Career Back 2 Women (CB2Women)
Certified Professional in Basics of Data Science and Big Data Analytics
The first ever flagship course that provides hands-on training experience to help individuals become cyber security experts to protect enterprises in this digital era.


FISST Academy Excellence

Learn from the Best

Hands-on Learning

Career Assistance
Course Objectives
Course is targeted at learners who are interested in learning and understanding data science and what big data is all about in sufficient depth and breadth.
The course will provide an overview of how to pose meaningful data analytics problems for real-life applications. At the end of the course, participants will develop a structured thinking approach to transition from data to data science problem definitions and also learn to address challenges in handling Big Data.
For Course Info
- Introduce the participants to Python – an easy to use tool for high level data analytics
- Introduce the participants to a comprehensive overview of linear algebra, statistics and optimization concepts – critical concepts for the understanding of data science
- Introduce the participants to in-depth explanation of data science algorithms – supported by hands-on work in Python from an application viewpoint
- Introduce participants to visualization
- Introduce the participants to the field of Big Data– background and key concepts
- Introduce the participants to real-life applications of data science – a case study approach.
Eligibility
- For Indian Participants - Graduates or Diploma Holders (10+2+3) from a recognized university (UGC/AICTE/DEC/AIU/State Government) in any discipline.
- For International Participants - Graduation or equivalent degree from any recognized University or Institution in their respective country.
Pre Requisites
- Basic understanding of technology, networks and security, while not mandatory, will be an added advantage.
- Pedagogy
- Assessment
- Duration
- Class Schedule
The primary method of instruction will be through LIVE lectures that will be delivered online via internet to participant desktops/laptops or classrooms. The lectures will be delivered by eminent academicians and practicing industry experts. The programme will be primarily taught though a combination of lectures, discussions, exercises and labs. All enrolled students will be provided access to our FISST Whizard Cloud Campus through which students may access other learning aids, reference materials, assessments and assignments as appropriate. Throughout the duration of the course, students will have the flexibility to reach out to the Professors, real time during the class or offline via the FISST Whizard Cloud Campus to raise questions and clear their doubts.
There are periodic evaluation components built in as a part of the program. These maybe in the form of a quiz, assignment or other objective/subjective assessments as relevant and applicable to the program. A minimum of 70% attendance to the LIVE lectures, is a prerequisite for the successful completion of this program. Participants who satisfy the attendance criteria and successfully clear the evaluation components will be awarded a certificate of completion.
Live delivery (Virtual) by instructors with Assignments
Basic course – 40 hours (10 weeks x 2 hrs per day on Sat & Sun)
TOTAL = 40 Hours
Twice a week on on Saturdays & Sundays from for 10 weeks (3 months – Basic)
Topics
Proposed Course outline / programme / plan
BASIC TRACK – 40 hours
- Why Python for data science?
- Opening, creating and managing Python IDE
- Basics of programming
- Variables
- Operators
- Data types
- Data structures – Lists, Tuples, Dictionary
- Control structures in Python
- Function files in Python
- Essential Python Library for data science with hands-on labs
- Numpy (Numeric Python)
- Pandas
- Matplotlib
- Object oriented programming
- Random variables, expectation
- Continuous and discrete random variables and their distributions (Poisson, Binomial, Normal and its derivatives), statistical intervals
- Bayes’ theorem, independent events
- Introduction to Bayesian inference
- Hands-on session in Python through examples
- Data preprocessing
- Treating outliers and missing values
- Exploratory Data analysis
- Correlation
- Feature Extraction
- Hands-on session in Python through examples
- Typology of Data Science problems
- Introduction to structured approaches to solving data science problems
- Imputation example to explain the structured approach
- Basics of visualization
- Introduction and use of the base graphics package of Python with some examples
- Elements of the Seaborn and Matplotlib packages – aesthetic mapping, geometry, scales, stat transformations etc.
- Advanced visualization
- Introduction to Big Data
- Characteristics of Big Data
- Challenges with Big Data
- Big Data Frameworks
- Installing and Configuring Python, Hadoop, Spark and Jupyter
- What and Why of Distributed Systems
- Distributed File System
- Distributed Programming Model
- Parallel Processing explained with WordCount
- Concept of Cloud Computing
- Big Data and Cloud Computing – Benefits
- Introduction to Hadoop
- How MapReduce works
- Parallelism in MapReduce
- Example: K means Clustering – Sequential and with MapReduce
- When does MapReduce work and Why? Comparison among Algorithms
- Implementation in Python – Regular and Spark Version of KMeans

Empower Your Cybersecurity Journey
Dive into a Personalized Risk Assessment Challenge!
Programme Highlights/USPs
Course Benefits to Participants
On successful completion of the programme, you will be able to
- The course will provide an overview of how to pose meaningful data analytics problems for reallife applications. At the end of the course, participants will develop a structured thinking approach to transition from data to data science problem definitions and also learn to address challenges in handling Big Data.
Other benefits to participants include
- Opportunity to earn a Certificate from IITM Pravartak and FISST
- Lectures imparted by eminent academicians and practicing industry experts.
- Get exposure to contemporary and sought after areas like IOT device security, Blockchain, Cryptocurrencies etc.
- Fully Online Course with LIVE online interactive lectures that provides a “real” classroom experience in a “virtual” environment. No isolated learning experience.
- Seamless technology that can transmit lecture videos effectively at home broadband connection of 512 kbps.
- User friendly and easy to use technology interface. No expensive and time consuming software/hardware installations required at your end.
- Virtual classrooms that allow for active interactions with other fellow students and faculty.
- Convenient weekend schedules
- In the event that students miss attending the LIVE lecture on the Virtual Classroom for some reason, students will be granted access to the recorded sessions for a specified number of days/times.
- FISST Whizard Cloud Campus – Students on our virtual social learning platform are provided access to course presentations, projects, case studies, assignments and other reference materials as applicable for specified courses. Students can raise questions and doubts either real time during the live class or offline through the Cloud Campus.
- Learn from Anywhere – No need to travel to an institute or training center. Learning continues even if you are traveling or not available at any specific location. You may also learn from the comfort of your home.

Interested in This Program?
Secure your spot now.
Programme Fee
Total Programme Fee
Rs. 35,000/- + GST
Payment Options

Internet Banking

Credit/Debit Card

EMI Options Available
What Our Clients Say
We place huge value on strong relationships and have seen the benefit they bring to our business. Customer feedback is vital in helping us to get it right.

As an order, we do multiple audits in a year, including tech audits for companies. This is one of the primary reasons why I wanted to enrol in the Certified Cyber Warrior course. The certified Cyber Warrior Course has been split into many different modules, of which one in particular that I liked was about physical security. It was taught to us by Professor Mohan Ram. After listening to the professors teach, I could understand that their experience speaks for itself. I strongly recommend this course for anyone looking to get into cyber security.
Suneel Narayan
Chartered Account
I have been working as a SOC analyst for the past one and a half years. After signing up for this course, I had a lot of hands-on practical training related to cyber security. I had a lot of to the cyberbay by taking part in a lot of stimulating real life scenarios. When it comes to boot camp, it was very live, hands-on, and interactive. Learning black box and grey box was such a thrilling experience. I now know how to actually implement the things I learned here. Thank you, IITM PRAVARTAK & FISST Academy.
Kalaiarasi
3i infotech
I have my background in power electronics and instrumentation from MIT Chennai. 25 years experience in operations, product management, and sales, I am glad to be here. As the world has completely become digitised in the last few years I wanted to elevate myself in the digital arena. Before joining this course, I felt that this course would create a big impact in my career. I am definitely very satisfied learning this course. After 20 weeks, I can now proudly say I am a Certified Cyber Warrior. Thanks to the professors who guided me through this course.
JP Balaji
Chennai
When I started this course it helped me understand various aspects of cyber security. I am able to put all the pieces together and I now have a clear understanding of what needs to be done. I never gave enough attention to physical security but after attending this course with the help of Mr professor Mohan Ram I understood the nuances of physical security as well. I also had the opportunity to meet people from various organisations so we could share our knowledge about cyber security. It was a dream come true having our boot camp at IIT Madras.
Kompella Phani
Vishakapatnam Port Trust
After attending the certified cyber Warrior course it was my humble realisation that I did not know a lot of things in this vast ocean that is cyber security. At my workplace we had a lot of practical work to be done which involved primarily monitoring. I am extremely thankful to the professors who taught us everything during the past few weeks. Both theory and practical sessions were amazing. The boot camp was the icing on the cake with interaction and exchange of knowledge all three days.
Pratyusha
3i infotech
Malini
CB2W

Rashmi
Govt Employee

Aravidhan
Software Professional
