Certified Cyber Engineer
Computer & Network Security (CCE-CNS)
The first ever flagship course that provides hands-on training experience to help individuals become cyber security experts to protect enterprises in this digital era.


FISST Academy Excellence

Learn from the Best

Hands-on Learning

Career Assistance
Course Objectives
It is a course to learn the most effective steps to prevent attacks and detect adversaries with actionable techniques for Computer and Network, that one can directly apply when they get to
work.
As Certified Cyber Engineer, the participant will learn tips and tricks from the best of the experts from a mix of industry & academia, so that they can win the battle against the wide range of cyber adversaries that want to harm the enterprises’ IT environment.
- CCE-CNS along with two more specialization viz.
- Certified Cyber Engineer – Software Engineering and Secure Coding (SESC)
- Certified Cyber Engineer – Cloud Security & Devops (CS&D)
Will make the students to be ready for a career in Infosec domain, where there is a huge shortfall of trainined manpower.
For Course Info
Eligibility
- Must be a bonafide student of any college and must have completed Year 1 of any course
- For Indian Participants – Pursuing a Graduate degree programme, after 1st year or finished Diploma Holders (10+2+3) from a recognized university (UGC/AICTE/DEC/AIU/State Government) in any discipline.
- For International Participants - Graduation or equivalent degree from any recognized University or Institution in their respective country.
Pre Requisites
- Basic understanding of technology, networks and security, while not mandatory, will be an added advantage.
- Pedagogy
- Assessment
- Duration
- Class Schedule
The primary method of instruction for theory will be through recorded sessions and reading materials. Hands-on will be LIVE demonstration that will be delivered online via internet to participant desktops/laptops or classrooms. The lectures will be delivered by eminent academicians and practicing industry experts. The programme will be primarily taught though a combination of lectures, discussions, exercises and labs. All enrolled students will be provided access to our FISST Whizard Cloud Campus through which students may access other learning aids, reference materials, assessments and assignments as appropriate.
Throughout the duration of the course, students will have the flexibility to reach out to the Professors, real time during the class or offline via the FISST Whizard Cloud Campus to raise questions and clear their doubts.
There are periodic evaluation components built in as a part of the program. These maybe in the form of a quiz, assignment or other objective/subjective assessments as relevant and applicable to
the program. A minimum of 70% attendance to the LIVE lectures and completion of assignments / assessments, is a prerequisite for the successful completion of this program. Participants who satisfy the attendance criteria and successfully clear the evaluation components will be awarded a certificate of completion.
LMS (Self-learning from Video and reading materials – to be completed before hands-on – every week) – 20 hours (mainly theory on Computer & Networking fundamentals)
Hands-on – Live delivery by instructors with hands-on demo – 20 hours (4 weeks x 5 hrs per week)
Tools and Hands-on exercises – 15 hours (students try the tools demonstrated themselves & report)
TOTAL = 55 Hours (40 hours of instruction / teaching)
Week days – between 6 and 8.30 PM – 2 days per week for 4 weeks
Topics
Introduction, securing the computer networks- hardware/software, forms of protection, security standards; Sources of vulnerabilities and its assessment (4 hrs)
Sources of security threats, threat motives, management and correlation and security threat awareness; System security policy, Building a security policy, security requirement specification, Threat Identification and analysis, Vulnerability identification and assessment and security monitoring and auditing; Disaster Management, Resources for disaster planning and recovery (6hrs).
Access - Rights, Control systems; authorization- mechanisms, types, principles, and granularity; Authentication - factors and effectiveness, elements, types, methods and policy (4 hrs).
Symmetric Encryption, public key encryption, enhancing security and Key management; Public key Infrastructure, hash function and digital signatures (4 hrs).
Intrusion detection mechanism, systems, types; Response to system intrusion, challenges to intrusion detection systems and implementations; Intrusion prevention systems (4 hrs).
Computer forensics, network forensic and forensics tools (2 hrs).
Firewall- types, configuration, implementations and limitations; Scanning, Filtering and blocking; Virus filtering and content filtering (4 hrs).
Computer Network Security Protocols: Application Level Security, Security in the Transport Layer, Network layer, Link layer and over LANs (6 hrs).
WLAN security concerns and best practices for WI- FI security (4 hrs).
Challenges, vulnerabilities and attacks, security mechanisms and best practices for sensors (4 hrs).

Empower Your Cybersecurity Journey
Dive into a Personalized Risk Assessment Challenge!
Meet Our Mentors
Lead Academic Faculty Members
Programme Highlights/USPs
Course Benefits to Participants
Build a lucrative and futuristic career in the field of Cyber Security. According to NASSCOM, the estimated demand for security workforce to rise globally to six million by next year, up from 4 million in 2015, with projected shortfall of 1.5 million. (Click Here)
About Cyber Security trainings so far – FISST has conducted awareness cum certification of working professionals in India and Dubai & formal electives subject to students @ IIIT-B to the tune of 2320+ participants. The number is growing rapidly with more corporate and colleges opting to this course.
Participants for certification programmes include IT professionals from leading banks like SBI, Vijaya Bank, Canara Bank, Axis Bank, IDFC Bank, HDFC Bank, Deutsche Bank, Royal Bank of Scotland (RBS), Manapuram Gold Loan etc. and several leading IT consulting and services organisations like Deloitte, HCL, Infosys, Wipro, Cognizant, TCS etc.
Also, top notch professionals big corporates like Oracle, Microsoft, Shell, Cisco, Honeywell, Schneider etc. and PSU like IRCTC, Railtel, NLC India, Dredging Corporation etc. have attended the courses. Also, officers from various Govt. departments like DRDO, MHA, DRDO and CEG – Govt. of Karnataka have participated.

On successful completion of the programme, you will be able to
- Apply what you learnt directly to your job when you get to work.
- Design and build a network architecture using VLANs, NAC, and 802.1x based on advanced persistent threat indicators of compromise.
- Run Windows command line tools to analyze the system looking for high-risk items.
- Run Linux command line tools (ps, ls, netstat, etc.) and basic scripting to automate the running of programs to perform continuous monitoring of various tools.
- Install VMWare and create virtual machines to create a virtual lab to test and evaluate tools/security of systems.
- Create an effective policy that can be enforced within an organization and design a checklist to validate security and create metrics to tie into training and awareness.
- Build a network visibility map that can be used for hardening of a network - validating the attack surface and covering ways to reduce that surface by hardening and patching.
Other benefits to participants include
- Opportunity to earn a Certificate from IITM Pravartak and FISST along with NASSCOM
- Lectures imparted by eminent academicians and practicing industry experts.
- Convenient schedules
- Learn from Anywhere – No need to travel to an institute or training center. Learning continues even if you are traveling or not available at any specific location. You may also learn from the comfort of your home.

Interested in This Program?
Secure your spot now.
Programme Fee
Total Programme Fee
INR 8400 + 18% GST (Total – Rs. 9912/-)
USD 250 for overseas enrollment
Payment Options

Internet Banking

Credit/Debit Card

EMI Options Available
What Our Clients Say
We place huge value on strong relationships and have seen the benefit they bring to our business. Customer feedback is vital in helping us to get it right.

As an order, we do multiple audits in a year, including tech audits for companies. This is one of the primary reasons why I wanted to enrol in the Certified Cyber Warrior course. The certified Cyber Warrior Course has been split into many different modules, of which one in particular that I liked was about physical security. It was taught to us by Professor Mohan Ram. After listening to the professors teach, I could understand that their experience speaks for itself. I strongly recommend this course for anyone looking to get into cyber security.
Suneel Narayan
Chartered Account
I have been working as a SOC analyst for the past one and a half years. After signing up for this course, I had a lot of hands-on practical training related to cyber security. I had a lot of to the cyberbay by taking part in a lot of stimulating real life scenarios. When it comes to boot camp, it was very live, hands-on, and interactive. Learning black box and grey box was such a thrilling experience. I now know how to actually implement the things I learned here. Thank you, IITM PRAVARTAK & FISST Academy.
Kalaiarasi
3i infotech
I have my background in power electronics and instrumentation from MIT Chennai. 25 years experience in operations, product management, and sales, I am glad to be here. As the world has completely become digitised in the last few years I wanted to elevate myself in the digital arena. Before joining this course, I felt that this course would create a big impact in my career. I am definitely very satisfied learning this course. After 20 weeks, I can now proudly say I am a Certified Cyber Warrior. Thanks to the professors who guided me through this course.
JP Balaji
Chennai
When I started this course it helped me understand various aspects of cyber security. I am able to put all the pieces together and I now have a clear understanding of what needs to be done. I never gave enough attention to physical security but after attending this course with the help of Mr professor Mohan Ram I understood the nuances of physical security as well. I also had the opportunity to meet people from various organisations so we could share our knowledge about cyber security. It was a dream come true having our boot camp at IIT Madras.
Kompella Phani
Vishakapatnam Port Trust
After attending the certified cyber Warrior course it was my humble realisation that I did not know a lot of things in this vast ocean that is cyber security. At my workplace we had a lot of practical work to be done which involved primarily monitoring. I am extremely thankful to the professors who taught us everything during the past few weeks. Both theory and practical sessions were amazing. The boot camp was the icing on the cake with interaction and exchange of knowledge all three days.
Pratyusha
3i infotech
Malini
CB2W

Rashmi
Govt Employee

Aravidhan
Software Professional
