proxies, Caches, Honeypots, Case Studies.

Module 2: Multimedia and Digital Forensic

  • Fundamentals of Digital Forensics.
  • Multimedia Forensics, Format-based Forensics, Pixel-based Forensics, Statistical-based Forensics, Camera-based Forensics, Homomorphic Encryption.
  • Framework for Digital Forensics Evidence Collection and Processing, Incident Response.
  • Disk and Mobile Forensic Techniques, Mobile Device Security Analysis, Incident Response.

Module 3: System and Software Security

  • Fundamentals of Linux and Windows OS.
  • Programme Binary Formats, Libraries Linkers and Loaders, Process Layout, Stack Layout, Heap Layout and Customisation.
  • Programming Language Weakness, Stack Smashing Heap Spray, Return Oriented Programming.
  • Principles of Defences, Address Space Randomization, Stack Canaries, Data Execution Prevention.
  • Vulnerability Analysis and Standardization, Scanners, Binary Diffing, Malwares and Analysis.
  • Reverse Engineering, Use Cases and Examples.
  • Software Security Issues and Best Practices.

Module 4: Special Topics in Cyber Security

  • OWASP Cloud Security Risks, Virtualisation and Related Setbacks, Co-Residency Attacks and Countermeasures.
  • Hyper Jacking, Rootkits, Hypervisor Vulnerabilities, XEN, KVM and Related Case Studies, Defenses in Azure, AWS, Data Security.
  • IoT and SDN Security Issues and Challenges.
  • Machine Learning for Security: Application of Machine Learning in Solving Various Problems in the Domain of Security, Deep Fake Detection.
  • Data Security and Privacy Issues: Frameworks and Standards, Cyber Security Laws.

Module 5: Applied Cyber Security Project

  • Problem Statement Discussion and Literature Survey.
  • Research Gaps Identification, Architecture the Solution.
  • Experimentations and Analysis.
  • Article or Publication Writing and Demonstrations.

Tools:

  • Wireshark
  • Tcpdump
  • BurpSuite
  • Zed Attack Proxy
  • BwAPP
  • Nmap
  • Hping
  • Hashcat
  • Volatility
  • FTK Imager
  • IPTables Firewall
  • ProcDump

Assignments/Case-studies/Projects

  • Design and Development of Intrusion Detection Systems.
  • Develop Security Related Protocols for Low Powered Device.
  • Design and Development of Intrusion Prevention Systems and Honeypots.
  • Develop Email Security and Anti Phishing SolutionsDigital Forensics Solutions.
  • AI powered Cyber Offense/Defense.
  • Homomorphic Encryption Applications.
  • Design and Develop IAM solutions for Infrastructure.
  • Develop Security solutions for Hypervisor and Virtualized Resources in CloudVPNS and Proxy Development.
  • PKI and Applications Development.