Certified Cyber Kid

Discover a world of interactive lessons, exciting games, and captivating stories, all carefully crafted to make learning an enjoyable.

(40 HOURS, 2 LEVELS)

Interactive sessions
Expert Teachers
4k Video Class

FISST Academy Excellence

Learn from the Best

Hands-on Learning

Career Assistance

LEVEL 1 - 20 HOURS

Cyber Security: The Modern Arena

Need for Cyber Security in the global Internet space shall be played along during the session with examples of day-to-day activities.

Expansion of Digitization
Need for Security
Types of Security
Cyber Threats

Mobile Security: The Time-killer

Mobile phones are one of the greatest inventions of the twentieth century, however it is also a curse for people who use for a time-killer. Understanding the utility of mobile phones and its countermeasures shall be discussed.

Mobile Operating Systems
Mobile Applications
Physical Device Security
Mobile Malware
Mobile Usage Safety

Smart Home Security: The Millennium Beauty

Today’s smart systems are a boon and a problem. Example, Alexa, Google Home and other smart devices shall be discussed with game play.

Cyber Attacks: An Attraction to Sin

‘Who?’, ‘Why?’, ‘What?’, and ‘Wow?’ of various cyber-attacks and incidents evolving across the globe.

  • Why Do Attacks Take Place?

  • Who Are The Attackers?

  • Basic Network And Application Attacks

  • Social Engineering Attacks

LEVEL 2 - 20 HOURS

Cyber Bullying & Stalking: A Definite Character

Bullies and stalkers have been present everywhere, and now, even within the cyber realm. Understanding their intentions, and how to safeguard against such threats shall be portrayed with thrilling activities

Online Gaming and Social N/W Security: A Poisonous Entertainer

Online gaming and standalone gaming – Which is safer and what can be added to make it a massive entertainer within a
safe environment.

Cyber Bullying & Stalking: A Definite Character

Real world examples for Cyber Safety shall be portrayed through mysterious and thrilling activities.

Securely Accessing The Internet
Safely Using The Internet
Do’s And Don’ts In The Cyber Realm

Cyber Ethics: The Goodness in You

The idea of ethics for aiming towards realizing responsibilities while using digital platforms to ensure interpersonal safety.

Responsibilities Of ‘Cyber Citizens’
Understanding And Staying Away From Cyber Crime
Understanding The Facts About Freedom Of Speech

Interested in This Program?
Secure your spot now.

Average Salary Increase of 55%
Highest Salary of 45 LPA
Over 12,000 Career Transitions
400+ Hiring Partners

Empower Your Cybersecurity Journey

Dive into a Personalized Risk Assessment Challenge!

What Our Clients Say

We place huge value on strong relationships and have seen the benefit they bring to our business. Customer feedback is vital in helping us to get it right.

As an order, we do multiple audits in a year, including tech audits for companies. This is one of the primary reasons why I wanted to enrol in the Certified Cyber Warrior course. The certified Cyber Warrior Course has been split into many different modules, of which one in particular that I liked was about physical security. It was taught to us by Professor Mohan Ram. After listening to the professors teach, I could understand that their experience speaks for itself. I strongly recommend this course for anyone looking to get into cyber security.
Suneel Narayan
Chartered Account
I have been working as a SOC analyst for the past one and a half years. After signing up for this course, I had a lot of hands-on practical training related to cyber security. I had a lot of to the cyberbay by taking part in a lot of stimulating real life scenarios. When it comes to boot camp, it was very live, hands-on, and interactive. Learning black box and grey box was such a thrilling experience. I now know how to actually implement the things I learned here. Thank you, IITM PRAVARTAK & FISST Academy.
Kalaiarasi
3i infotech
I have my background in power electronics and instrumentation from MIT Chennai. 25 years experience in operations, product management, and sales, I am glad to be here. As the world has completely become digitised in the last few years I wanted to elevate myself in the digital arena. Before joining this course, I felt that this course would create a big impact in my career. I am definitely very satisfied learning this course. After 20 weeks, I can now proudly say I am a Certified Cyber Warrior. Thanks to the professors who guided me through this course.
JP Balaji
Chennai
When I started this course it helped me understand various aspects of cyber security. I am able to put all the pieces together and I now have a clear understanding of what needs to be done. I never gave enough attention to physical security but after attending this course with the help of Mr professor Mohan Ram I understood the nuances of physical security as well. I also had the opportunity to meet people from various organisations so we could share our knowledge about cyber security. It was a dream come true having our boot camp at IIT Madras.
Kompella Phani
Vishakapatnam Port Trust
After attending the certified cyber Warrior course it was my humble realisation that I did not know a lot of things in this vast ocean that is cyber security. At my workplace we had a lot of practical work to be done which involved primarily monitoring. I am extremely thankful to the professors who taught us everything during the past few weeks. Both theory and practical sessions were amazing. The boot camp was the icing on the cake with interaction and exchange of knowledge all three days.
Pratyusha
3i infotech

Interested in This Program?
Secure your spot now.

Our Trusted Clients Of Repute

Amazing clients and brands