Certified Cyber Kid
Discover a world of interactive lessons, exciting games, and captivating stories, all carefully crafted to make learning an enjoyable.

(40 HOURS, 2 LEVELS)


FISST Academy Excellence

Learn from the Best

Hands-on Learning

Career Assistance
LEVEL 1 - 20 HOURS
Cyber Security: The Modern Arena
Need for Cyber Security in the global Internet space shall be played along during the session with examples of day-to-day activities.
Mobile Security: The Time-killer
Mobile phones are one of the greatest inventions of the twentieth century, however it is also a curse for people who use for a time-killer. Understanding the utility of mobile phones and its countermeasures shall be discussed.
Smart Home Security: The Millennium Beauty
Today’s smart systems are a boon and a problem. Example, Alexa, Google Home and other smart devices shall be discussed with game play.
- What Makes Devices Smart?
- Understanding The Controllers
- Intruders And Malware Threats
Cyber Attacks: An Attraction to Sin
‘Who?’, ‘Why?’, ‘What?’, and ‘Wow?’ of various cyber-attacks and incidents evolving across the globe.
-
Why Do Attacks Take Place?
-
Who Are The Attackers?
-
Basic Network And Application Attacks
-
Social Engineering Attacks
LEVEL 2 - 20 HOURS
Cyber Bullying & Stalking: A Definite Character
Bullies and stalkers have been present everywhere, and now, even within the cyber realm. Understanding their intentions, and how to safeguard against such threats shall be portrayed with thrilling activities
- Bullies, Stalkers And Their Victims
- Online Behavior, Social Networking And Its Risks
- What Makes Devices Smart?
- What Makes Devices Smart?
- What Makes Devices Smart?
Online Gaming and Social N/W Security: A Poisonous Entertainer
Online gaming and standalone gaming – Which is safer and what can be added to make it a massive entertainer within a
safe environment.
- Attraction Towards Online Gaming
- Diminishing Boundary Between Online Gaming And Social Networking
- Social Engineering And Malware Threats
- Safely Indulging In Online Gaming And Social Networking
Cyber Bullying & Stalking: A Definite Character
Real world examples for Cyber Safety shall be portrayed through mysterious and thrilling activities.
Cyber Ethics: The Goodness in You
The idea of ethics for aiming towards realizing responsibilities while using digital platforms to ensure interpersonal safety.

Interested in This Program?
Secure your spot now.

Empower Your Cybersecurity Journey
Dive into a Personalized Risk Assessment Challenge!
What Our Clients Say
We place huge value on strong relationships and have seen the benefit they bring to our business. Customer feedback is vital in helping us to get it right.

As an order, we do multiple audits in a year, including tech audits for companies. This is one of the primary reasons why I wanted to enrol in the Certified Cyber Warrior course. The certified Cyber Warrior Course has been split into many different modules, of which one in particular that I liked was about physical security. It was taught to us by Professor Mohan Ram. After listening to the professors teach, I could understand that their experience speaks for itself. I strongly recommend this course for anyone looking to get into cyber security.
Suneel Narayan
Chartered Account
I have been working as a SOC analyst for the past one and a half years. After signing up for this course, I had a lot of hands-on practical training related to cyber security. I had a lot of to the cyberbay by taking part in a lot of stimulating real life scenarios. When it comes to boot camp, it was very live, hands-on, and interactive. Learning black box and grey box was such a thrilling experience. I now know how to actually implement the things I learned here. Thank you, IITM PRAVARTAK & FISST Academy.
Kalaiarasi
3i infotech
I have my background in power electronics and instrumentation from MIT Chennai. 25 years experience in operations, product management, and sales, I am glad to be here. As the world has completely become digitised in the last few years I wanted to elevate myself in the digital arena. Before joining this course, I felt that this course would create a big impact in my career. I am definitely very satisfied learning this course. After 20 weeks, I can now proudly say I am a Certified Cyber Warrior. Thanks to the professors who guided me through this course.
JP Balaji
Chennai
When I started this course it helped me understand various aspects of cyber security. I am able to put all the pieces together and I now have a clear understanding of what needs to be done. I never gave enough attention to physical security but after attending this course with the help of Mr professor Mohan Ram I understood the nuances of physical security as well. I also had the opportunity to meet people from various organisations so we could share our knowledge about cyber security. It was a dream come true having our boot camp at IIT Madras.
Kompella Phani
Vishakapatnam Port Trust
After attending the certified cyber Warrior course it was my humble realisation that I did not know a lot of things in this vast ocean that is cyber security. At my workplace we had a lot of practical work to be done which involved primarily monitoring. I am extremely thankful to the professors who taught us everything during the past few weeks. Both theory and practical sessions were amazing. The boot camp was the icing on the cake with interaction and exchange of knowledge all three days.
Pratyusha
3i infotech
Malini
CB2W

Rashmi
Govt Employee

Aravidhan
Software Professional
