Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
11 views1 page

55 Programcurriculum

The Post Graduate Certificate in Cyber Security program consists of two semesters covering various topics including Cyber Security Fundamentals, Incident Management, Web Security, Network Security, Cryptography, and Emerging Trends in Cyber Security. Each semester includes specific courses designed to provide a comprehensive understanding of cyber security principles, practices, and technologies. The program culminates in a project that integrates concepts learned throughout the course.

Uploaded by

Kiran Kesav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views1 page

55 Programcurriculum

The Post Graduate Certificate in Cyber Security program consists of two semesters covering various topics including Cyber Security Fundamentals, Incident Management, Web Security, Network Security, Cryptography, and Emerging Trends in Cyber Security. Each semester includes specific courses designed to provide a comprehensive understanding of cyber security principles, practices, and technologies. The program culminates in a project that integrates concepts learned throughout the course.

Uploaded by

Kiran Kesav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Post Graduate Certificate in Cyber Security

PROGRAMME CURRICULUM

Sem I Sem II
1. Cyber Security Fundamentals 1. Cyber Security Incident Management
1. Introduction to Cyber Security 1. Incident Management-Identification, Protection,
2. Cyber Security Terminologies Detection, Response, Recovery
3. Vulnerabilities, Threats, Threat Agents, Risks 2. Incident Response and Management
4. Types of hackers 3. Business Continuity Management (BCM) and
5. Types of Malicious Attacks Principles-Business Impact Analysis (BIA)
6. CIA / AIC Triad methodology
7. Cyber kill chain methodology 4. Business Continuity Planning (BCP), Disaster
8. Biometrics Recovery Planning (DRP)
9. Security Architecture and Design 5. Introduction to SIEM
2. Information Security Management Systems 6. SIEM Architecture
1. Security Engineering 7. Anomaly Detection
2. Cyber Security Architecture / Framework 8. Role of SIEM in Business Security Strategy
3. Importance of Information Security in Business 9. Properties of a Robust SIEM
4. Governance, Risk & Compliance 10. Case study.
5. Risk Management 2. Web Security, Application Security and Mobile Security
6. Cyber Security Policy, Standards, Procedures & 1. Common web vulnerabilities
Guidelines 2. Web application firewalls
7. Common International Compliance Frameworks (ISO 3. Web Application Security Risks
27001, NIST) 4. DevSecOps
8. IT and National Acts 5. Security challenges in mobile devices
9. International Legal and Ethical Considerations 6. Mobile App security
10. Cyber Crime and Cyber Law 7. Unified Endpoint Management (UEM)
8. Mobile Device and Application Management.
3. Network Security 9. Web Browser security
1. Overview of computer networks 10. Android Malware
2. Introduction to Network Security
3. Forensics Investigation & Audit
3. Firewalls and Intrusion Detection/Prevention Systems
1. Introduction to Digital Forensics and Audit
4. Demilitarized Zone (DMZ) 2. Role of Digital Forensics in Business Security
5. Proxy Servers and Application Layer Firewalls 3. Email Investigation
6. Network Security Protocols (SSL/TLS, IPsec, VPNs and 4. Mobile device Forensics
Remote Access Security) 5. Sans Investigative Forensics Toolkit (SIFT)
7. Operating System security 6. CAINE Forensic Environment
8. System and Software Security 7. Database and Cloud Forensic
9. Remote Access Security 8. Ethics in Digital Forensics
9. Forensics Analysis Tools
4. Cryptography and Applications
10. Anti-Forensic Techniques.
1. Principles of Cryptography
2. Symmetric and Asymmetric Cryptography 4. Emerging Trends in Cyber Security
3. Encryption and Decryption Techniques 1. Threat Intelligence
4. One-way Functions 2. Cloud Computing Fundamentals
5. Hash Functions 3. Cloud Security
6. Digital Signatures 4. Automotive Industry
7. Public Key Infrastructure (PKI) 5. SCADA
8. Key Management-Key Generation, Distribution, and 6. IOT
Storage, Public Key Infrastructure (PKI) 7. AI and machine learning in cybersecurity
9. Certificate Authorities (CA) 8. Blockchain and blockchain security
10. Encryption and Decryption Techniques 9. Current Threats and Mitigation
10. Targeted Ransomware
5. Assets Security, Identity and Access Management (IAM)
1. Asset Security 5. Project
2. Data Security Principles Culminating project integrating concepts from the entire
3. IAAA Principles of IAM program
4. Mandatory Access Control (MAC)
5. Discrete Access Control (DAC),
6. Role-Based Access Control (RBAC)
7. Rule-Based Access Control (RB-BAC)
8. Defence in Depth
9. Zero Trust Architecture (ZTA)
10. Financial Assests

You might also like