Professional Documents
Culture Documents
CYBERSECURITY AND
ETHICAL HACKING
Master Cybersecurity and Ethical Hacking skills and
take your career to the next level!
Page - 1
Our Credentials
1.2 Million+ 1,000+ 400+
Aspiring Active Students Industry-expert Instructors
Hiring Partners
Page - 2
This PG certification in Cybersecurity and Ethical Hacking aims to help you build and
strengthen your academic foundation for you to excel in the cybersecurity domain and
gain industry exposure. The skills that you will be learning in this course are all designed to
Key Highlights
400 Hrs of Applied Learning 200 Hrs of Project work & Exercises
50+ Live Sessions for the span of 7 Months PG Certification by E&ICT Academy, MNIT
Practitioners
One-on-One with Industry Mentors Executive Alumni status by E&ICT Academy, MNIT Jaipur
Pr gram
o Pedagogy
Att
In str
end
u c - T
Liveled
tor Class
rai
ens i ng Ha
Innoc
k
vatho
ative
nsLMS
From
Get worlds
trained top
by Faculty
top and
Ded c
Learin at
by Doi
ed Lenar
g ning Managers Peer Networking and Group Learning
To helpon
Hands you with your
exercises, learning
pro needs
ject work, For effective
Improve your online
professional
Learning
Se - c
lfep
1:1 P a n
rso aliv
ed ideLe
zed os arning Gamified Learning
Hands
Learn at
onyour
exercises,
own pace
projwith
ect work, Get
Learn trough in
involved Hackathons and
group activities to
world-class
quiz, capstone
content
projects Group Learning
solve real-world problems
Pro
24*7jc
eSupp ort
ts and Ex c
er ises 1:1 Personalized Learning
Hands
Get real-world
on exercises,
experience
project
through
work, Hands-on exercises, project work,
pro
quiz
jects
, capstone projects quizzes, and capstone projects
Page - 3
Any IT professional with a bachelor’s degree who want to transition into Cybersecurity
Application Process
The application process consists of three simple steps. Candidates have to submit their application.
An offer of admission will be made to the selected candidates, and their application will be accepted
upon the payment of the admission fee.
SUBMIT APPLICATION
1 Tell us a bit about yourself and why you want to join
ADMISSION LETTER
3 Shortlisted candidates would be offered the admission letter
Page - 4
Live Courses
2 3 4
Certified Ethical Hacking
Information Systems
Secure Applications,
PG Certification in
Page - 5
Module 1 Module 4
Preparatory Sessions – Python & Linux Secure Applications, Network & Devices
Python
Risk Management
Python Basics
Identity and Access Management
Introduction to Linux
Beyond the Basic LAN
Linux Basics
Secure Protocols
Capstone Project
Footprinting and Reconnaissance
Scanning Networks
Our Cybersecurity and Ethical Hacking capstone
Enumeration
Vulnerability Analysis
System Hacking
Sniffing
learning the course and showcasing your skills and
Social Engineering
knowledge in Ethical Hacking and Cybersecurity to
Denial-of-Service
your future recruiters.
Session Hijacking
Skills Covered
SQL Injection
Linux
Vulnerability Analysis
Management
Malware Threats
IoT Hacking
Cloud Computing
IoT Hacking
Sniffing
Cryptography
Session Hijacking
Module 3
Information Systems Security KPI
Firewalls and
Asset Security
Reconnaissance
Hacking Web Servers
Security Operations
Tools to Master
Page - 6
Retail Social Media Supply Chain Entrepreneurship E-commerce Banking Healthcare Insurance
Beginner Beginner
Beginner Intermediate
Cracking Wi-Fi Security Improvement
Get hands-on learning experience in how to crack The project is based on Security Improvement and
Wi-Fi passwords. As a core requirement of the as IT professionals, learners need to make necessary
project, learners will have to use various tools, improvements in the security branches by
techniques, and technologies to effectively crack the implementing physical security and performing
WPA/WPA2 Wi-Fi routers. security control testing.
Intermediate Intermediate
Advance Advance
Improvement of Auditing in the Strategic Flexibility
Restaurant The project allows practical know-how to maintain
Make necessary improvements in a restaurant’s strategic flexibility along with successfully working
auditing system using PKI implementation, system with numerous cloud services, strategy around
resiliency, and more. unavailability, and various methods of digital
marketing strategies.
Advance
Data Security of a BPO Firm
Work with the business process outsourcing firms’
machine-generated data in order to look for
suspicious activities, anomalies, and the suspected
threats. Also, deploy the Splunk SIEM tool to comb
through huge volumes of data.
Page - 7
Vineet Sahula
A fellow of IETE and Sr. member of IEEE, he has 100+ research papers and chapters published in reputed
journals. He has guided 10 PhD theses and many UG/PG dissertations. His research area includes Trust,
With 23 yrs in teaching, his research area includes Security, Privacy and Forensics, Cloud Computing,
Blockchain etc. He has co-authored “ Fundamentals of Network Forensics” for Springer and is a senior
Murli Nambiar
Having worked in companies like ICICI, Reliance, Apollo, Murli carries ground level expertise in Information
security and Risk management, and has been instrumental in setting up Information security divisions for
Certified in CISSP and CCSP by (ISC)², and Cyber security Risk management by Harvard University,he
carries 14+ yrs of experience with a focus on SIEM solutions & Host Based instruction detection systems,etc.
Page - 8
Industries
Industries OurOur Learners
Learners Come
Come From
From
12%10% - Consulting
- BFSI
50%45% IT
Information Technology
5% 5% - Healthcare
- Healthcare
10% - Consulting
20% - Others
6% - Others
17%20% - BSFI
- BPO/ KPO
Work Experience
12%
9-12 years
12%
18%
6-9 years
18%
22%
3-6 years
22%
36%
0-3 years
36%
Page - 9
top employers
Learner Reviews
Nanda Kishore Vikram C Syed Zakiruddin
Senior Associate at Tata Design Engineer at Tech IT Manager at Grand Regal
Consultancy Services Mahindra Hotel - Doha
Intellipaat has some of the best Intellipaat is crystal clear and The training went smoothly from day
trainers and a wonderful curriculum confident in what they are one. The learning content, trainers,
in the market. Amazing support delivering. The trainers are experts hands-on assignments and quizzes all
team. I received assistance starting with experience and this helped me are perfect. Recording facility is
from the registration to the get industry-level knowledge to excellent for revising. Also, a prompt
successful course completion. shape my career. support team.
Page - 10
About Intellipaat
Intellipaat is one of the leading online training providers with more than 1.2 million learners
We create courses in collaboration with top universities and MNCs for employability like IIT
Madras, University of Essex, University of Liverpool, IIT Roorkee, IIT Guwahati, E&ICT MNIT
Our courses are delivered by SMEs & our pedagogy enables quick learning of difficult
topics. 24/7 technical support & career services help learners to jump-start their careers.
us lay an emphasis on bridging the gap between industry demand and academic
approach to learn and provide a foundation to build your career in top IT companies.
About t he EC-Council
This American organization offers education, training, and services on Cyber Security. The
certification by the EC-Council validates the various cybersecurity skills that the learners
Page - 11
Contact Us
INDIA
AMR Tech Park 3, Ground Floor, Tower B, Hongasandra Village,
Bommanahalli, Hosur Road, Bangalore, Karnataka 560068, India
sales@intellipaat.com
www.intellipaat.com