It is comprehensive course to learn the most effective steps to prevent attacks and detect adversaries with actionable techniques that one can directly apply when they get back to work after training. Being organized in partnership with Forensics Intelligence Surveillance and Security Technologies (FISST) & Talentedge.

As Certified Cyber Warrior, the participant will learn tips and tricks from the best of the experts from a mix of industry & academia, so that they can win the battle against the wide range of cyber adversaries that want to harm the enterprises’ IT environment.

  1. Opportunity to earn a Certificate from IIIT Bangalore.
  2. Lectures imparted by eminent academicians and practicing industry experts.
  3. Get exposure to contemporary and sought after areas like IOT device security, Blockchain, Cryptocurrencies etc.
  4. Gain comprehensive understanding of applicable Cyber Laws. 
  5. 2 days On Campus “Bootcamp” style workshop module covering hands on exposure to labs on Cyber Threats and Cryptography etc.
  6. Certification ceremony on campus at the completion of the programme


Course Benefits to Participants

Build a lucrative and futuristic career in the field of Cyber Security (on date at salaries are peaking to premium, as India / World goes Digital way). According to NASSCOM, the estimated demand for security workforce to rise globally to six million by 2019, up from 4 million in 2015, with projected shortfall of 1.5 million (https://www.gadgetsnow.com/tech-news/Cybersecurity-to-create-1million-jobs-Nasscom/articleshow/51884133.cms)

  1. Run Windows command line tools to analyze the system looking for high-risk items
  2. Design and build a network architecture using VLANs, NAC, and 802.1x based on advanced persistent threat indicators of compromise
  3. Run Windows command line tools to analyze the system looking for high-risk items
  4. Run Linux command line tools (ps, ls, netstat, etc.) and basic scripting to automate the running of programs to perform continuous monitoring of various tools
  5. Install VMWare and create virtual machines to create a virtual lab to test and evaluate tools/security of systems
  6. Create an effective policy that can be enforced within an organization and design a checklist to validate security and create metrics to tie into training and awareness
  7. Identify visible weaknesses of a system using various tools (mostly free or minimal subscription – without large investment) and, once vulnerabilities are discovered, cover ways to configure the system to be more secure
  8. Build a network visibility map that can be used for hardening of a network - validating the attack surface and covering ways to reduce that surface by hardening and patching
  9. Sniff open protocols like telnet and ftp and determine the content, passwords, and vulnerabilities using WireShark and many more relevant tools