Post Graduate Program in Cyber Security Course- Henry Harvin®

Post Graduate Program in Cyber Security

Henry Harvin® Ranks in Top 30 most Trusted Companies by Insight Success

  • ★ ★ ★ ★ ★ 4.7/5 Ratings
  • 1.1 Million Learners
  • 1453 Learner’s Rating
  • 81% Report Career Benefits

Boost your career level with our Post Graduate Program in Cyber Security at Henry Harvin® Cyber Security Academy | Gain in-depth working knowledge to provide a centralized way to see and safeguard data, analyze potential risks, reduction of risks, cloud-based security, and more, while ensuring regulatory compliance I This program is developed to emphasize building skills and caliber that suit the Cyber world outside | Hone your existing skills by working on assignments and projects which will help you solve the toughest problems in the domain of Cyber Security.

Starts In 2 day

25 Feb 2024

EMI Starting at

₹ 25500/month

Total Program Fee

₹ 229500

Learning Period

288 Hours

Placed Learners

  • Image 4
  • Image 5
  • Image 6
  • Image 7
  • Image 8
  • Image 9
  • Image 10
  • Image 11
  • Image 12
  • Image 13
  • Image 14
  • Image 15
  • Image 16
  • Image 17
  • Image 18
  • Image 19
  • Image 20
  • Image 21
  • Image 22
  • Image 23
  • Image 24
  • placed-learner-1
  • placed-learner-2
  • placed-learner-3
  • placed-learner-4
  • placed-learner-5
  • placed-learner-6
  • placed-learner-7
  • placed-learner-8
  • placed-learner-9
  • placed-learner-10
  • placed-learner-11

Accreditations & Affiliations

accreditations-affiliations1 accreditations-affiliations1 accreditations-affiliations1 accreditations-affiliations1 accreditations-affiliations1 accreditations-affiliations1 accreditations-affiliations1

World’s #1 Upskilling & Reskilling Institute

Key Features

images37
10-in-1 Benefits

Training + Projects + Internship + Certification + Placement + E-learning + Masterclass + Hackathons + Gold Membership + Entrepreneurship Mentorship

images37
Grow Professional Network

Successfully transition your career into high-demanding job roles. Meet & network with your fellow cohorts.

images37
Comprehensive Exam Support

Get complete guidance on Cyber Security. Solve 150+ MCQs & sample papers under expert guidance.

images37
1-year Gold Membership

Once enrolled at our Cyber Security  Academy, attend different batches with different trainers during the membership period without paying extra.

images37
100% Money-back Guarantee*

If you are unsatisfied with our Post Graduate Program in Cyber Security after completing the first session, we will refund you the entire amount.

images37
Exclusive Training Sessions

Interactive Instructor-led Live Online Training sessions delivered by Professionals to polish your existing knowledge & skills

Upcoming Cohorts

Our Placement Stats

95% images38

Average salary hike

2100+

Access the best jobs in industry

155% images39

Maximum salary hike

About the Post Graduate Program in Cyber Security

About the Post Graduate Program in Cyber Security

In this course, learners will understand the comprehensive approaches for securing and protecting data that can prodigiously and with considerable effect harm and devastate the whole base of an IT structure. It centers on safeguarding data, analyzing potential risks, reduction of risks, cloud-based security, and compliance. In this Cyber Security program, you will learn to cluster all the information, allowing you to learn, and understand data that will help you solve the toughest problems in the domain of Cyber Security. The course covers topics related to Data Collection, Processing, Security Strategies, Operational Security Management, the role of Intermediaries, Security Economics and Policy, and more.

Who Should Attend?

  • Working professionals in IT and Management
  • Entrepreneurs looking to enhance their skills in Cyber Security
  • Fresh graduates with Engineering / Mathematics background
  • Final year students completing their graduation
  • Security Engineer
  • Cyber Security Architect
  • Cyber Security Engineer
  • Information Security Lead

10 in 1 Course

  • Training: 288 Hours of Two-Way Live Online Interactive Sessions
  • Projects: Facility to undergo projects in Post Graduate Program in Cyber Security & more
  • Internship: Get Internship Support to gain experiential learning
  • Certification: Get course completion Certification for Post Graduate Program in Cyber Security from Henry Harvin® Govt of India recognized & Award-Winning Institute, and showcase expertise
  • Placement: 100% Placement Support for 1-Year post successful completion of the course
  • E-Learning: Free access to E-learning Portal and future updates
  • Masterclass: Access to 52+ Masterclass Sessions for essential soft skill development
  • Hackathons: Free Access to #AskHenry Hackathons and Competitions
  • Membership: 1-Year Gold Membership of Henry Harvin® Cyber Security Academy for the Post Graduate Program in Cyber Security
  • Entrepreneurship Mentorship: Mentorship from Young Successful Entrepreneurs to set up a sustainable & scalable Business from scratch at both Freelance and entrepreneur levels

Trainers at Henry Harvin®

  • Most respected industry experts with 18+ years of working experience and recognized by numerous organizations over the years for their work
  • They have delivered 360+ keynote classes in Cyber Security
  • Have delivered 450+ lectures and are currently empaneled as domain experts with Henry Harvin® Cyber Security Academy

Alumni Status

Become a part of the Elite Cyber Security  Academy of Henry Harvin® and join the 4,60,000+ large Alumni Network Worldwide.

Gold Membership Benefits

  • Avail 1-Year Gold Membership of Henry Harvin® Cyber Security  Academy that includes E-Learning Access through recorded Videos, Games, Projects, CPDSPe Studies
  • Access to Masterclass Sessions
  • Earn the Prestigious Henry Harvin®️ Alumni Status and become one of the reputed 4,60,000+ Alumni across the globe.
  • Guaranteed Internship with Henry Harvin®️ or partner firms
  • Weekly 10+ job opportunities offered.
  • Experience Industry Projects during the training

Learning Benefits

  • Access to E-Learning Portal
  • Learn from the latest Industry trend Curriculum
  • Earn globally recognized Certification
  • Work on Real-time Assignments and Projects related to Cyber Security
  • Understand terminologies and tactics commonly heard in the cyber world
  • Understand different stages of an exploit to adopt adequate detective and preventive cyber security controls.
  • Recognize common threat behaviors and attack vectors, hunt and, threats across enterprise networks.
  • Monitor Network and the provide real-time security solutions.
  • Learn to secure data and information security by using advanced strategies, techniques, and tools
  • Extensive coverage of the topic of security under cloud computing architecture
  • Compliance for IT and integrity of enterprise systems for the overall betterment of enterprise IT framework to thwart threats
  • On completion of the course, become eligible for various  Cyber security roles

Know the complete offerings of our Post Graduate Program in Cyber Security

You Get 10-In-1 Program

Two-way Live Training Course

pic5

Hallmark Certification

pic6

10+ Projects

pic7

Guaranteed Internship

pic8

Personalized Job Support

pic9

Student Engagement & Events

pic10

Masterclass

pic11

E-Learning Access

pic12

Gold Membership

pic13

Entrepreneurship Mentorship

pic14

Post Graduate Program in Cyber Security Curriculum

  • Module 1: Fundamentals of Cyber Security

    In this module, learners will understand the fundamentals of cyber security programs, its importance, impact of cyber crime and more

    • Introduction of PGP Cyber Security Program
    • What is Cybersecurity?
    • The Importance of Cybersecurity
    • Why is Cybercrime Increasing?
    • What is the Impact of Cybercrime?
    • How to Protect your Organization Against Cybercrime?
    • Examples of Damages to Companies Affected by Cyber Attacks and Data Breaches
    • Is Your Business at Risk of a Data Breach?
    • Quiz Module 1
  • Module 2: Text Processing

    In this module, learners will understand scheduling tasks, database connectivity, mounting a folder, linux networking and more
    • Using GREP,SED,and AWK commands
    • Mounting a file to the virtual box
    • Mounting a folder
    • SORT command and pipes to combine multiple commands
    • Scheduling Tasks
    • Advanced Shell Scripting
    • Database Connectivity
    • Linux Networking
    • Information over open source projects
    • Quiz Module 2
  • Module 3: Introduction to Linux

    In this module, learn about Linux and Windows, basic commands, boot process, hardening, scripting and more.
    • Difference Between Linux and Windows
    • Root
    • Basic commands
    • Editors
    • Schedulers
    • User Administration (Software Installation In Linux)
    • Linux Boot process
    • LVM (Logical Volume Manager)
    • TCP/IP Network Management.
    • Driver/Module Installation and Removal.
    • Log Monitoring and rotating (OpenSSH - The GNU/Linux Secure Shell)
    • sudo and su - Giving users SuperUser Privileges (Linux Administration)
    • Linux Hardening and Linux Scripting
    • Conditional, Looping Statements and Functions
  • Module 4: Footprinting and Reconnaissance

    In this module, gain knowledge on Footprinting through Search Engines, advanced Google hacking techniques, Web Services, etc. Also gather information from different sources, monitor the target using alerts and more.
    • Footprinting through Search Engines
    • Foot print using advanced Google hacking techniques
    • Information gathering using Google Advanced Search and Image Search
    • Google Hacking Database
    • VoIP and VPN Footprinting through Google Hacking Database
    • Footprinting through Web Services
    • Monitor in target using alerts
    • Finding the geographical location of the target
    • People Search on social networking sites and people search services
    • Gathering information from LinkedIn
    • Gather information from financial services
    • Footprinting through job sites
    • Information gathering using groups, forums, and blogs
    • Determining the OS
    • VoIP and VPN Footprinting through SHODAN
    • Footprinting through Social Networking Sites
    • Collecting information through social engineering on social networking sites
    • Website Footprinting
    • Mirroring the entire website
    • Extracting website information
    • Monitoring web pages for updates and changes
    • Email Footprinting
    • Tracking email communications
    • Collecting information from the email header
    • Email tracking tools
    • Competitive Intelligence
    • Whois Footprinting
    • Whois Lookup
    • Whois Lookup result analysis
    • Whois Lookup tools
    • Finding IP geolocation information
    • DNS Footprinting
    • Extracting DNS information
    • DNS interrogation tools
    • Network Footprinting
    • Locate the network range
    • Traceroute
    • Traceroute analysis and tools
    • Footprinting Through Social Engineering
    • Shoulder surfing
    • Dumpster diving
    • Footprinting Tools
    • Maltego
    • Recon-ng
    • FOCA
    • Recon-Dog
    • OSR Framework
    • Additional Footprinting tools
    • Footprinting Counter measures
    • Footprinting PenTesting
  • Module 5: Enumeration

    In this module, the learner will understand the concepts of enumeration, its technique, tools, measures and more.
    • Enumeration Concepts
    • What is Enumeration?
    • Techniques for Enumeration
    • Services and port state Enumeration
    • NetBIOS Enumeration
    • NetBIOS Enumeration Tools
    • Enumerating user accounts
    • Enumerating shared resources using Net View
    • SNMP (Simple Network Management Protocol) Enumeration
    • Working of SNMP
    • Management Information Base (MIB)
    • SNMP Enumeration tools
    • LDAP Enumeration
    • LDAP Enumeration tools
    • NTP Enumeration
    • NTP Enumeration tools
    • DNS Enumeration
    • SMTP Enumeration
    • SMTP Enumeration tools
    • DNS Enumeration Using zone transfer
    • Other Enumeration Techniques
    • IPsec Enumeration
    • VoIP Enumeration
    • RPC Enumeration
    • Unix/Linux User Enumeration
    • Enumeration Counter measures
    • Enumeration Pen Testing
  • Module 6: System Hacking

    In this module, learn about system hacking, its concept, goals, cracking password, recovery passwords, salting, escalating techniques, defending against privilege escalation and more
    • System Hacking Concepts
    • CEH Hacking Methodology (CHM)
    • System hacking goals
    • Password cracking
    • Types of password attacks
    • Password recovery tools
    • Password salting
    • Password cracking tools
    • Escalating Privileges
    • Privilege Escalation techniques
    • How to defend against privilege escalation?
    • Executing Applications
    • Tools for executing applications
    • Keylogger
    • Spyware
    • Hiding Files
    • Rootkits
    • NTFS Data Stream
    • What is steganography?
    • Covering Tracks
    • Disabling auditing: Audit pol
    • Clearing logs
    • Clear online tracks
    • Covering BASH shell tracks
    • Covering tracks on the network and OS
    • Covering tracks tools
  • Module 7: Sniffing

    In this module, learners will understand the sniffing concepts, types of sniffing, protocol analyzers, sniffing techniques, spoofing, tools, counter measures, sniffing penetration testing and more.
    • Sniffing Concepts
    • Network sniffing
    • Types of sniffing
    • Hardware protocol analyzers
    • SPAN port
    • Wiretapping
    • Lawful interception
    • Sniffing Technique
    • MAC attacks
    • DHCP attacks
    • ARP poisoning
    • Spoofing attacks
    • DNS poisoning
    • Sniffing Tools
    • Wireshark
    • Wireshark filters
    • Packet sniffing tools for mobile
    • Countermeasures
    • How to Defend Against Sniffing
    • Sniffing Detection Techniques
    • How to detect sniffing
    • Promiscuous detection tools
    • Sniffing penetration testing
  • Module 8: Denial-of-Service

    In this module, learners will understand the DoS/DDoS Concepts, attack techniques, categories, tools, attack tools for mobile, protection, counter measures, strategies and more
    • DoS/DDoS Concepts
    • What is aDenial-of-Service attack?
    • What is a distributed Denial-of-Service attack?
    • DoS/DDoS Attack Techniques
    • Basic categories of DoS/DDoS attack vectors
    • UDP, ICMP, and SYN flood attack
    • Ping of death and smurf attack
    • Fragmentation attack
    • HTTP GET/POST and slow loris attacks
    • Multi-vector attack
    • Peer-to-peer attacks
    • Permanent Denial-of-Service attack
    • Distributed reflection Denial-of-Service (DRDoS)
    • Botnets
    • Organized cyber crime: Organizational chart
    • Botnet Ecosystem
    • Botnet Trojans
    • DDoS Case Study
    • DDoS attack
    • Hackers Advertise Links To Download Botnet
    • Use of mobile devices as botnets for launching DDoS attacks
    • DDoS Case Study: Dyn DDoS Attack
    • DoS/DDoS Attack Tools
    • DoS and DDoS attack tool for mobile
    • Countermeasures
    • Detection techniques
    • DoS/DDoS counter measure strategies
    • DDoS Attack counter measures
    • Techniques to defend against botnets
    • DoS/DDoS protection at ISP Level
    • DoS/DDoS Protection Tools
    • Advanced DDoS protection appliances
    • DoS/DDoS Penetration Testing
  • Module 9: Evading IDS, Firewalls, and Honeypots

    In this module, learners learn about IDS, Firewall and Honeypot Concepts, detecting, evading, defending against firewall evasion, Firewall/IDS Penetration Testing and more
    • IDS, Firewall and Honeypot Concepts
    • Intrusion Detection System (IDS)
    • Firewall
    • Honeypot
    • IDS, Firewall and Honeypot Solutions
    • Intrusion detection tool
    • Firewalls and honeypot tools
    • Evading IDS
    • IDS/firewall evasion tools and techniques
    • Packet Fragment Generator Tools
    • Detecting Honeypots
    • Detecting and defeating honeypots
    • Honeypot detection tool: Send-Safe Honeypot Hunter
    • IDS/Firewall Evasion Counter measures
    • Firewall/IDS Penetration Testing
  • Module 10: Hacking Web Application

    In this module, learners will learn hacking Web Techniques, concepts, vulnerability, threats, web hacking methodology, Defend against web application attacks, analysing, Web application attack counter measures and more.
    • WebApp Concepts
    • Introduction to web applications
    • Web application architecture
    • Web2.0 applications
    • Vulnerability stack
    • WebApp Threats
    • OWASP Top 10 Application Security Risks
    • Web app hacking methodology
    • Foot print web Infrastructure
    • Analyze web applications
    • Bypass client-side controls
    • Attack authentication mechanism
    • Attack authorization schemes
    • Attack access controls
    • Web application attack counter measures
    • Perform injection/input validation attacks
    • Attack application logic flaws
    • Attack database connectivity
    • Attack web app client
    • Web App Hacking Tools
    • Counter measures
    • Web application fuzz testing
    • Wireless Hacking Methodology
    • Encoding schemes
    • Defend against injection attacks
    • Web application attack counter measures
    • Defend against web application attacks
    • Web App Security Testing Tools
    • Web application security testing tools
    • Web application firewall
    • Web App Pen Testing
    • Web application pen testing framework
  • Module 11: Hacking Wireless Networks

    In this module, learners will learn to hack wireless networks, authenticate, types of antennas and wireless encryption, GPS Mapping, threats,Bluetooth hacking tools, Wireless Security Tools, cracking tools, Wireless Penetration Testing and more.
    • Wireless Concepts
    • Wireless terminologies, networks, and standards
    • Service Set Identifier (SSID)
    • Wi-Fi Authentication modes
    • Wi-Fi Authentication process using a centralized authentication server
    • Types of wireless antennas
    • Wireless Encryption
    • Types of wireless encryption
    • WEP vs.WPA vs.WPA2
    • WEP issues
    • Weak Initialization Vectors (IV)
    • Wireless Threats
    • Rogue access point attack
    • Client mis-association
    • Misconfigured access point attack
    • Unauthorized association
    • Ad-Hoc Connection Attack
    • Honeypot access point attack
    • APMAC spoofing
    • Denial-of-Service attack
    • Key Reinstallation Attack (KRACK)
    • Jamming signal attack
    • Wireless Hacking Methodology
    • Wi-Fi Discovery
    • GPS mapping
    • Wireless traffic analysis
    • Launch wireless attacks
    • Crack Wi-Fi Encryption
    • Wireless Hacking Tools
    • WEP/WPA cracking tool for mobile
    • Wi-Fi Sniffer
    • Wifi Traffic Analyzer tools
    • Other wireless hacking tools
    • Bluetooth Hacking
    • Bluetooth stack
    • Bluetooth threats
    • How to blueJack a victim
    • Bluetooth hacking tools
    • Counter measures
    • Wireless security layers
    • How to defend against WPA/WPA2 cracking, KRACK attacks, wireless attacks, and bluetooth hacking
    • How to detect and block rogue AP
    • Wireless Security Tools
    • Wireless intrusion prevention systems
    • Wireless IPS deployment
    • Wi-Fi security auditing tools
    • Wi-Fi predictive planning tools
    • Wi-Fi vulnerability scanning tools
    • Bluetooth security tools
    • Wi-Fi security tools for mobile
    • Wireless Penetration Testing
    • Wireless Penetration Testing Framework
  • Module 12: IoT Hacking

    In this module, learners will understand about Iot, its concept, functioning, protocols, hacking, threat, vulnerability, scanning tools and more.
    • IoT Concepts
    • What is IoT?
    • How does IoT work?
    • IoT architecture
    • IoT application and devices
    • IoT technologies and protocols
    • IoT communication models
    • Challenges of IoT
    • Threat vs opportunity
    • IoT Attacks
    • IoT security problems
    • OWASP top 10 IoT vulnerabilities and obstacles
    • IoT attack surface areas
    • IoT threats
    • Hacking IoT devices
    • Case Study: Dyn Attack
    • IoT Hacking Methodology
    • What is IoT device hacking?
    • IoT hacking tools
    • Information gathering tools
    • Sniffing Tools
    • Vulnerability scanning tools
    • Countermeasures for Defending Against IoT Hacking
    • How to defend against IoT hacking
    • General guidelines for IoT device manufacturing companies
    • OWASP Top 10 IoT vulnerabilities solutions
    • IoT framework security considerations
    • IoT security tools
    • IoT Penetration Testing
  • Module 13: Cryptography

    In this module, learn cryptography concepts, types, GAK, DES, AES, RSA, Certification authorities, Email Encryption, Digital signature, Secure Sockets Layer (SSL), Transport Layer Security (TLS), Cryptography toolkit, Code Breaking Methodologies and more.
    • Cryptography Concepts
    • Cryptography
    • Types of cryptography
    • Government Access to Keys (GAK)
    • Encryption Algorithms
    • Ciphers
    • Data Encryption Standard (DES)
    • Advanced Encryption Standard (AES)
    • RC4, RC5, and RC6 algorithms
    • Twofish
    • The DSA and related signature schemes
    • Rivest Shamir Adleman (RSA)
    • Diffie-Hellman
    • Message digest (One-WayHash) functions
    • MD5 hash calculators
    • Cryptography tools
    • Cryptography tools for mobile
    • Public Key Infrastructure (PKI)
    • Certification authorities
    • Signed certificate (CA) vs. self-signed certificate
    • Email Encryption
    • Digital signature
    • Secure Sockets Layer (SSL)
    • Transport Layer Security (TLS)
    • Cryptography toolkit
    • Pretty Good Privacy (PGP)
    • Disk Encryption
    • Disk encryption tools
    • Cryptanalysis
    • Cryptanalysis methods
    • Code Breaking Methodologies
    • Cryptography attacks
    • Online MD5 decryption tools
    • Counter measures: How to Defend Against Cryptographic Attacks
  • Module 14: Introduction to Ethical Hacking

    In this module, learners will understand ethical hacking, its concept, Motives, goals, and objectives of information security attacks, Types of attacks on a system, SIEM, Data Leakage,backup, and recovery, Vulnerability Assessment, Cyber law in different countries and more.
    • Information Security Threats and Attack Vectors
    • Motives, goals, and objectives of information security attacks
    • Information security threat categories
    • Types of attacks on a system
    • Information Warfare
    • Hacking Concepts
    • What is hacking?
    • Who is a hacker?
    • Hacker classes
    • Hacking phases
    • Ethical Hacking Concepts
    • What is Ethical Hacking?
    • Why is Ethical Hacking necessary?
    • Scope and limitations of Ethical Hacking
    • Skills of an Ethical Hacker
    • Information Security Controls
    • Information Assurance (IA)
    • Information Security Management System
    • Enterprise Information Security Architecture (EISA)
    • Network security zoning
    • Defense-in-Depth
    • Information security policies
    • Physical Security
    • What is risk?
    • Threat modeling
    • Incident management
    • Security Information and Event Management (SIEM)
    • User Behaviour Analytics (UBA)
    • Network security controls
    • Identity and Access Management (IAM)
    • Data Leakage, backup, and recovery
    • The role of AI/ML in Cyber Security
    • Penetration Testing Concepts
    • Why penetration testing?
    • Security audit
    • Vulnerability Assessment
    • Blue Teaming/Red Teaming
    • Types and phases of penetration testing
    • Security Testing Methodology
    • Information Security Laws and Standards
    • Payment Card Industry Data Security Standard (PCI-DSS)
    • ISO/IEC27001:2013
    • Health Insurance Portability and Accountability Act(HIPAA)
    • Sarbanes Oxley Act (SOX)
    • The Digital Millennium Copyright Act(DMCA)
    • Federal Information Security Management Act(FISMA)
    • Cyber law in different countries
  • Module 15: Scanning Networks

    In this module, learners will gain knowledge on network scanning, scanning tools, techniques, packet fragmentation, source routing, banner grabbing, being able to identify target system OS and more
    • Introduction to Network Scanning
    • Scanning tools: Nmap, Hping2/Hping3, and Hping commands
    • Scanning Techniques
    • ICMP scanning
    • Ping sweep
    • ICMP echo scanning
    • TCP connect/full-open scan
    • Stealth Scan/ half-open scan
    • Inverse TCP flag scanning
    • Xmas scan
    • ACK flag probe scanning
    • IDLE/IPID header Ssan
    • UDP scanning
    • SSDP and list scanning
    • Port scanning counter measures
    • Scanning Beyond IDS and Firewall
    • IDS/Firewall Evasion Techniques
    • Packet fragmentation
    • Source routing
    • IP address decoy
    • IP address spoofing
    • Proxy servers
    • Anonymizers
    • Banner Grabbing
    • How to identify target system OS
    • Banner grabbing counter measures
    • Draw Network Diagrams
    • Drawing network diagrams
    • Network discovery and mapping tools
    • Network discovery tools for mobile
    • Scanning Pen Testing
  • Module 16: Vulnerability Analysis

    In this module, learners will learn to access vulnerability, Types of vulnerability assessment tools, Choosing a vulnerability assessment tool, Resources for Vulnerability Research, Vulnerability Assessment Reports and more.
    • Vulnerability Assessment Concepts
    • What is vulnerability assessment?
    • Vulnerability classification and research
    • Vulnerability-Management Life Cycle
    • Vulnerability Assessment Solutions
    • Vulnerability scanning solutions
    • Types of vulnerability assessment tools
    • Choosing a vulnerability assessment tool
    • Vulnerability Scoring Systems
    • Common Vulnerability Scoring System (CVSS)
    • Common Vulnerabilities and Exposures (CVE)
    • National Vulnerability Database (NVD)
    • Resources for Vulnerability Research
    • Vulnerability Assessment Reports
    • Analysing vulnerability scanning report
  • Module 17: Malware Threats

    In this module, learners will know about malware threat, its concept, components, Trojan concepts, evading antivirus techniques, about viruses, worms, Anti-virus sensor systems, Malware analysis procedure, Counter measures and more.
    • Malware Concepts
    • Introduction to malware
    • Components of malware
    • Trojan Concepts
    • What is a trojan and its types?
    • Trojan horse construction kit
    • Wrappers
    • Crypters
    • Evading Anti-virus techniques
    • Virus and Worm Concepts
    • Introduction to viruses
    • Stages of virus life
    • Different types of viruses
    • Virus hoaxes
    • Fake antiviruses
    • Ransomware
    • Creating virus
    • Computer worms
    • Worm makers
    • Malware Analysis
    • Introduction to malware analysis
    • What is a Sheep Dip Computer?
    • Anti-virus sensor systems
    • Malware analysis procedure
    • Counter measures
    • Trojan counter measures
    • Backdoor counter measures
    • Virus And worms counter measures
    • Anti-Malware Software
    • Anti-trojan software
    • Antivirus software
    • Malware Penetration Testing
  • Module 18: Social Engineering

    In this module, learners will understand Social Engineering Concepts, phases of attack, types, insider threats/ attacks, identity theft, counter measures, detect phishing mails, anti phishing toolbars and more
    • Social Engineering Concepts
    • What is Social Engineering?
    • Phases of Social Engineering attack
    • Social Engineering Techniques
    • Types of Social Engineering
    • Human-based Social Engineering
    • Computer-based Social Engineering
    • Mobile-based Social Engineering
    • Insider threat/insider attack
    • Types of insider threats
    • Social Engineering through impersonation on social networking sites
    • Social networking threats to corporate networks
    • Identity Theft
    • Social Engineering countermeasures
    • Insider threats countermeasures
    • Identity theft countermeasures
    • Detect phishing emails
    • Anti-phishing toolbar
    • Common Social Engineering targets and defense strategies
    • Social Engineering Pen Testing
    • Social Engineering pen testing tools
  • Module 19: Session Hijacking

    In this module, learners will understand the concepts of session hijacking, types, Application Level Session Hijacking, Compromising session IDs, RST Hijacking, Blind Hijacking, UDP Hijacking, CRIME attack, Session Hijacking Tools for mobile, Session Hijacking Detection methods, Protection against session Hijacking and more.
    • Session Hijacking Concepts
    • What is session Hijacking?
    • Session Hijacking Process
    • Types of Session Hijacking
    • Packet analysis of a local session hijack
    • Session Hijacking in OSI Model
    • Spoofing vs. Hijacking
    • Application Level Session Hijacking
    • Compromising session IDs using sniffing and by predicting session token
    • Man-in-the-Middle attack
    • Man-in-the-Browser attack
    • Client-side attacks
    • Cross-site script attack
    • Compromising session IDs
    • Session fixation
    • Session Hijacking using proxy servers
    • CRIME attack
    • Forbidden attack
    • Network Level Session Hijacking
    • TCP/IP Hijacking
    • IP spoofing: source routed packets
    • RST Hijacking
    • Blind Hijacking
    • UDP Hijacking
    • MiTM attack using forged ICMP and ARP spoofing
    • Session Hijacking Tools
    • Session Hijacking Tools for mobile
    • Counter measures
    • Session Hijacking Detection methods
    • Protection against session Hijacking
    • Session Hijacking Detection and prevention tools
    • IPSec
    • Penetration Testing
  • Module 20: Hacking Web Servers

    In this module, learners will learn to hack Web Servers, Web server security issues, Website defacement, Web Server misconfiguration, Web cache poisoning attack, Web server password cracking, Detecting web server hacking attempts, Patch Management, Web server security tools and more.
    • Web Server Concepts
    • Web server operations
    • Open source web server architecture
    • IIS web server architecture
    • Web server security issue
    • Web Server Attacks
    • DoS/DDoS attacks
    • DNS server Hijacking
    • DNS amplification attack
    • Directory traversal attacks
    • Man-in-the-Middle/sniffing attack
    • Phishing attacks
    • Website defacement
    • Web Server misconfiguration
    • HTTP response splitting attack
    • Web cache poisoning attack
    • SSH brute force attack
    • Web server password cracking
    • Web Server Attack Methodology
    • Information gathering
    • Web server Footprinting/banner grabbing
    • Website mirroring
    • Vulnerability scanning
    • Session Hijacking
    • Web server passwords hacking
    • Web Server Attack Tools
    • Metasploit
    • Counter measures
    • Web servers in separate secure server security segment
    • Detecting web server hacking attempts
    • HTTP response splitting
    • Web cache poisoning
    • DNS Hijacking
    • Patch Management
    • Patches And Hotfixes
    • Installation Of Patch
    • Patch management tools
    • Web application security scanners
    • Web server security scanners
    • Web server security tools
    • Web Server Pen Testing
    • Web server pentesting tools
  • Module 21: SQL Injection

    In this module, learners will understand concepts of SQL Injection, HTTP POST Request, Code Analysis, The mole and SQL injection, Evasion Techniques, Types of signature evasion techniques, URL encoding, Defend against SQL injection attacks, SQL injection detection tools and more.
    • SQL Injection Concepts
    • What is SQL injection?
    • SQL injection and server-side technologies
    • HTTP POST Request
    • Normal SQL Query
    • SQL Injection Query
    • Code Analysis
    • Types of SQL Injection
    • SQL Injection Methodology
    • SQL Injection Tools
    • SQL power injector and SQL map
    • The mole and SQL injection
    • SQL injection tools for mobile
    • Evasion Techniques
    • Evading IDS
    • Types of signature evasion techniques
    • In-line comment
    • Character encoding
    • String concatenation
    • Obfuscated codes
    • Manipulating white spaces
    • Hex encoding
    • Sophisticated matches
    • URL encoding
    • Null Byte
    • Case variation
    • Declare variable
    • IP fragmentation
    • Counter measures
    • Defend against SQL injection attacks
    • SQL injection detection tools
  • Module 22: Hacking Mobile Platforms

    In this module, learners will learn to hack mobile platforms, vulnerabilities in mobile business environments, Anatomy of a mobile attack, Security issues arising from App Stores, Hacking Android OS, Mobile Device Management (MDM), Mobile Spyware and more.
    • Mobile Platform Attack Vectors
    • Vulnerabilities in mobile business environment
    • OWASP top 10 mobile risks
    • Anatomy of a mobile attack
    • Mobile attack vectors
    • Mobile platform vulnerabilities
    • Security issues arising from App Stores
    • Apps and boxing issues
    • Mobile spam
    • SMS Phishing Attack (SMiShing)
    • Hacking Android OS
    • Android OS and rooting
    • Blocking Wi-Fi access using Net Cut
    • Hacking with z ANTI
    • Hacking network using Network Spoofer
    • Launching DdoS attack using Low Orbit Ion Cannon (LOIC)
    • Performing session Hijacking using DroidSheep
    • Hacking with Orbot Proxy
    • Android-based sniffer
    • Android trojans
    • Securing android devices
    • Android security tools
    • Android device tracking tools
    • Hacking iOS
    • Apple iOS
    • Jailbreaking iOS
    • iOS trojans
    • Guidelines for securing iOS devices
    • iOS device security and tracking tools
    • Mobile Spyware
    • mSpy
    • Mobile Device Management (MDM)
    • MDM solutions
    • Bring Your Own Device (BYOD)
    • Mobile Security Guidelines and Tools
    • General guidelines for mobile platform security
    • Mobile device security guidelines for Administrator
    • SMS phishing counter measures
    • Mobile protection tools
    • Mobile anti-spyware
    • Mobile Pen Testing
    • Android Phone Pen Testing
    • iPhone Pen Testing
    • Mobile Pentesting Toolkit: Hackode
  • Module 23: Cloud Computing

    In this module, learners will understand the concepts of cloud computing, Separation of responsibilities in cloud, Cloud deployment models, Cloud Security, Cloud security control layers, Cloud computing security considerations, Cloud Security Tools, Cloud Penetration Testing and more.
    • Cloud Computing Concepts
    • Introduction to cloud computing
    • Separation of responsibilities in cloud
    • Cloud deployment models
    • NIST cloud deployment reference architecture
    • Cloud computing benefits
    • Virtualization
    • Cloud Computing Threats
    • Cloud Computing Attacks
    • Service Hijacking and Social Engineering attacks
    • Service Hijacking and network sniffing
    • Session Hijacking and XSS attack
    • Session Hijacking and session riding
    • Domain Name System (DNS) attacks
    • Side channel attacks cross-guest VM breach
    • SQL Injection attacks
    • Cryptanalysis attacks
    • Wrapping attack
    • DoS and DDoS attacks
    • Man-in-the-Cloud attack
    • Cloud Security
    • Cloud security control layers
    • Cloud computing security considerations
    • Placement Of Security Controls in the cloud
    • Best practices for securing cloud
    • NIST recommendations for cloud security
    • Organization/Provider cloud security compliance checklist
    • Cloud Security Tools
    • Cloud Penetration Testing
    • Key considerations for pen testing in the cloud
    • Recommendations for Cloud Testing

Know the complete offerings of our Post Graduate Program in Post Graduate Program in Cyber Security

Skills Covered

Secure Data

Mitigate Risk

Compliance for IT

Information Security

Network Monitoring

Recognize Threat Behaviors

Languages and Tools Covered

tools1
tools2
tools3
tools4
tools5
tools6
tools7
tools8
tools9
tools10
tools11
tools12
tools13
tools14
tools15
tools16
tools17
tools18

Tools Covered

tool-image1
tool-image1
tool-image1
tool-image1
tool-image1
tool-image1
tool-image1
tool-image1
tool-image1
tool-image1
tool-image1
tool-image1
tool-image1
tool-image1
tool-image1
tool-image1

Know more about 50+ tools covered in this Data Science with Python

Career Services By Henry Harvin®

Career Services
images53

Placement Drives

We are dedicated to supporting our students throughout their career journey. Join us, and let's embark on a journey towards a successful and fulfilling career together.

images54

Premium access to Henry Harvin® Job portal

Exclusive access to our dedicated job portal and apply for jobs. More than 2100+ hiring partners’ including top start–ups and product companies hiring our learners. Mentored support on job search and relevant jobs for your career growth.

images55

Personalized Job Consulting

Share what kind of job you are looking for and we will provide you with verified job openings that match your requirement.

Salary Trends

200+

Global Companies

$122K PA

Average CTC

$250K PA

Highest CTC

87%

Average Salary Hike

images66

Get Ahead with Henry Harvin® Post Graduate Program in Cyber Security Certification

  • Earn your Certification

    Our Post Graduate Program in Cyber Security is exhaustive and this Certification is proof that you have taken a giant leap in mastering the domain

  • Differentiate yourself with a Henry Harvin® Certification

    The practical knowledge and actionable skillset you've gained working on projects, simulations, and case studies will set you ahead of the competition

  • Share your achievement

    Talk about it on LinkedIn, WhatsApp, Instagram, Facebook, and Twitter to boost your resume or frame it - tell your friends and colleagues about it.

  • Training Certification

    Get Course Completion Certification of Post Graduate Program in Cyber Security Training from Henry Harvin®

certificate1

Our courses and Course Certificates are trusted by these industry leaders

images68

Know more about the value of this certificate in the industry

Post Graduate Program in Cyber Security Training Certification Process

Counselling and Registration

Consult one of the counselors and get into the Right Batch. Register yourself for the Post Graduate Program in Cyber Security.

Attend the Training

Attend 288 Hours of sessions and gain credits to get Certification from Henry Harvin® Post Graduate Program in Cyber Security (Cyber SecurityAcademy)

Deliver Projects Assigned

Gather experience with real-world assignments and practical projects to upgrade your existing skills. Deliver these mini-projects to be eligible for Henry Harvin® Certification

Earn Certification

Post-successful completion of the Course, earn Henry Harvin® Certification. Post it on social media, get it framed, and increase your value in the industry.

Know more about the value of this certificate in the industry

There's a reason that 95% of our customers undertake 3+ courses as a minimum with Henry Harvin®

images78
Tristan
★ ★ ★ ★ ★
link-img
images78
Olu
★ ★ ★ ★ ★
link-img
images78
SANDESH KUMAR
★ ★ ★ ★ ★
link-img
images78
Alagie
★ ★ ★ ★ ★
link-img
images78
Rachel
★ ★ ★ ★ ★
link-img
images78
USHA RAJU
★ ★ ★ ★ ★
link-img
images78
Oluwafemi
★ ★ ★ ★ ★
link-img
images78
Jessica
★ ★ ★ ★ ★
link-img

Know the complete offerings of our Post Graduate Program in Cyber Security

FAQs

Popular Programs

Cyber Security Professional Course
best seller pic1

4.9(1291 Ratings) 7625 Learners

Cyber Security Fundamentals Course
best seller pic1

4.9(1953 Ratings) 3861 Learners

Data Privacy Course
best seller pic1

4.8(1976 Ratings) 41323 Learners

Cyber Forensics Course
best seller pic1

4.9(1958 Ratings) 5713 Learners

CSX Fundamentals Course
best seller pic1

4.9(1790 Ratings) 41972 Learners

Cyber Security Audit Course
best seller pic1

4.9(1873 Ratings) 41869 Learners

Incident Handler Course
best seller pic1

4.9(1102 Ratings) 7193 Learners

Entry Level Cybersecurity Course
best seller pic1

4.9(1174 Ratings) 3961 Learners

Ethical Hacking Course
best seller pic1

4.9(1023 Ratings) 6232 Learners

Who We Are?

Henry Harvin®️ ranks amongst the Top 500 Global Edtech Companies with 4,60,000+ Alumni, 900+ B2B Clients, 500+ Award Winning Trainers, and 1200+ Courses.

460,000+

Trained

6,700+

Reviews with 4.5/5
rating

7,000+

Live Classes Every
Month

210+

Corporate Partners

180+

College Partners

87%

Reported Career
Benefits

Why Us?

Certified & Experienced Instructors

Learn More pic31

Gold Membership & Post Training Followups

Tailor Made Training

Flexible Schedule

Access to the Recorded Sessions

10 in 1 Program

Masterclasses By Henry Harvin®️

One-to-One Training

Awards

award award1 award33 award2

Henry Harvin® often makes the news

images70 images71 images72 images73 images74 images75

Excited to Learn?

Post Graduate Program in Cyber Security in other cities