Amity University Online
Amity University Online Logo

Discontinued (July 2024)- Post Graduate Program in Cyber Security 

  • A+ NAAC accredited
  • Private Institute
  • Estd. 2005

Discontinued (July 2024)- Post Graduate Program in Cyber Security
 at 
Amity University Online 
Overview

Become a Cyber warrior and enhance your technical capabilities in booming areas of Cyber world and prepare yourself to explore millions of trending job opportunities in cyber security

Duration

12 months

Mode of learning

Online

Difficulty level

Intermediate

Credential

Certificate

Discontinued (July 2024)- Post Graduate Program in Cyber Security
Table of content
Accordion Icon V3
  • Overview
  • Highlights
  • Course Details
  • Curriculum
  • Entry Requirements
  • + 1 more item

Discontinued (July 2024)- Post Graduate Program in Cyber Security
 at 
Amity University Online 
Highlights

  • Earn CompTIA Security+ Certification and Alumni Status from Amity Future Academy
  • Develop a thorough understanding of the core concepts, terminologies, tactics used in cyberworld.
  • Industry-driven comprehensive curriculum with Focus on Both Strategy & Tools
  • Career guidance and support
  • Virtual Labs for hands-on learning
Read more
Details Icon

Discontinued (July 2024)- Post Graduate Program in Cyber Security
 at 
Amity University Online 
Course details

Who should do this course?
  • Working professionals in IT and Management
  • Entrepreneurs looking to enhance their skills in Cyber Security
  • Fresh graduates from Engineering / Mathematics background
  • Final year students completing their graduation on or before April 2021
What are the course deliverables?
  • Understand terminologies and tactics commonly heard in the cyber world.
  • Understand various components of IT systems and networks and how do they interoperate to form the cyberspace.
  • Understand different stages of an exploit to adopt adequate detective and preventive cyber security controls.
  • Recognize common threat behaviors and attack vectors, hunt threat across the enterprise network.
  • Network monitoring and provide real-time security solutions.
  • Understand attacks on application and how to implement the security against this attacks happening nowadays.
  • Use incident response best practices.
  • Apply Blockchain in IoT security
  • Define Information Security Management Framework, and manage compliance with an organization.
  • Conduct penetration testing, developing reports outlining vulnerabilities and risk mitigation strategies.
  • Understand ICS defence strategies, ICS risk management and Assessment, Applying Security controls to ICS
Read more
More about this course
  • Post Graduate Program in Cyber Security (PGP-CS) at Amity Future Academy has been designed to provide a strong foundation of Cyber Security concepts and tactics along with extensive Industry learning exposure. PGP - CS is aimed to bridge the skill gap of cyber security professionals around the globe with an ambitious career-focused industry program.
  • Amity's world class faculty and their industry experiences make our core curriculum stand out from the rest. Our rigorous curriculum bundled together with case studies, assignments, hands-on training and capstone cyber project gives you a real world learning experience.
  • Course Fees: Rs. 1,95,000/ (All-Inclusive)
  • Options- One Time Payment, Cardless EMI Payment.

Discontinued (July 2024)- Post Graduate Program in Cyber Security
 at 
Amity University Online 
Curriculum

Cyber Security Building blocks

Introduction to Cyber Security

Threats and Vulnerabilities

Cyber Security Breaches - Phishing, Vishing, Identity Theft, Cyberstalking, Water-Hole, and Whaling Attacks.

Penetration Testing and Methodologies

Frameworks and Standards for Cyber Security - Introduction to ISO 27001 and NIST800

Cybersecurity practices - Governance, Operations, and Assurance

Introduction to Cyber Security Risk Management, Roles and Responsibilities.

IT Infrastructure Technologies

Physical and Software elements of computer systems

Authentication and Authorization

Introduction to Networks and Type of Networks

Understanding the OSI Layers

Networking Protocols – TCP / IP

Understanding IP addresses and Subnet Classes

Networking Infrastructure – Hubs, Switches, Routers and Firewalls

Intrusion Prevention Systems and Proxies

Routing and Switching in Networks

Software Defined Networking

Cloud Computing and Datacenter Virtualization

Auditing IT Infrastructure

Tools covered - Wireshark

Scripting for Hackers

Why Scripting?

Powershell Basics

Linux Shell Scripting

Python Scripting

Tools covered- Python, Powershell, Linux

CompTIA Security+

Attacks, threats & vulnerabilities

Architecture & design

Implementation

Operations & incident response

Governance, risk & compliance

Offensive Security and Cyber kill chain

Reconnaissance – Information harvesting and intelligence

Weaponization tactics

Art of Scanning

Enumerating services

Exploiting – payload delivery and exploit

Gaining Foothold – installation, and persistence

Remote C&C – Command and Control

Cover tracks and forensic evidence

Tools covered- Kali Linux, Oracle VirtualBox

Application Security

Web Application Security

Android Penetration Testing

Tools covered- BurpSuite, Nessus, Genymotion

Blue Teaming & Cyber SOC

Introduction to SIEM, SOC, NextGen SOC

SOC & SIEM Architecture and Deployment

Logs, Events Collection and Event Correlation

Developing use cases and associated correlation rules

Detection and Prevention

Incident Management

Understanding Logs

Setting up Sysmon and Threat Hunting on Windows

Processing Logs via ELK and Making Visualizations

Tools covered- SIEM

Blockchain, Artificial Intelligence and Machine Learning for Cybersecurity

Introduction to Artificial Intelligence – Machine learning, Deep Learning, and Robotics

Various attacks on Blockchain platforms

Security considerations for Blockchain platforms and systems

Building a business case for AI implementations in Cybersecurity

Salient features of Blockchain

Blockchain as a tool for cybersecurity

Blockchain for IoT security

Tools covered - Python

Regulatory Compliances in Cybersecurity

Defining compliance and compliance management

Developing compliance baselines for systems

Regulatory compliance

Introduction to commercial and non-commercial compliance scanners

Compliance Scanning

Business and Cybersecurity

Aligning cybersecurity with business strategies

Aligning roles and responsibilities for cybersecurity

Threat Intelligence

Conducting business impact analysis for cyber threats

Developing reports and presentations for the non-technical business community

Introduction to the roles of Cyber Security Managers and CISOs

Critical Infrastructure Security

Introduction to Industrial Control Systems

Impact of ICS failure

Cyber attack on ICS

Securing ICS

Discontinued (July 2024)- Post Graduate Program in Cyber Security
 at 
Amity University Online 
Entry Requirements

Eligibility criteriaUp Arrow Icon

Other courses offered by Amity University Online

Discontinued (July 2024)- Post Graduate Program in Cyber Security
 at 
Amity University Online 
Students Ratings & Reviews

4/5
Verified Icon1 Rating
M
Mohit Sharma
Discontinued (July 2024)- Post Graduate Program in Cyber Security
Offered by Amity University Online
4
Other: Good experience to learn basics of cyber security
Reviewed on 4 Oct 2021Read More
Thumbs Up IconThumbs Down Icon
View 1 ReviewRight Arrow Icon

Discontinued (July 2024)- Post Graduate Program in Cyber Security
 at 
Amity University Online 
 
Frequently Asked Questions

qna

Discontinued (July 2024)- Post Graduate Program in Cyber Security
 at 
Amity University Online 

Student Forum

chatAnything you would want to ask experts?
Write here...

Discontinued (July 2024)- Post Graduate Program in Cyber Security
 at 
Amity University Online 
Contact Information

Address

C-Block, Amity University Campus, Sec-125
Noida ( Uttar Pradesh)

Go to College Website ->