Powered by:

Powered by:

IBM

IBM

Logo
Logo
Logo
Logo

Cyber Security

Cyber Security

Become a Digital Guardian: Master Cyber Security & Protect Your World (From Hackers to Heroes)

Become a Digital Guardian: Master Cyber Security & Protect Your World (From Hackers to Heroes)

Become a Digital Guardian: Master Cyber Security & Protect Your World (From Hackers to Heroes)

DURATION

3 months

Intensive

MODE

LIVE Online

Intensive

FORMAT

Hybrid

Hands-on, Theoretic

STARTING

June, 2024

Program Details

Program Details

Program Details

Empower yourself to protect the digital world! Our Cyber Security Pre-graduation program equips you with the most sought-after cybersecurity skills. Dive deep into advanced penetration testing frameworks, incident response with industry-standard forensics suites like EnCase and Wireshark, and learn to design secure architectures. Master threat intelligence platforms like ThreatConnect, automate security tasks, and navigate cloud security tools like AWS Security Hub. Additionally, gain proficiency in encryption methods and scripting languages like Python and Bash – the foundations for powerful security automation. Don't wait – graduate with the knowledge and skills to become a cybersecurity leader!

Empower yourself to protect the digital world! Our Cyber Security Pre-graduation program equips you with the most sought-after cybersecurity skills. Dive deep into advanced penetration testing frameworks, incident response with industry-standard forensics suites like EnCase and Wireshark, and learn to design secure architectures. Master threat intelligence platforms like ThreatConnect, automate security tasks, and navigate cloud security tools like AWS Security Hub. Additionally, gain proficiency in encryption methods and scripting languages like Python and Bash – the foundations for powerful security automation. Don't wait – graduate with the knowledge and skills to become a cybersecurity leader!

Empower yourself to protect the digital world! Our Cyber Security Pre-graduation program equips you with the most sought-after cybersecurity skills. Dive deep into advanced penetration testing frameworks, incident response with industry-standard forensics suites like EnCase and Wireshark, and learn to design secure architectures. Master threat intelligence platforms like ThreatConnect, automate security tasks, and navigate cloud security tools like AWS Security Hub. Additionally, gain proficiency in encryption methods and scripting languages like Python and Bash – the foundations for powerful security automation. Don't wait – graduate with the knowledge and skills to become a cybersecurity leader!

Who should enroll?

Who should enroll?

Who should enroll?

- You want to start learning cyber security from scratch.

- You have an interest in understanding how to protect digital information.

- You aim to build a foundation in cyber security to enhance your career prospects.

- You want to develop skills that are highly valued in today's job market.

- You want to start learning cyber security from scratch.

- You have an interest in understanding how to protect digital information.

- You aim to build a foundation in cyber security to enhance your career prospects.

- You want to develop skills that are highly valued in today's job market.

Join our community to learn, connect with like-minded peers, and get updates on the scholarship test

Limited Seats in the Cohort

APPLY NOW

TEACHING PLAN (3 Month Program)

TEACHING PLAN (3 Month Program)

Week 1

Session 1: Introduction to CyberSecurity

- Overview of Cyber Security

- Importance of Cyber Security

- Key Concepts and Terminology

- Common Cyber Attacks

Session 2: Expectations & Career Aspects

- Cyber Security Career Paths

- Skills Required for Cyber Security Professionals

- Certifications and Training

- Industry Demand and Job Opportunities

Session 3: Offensive vs Defensive Security, Malware, Threats & Vulnerabilities

- Offensive Security Techniques

- Defensive Security Strategies

- Types of Malware

- Identifying and Mitigating Threats

- Understanding Vulnerabilities

- Best Practices for CyberSecurity

Week 1

Session 1: Introduction to CyberSecurity

- Overview of Cyber Security

- Importance of Cyber Security

- Key Concepts and Terminology

- Common Cyber Attacks

Session 2: Expectations & Career Aspects

- Cyber Security Career Paths

- Skills Required for Cyber Security Professionals

- Certifications and Training

- Industry Demand and Job Opportunities

Session 3: Offensive vs Defensive Security, Malware, Threats & Vulnerabilities

- Offensive Security Techniques

- Defensive Security Strategies

- Types of Malware

- Identifying and Mitigating Threats

- Understanding Vulnerabilities

- Best Practices for CyberSecurity

Week 1

Session 1: Introduction to CyberSecurity

- Overview of Cyber Security

- Importance of Cyber Security

- Key Concepts and Terminology

- Common Cyber Attacks

Session 2: Expectations & Career Aspects

- Cyber Security Career Paths

- Skills Required for Cyber Security Professionals

- Certifications and Training

- Industry Demand and Job Opportunities

Session 3: Offensive vs Defensive Security, Malware, Threats & Vulnerabilities

- Offensive Security Techniques

- Defensive Security Strategies

- Types of Malware

- Identifying and Mitigating Threats

- Understanding Vulnerabilities

- Best Practices for CyberSecurity

Week 2

Session 4: CIA Triad & Cyber Kill Chain

- Introduction to CIA Triad (Confidentiality, Integrity, Availability)

- Importance of the CIA Triad in Cyber Security

- Understanding the Cyber Kill Chain

- Stages of the Cyber Kill Chain

- Applying the Cyber Kill Chain to Real-world Scenarios

Session 5: Understanding the Pillars of Cyber Security & Phases of a Cyber Attack

- Overview of Cyber Security Pillars

- Key Principles and Best Practices

- Identifying Phases of a Cyber Attack

- Reconnaissance

- Weaponization

- Delivery

- Exploitation

- Installation

- Command and Control (C2)

- Actions on Objectives

Session 6: Mitre ATT&CK Framework & NICE Framework

- Introduction to Mitre ATT&CK Framework

- Navigating and Using the Mitre ATT&CK Framework

- Mapping Attacks to the Framework

- Overview of the NICE Framework

- Categories and Specialty Areas of the NICE Framework

- Applying the NICE Framework to Career Development

Week 2

Session 4: CIA Triad & Cyber Kill Chain

- Introduction to CIA Triad (Confidentiality, Integrity, Availability)

- Importance of the CIA Triad in Cyber Security

- Understanding the Cyber Kill Chain

- Stages of the Cyber Kill Chain

- Applying the Cyber Kill Chain to Real-world Scenarios

Session 5: Understanding the Pillars of Cyber Security & Phases of a Cyber Attack

- Overview of Cyber Security Pillars

- Key Principles and Best Practices

- Identifying Phases of a Cyber Attack

- Reconnaissance

- Weaponization

- Delivery

- Exploitation

- Installation

- Command and Control (C2)

- Actions on Objectives

Session 6: Mitre ATT&CK Framework & NICE Framework

- Introduction to Mitre ATT&CK Framework

- Navigating and Using the Mitre ATT&CK Framework

- Mapping Attacks to the Framework

- Overview of the NICE Framework

- Categories and Specialty Areas of the NICE Framework

- Applying the NICE Framework to Career Development

Week 2

Session 4: CIA Triad & Cyber Kill Chain

- Introduction to CIA Triad (Confidentiality, Integrity, Availability)

- Importance of the CIA Triad in Cyber Security

- Understanding the Cyber Kill Chain

- Stages of the Cyber Kill Chain

- Applying the Cyber Kill Chain to Real-world Scenarios

Session 5: Understanding the Pillars of Cyber Security & Phases of a Cyber Attack

- Overview of Cyber Security Pillars

- Key Principles and Best Practices

- Identifying Phases of a Cyber Attack

- Reconnaissance

- Weaponization

- Delivery

- Exploitation

- Installation

- Command and Control (C2)

- Actions on Objectives

Session 6: Mitre ATT&CK Framework & NICE Framework

- Introduction to Mitre ATT&CK Framework

- Navigating and Using the Mitre ATT&CK Framework

- Mapping Attacks to the Framework

- Overview of the NICE Framework

- Categories and Specialty Areas of the NICE Framework

- Applying the NICE Framework to Career Development

Week 3

Session 7: Virtual Environment & Kali Linux Setup

- Introduction to Virtual Machines and VirtualBox

- Installing Kali Linux on VirtualBox

- Configuring Network Settings for Virtual Labs

- Updating and Upgrading Kali Linux

- Essential Tools and Utilities in Kali Linux

Session 8: Introduction to Penetration Testing

- Understanding Penetration Testing Methodologies

- Types of Penetration Testing (Black Box, White Box, Gray Box)

- Legal and Ethical Considerations in Penetration Testing

- Setting Up Target Systems for Testing

- Documenting and Reporting Penetration Test Results

Session 9: Introduction to OWASP Top 10

- Overview of OWASP and its Mission

- Detailed Analysis of OWASP Top 10 Vulnerabilities

- Injection

- Broken Authentication

- Sensitive Data Exposure

- XML External Entities (XXE)

- Broken Access Control

- Strategies for Mitigating OWASP Top 10 Vulnerabilities

Week 3

Session 7: Virtual Environment & Kali Linux Setup

- Introduction to Virtual Machines and VirtualBox

- Installing Kali Linux on VirtualBox

- Configuring Network Settings for Virtual Labs

- Updating and Upgrading Kali Linux

- Essential Tools and Utilities in Kali Linux

Session 8: Introduction to Penetration Testing

- Understanding Penetration Testing Methodologies

- Types of Penetration Testing (Black Box, White Box, Gray Box)

- Legal and Ethical Considerations in Penetration Testing

- Setting Up Target Systems for Testing

- Documenting and Reporting Penetration Test Results

Session 9: Introduction to OWASP Top 10

- Overview of OWASP and its Mission

- Detailed Analysis of OWASP Top 10 Vulnerabilities

- Injection

- Broken Authentication

- Sensitive Data Exposure

- XML External Entities (XXE)

- Broken Access Control

- Strategies for Mitigating OWASP Top 10 Vulnerabilities

Week 3

Session 7: Virtual Environment & Kali Linux Setup

- Introduction to Virtual Machines and VirtualBox

- Installing Kali Linux on VirtualBox

- Configuring Network Settings for Virtual Labs

- Updating and Upgrading Kali Linux

- Essential Tools and Utilities in Kali Linux

Session 8: Introduction to Penetration Testing

- Understanding Penetration Testing Methodologies

- Types of Penetration Testing (Black Box, White Box, Gray Box)

- Legal and Ethical Considerations in Penetration Testing

- Setting Up Target Systems for Testing

- Documenting and Reporting Penetration Test Results

Session 9: Introduction to OWASP Top 10

- Overview of OWASP and its Mission

- Detailed Analysis of OWASP Top 10 Vulnerabilities

- Injection

- Broken Authentication

- Sensitive Data Exposure

- XML External Entities (XXE)

- Broken Access Control

- Strategies for Mitigating OWASP Top 10 Vulnerabilities

Week 4

Session 10: Understanding OWASP Web Top 10

- Introduction to OWASP

- Overview of the OWASP Top 10

- Injection Attacks

- Broken Authentication

- Sensitive Data Exposure

Session 11 & 12: Hands-On Exploitation Techniques

- XML External Entities (XXE)

- Broken Access Control

- Security Misconfiguration

- Cross-Site Scripting (XSS)

- Insecure Deserialization

Week 4

Session 10: Understanding OWASP Web Top 10

- Introduction to OWASP

- Overview of the OWASP Top 10

- Injection Attacks

- Broken Authentication

- Sensitive Data Exposure

Session 11 & 12: Hands-On Exploitation Techniques

- XML External Entities (XXE)

- Broken Access Control

- Security Misconfiguration

- Cross-Site Scripting (XSS)

- Insecure Deserialization

Week 4

Session 10: Understanding OWASP Web Top 10

- Introduction to OWASP

- Overview of the OWASP Top 10

- Injection Attacks

- Broken Authentication

- Sensitive Data Exposure

Session 11 & 12: Hands-On Exploitation Techniques

- XML External Entities (XXE)

- Broken Access Control

- Security Misconfiguration

- Cross-Site Scripting (XSS)

- Insecure Deserialization

Week 5

Session 13: Fundamentals of Networking

- Networking Basics & OSI Model

- Various Networking Devices and their functions

- IPS, IDS, Firewall, NGFW, Antivirus

- Network Devices & Protocols implemented across the layers

Session 14: Deep Dive into the OSI Model

- In-Depth understanding of Layers of OSI Model

- Layer 1 (Physical Layer) – Functions and Devices

- Layer 2 (Data Link Layer) – Functions and Protocols

- Layer 3 (Network Layer) – Functions and Protocols

Session 15: Network Security and Advanced Concepts

- Layer 4 (Transport Layer) – Functions and Protocols

- Layer 5-7 (Session, Presentation, Application Layers) – Functions and Protocols

- Detailed Study of Firewall, NGFW, IPS, IDS

- Advanced Security Measures – Antivirus and Network Security Best Practices

Week 5

Session 13: Fundamentals of Networking

- Networking Basics & OSI Model

- Various Networking Devices and their functions

- IPS, IDS, Firewall, NGFW, Antivirus

- Network Devices & Protocols implemented across the layers

Session 14: Deep Dive into the OSI Model

- In-Depth understanding of Layers of OSI Model

- Layer 1 (Physical Layer) – Functions and Devices

- Layer 2 (Data Link Layer) – Functions and Protocols

- Layer 3 (Network Layer) – Functions and Protocols

Session 15: Network Security and Advanced Concepts

- Layer 4 (Transport Layer) – Functions and Protocols

- Layer 5-7 (Session, Presentation, Application Layers) – Functions and Protocols

- Detailed Study of Firewall, NGFW, IPS, IDS

- Advanced Security Measures – Antivirus and Network Security Best Practices

Week 5

Session 13: Fundamentals of Networking

- Networking Basics & OSI Model

- Various Networking Devices and their functions

- IPS, IDS, Firewall, NGFW, Antivirus

- Network Devices & Protocols implemented across the layers

Session 14: Deep Dive into the OSI Model

- In-Depth understanding of Layers of OSI Model

- Layer 1 (Physical Layer) – Functions and Devices

- Layer 2 (Data Link Layer) – Functions and Protocols

- Layer 3 (Network Layer) – Functions and Protocols

Session 15: Network Security and Advanced Concepts

- Layer 4 (Transport Layer) – Functions and Protocols

- Layer 5-7 (Session, Presentation, Application Layers) – Functions and Protocols

- Detailed Study of Firewall, NGFW, IPS, IDS

- Advanced Security Measures – Antivirus and Network Security Best Practices

Week 6

Session 16: Basics of IPv4 Addressing

- Understanding IPv4 Address

- How IP Addresses are classified

- Learn to build IP addresses from Binary

- Classful vs Classless IP Addresses

Session 17: Advanced IP Addressing Techniques

- CIDR (Classless Inter-Domain Routing)

- VLSM (Variable Length Subnet Mask)

- VLAN (Virtual Local Area Network)

- Subnetting and Supernetting Concepts

Session 18: Practical Application and Implementation

- Implementing CIDR in Networks

- Configuring VLSM for Efficient IP Allocation

- Setting up and Managing VLANs

- Real-world IP Addressing Scenarios and Solutions

Week 6

Session 16: Basics of IPv4 Addressing

- Understanding IPv4 Address

- How IP Addresses are classified

- Learn to build IP addresses from Binary

- Classful vs Classless IP Addresses

Session 17: Advanced IP Addressing Techniques

- CIDR (Classless Inter-Domain Routing)

- VLSM (Variable Length Subnet Mask)

- VLAN (Virtual Local Area Network)

- Subnetting and Supernetting Concepts

Session 18: Practical Application and Implementation

- Implementing CIDR in Networks

- Configuring VLSM for Efficient IP Allocation

- Setting up and Managing VLANs

- Real-world IP Addressing Scenarios and Solutions

Week 6

Session 16: Basics of IPv4 Addressing

- Understanding IPv4 Address

- How IP Addresses are classified

- Learn to build IP addresses from Binary

- Classful vs Classless IP Addresses

Session 17: Advanced IP Addressing Techniques

- CIDR (Classless Inter-Domain Routing)

- VLSM (Variable Length Subnet Mask)

- VLAN (Virtual Local Area Network)

- Subnetting and Supernetting Concepts

Session 18: Practical Application and Implementation

- Implementing CIDR in Networks

- Configuring VLSM for Efficient IP Allocation

- Setting up and Managing VLANs

- Real-world IP Addressing Scenarios and Solutions

Download Complete 3 Months Plan

Download Complete 3 Months Plan

CAREER DEVELOPMENT TRACK

CAREER DEVELOPMENT TRACK

  1. Pregrad Career Assist Access

  • Mentoring

  • career-specific resume tailoring

  1. Personal Branding

  • Build and showcase your skills in public

  • Strategic LinkedIn profiling

  1. Community Session

  • Strengthen Communication

  • Improve presentation skills

  1. Interview Preparation

  • Mock community sessions & GD

  • Art of negotiation

  1. Domain workshops/Masterclasses

  • Masterclasses from professionals

  • HR Session

  1. Career Kick-start

  • Internship/Freelance/ Applications & Interview

  • Placement assistance in final year

Total Fee of the Program

₹ 20060/- Including tax

(Non-refundable)

0% cost EMI Option Available*

EMI options for admission will not be available on discounted Fee or admission through scholarship

APPLY NOW

Live Learning delivered by Industry veteran

Sessions Backup

Hands-On Projects & Challenges

Global Certifications

Access to Career Assist cell*

Logo

Payment gateway Razorpay

FAQ

Is this course for Beginner, Intermediate, and Advanced level?

What is the duration of this Program?

Is it possible to shift my batch?

Is this course for Beginner, Intermediate, and Advanced level?

What is the class schedule for the Program?

Will I be provided with recordings of classes and how long will we have access to it?

What is the role of the mentor?

What are the profiles of the mentors?

How often does the new Batch start?

When will we be getting internship opportunities?

How is placement at Pregrad?

What is the success rate of the Pregrad's Pre-graduation Program?

Pregrad Logo

G Block Sector 6, Noida, Uttar Pradesh - 201301

hello@pregrad.in

Pregrad Logo

G Block Sector 6, Noida, Uttar Pradesh - 201301

hello@pregrad.in

Pregrad Logo

G Block Sector 6, Noida, Uttar Pradesh - 201301

hello@pregrad.in