Certified Cyber Engineer

Computer & Network Security (CCE-CNS)

The first ever flagship course that provides hands-on training experience to help individuals become cyber security experts to protect enterprises in this digital era.

FISST Academy Excellence

Learn from the Best

Hands-on Learning

Career Assistance

Course Objectives

It is a course to learn the most effective steps to prevent attacks and detect adversaries with actionable techniques for Computer and Network, that one can directly apply when they get to
work.

As Certified Cyber Engineer, the participant will learn tips and tricks from the best of the experts from a mix of industry & academia, so that they can win the battle against the wide range of cyber adversaries that want to harm the enterprises’ IT environment.

Will make the students to be ready for a career in Infosec domain, where there is a huge shortfall of trainined manpower.

For Course Info

    Array

    Eligibility

    Pre Requisites

    The primary method of instruction for theory will be through recorded sessions and reading materials. Hands-on will be LIVE demonstration that will be delivered online via internet to participant desktops/laptops or classrooms. The lectures will be delivered by eminent academicians and practicing industry experts. The programme will be primarily taught though a combination of lectures, discussions, exercises and labs. All enrolled students will be provided access to our FISST Whizard Cloud Campus through which students may access other learning aids, reference materials, assessments and assignments as appropriate.

    Throughout the duration of the course, students will have the flexibility to reach out to the Professors, real time during the class or offline via the FISST  Whizard Cloud Campus to raise questions and clear their doubts.

    There are periodic evaluation components built in as a part of the program. These maybe in the form of a quiz, assignment or other objective/subjective assessments as relevant and applicable to
    the program. A minimum of 70% attendance to the LIVE lectures and completion of assignments / assessments, is a prerequisite for the successful completion of this program. Participants who satisfy the attendance criteria and successfully clear the evaluation components will be awarded a certificate of completion.

    LMS (Self-learning from Video and reading materials – to be completed before hands-on – every week) – 20 hours (mainly theory on Computer & Networking fundamentals)

    Hands-on - Live delivery by instructors with hands-on demo – 20 hours (4 weeks x 5 hrs per week)

    Tools and Hands-on exercises – 15 hours (students try the tools demonstrated themselves & report)

     

    TOTAL = 55 Hours (40 hours of instruction / teaching)

    Week days – between 6 and 8.30 PM – 2 days per week for 4 weeks

    Topics

    Module 1 - Introduction to Computer Network Security

    Introduction, securing the computer networks- hardware/software, forms of protection, security standards; Sources of vulnerabilities and its assessment (4 hrs)

    Module 2 - Security challenges, Assessment, Analysis and Assurance

    Sources of security threats, threat motives, management and correlation and security threat awareness; System security policy, Building a security policy, security requirement specification, Threat Identification and analysis, Vulnerability identification and assessment and security monitoring and auditing; Disaster Management, Resources for disaster planning and recovery (6hrs).

    Module 3 - Access Control, Authorization and Authentication

    Access - Rights, Control systems; authorization- mechanisms, types, principles, and granularity; Authentication - factors and effectiveness, elements, types, methods and policy (4 hrs).

    Module 4 - Cryptography

    Symmetric Encryption, public key encryption, enhancing security and Key management; Public key Infrastructure, hash function and digital signatures (4 hrs).

    Module 5 - System Intrusion Detection and Prevention

    Intrusion detection mechanism, systems, types; Response to system intrusion, challenges to intrusion detection systems and implementations; Intrusion prevention systems (4 hrs).

    Module 6 - Computer and Network Forensics

    Computer forensics, network forensic and forensics tools (2 hrs).

    Module 7 - Firewall, Virus and Content Filtering

    Firewall- types, configuration, implementations and limitations; Scanning, Filtering and blocking; Virus filtering and content filtering (4 hrs).

    Computer Network Security Protocols: Application Level Security, Security in the Transport Layer, Network layer, Link layer and over LANs (6 hrs).

    Module 8 - Security in Wireless Network and Devices

    WLAN security concerns and best practices for WI- FI security (4 hrs).

    Module 9 - Security in sensor networks

    Challenges, vulnerabilities and attacks, security mechanisms and best practices for sensors (4 hrs).

    Empower Your Cybersecurity Journey

    Dive into a Personalized Risk Assessment Challenge!

    Meet Our Mentors

    Professor Kamakoti

    Programme Advisor and Mentor
    IIT – Madras

    Mr. Mohan Ram C

    Programme Director
    MD, FISST

    Professor K. Mangala Sunder

    Programme Coordinator
    IIT – Madras

    Lead Academic Faculty Members

    Professor Noor Mahammad SK

    IIIT D&M
    Kancheepuram

    Professor Harish Ramani

    Visiting Faculty
    IIIT-B & Sri City

    Professor Mohan Ram C

    Adjunct Faculty
    IIIT-B & Sri City

    Programme Highlights/USPs

    Course Benefits to Participants

    Build a lucrative and futuristic career in the field of Cyber Security. According to NASSCOM, the estimated demand for security workforce to rise globally to six million by next year, up from 4 million in 2015, with projected shortfall of 1.5 million. (Click Here)

    About Cyber Security trainings so far – FISST has conducted awareness cum certification of working professionals in India and Dubai & formal electives subject to students @ IIIT-B to the tune of 2320+ participants. The number is growing rapidly with more corporate and colleges opting to this course.

    Participants for certification programmes include IT professionals from leading banks like SBI, Vijaya Bank, Canara Bank, Axis Bank, IDFC Bank, HDFC Bank, Deutsche Bank, Royal Bank of Scotland (RBS), Manapuram Gold Loan etc. and several leading IT consulting and services organisations like Deloitte, HCL, Infosys, Wipro, Cognizant, TCS etc.

    Also, top notch professionals big corporates like Oracle, Microsoft, Shell, Cisco, Honeywell, Schneider etc. and PSU like IRCTC, Railtel, NLC India, Dredging Corporation etc. have attended the courses. Also, officers from various Govt. departments like DRDO, MHA, DRDO and CEG – Govt. of Karnataka have participated.

    On successful completion of the programme, you will be able to

    Other benefits to participants include

    Interested in This Program?
    Secure your spot now.

    Average Salary Increase of 55%
    Highest Salary of 45 LPA
    Over 12,000 Career Transitions
    400+ Hiring Partners

    Programme Fee

    Total Programme Fee

    INR 8400 + 18% GST (Total – Rs. 9912/-)
    USD 250 for overseas enrollment

    Payment Options

    Internet Banking

    Credit/Debit Card

    EMI Options Available

    What Our Clients Say

    We place huge value on strong relationships and have seen the benefit they bring to our business. Customer feedback is vital in helping us to get it right.

    As an order, we do multiple audits in a year, including tech audits for companies. This is one of the primary reasons why I wanted to enrol in the Certified Cyber Warrior course. The certified Cyber Warrior Course has been split into many different modules, of which one in particular that I liked was about physical security. It was taught to us by Professor Mohan Ram. After listening to the professors teach, I could understand that their experience speaks for itself. I strongly recommend this course for anyone looking to get into cyber security.
    Suneel Narayan
    Chartered Account
    I have been working as a SOC analyst for the past one and a half years. After signing up for this course, I had a lot of hands-on practical training related to cyber security. I had a lot of to the cyberbay by taking part in a lot of stimulating real life scenarios. When it comes to boot camp, it was very live, hands-on, and interactive. Learning black box and grey box was such a thrilling experience. I now know how to actually implement the things I learned here. Thank you, IITM PRAVARTAK & FISST Academy.
    Kalaiarasi
    3i infotech
    I have my background in power electronics and instrumentation from MIT Chennai. 25 years experience in operations, product management, and sales, I am glad to be here. As the world has completely become digitised in the last few years I wanted to elevate myself in the digital arena. Before joining this course, I felt that this course would create a big impact in my career. I am definitely very satisfied learning this course. After 20 weeks, I can now proudly say I am a Certified Cyber Warrior. Thanks to the professors who guided me through this course.
    JP Balaji
    Chennai
    When I started this course it helped me understand various aspects of cyber security. I am able to put all the pieces together and I now have a clear understanding of what needs to be done. I never gave enough attention to physical security but after attending this course with the help of Mr professor Mohan Ram I understood the nuances of physical security as well. I also had the opportunity to meet people from various organisations so we could share our knowledge about cyber security. It was a dream come true having our boot camp at IIT Madras.
    Kompella Phani
    Vishakapatnam Port Trust
    After attending the certified cyber Warrior course it was my humble realisation that I did not know a lot of things in this vast ocean that is cyber security. At my workplace we had a lot of practical work to be done which involved primarily monitoring. I am extremely thankful to the professors who taught us everything during the past few weeks. Both theory and practical sessions were amazing. The boot camp was the icing on the cake with interaction and exchange of knowledge all three days.
    Pratyusha
    3i infotech
    Play Video
    Play Video
    Play Video

    Interested in This Program?
    Secure your spot now.

    Our Trusted Clients Of Repute

    Amazing clients and brands