NIT Rourkela | Advanced Executive Programme in Cyber Security

9 Months | Online | 400+ Hours of intensive learning

Course Snapshot
  • FeeINR 175000 + GST (Installments starting at INR 14K per month)
  • Work Experience0 - 30 Years
  • Duration9 Months
  • Delivery MethodOnline
Course Detail

Why enroll in this Program?
There has been a whopping 94% growth in the number of cybersecurity job postings in the last six years and studies suggest that the demand for cybersecurity professionals is exceeding the supply. This lack of talent means that top global companies like Amazon, Google, Cisco, Visa, and KPMG are willing to spend a lot more on professionals with the skills to outsmart phishers, hackers, and cybercriminals.

Don't you want to be a part of this zeitgeist?
The NIT Rourkela faculty, Edureka experts, industry veterans, a large pool of SMEs and learners have jointly collaborated to create this online PG Program in Cybersecurity. This Post Graduate Program is a rigorous 9-month program with over 400+ hours of intensive learning designed to make you not just industry ready but also primed to excel.

Program Features
● 9 Months online Post-Graduate program
● NITR Certificate on Completion
● Mentoring from NITR ptofessors
● Connect with Industry Veterans
● Mentoring by E & ICT Academy, IITK professors
● 21+ Assignments & Industry Projects
● 24x7 expert support
● 400+ hours of intensive learning
● Custom Cyber Lab with 27+ Practicals
● 100% Placement Assistance

About NIT, Rourkela
The National Institute of Technology, Rourkela is one of India's top colleges and ranked 2nd among NITs by MHRD. NITR has also been recognized as an Institute of National Importance by the Government of India. NITR has partnered with Edureka to design this online Post-Graduate Program in Cybersecurity in order to develop the next cadre of highly skilled professionals and experts in the field of Cybersecurity.

About Edureka PG Programs
Edureka is an online education platform focused on delivering high-quality learning to technology professionals. The company has the highest course completion rate in the industry and they strive to create an online ecosystem for global learners to equip themselves with industry-relevant skills in today's cutting edge technologies. Edureka houses a team of dedicated instructors with vast industry experience backed by a support team that works round the clock, ready to help their learners maximize their experience.

Desired Candidate Profile

● A graduate with degrees such as BCA, MCA, B.E or B.Tech
● An aspiring candidate should have studied PCM in 10+2

Course Modules

MODULE 1: Operating System and Network Fundamentals
● Linux Fundamentals
● Cybersecurity Tools In Kali Linux
● System Security and Protection
● Basics of Networking
● Network Security
MODULE 2: Cryptography
● Introduction to Cryptography
● Symmetric Ciphers
● Asymmetric Ciphers
● Pseudo-Random Number Generation
● Steganography and Data Integrity Algorithms
MODULE 3: Infrastructure Security
● Security Fundamentals
● Device Security
● Topologies and IDS
● System Hardening
MODULE 4: Application Security
● Authentication and Authorization
● Session Management
● Web Security
● Database Security
● File Security
● Mobile Security
● Secure Development Methodologies
MODULE 5: Basics of Ethical Hacking
● Introduction to Ethical Hacking
● Anonymity
● Information Gathering
● Scanning Networks
● Enumeration
● Vulnerability Analysis
MODULE 6: Device Hacking
● Operating System Hacking
● Hacking Wireless Networks
● Cloud Hacking
● IoT Hacking
● Malware Threats
● Sniffing
MODULE 7: Web Application Hacking
● Introduction to Web Application Hacking
● Social Engineering
● Session Hijacking
● SQL Injection
● OWASP Top 10 - Part 1
● OWASP Top 10 - Part 2
● OWASP Top 10 - Part 3
MODULE 8 : Enterprise Security Architecture
● Introduction to Enterprise Security
● Planning the Security Architecture
● Designing the Security Architecture
● Security Architecture: Operations
● Security Governance and Risk Management
MODULE 9 : Digital Forensics
● Introduction to Digital Forensics
● Data Recovery and OS Forensics
● Email Crimes and Violations