Cyber Champ
Discover a world of interactive lessons, exciting games, and captivating stories, all carefully crafted to make learning an enjoyable.

Age 13 -17

- Level - 1
- Level - 2
- Level - 3
- Level - 4
- Level - 5

Evolution of Digital Devices
Understanding different types of digital devices and adaptation in modern day-to-day activities

Basics of Cyber Security
Understanding different types of digital devices and adaptation in modern day-to-day activities

Internet Communications
Visualizing what and how communications happen over the Internet

Basics of Information Security
Drawing parallels between traditional security, cyber security and information security

Basics Of Digital Forensics
Foundations of digital forensics process and its importance in identifying and preventing future cyber threats

Technologies of the Century
Introducing modern technological advances such as IoT, AI, ML, etc. and their adoption in recent times

Insight into popular computer and mobile operating systems from a cyber-defensive perspective

‘Who?’, ‘Why?’, ‘What?’, and ‘How?’ of various cyber threats and incidents evolving across the globe





Module - 1
Computer Security
Baseline security practices and techniques for security computer systems from cyber threats

Module - 2
Cyber Threat Analysis
Web Application Security

Module - 3
Email Security

Module - 4

Module - 5
Network Security

Module - 6
Automation
Mobile Security
Understanding utility of mobile phones, applications and countermeasures to safeguard against cyber threats
Wireless Security
Components, methods and techniques to safely access and protect from threats to wireless networks
Socio-economic Threats
Discovering several techniques for misleading technology users to steal information and defending from them
Network Security Threats
Exploring various kinds of threats to network security and understanding ways to safeguard networks
OWASP Top 10 Security Risks (Phase 1)
Understanding utility of mobile phones, applications and countermeasures to safeguard against cyber threats
Blockchain
Describing the operation, role and security of blockchain in present day transactions and communications







FISST Academy Excellence

Learn from the Best

Hands-on Learning

Career Assistance

Interested in This Program?
Secure your spot now.

Empower Your Cybersecurity Journey
Dive into a Personalized Risk Assessment Challenge!
What Our Clients Say
We place huge value on strong relationships and have seen the benefit they bring to our business. Customer feedback is vital in helping us to get it right.

As an order, we do multiple audits in a year, including tech audits for companies. This is one of the primary reasons why I wanted to enrol in the Certified Cyber Warrior course. The certified Cyber Warrior Course has been split into many different modules, of which one in particular that I liked was about physical security. It was taught to us by Professor Mohan Ram. After listening to the professors teach, I could understand that their experience speaks for itself. I strongly recommend this course for anyone looking to get into cyber security.
Suneel Narayan
Chartered Account
I have been working as a SOC analyst for the past one and a half years. After signing up for this course, I had a lot of hands-on practical training related to cyber security. I had a lot of to the cyberbay by taking part in a lot of stimulating real life scenarios. When it comes to boot camp, it was very live, hands-on, and interactive. Learning black box and grey box was such a thrilling experience. I now know how to actually implement the things I learned here. Thank you, IITM PRAVARTAK & FISST Academy.
Kalaiarasi
3i infotech
I have my background in power electronics and instrumentation from MIT Chennai. 25 years experience in operations, product management, and sales, I am glad to be here. As the world has completely become digitised in the last few years I wanted to elevate myself in the digital arena. Before joining this course, I felt that this course would create a big impact in my career. I am definitely very satisfied learning this course. After 20 weeks, I can now proudly say I am a Certified Cyber Warrior. Thanks to the professors who guided me through this course.
JP Balaji
Chennai
When I started this course it helped me understand various aspects of cyber security. I am able to put all the pieces together and I now have a clear understanding of what needs to be done. I never gave enough attention to physical security but after attending this course with the help of Mr professor Mohan Ram I understood the nuances of physical security as well. I also had the opportunity to meet people from various organisations so we could share our knowledge about cyber security. It was a dream come true having our boot camp at IIT Madras.
Kompella Phani
Vishakapatnam Port Trust
After attending the certified cyber Warrior course it was my humble realisation that I did not know a lot of things in this vast ocean that is cyber security. At my workplace we had a lot of practical work to be done which involved primarily monitoring. I am extremely thankful to the professors who taught us everything during the past few weeks. Both theory and practical sessions were amazing. The boot camp was the icing on the cake with interaction and exchange of knowledge all three days.
Pratyusha
3i infotech
Malini
CB2W

Rashmi
Govt Employee

Aravidhan
Software Professional
