

Discontinued (July 2024)- Post Graduate Program in Cyber Security offered by Amity University Online
- A+ NAAC accredited
- Private Institute
- Estd. 2005
Discontinued (July 2024)- Post Graduate Program in Cyber Security at Amity University Online Overview
Duration | 12 months |
Mode of learning | Online |
Difficulty level | Intermediate |
Credential | Certificate |
Discontinued (July 2024)- Post Graduate Program in Cyber Security at Amity University Online Highlights
- Earn CompTIA Security+ Certification and Alumni Status from Amity Future Academy
- Develop a thorough understanding of the core concepts, terminologies, tactics used in cyberworld.
- Industry-driven comprehensive curriculum with Focus on Both Strategy & Tools
- Career guidance and support
- Virtual Labs for hands-on learning
Discontinued (July 2024)- Post Graduate Program in Cyber Security at Amity University Online Course details
- Working professionals in IT and Management
- Entrepreneurs looking to enhance their skills in Cyber Security
- Fresh graduates from Engineering / Mathematics background
- Final year students completing their graduation on or before April 2021
- Understand terminologies and tactics commonly heard in the cyber world.
- Understand various components of IT systems and networks and how do they interoperate to form the cyberspace.
- Understand different stages of an exploit to adopt adequate detective and preventive cyber security controls.
- Recognize common threat behaviors and attack vectors, hunt threat across the enterprise network.
- Network monitoring and provide real-time security solutions.
- Understand attacks on application and how to implement the security against this attacks happening nowadays.
- Use incident response best practices.
- Apply Blockchain in IoT security
- Define Information Security Management Framework, and manage compliance with an organization.
- Conduct penetration testing, developing reports outlining vulnerabilities and risk mitigation strategies.
- Understand ICS defence strategies, ICS risk management and Assessment, Applying Security controls to ICS
- Post Graduate Program in Cyber Security (PGP-CS) at Amity Future Academy has been designed to provide a strong foundation of Cyber Security concepts and tactics along with extensive Industry learning exposure. PGP - CS is aimed to bridge the skill gap of cyber security professionals around the globe with an ambitious career-focused industry program.
- Amity's world class faculty and their industry experiences make our core curriculum stand out from the rest. Our rigorous curriculum bundled together with case studies, assignments, hands-on training and capstone cyber project gives you a real world learning experience.
- Course Fees: Rs. 1,95,000/ (All-Inclusive)
- Options- One Time Payment, Cardless EMI Payment.
Discontinued (July 2024)- Post Graduate Program in Cyber Security at Amity University Online Curriculum
Cyber Security Building blocks
Introduction to Cyber Security
Threats and Vulnerabilities
Cyber Security Breaches - Phishing, Vishing, Identity Theft, Cyberstalking, Water-Hole, and Whaling Attacks.
Penetration Testing and Methodologies
Frameworks and Standards for Cyber Security - Introduction to ISO 27001 and NIST800
Cybersecurity practices - Governance, Operations, and Assurance
Introduction to Cyber Security Risk Management, Roles and Responsibilities.
IT Infrastructure Technologies
Physical and Software elements of computer systems
Authentication and Authorization
Introduction to Networks and Type of Networks
Understanding the OSI Layers
Networking Protocols – TCP / IP
Understanding IP addresses and Subnet Classes
Networking Infrastructure – Hubs, Switches, Routers and Firewalls
Intrusion Prevention Systems and Proxies
Routing and Switching in Networks
Software Defined Networking
Cloud Computing and Datacenter Virtualization
Auditing IT Infrastructure
Tools covered - Wireshark
Scripting for Hackers
Why Scripting?
Powershell Basics
Linux Shell Scripting
Python Scripting
Tools covered- Python, Powershell, Linux
CompTIA Security+
Attacks, threats & vulnerabilities
Architecture & design
Implementation
Operations & incident response
Governance, risk & compliance
Offensive Security and Cyber kill chain
Reconnaissance – Information harvesting and intelligence
Weaponization tactics
Art of Scanning
Enumerating services
Exploiting – payload delivery and exploit
Gaining Foothold – installation, and persistence
Remote C&C – Command and Control
Cover tracks and forensic evidence
Tools covered- Kali Linux, Oracle VirtualBox
Application Security
Web Application Security
Android Penetration Testing
Tools covered- BurpSuite, Nessus, Genymotion
Blue Teaming & Cyber SOC
Introduction to SIEM, SOC, NextGen SOC
SOC & SIEM Architecture and Deployment
Logs, Events Collection and Event Correlation
Developing use cases and associated correlation rules
Detection and Prevention
Incident Management
Understanding Logs
Setting up Sysmon and Threat Hunting on Windows
Processing Logs via ELK and Making Visualizations
Tools covered- SIEM
Blockchain, Artificial Intelligence and Machine Learning for Cybersecurity
Introduction to Artificial Intelligence – Machine learning, Deep Learning, and Robotics
Various attacks on Blockchain platforms
Security considerations for Blockchain platforms and systems
Building a business case for AI implementations in Cybersecurity
Salient features of Blockchain
Blockchain as a tool for cybersecurity
Blockchain for IoT security
Tools covered - Python
Regulatory Compliances in Cybersecurity
Defining compliance and compliance management
Developing compliance baselines for systems
Regulatory compliance
Introduction to commercial and non-commercial compliance scanners
Compliance Scanning
Business and Cybersecurity
Aligning cybersecurity with business strategies
Aligning roles and responsibilities for cybersecurity
Threat Intelligence
Conducting business impact analysis for cyber threats
Developing reports and presentations for the non-technical business community
Introduction to the roles of Cyber Security Managers and CISOs
Critical Infrastructure Security
Introduction to Industrial Control Systems
Impact of ICS failure
Cyber attack on ICS
Securing ICS
Discontinued (July 2024)- Post Graduate Program in Cyber Security at Amity University Online Entry Requirements
Other courses offered by Amity University Online
Discontinued (July 2024)- Post Graduate Program in Cyber Security at Amity University Online Students Ratings & Reviews
- 3-41
Discontinued (July 2024)- Post Graduate Program in Cyber Security at Amity University Online Frequently Asked Questions
Student Forum
Discontinued (July 2024)- Post Graduate Program in Cyber Security at Amity University Online News & Updates

Discontinued (July 2024)- Post Graduate Program in Cyber Security at Amity University Online Contact Information
Useful Links
Know more about Amity University Online
- All About Amity University Online
- Courses 2026
- Fees 2026
- Reviews on Placements, Faculty & Facilities
- Admission 2026 - Cutoffs, Eligibility & Dates
- Placement - Highest & Average Salary Package
- Infrastructure Details & Reviews
- Amity University Online Faculty
- Compare Amity University Online
- Amity University Online Q&A
- Scholarships
- Amity University Online News & Articles