Post Graduate Program in Cyber Security Course- Henry Harvin®

Post Graduate Program in Cyber Security

Henry Harvin® Ranked No.1 amongst Top Cyber Security courses in India by Express Computer

  • ★ ★ ★ ★ ★ 4.7/5 Ratings
  • 1.1 Million Learners
  • 1453 Learner’s Rating
  • 81% Report Career Benefits

Boost your career level with our Post Graduate in Cyber Security Course at Henry Harvin® Cyber Security Academy | Gain in-depth working knowledge to provide a centralized way to see and safeguard data, analyze potential risks, reduction of risks, cloud-based security, and more, while ensuring regulatory compliance I This program is developed to emphasize building skills and caliber that suit the Cyber world outside | Hone your existing skills by working on assignments and projects which will help you solve the toughest problems in the domain of Cyber Security.

Starts In 1 day

21 Apr 2024

Learning Period

288 Hours

Book a Live Class, For Free!

svg-seat Limited seats left

By continuing you agree to Henry Harvin® Terms & conditions and Privacy Policy

Placed Learners

  • Image 4
  • Image 5
  • Image 6
  • Image 7
  • Image 8
  • Image 9
  • Image 10
  • Image 11
  • Image 12
  • Image 13
  • Image 14
  • Image 15
  • Image 16
  • Image 17
  • Image 18
  • Image 19
  • Image 20
  • Image 21
  • Image 22
  • Image 23
  • Image 24
  • placed-learner-1
  • placed-learner-2
  • placed-learner-3
  • placed-learner-4
  • placed-learner-5
  • placed-learner-6
  • placed-learner-7
  • placed-learner-8
  • placed-learner-9
  • placed-learner-10
  • placed-learner-11

Accreditations & Affiliations

accreditations-affiliations1 accreditations-affiliations1 accreditations-affiliations1 accreditations-affiliations1 accreditations-affiliations1 accreditations-affiliations1 accreditations-affiliations1

There's a reason that 95% of our alumni undertake 3+ courses as a minimum with Henry Harvin®

images78
AJ
★ ★ ★ ★ ★
link-img
images78
Tristan
★ ★ ★ ★ ★
link-img
images78
Olu
★ ★ ★ ★ ★
link-img
images78
SANDESH KUMAR
★ ★ ★ ★ ★
link-img
images78
Alagie
★ ★ ★ ★ ★
link-img
images78
USHA RAJU
★ ★ ★ ★ ★
link-img
images78
Jessica
★ ★ ★ ★ ★
link-img

Know the complete offerings of our Post Graduate Program in Cyber Security

Key Highlights

images37
Agota™ Framework
images37
Grow Professional Network
images37
Comprehensive Exam Support
images37
1-year Gold Membership
images37
100% Money-back Guarantee*
images37
Exclusive Training Sessions

Upcoming Cohorts

Our Placement Stats

95% images38

Average salary hike

2100+

Access the best jobs in industry

155% images39

Maximum salary hike

Access the best jobs in the industry

You Get 10-In-1 Program

Two-way Live Training Course

Two-way Live Online Interactive Classroom Sessions

 random imgee

Certification

Distinguish your profile with global credentials and showcase expertise with our Hallmark Completion certificate

 random imgee

Projects

Facility to undergo various projects along with the course.

random imgee

Guaranteed Internship

Get a guaranteed Internship with Henry Harvin® and in top MNCs like J.P. Morgan, Accenture & many more via Forage.

 random imgee

Placement

Get 3 in 1 Placement support through Placement Drives, Premium access to Job portal & Personalized Job Consulting

 random imgee

Student Engagement & Events

Free Access to #AskHenry Hackathons and Competitions & many other facilities from Henry Harvin®

 random imgee

Masterclass

Access to 52+ Masterclass Sessions for essential soft skill development

 random imgee

Membership

Get Free Gold Membership of Henry Harvin®

 random imgee

E-Learning Access

Free access to the E-learning Portal and future updates. Get access to PPTs, Projects, Quizzes, self-paced Video-based learning, a question bank, a library, practice tests, final assessment, a forum, and doubt sessions.

 random imgee

Entrepreneurship Mentorship

Mentorship from Young Successful Entrepreneurs to set up a sustainable & scalable Business from scratch at both Freelance and entrepreneur levels

 random imgee

About the Post Graduate Program in Cyber Security

About the Post Graduate Program in Cyber Security

In this Post Graduation in Cyber Security Course, learners will understand the comprehensive approaches for securing and protecting data that can prodigiously and with considerable effect harm and devastate the whole base of an IT structure. It centers on safeguarding data, analyzing potential risks, reduction of risks, cloud-based security, and compliance. In this Cyber Security PG course, you will learn to cluster all the information, allowing you to learn, and understand data that will help you solve the toughest problems in the domain of Cyber Security. The Post Graduation in Cyber Security Course covers topics related to Data Collection, Processing, Security Strategies, Operational Security Management, the role of Intermediaries, Security Economics and Policy, and more.

Who Should Attend?

  • Working professionals in IT and Management
  • Entrepreneurs looking to enhance their skills in Cyber Security
  • Fresh graduates with Engineering / Mathematics background
  • Final year students completing their graduation
  • Security Engineer
  • Cyber Security Architect
  • Cyber Security Engineer
  • Information Security Lead

Agota™ Framework

This is a versatile 10-in-1 program that includes various aspects of competency development and career development.

  • Training: 288 Hours of Two-Way Live Online Interactive Sessions with our Cyber Security PG course,
  • Projects: Facility to undergo projects in Post Graduate in Cyber Security Course & more 
  • Masterclass: Access to 52+ Masterclass Sessions for essential soft skill development
  • Student Engagement & Events: Free Access to #AskHenry Hackathons and Competitions & many other facilities from Henry Harvin®
  • Membership:  2-Year Gold Membership of Henry Harvin® Cyber Security Academy for the Post Graduate Program in Cyber Security 
  • E-Learning  Free access to E-learning Portal and future updates. Get access to PPTs, Projects, Quizzes, self-paced Video based learning, a question bank, a library, practice tests, final assessment, a forum, and doubt sessions.
  • Certification: Get course completion Certification for Post Graduate Program in Cyber Security from Henry Harvin® Govt of India recognized & Award-Winning Institute, and from NSDC
  • Internship Support: Get a guaranteed Internship with Henry Harvin® and in top MNC's like J.P. Morgan, Accenture & many more via Forage.
  • Entrepreneurship Mentorship: Mentorship from Young Successful Entrepreneurs to set up a sustainable & scalable Business from scratch at both Freelance and entrepreneur levels
  • Placement Support: Get 3 in 1 Placement support through Placement Drives, Premium access to Job portal & Personalized Job Consulting

Trainers at Henry Harvin®

  • Most respected industry experts with 18+ years of working experience and recognized by numerous organizations over the years for their work
  • They have delivered 360+ keynote classes for Post Graduation in Cyber Security.
  • Have delivered 450+ lectures and are currently empaneled as domain experts with Henry Harvin® Cyber Security Academy

Alumni Status

Become a part of the Elite Cyber Security  Academy of Henry Harvin® and join the 4,60,000+ large Alumni Network Worldwide.

Gold Membership Benefits

  • Avail 1-Year Gold Membership of Henry Harvin® Cyber Security  Academy that includes E-Learning Access through recorded Videos, Games, Projects, CPDSPe Studies for the Cyber Security PG course.
  • Access to Masterclass Sessions for Post Graduation in Cyber Security Course
  • Earn the Prestigious Henry Harvin®️ Alumni Status and become one of the reputed 4,60,000+ Alumni across the globe.
  • Guaranteed Internship with Henry Harvin®️ or partner firms after finishing the Cyber Security PG course
  • Weekly 10+ job opportunities offered after completion of Post Graduation in Cyber Security Course
  • Experience Industry Projects during the training for Post Graduation in Cyber Security Course

Learning Benefits of Post Graduation in Cyber Security Course

  • Access to E-Learning Portal
  • Learn from the latest Industry trend Curriculum for the Cyber Security PG course.
  • Earn globally recognized Certification
  • Work on Real-time Assignments and Projects related to Cyber Security
  • Understand terminologies and tactics commonly heard in the cyber world with our distinguished Post Graduation in Cyber Security Course
  • Understand different stages of an exploit to adopt adequate detective and preventive cyber security controls.
  • Recognize common threat behaviors and attack vectors, hunt and, threats across enterprise networks with this Post Graduation in Cyber Security Course
  • Learn to monitor network and provide real-time security solutions with this one-of-a-kind Cyber Security PG course
  • Learn to secure data and information security by using advanced strategies, techniques, and tools with the Cyber Security PG course
  • Extensive coverage of the topic of security under cloud computing architecture
  • Compliance for IT and integrity of enterprise systems for the overall betterment of enterprise IT framework to thwart threats
  • On completion of the Cyber Security PG course, become eligible for various Cyber security roles

Recognitions of Henry Harvin® Education

  • Winner of Top Corporate Training Award, Game-Based Learning Company of the under 40 Business World Award
  • Affiliated with the American Association of EFL, Ministry of Corporate Affairs, MSME, UKAF, UKCert, Project Management Institute (PMI), and ISO 29990:2010 certified
  • Reviews: 3425+ Google Reviews, 1100+ YouTube Testimonials with 4.5+ Rating Rated on GoAbroad, Trustpilot, GoOverseas & more

Career Benefits

  • Promotes Cyber Security awareness
  • Reduce and minimize damages from Cyber Incidents
  • Safeguard information and information infrastructures in Cyberspaces
  • Gain hands-on-experience to work on Cyber Security Tools
  • Identify the most common Security Attacks in an organization
  • Implement Security Measures on a network environment
  • Know Risk Management processes and techniques
  • Develop Job-Ready Skills on learning Cyber Security Course

Know the complete offerings of our Post Graduate Program in Cyber Security

Post Graduate Program in Cyber Security Curriculum

  • Module 1: Fundamentals of Cyber Security

    In this module, learners will understand the fundamentals of cyber security programs, its importance, impact of cyber crime and more

    • Introduction of PGP Cyber Security Program
    • What is Cybersecurity?
    • The Importance of Cybersecurity
    • Why is Cybercrime Increasing?
    • What is the Impact of Cybercrime?
    • How to Protect your Organization Against Cybercrime?
    • Examples of Damages to Companies Affected by Cyber Attacks and Data Breaches
    • Is Your Business at Risk of a Data Breach?
    • Quiz Module 1
  • Module 2: Text Processing

    In this module, learners will understand scheduling tasks, database connectivity, mounting a folder, linux networking and more
    • Using GREP,SED,and AWK commands
    • Mounting a file to the virtual box
    • Mounting a folder
    • SORT command and pipes to combine multiple commands
    • Scheduling Tasks
    • Advanced Shell Scripting
    • Database Connectivity
    • Linux Networking
    • Information over open source projects
    • Quiz Module 2
  • Module 3: Introduction to Linux

    In this module, learn about Linux and Windows, basic commands, boot process, hardening, scripting and more.
    • Difference Between Linux and Windows
    • Root
    • Basic commands
    • Editors
    • Schedulers
    • User Administration (Software Installation In Linux)
    • Linux Boot process
    • LVM (Logical Volume Manager)
    • TCP/IP Network Management.
    • Driver/Module Installation and Removal.
    • Log Monitoring and rotating (OpenSSH - The GNU/Linux Secure Shell)
    • sudo and su - Giving users SuperUser Privileges (Linux Administration)
    • Linux Hardening and Linux Scripting
    • Conditional, Looping Statements and Functions
  • Module 4: Footprinting and Reconnaissance

    In this module, gain knowledge on Footprinting through Search Engines, advanced Google hacking techniques, Web Services, etc. Also gather information from different sources, monitor the target using alerts and more.
    • Footprinting through Search Engines
    • Foot print using advanced Google hacking techniques
    • Information gathering using Google Advanced Search and Image Search
    • Google Hacking Database
    • VoIP and VPN Footprinting through Google Hacking Database
    • Footprinting through Web Services
    • Monitor in target using alerts
    • Finding the geographical location of the target
    • People Search on social networking sites and people search services
    • Gathering information from LinkedIn
    • Gather information from financial services
    • Footprinting through job sites
    • Information gathering using groups, forums, and blogs
    • Determining the OS
    • VoIP and VPN Footprinting through SHODAN
    • Footprinting through Social Networking Sites
    • Collecting information through social engineering on social networking sites
    • Website Footprinting
    • Mirroring the entire website
    • Extracting website information
    • Monitoring web pages for updates and changes
    • Email Footprinting
    • Tracking email communications
    • Collecting information from the email header
    • Email tracking tools
    • Competitive Intelligence
    • Whois Footprinting
    • Whois Lookup
    • Whois Lookup result analysis
    • Whois Lookup tools
    • Finding IP geolocation information
    • DNS Footprinting
    • Extracting DNS information
    • DNS interrogation tools
    • Network Footprinting
    • Locate the network range
    • Traceroute
    • Traceroute analysis and tools
    • Footprinting Through Social Engineering
    • Shoulder surfing
    • Dumpster diving
    • Footprinting Tools
    • Maltego
    • Recon-ng
    • FOCA
    • Recon-Dog
    • OSR Framework
    • Additional Footprinting tools
    • Footprinting Counter measures
    • Footprinting PenTesting
  • Module 5: Enumeration

    In this module, the learner will understand the concepts of enumeration, its technique, tools, measures and more.
    • Enumeration Concepts
    • What is Enumeration?
    • Techniques for Enumeration
    • Services and port state Enumeration
    • NetBIOS Enumeration
    • NetBIOS Enumeration Tools
    • Enumerating user accounts
    • Enumerating shared resources using Net View
    • SNMP (Simple Network Management Protocol) Enumeration
    • Working of SNMP
    • Management Information Base (MIB)
    • SNMP Enumeration tools
    • LDAP Enumeration
    • LDAP Enumeration tools
    • NTP Enumeration
    • NTP Enumeration tools
    • DNS Enumeration
    • SMTP Enumeration
    • SMTP Enumeration tools
    • DNS Enumeration Using zone transfer
    • Other Enumeration Techniques
    • IPsec Enumeration
    • VoIP Enumeration
    • RPC Enumeration
    • Unix/Linux User Enumeration
    • Enumeration Counter measures
    • Enumeration Pen Testing
  • Module 6: System Hacking

    In this module, learn about system hacking, its concept, goals, cracking password, recovery passwords, salting, escalating techniques, defending against privilege escalation and more
    • System Hacking Concepts
    • CEH Hacking Methodology (CHM)
    • System hacking goals
    • Password cracking
    • Types of password attacks
    • Password recovery tools
    • Password salting
    • Password cracking tools
    • Escalating Privileges
    • Privilege Escalation techniques
    • How to defend against privilege escalation?
    • Executing Applications
    • Tools for executing applications
    • Keylogger
    • Spyware
    • Hiding Files
    • Rootkits
    • NTFS Data Stream
    • What is steganography?
    • Covering Tracks
    • Disabling auditing: Audit pol
    • Clearing logs
    • Clear online tracks
    • Covering BASH shell tracks
    • Covering tracks on the network and OS
    • Covering tracks tools
  • Module 7: Sniffing

    In this module, learners will understand the sniffing concepts, types of sniffing, protocol analyzers, sniffing techniques, spoofing, tools, counter measures, sniffing penetration testing and more.
    • Sniffing Concepts
    • Network sniffing
    • Types of sniffing
    • Hardware protocol analyzers
    • SPAN port
    • Wiretapping
    • Lawful interception
    • Sniffing Technique
    • MAC attacks
    • DHCP attacks
    • ARP poisoning
    • Spoofing attacks
    • DNS poisoning
    • Sniffing Tools
    • Wireshark
    • Wireshark filters
    • Packet sniffing tools for mobile
    • Countermeasures
    • How to Defend Against Sniffing
    • Sniffing Detection Techniques
    • How to detect sniffing
    • Promiscuous detection tools
    • Sniffing penetration testing
  • Module 8: Denial-of-Service

    In this module, learners will understand the DoS/DDoS Concepts, attack techniques, categories, tools, attack tools for mobile, protection, counter measures, strategies and more
    • DoS/DDoS Concepts
    • What is aDenial-of-Service attack?
    • What is a distributed Denial-of-Service attack?
    • DoS/DDoS Attack Techniques
    • Basic categories of DoS/DDoS attack vectors
    • UDP, ICMP, and SYN flood attack
    • Ping of death and smurf attack
    • Fragmentation attack
    • HTTP GET/POST and slow loris attacks
    • Multi-vector attack
    • Peer-to-peer attacks
    • Permanent Denial-of-Service attack
    • Distributed reflection Denial-of-Service (DRDoS)
    • Botnets
    • Organized cyber crime: Organizational chart
    • Botnet Ecosystem
    • Botnet Trojans
    • DDoS Case Study
    • DDoS attack
    • Hackers Advertise Links To Download Botnet
    • Use of mobile devices as botnets for launching DDoS attacks
    • DDoS Case Study: Dyn DDoS Attack
    • DoS/DDoS Attack Tools
    • DoS and DDoS attack tool for mobile
    • Countermeasures
    • Detection techniques
    • DoS/DDoS counter measure strategies
    • DDoS Attack counter measures
    • Techniques to defend against botnets
    • DoS/DDoS protection at ISP Level
    • DoS/DDoS Protection Tools
    • Advanced DDoS protection appliances
    • DoS/DDoS Penetration Testing
  • Module 9: Evading IDS, Firewalls, and Honeypots

    In this module, learners learn about IDS, Firewall and Honeypot Concepts, detecting, evading, defending against firewall evasion, Firewall/IDS Penetration Testing and more
    • IDS, Firewall and Honeypot Concepts
    • Intrusion Detection System (IDS)
    • Firewall
    • Honeypot
    • IDS, Firewall and Honeypot Solutions
    • Intrusion detection tool
    • Firewalls and honeypot tools
    • Evading IDS
    • IDS/firewall evasion tools and techniques
    • Packet Fragment Generator Tools
    • Detecting Honeypots
    • Detecting and defeating honeypots
    • Honeypot detection tool: Send-Safe Honeypot Hunter
    • IDS/Firewall Evasion Counter measures
    • Firewall/IDS Penetration Testing
  • Module 10: Hacking Web Application

    In this module, learners will learn hacking Web Techniques, concepts, vulnerability, threats, web hacking methodology, Defend against web application attacks, analysing, Web application attack counter measures and more.
    • WebApp Concepts
    • Introduction to web applications
    • Web application architecture
    • Web2.0 applications
    • Vulnerability stack
    • WebApp Threats
    • OWASP Top 10 Application Security Risks
    • Web app hacking methodology
    • Foot print web Infrastructure
    • Analyze web applications
    • Bypass client-side controls
    • Attack authentication mechanism
    • Attack authorization schemes
    • Attack access controls
    • Web application attack counter measures
    • Perform injection/input validation attacks
    • Attack application logic flaws
    • Attack database connectivity
    • Attack web app client
    • Web App Hacking Tools
    • Counter measures
    • Web application fuzz testing
    • Wireless Hacking Methodology
    • Encoding schemes
    • Defend against injection attacks
    • Web application attack counter measures
    • Defend against web application attacks
    • Web App Security Testing Tools
    • Web application security testing tools
    • Web application firewall
    • Web App Pen Testing
    • Web application pen testing framework
  • Module 11: Hacking Wireless Networks

    In this module, learners will learn to hack wireless networks, authenticate, types of antennas and wireless encryption, GPS Mapping, threats,Bluetooth hacking tools, Wireless Security Tools, cracking tools, Wireless Penetration Testing and more.
    • Wireless Concepts
    • Wireless terminologies, networks, and standards
    • Service Set Identifier (SSID)
    • Wi-Fi Authentication modes
    • Wi-Fi Authentication process using a centralized authentication server
    • Types of wireless antennas
    • Wireless Encryption
    • Types of wireless encryption
    • WEP vs.WPA vs.WPA2
    • WEP issues
    • Weak Initialization Vectors (IV)
    • Wireless Threats
    • Rogue access point attack
    • Client mis-association
    • Misconfigured access point attack
    • Unauthorized association
    • Ad-Hoc Connection Attack
    • Honeypot access point attack
    • APMAC spoofing
    • Denial-of-Service attack
    • Key Reinstallation Attack (KRACK)
    • Jamming signal attack
    • Wireless Hacking Methodology
    • Wi-Fi Discovery
    • GPS mapping
    • Wireless traffic analysis
    • Launch wireless attacks
    • Crack Wi-Fi Encryption
    • Wireless Hacking Tools
    • WEP/WPA cracking tool for mobile
    • Wi-Fi Sniffer
    • Wifi Traffic Analyzer tools
    • Other wireless hacking tools
    • Bluetooth Hacking
    • Bluetooth stack
    • Bluetooth threats
    • How to blueJack a victim
    • Bluetooth hacking tools
    • Counter measures
    • Wireless security layers
    • How to defend against WPA/WPA2 cracking, KRACK attacks, wireless attacks, and bluetooth hacking
    • How to detect and block rogue AP
    • Wireless Security Tools
    • Wireless intrusion prevention systems
    • Wireless IPS deployment
    • Wi-Fi security auditing tools
    • Wi-Fi predictive planning tools
    • Wi-Fi vulnerability scanning tools
    • Bluetooth security tools
    • Wi-Fi security tools for mobile
    • Wireless Penetration Testing
    • Wireless Penetration Testing Framework
  • Module 12: IoT Hacking

    In this module, learners will understand about Iot, its concept, functioning, protocols, hacking, threat, vulnerability, scanning tools and more.
    • IoT Concepts
    • What is IoT?
    • How does IoT work?
    • IoT architecture
    • IoT application and devices
    • IoT technologies and protocols
    • IoT communication models
    • Challenges of IoT
    • Threat vs opportunity
    • IoT Attacks
    • IoT security problems
    • OWASP top 10 IoT vulnerabilities and obstacles
    • IoT attack surface areas
    • IoT threats
    • Hacking IoT devices
    • Case Study: Dyn Attack
    • IoT Hacking Methodology
    • What is IoT device hacking?
    • IoT hacking tools
    • Information gathering tools
    • Sniffing Tools
    • Vulnerability scanning tools
    • Countermeasures for Defending Against IoT Hacking
    • How to defend against IoT hacking
    • General guidelines for IoT device manufacturing companies
    • OWASP Top 10 IoT vulnerabilities solutions
    • IoT framework security considerations
    • IoT security tools
    • IoT Penetration Testing
  • Module 13: Cryptography

    In this module, learn cryptography concepts, types, GAK, DES, AES, RSA, Certification authorities, Email Encryption, Digital signature, Secure Sockets Layer (SSL), Transport Layer Security (TLS), Cryptography toolkit, Code Breaking Methodologies and more.
    • Cryptography Concepts
    • Cryptography
    • Types of cryptography
    • Government Access to Keys (GAK)
    • Encryption Algorithms
    • Ciphers
    • Data Encryption Standard (DES)
    • Advanced Encryption Standard (AES)
    • RC4, RC5, and RC6 algorithms
    • Twofish
    • The DSA and related signature schemes
    • Rivest Shamir Adleman (RSA)
    • Diffie-Hellman
    • Message digest (One-WayHash) functions
    • MD5 hash calculators
    • Cryptography tools
    • Cryptography tools for mobile
    • Public Key Infrastructure (PKI)
    • Certification authorities
    • Signed certificate (CA) vs. self-signed certificate
    • Email Encryption
    • Digital signature
    • Secure Sockets Layer (SSL)
    • Transport Layer Security (TLS)
    • Cryptography toolkit
    • Pretty Good Privacy (PGP)
    • Disk Encryption
    • Disk encryption tools
    • Cryptanalysis
    • Cryptanalysis methods
    • Code Breaking Methodologies
    • Cryptography attacks
    • Online MD5 decryption tools
    • Counter measures: How to Defend Against Cryptographic Attacks
  • Module 14: Introduction to Ethical Hacking

    In this module, learners will understand ethical hacking, its concept, Motives, goals, and objectives of information security attacks, Types of attacks on a system, SIEM, Data Leakage,backup, and recovery, Vulnerability Assessment, Cyber law in different countries and more.
    • Information Security Threats and Attack Vectors
    • Motives, goals, and objectives of information security attacks
    • Information security threat categories
    • Types of attacks on a system
    • Information Warfare
    • Hacking Concepts
    • What is hacking?
    • Who is a hacker?
    • Hacker classes
    • Hacking phases
    • Ethical Hacking Concepts
    • What is Ethical Hacking?
    • Why is Ethical Hacking necessary?
    • Scope and limitations of Ethical Hacking
    • Skills of an Ethical Hacker
    • Information Security Controls
    • Information Assurance (IA)
    • Information Security Management System
    • Enterprise Information Security Architecture (EISA)
    • Network security zoning
    • Defense-in-Depth
    • Information security policies
    • Physical Security
    • What is risk?
    • Threat modeling
    • Incident management
    • Security Information and Event Management (SIEM)
    • User Behaviour Analytics (UBA)
    • Network security controls
    • Identity and Access Management (IAM)
    • Data Leakage, backup, and recovery
    • The role of AI/ML in Cyber Security
    • Penetration Testing Concepts
    • Why penetration testing?
    • Security audit
    • Vulnerability Assessment
    • Blue Teaming/Red Teaming
    • Types and phases of penetration testing
    • Security Testing Methodology
    • Information Security Laws and Standards
    • Payment Card Industry Data Security Standard (PCI-DSS)
    • ISO/IEC27001:2013
    • Health Insurance Portability and Accountability Act(HIPAA)
    • Sarbanes Oxley Act (SOX)
    • The Digital Millennium Copyright Act(DMCA)
    • Federal Information Security Management Act(FISMA)
    • Cyber law in different countries
  • Module 15: Scanning Networks

    In this module, learners will gain knowledge on network scanning, scanning tools, techniques, packet fragmentation, source routing, banner grabbing, being able to identify target system OS and more
    • Scanning tools: Nmap, Hping2/Hping3, and Hping commands
    • Introduction to Network Scanning
    • Scanning Techniques
    • ICMP scanning
    • Ping sweep
    • ICMP echo scanning
    • TCP connect/full-open scan
    • Stealth Scan/ half-open scan
    • Inverse TCP flag scanning
    • Xmas scan
    • ACK flag probe scanning
    • IDLE/IPID header Ssan
    • UDP scanning
    • SSDP and list scanning
    • Port scanning counter measures
    • Scanning Beyond IDS and Firewall
    • IDS/Firewall Evasion Techniques
    • Packet fragmentation
    • Source routing
    • IP address decoy
    • IP address spoofing
    • Proxy servers
    • Anonymizers
    • Banner Grabbing
    • How to identify target system OS
    • Banner grabbing counter measures
    • Draw Network Diagrams
    • Drawing network diagrams
    • Network discovery and mapping tools
    • Network discovery tools for mobile
    • Scanning Pen Testing
  • Module 16: Vulnerability Analysis

    In this module, learners will learn to access vulnerability, Types of vulnerability assessment tools, Choosing a vulnerability assessment tool, Resources for Vulnerability Research, Vulnerability Assessment Reports and more.
    • Vulnerability Assessment Concepts
    • What is vulnerability assessment?
    • Vulnerability classification and research
    • Vulnerability-Management Life Cycle
    • Vulnerability Assessment Solutions
    • Vulnerability scanning solutions
    • Types of vulnerability assessment tools
    • Choosing a vulnerability assessment tool
    • Vulnerability Scoring Systems
    • Common Vulnerability Scoring System (CVSS)
    • Common Vulnerabilities and Exposures (CVE)
    • National Vulnerability Database (NVD)
    • Resources for Vulnerability Research
    • Vulnerability Assessment Reports
    • Analysing vulnerability scanning report
  • Module 17: Malware Threats

    In this module, learners will know about malware threat, its concept, components, Trojan concepts, evading antivirus techniques, about viruses, worms, Anti-virus sensor systems, Malware analysis procedure, Counter measures and more.
    • Malware Concepts
    • Introduction to malware
    • Components of malware
    • Trojan Concepts
    • What is a trojan and its types?
    • Trojan horse construction kit
    • Wrappers
    • Crypters
    • Evading Anti-virus techniques
    • Virus and Worm Concepts
    • Introduction to viruses
    • Stages of virus life
    • Different types of viruses
    • Virus hoaxes
    • Fake antiviruses
    • Ransomware
    • Creating virus
    • Computer worms
    • Worm makers
    • Malware Analysis
    • Introduction to malware analysis
    • What is a Sheep Dip Computer?
    • Anti-virus sensor systems
    • Malware analysis procedure
    • Counter measures
    • Trojan counter measures
    • Backdoor counter measures
    • Virus And worms counter measures
    • Anti-Malware Software
    • Anti-trojan software
    • Antivirus software
    • Malware Penetration Testing
  • Module 18: Social Engineering

    In this module, learners will understand Social Engineering Concepts, phases of attack, types, insider threats/ attacks, identity theft, counter measures, detect phishing mails, anti phishing toolbars and more
    • Social Engineering Concepts
    • What is Social Engineering?
    • Phases of Social Engineering attack
    • Social Engineering Techniques
    • Types of Social Engineering
    • Human-based Social Engineering
    • Computer-based Social Engineering
    • Mobile-based Social Engineering
    • Insider threat/insider attack
    • Types of insider threats
    • Social Engineering through impersonation on social networking sites
    • Social networking threats to corporate networks
    • Identity Theft
    • Social Engineering countermeasures
    • Insider threats countermeasures
    • Identity theft countermeasures
    • Detect phishing emails
    • Anti-phishing toolbar
    • Common Social Engineering targets and defense strategies
    • Social Engineering Pen Testing
    • Social Engineering pen testing tools
  • Module 19: Session Hijacking

    In this module, learners will understand the concepts of session hijacking, types, Application Level Session Hijacking, Compromising session IDs, RST Hijacking, Blind Hijacking, UDP Hijacking, CRIME attack, Session Hijacking Tools for mobile, Session Hijacking Detection methods, Protection against session Hijacking and more.
    • Session Hijacking Concepts
    • What is session Hijacking?
    • Session Hijacking Process
    • Types of Session Hijacking
    • Packet analysis of a local session hijack
    • Session Hijacking in OSI Model
    • Spoofing vs. Hijacking
    • Application Level Session Hijacking
    • Compromising session IDs using sniffing and by predicting session token
    • Man-in-the-Middle attack
    • Man-in-the-Browser attack
    • Client-side attacks
    • Cross-site script attack
    • Compromising session IDs
    • Session fixation
    • Session Hijacking using proxy servers
    • CRIME attack
    • Forbidden attack
    • Network Level Session Hijacking
    • TCP/IP Hijacking
    • IP spoofing: source routed packets
    • RST Hijacking
    • Blind Hijacking
    • UDP Hijacking
    • MiTM attack using forged ICMP and ARP spoofing
    • Session Hijacking Tools
    • Session Hijacking Tools for mobile
    • Counter measures
    • Session Hijacking Detection methods
    • Protection against session Hijacking
    • Session Hijacking Detection and prevention tools
    • IPSec
    • Penetration Testing
  • Module 20: Hacking Web Servers

    In this module, learners will learn to hack Web Servers, Web server security issues, Website defacement, Web Server misconfiguration, Web cache poisoning attack, Web server password cracking, Detecting web server hacking attempts, Patch Management, Web server security tools and more.
    • Web Server Concepts
    • Web server operations
    • Open source web server architecture
    • IIS web server architecture
    • Web server security issue
    • Web Server Attacks
    • DoS/DDoS attacks
    • DNS server Hijacking
    • DNS amplification attack
    • Directory traversal attacks
    • Man-in-the-Middle/sniffing attack
    • Phishing attacks
    • Website defacement
    • Web Server misconfiguration
    • HTTP response splitting attack
    • Web cache poisoning attack
    • SSH brute force attack
    • Web server password cracking
    • Web Server Attack Methodology
    • Information gathering
    • Web server Footprinting/banner grabbing
    • Website mirroring
    • Vulnerability scanning
    • Session Hijacking
    • Web server passwords hacking
    • Web Server Attack Tools
    • Metasploit
    • Counter measures
    • Web servers in separate secure server security segment
    • Detecting web server hacking attempts
    • HTTP response splitting
    • Web cache poisoning
    • DNS Hijacking
    • Patch Management
    • Patches And Hotfixes
    • Installation Of Patch
    • Patch management tools
    • Web application security scanners
    • Web server security scanners
    • Web server security tools
    • Web Server Pen Testing
    • Web server pentesting tools
  • Module 21: SQL Injection

    In this module, learners will understand concepts of SQL Injection, HTTP POST Request, Code Analysis, The mole and SQL injection, Evasion Techniques, Types of signature evasion techniques, URL encoding, Defend against SQL injection attacks, SQL injection detection tools and more.
    • SQL Injection Concepts
    • What is SQL injection?
    • SQL injection and server-side technologies
    • HTTP POST Request
    • Normal SQL Query
    • SQL Injection Query
    • Code Analysis
    • Types of SQL Injection
    • SQL Injection Methodology
    • SQL Injection Tools
    • SQL power injector and SQL map
    • The mole and SQL injection
    • SQL injection tools for mobile
    • Evasion Techniques
    • Evading IDS
    • Types of signature evasion techniques
    • In-line comment
    • Character encoding
    • String concatenation
    • Obfuscated codes
    • Manipulating white spaces
    • Hex encoding
    • Sophisticated matches
    • URL encoding
    • Null Byte
    • Case variation
    • Declare variable
    • IP fragmentation
    • Counter measures
    • Defend against SQL injection attacks
    • SQL injection detection tools
  • Module 22: Hacking Mobile Platforms

    In this module, learners will learn to hack mobile platforms, vulnerabilities in mobile business environments, Anatomy of a mobile attack, Security issues arising from App Stores, Hacking Android OS, Mobile Device Management (MDM), Mobile Spyware and more.
    • Mobile Platform Attack Vectors
    • Vulnerabilities in mobile business environment
    • OWASP top 10 mobile risks
    • Anatomy of a mobile attack
    • Mobile attack vectors
    • Mobile platform vulnerabilities
    • Security issues arising from App Stores
    • Apps and boxing issues
    • Mobile spam
    • SMS Phishing Attack (SMiShing)
    • Hacking Android OS
    • Android OS and rooting
    • Blocking Wi-Fi access using Net Cut
    • Hacking with z ANTI
    • Hacking network using Network Spoofer
    • Launching DdoS attack using Low Orbit Ion Cannon (LOIC)
    • Performing session Hijacking using DroidSheep
    • Hacking with Orbot Proxy
    • Android-based sniffer
    • Android trojans
    • Securing android devices
    • Android security tools
    • Android device tracking tools
    • Hacking iOS
    • Apple iOS
    • Jailbreaking iOS
    • iOS trojans
    • Guidelines for securing iOS devices
    • iOS device security and tracking tools
    • Mobile Spyware
    • mSpy
    • Mobile Device Management (MDM)
    • MDM solutions
    • Bring Your Own Device (BYOD)
    • Mobile Security Guidelines and Tools
    • General guidelines for mobile platform security
    • Mobile device security guidelines for Administrator
    • SMS phishing counter measures
    • Mobile protection tools
    • Mobile anti-spyware
    • Mobile Pen Testing
    • Android Phone Pen Testing
    • iPhone Pen Testing
    • Mobile Pentesting Toolkit: Hackode
  • Module 23: Cloud Computing

    In this module, learners will understand the concepts of cloud computing, Separation of responsibilities in cloud, Cloud deployment models, Cloud Security, Cloud security control layers, Cloud computing security considerations, Cloud Security Tools, Cloud Penetration Testing and more.
    • Cloud Computing Concepts
    • Introduction to cloud computing
    • Separation of responsibilities in cloud
    • Cloud deployment models
    • NIST cloud deployment reference architecture
    • Cloud computing benefits
    • Virtualization
    • Cloud Computing Threats
    • Cloud Computing Attacks
    • Service Hijacking and Social Engineering attacks
    • Service Hijacking and network sniffing
    • Session Hijacking and XSS attack
    • Session Hijacking and session riding
    • Domain Name System (DNS) attacks
    • Side channel attacks cross-guest VM breach
    • SQL Injection attacks
    • Cryptanalysis attacks
    • Wrapping attack
    • DoS and DDoS attacks
    • Man-in-the-Cloud attack
    • Cloud Security
    • Cloud security control layers
    • Cloud computing security considerations
    • Placement Of Security Controls in the cloud
    • Best practices for securing cloud
    • NIST recommendations for cloud security
    • Organization/Provider cloud security compliance checklist
    • Cloud Security Tools
    • Cloud Penetration Testing
    • Key considerations for pen testing in the cloud
    • Recommendations for Cloud Testing
  • Module 24: Complimentary Module 1: Soft Skills Development

    • Business Communication
    • Preparation for the Interview
    • Presentation Skills
  • Module 25: Complimentary Module 2: Resume Writing

    • Resume Writing

Know the complete offerings of our Post Graduate Program in Post Graduate Program in Cyber Security

Book a Live Class, For Free!

svg-seat Limited seats left

By continuing you agree to Henry Harvin® Terms & conditions and Privacy Policy

Skills Covered

Secure Data

Mitigate Risk

Compliance for IT

Information Security

Network Monitoring

Recognize Threat Behaviors

Languages and Tools Covered

tools1
tools2
tools3
tools4
tools5
tools6
tools7
tools8
tools9
tools10
tools11
tools12
tools13
tools14
tools15
tools16
tools17
tools18

Tools Covered

tool-image1
tool-image1
tool-image1
tool-image1
tool-image1
tool-image1
tool-image1
tool-image1
tool-image1
tool-image1
tool-image1
tool-image1
tool-image1
tool-image1
tool-image1
tool-image1

Know more about 50+ tools covered in this Post Graduate Program in Cyber Security

Salary Trends

200+

Global Companies

$122K PA

Average CTC

$250K PA

Highest CTC

87%

Average Salary Hike

images66

Certifications

Get Ahead with Henry Harvin® Post Graduate Program in Cyber Security Certification

What you'll Learn in this course

Basic Concepts & Principles of Cyber Security

Database Connectivity & Networking

Security in Network Programming

Legal and Ethical Policy in Cyber Space

Different Computer Security Threats and Attacks

Fundamentals of Cloud Computing

Our courses and Course Certificates are trusted by these industry leaders

images68

Know more about the value of this certificate in the industry

Career Services By Henry Harvin®

Career Services
images53

Placement Drives

We are dedicated to supporting our students throughout their career journey. Join us, and let's embark on a journey towards a successful and fulfilling career together.

images54

Premium access to Henry Harvin® Job portal

Exclusive access to our dedicated job portal and apply for jobs. More than 2100+ hiring partners’ including top start–ups and product companies hiring our learners. Mentored support on job search and relevant jobs for your career growth.

images55

Personalized Job Consulting

Share what kind of job you are looking for and we will provide you with verified job openings that match your requirement.

Job Profiles

Cryptographer

Forensics Expert

Chief Information Security Officer

Incident Responder

Security Engineer

Security Administrator

Security Auditor

Malware Analyst

Penetration Tester

FAQs

Popular Programs

Cyber Security Professional Course
best seller pic1

4.9(1291 Ratings) 7625 Learners

Cyber Security Fundamentals Course
best seller pic1

4.9(1953 Ratings) 3861 Learners

Cyber Forensics Course
best seller pic1

4.9(1958 Ratings) 5713 Learners

CSX Fundamentals Course
best seller pic1

4.9(1790 Ratings) 41972 Learners

Cyber Security Audit Course
best seller pic1

4.9(1873 Ratings) 41869 Learners

Data Privacy Course
best seller pic1

4.8(1976 Ratings) 41323 Learners

Incident Handler Course
best seller pic1

4.9(1102 Ratings) 7193 Learners

Entry Level Cybersecurity Course
best seller pic1

4.9(1174 Ratings) 3961 Learners

Ethical Hacking Course
best seller pic1

4.9(1023 Ratings) 6232 Learners

Who We Are?

Henry Harvin®️ ranks amongst the Top 500 Global Edtech Companies with 4,60,000+ Alumni, 900+ B2B Clients, 500+ Award Winning Trainers, and 1200+ Courses.

460,000+

Trained

6,700+

Reviews with 4.5/5
rating

7,000+

Live Classes Every
Month

210+

Corporate Partners

180+

College Partners

87%

Reported Career
Benefits

Why Us?

Certified & Experienced Instructors

Learn More pic31

Gold Membership & Post Training Followups

Tailor Made Training

Flexible Schedule

Access to the Recorded Sessions

10 in 1 Program

Masterclasses By Henry Harvin®️

One-to-One Training

Awards

award award1 award33 award2

Henry Harvin® often makes the news

images70 images71 images72 images73 images74 images75

Excited to Learn?

Post Graduate Program in Cyber Security in other cities

24x7 Helpline Need Advice! Talk to Expert talk to