Post Graduate Program in Cyber Security and Digital Forensics
Become an Ace Professional in Cyber Security and Digital Forensics
100% Placement Assistance | 1000+ Hiring Partners
About Post Graduate Program in Cyber Security and Digital Forensics
The Internet is developing and growing faster, and with that the related risks too. Cyber Fraud is rampant. The year 2018, India was the victim of 27k instances of Cyber Frauds of varying degree and complexities, causing a huge setback for many Businesses. The need for protection of Personal and Corporate data has become the highest Priority and Companies are investing huge capital in Planning, Designing and Implementing Security Policies to protect their valuable assets. For these reasons and more, it is the perfect time to gain the latest skills in the field of Cyber Security and Digital Forensics and enjoy a rewarding career. The JAINx Post Graduate Program in Cyber Security and Digital Forensics helps learners to identify Vulnerabilities, conduct tests, assess risks and design/implement solutions.
Course Start Date
16th Nov, 2020
Mode of Delivery
Blended & Classroom
No. of Hours
3 Months Live Projects
Basic to Advanced
Important Things to Know about Cyber Security and Digital Forensics
Growth of Cyber Security and Digital Forensics
With the estimation that Digital Economy in India is going to touch 1 trillion USD in 2025, speculations are rife about the spike in Cyber Crimes. It is high time that the third most vulnerable country in the world will wake up to the atrocities infested by Cyber Criminals and stop them beforehand. The only way to do this is to create a highly-skilled and experienced pool of professionals who can come up with strict Security Policies and Framework for Individuals and Organizations. According to a Data Security Council of India, 1 million Cyber Security Professionals are needed by the end of 2020.
Careers & Remuneration in Cyber Security and Digital Forensics
There are multiple Technical roles available for Cyber Security Professionals with a specialized skillset. Some of those include Penetration Tester, Ethical hacker, Network Security Engineer, Network Security Auditor, Network Security Analyst, Cyber Security Support Engineer, Systems Engineer, IS Auditor, Cyber Security Auditor. Beginning salary for a Cyber Security professional in India is anywhere between 5 Lakhs p.a. to 7 Lakhs p.a up to 60 Lakh p.a for Senior Positions. Cyber Security Market in India is taking big leaps, and according to reports, it is expected to become a 3 billion dollars USD industry in 2022.
Who Can Learn
Get trained in industry-relevant skills and Interact with Mentors across multiple industries and enhance your learning through Certifications. Get rewarding Job offers from top companies and Kickstart your career.
Upskill & Prepare Yourself for Senior Positions or Transition to new roles by gaining in-demand Skills. Experience seamless Integration of Theory, Practicals and Continuous Evaluation of your Progress by Mentors.
Module 1: Network Fundamentals, Routing, and Switching Basics"Introduction to Networking Network topology architecture Network Standards and protocol stacks Physical Network Connections Ethernet LANs Ethernet Switching Introduction to Wireless LANs IP and IPv4v4 Addressing IPv4 Subnetting Introducing Basic IPv6 TCP and UDP Support and Management Protocols Communications Protocols Web Protocols Virtualization Fundamentals Introduction to Network Security Introduction to IP Telephony and VOIP Implementation Operating Cisco IOS Software and Junos Configuring a Router Exploring the Packet Delivery Process Troubleshooting a Simple Network Configuring Static Routing Understanding and Implementing VLANs and Trunking Routing Between VLANs Introducing Dynamic Routing Introducing OSPF Building Redundant Switched Topologies Improving Redundant Switched Topologies with EtherChannel Exploring Layer 3 Redundancy Introducing WAN Technologies Explaining the Basics of ACLs IP Services Automation and Programmability Implementing Wide Area Networks
Module 2: Core Routing and SwitchingExamining Cisco Enterprise Network Architecture Understanding Cisco Switching Paths Implementing Campus LAN Connectivity Building Redundant Switched Topology Implementing Layer 2 Port Aggregation Understanding EIGRP Implementing OSPF Optimizing OSPF Exploring EBGP Implementing Network Redundancy Implementing NAT Introducing Virtualization Protocols and Techniques Understanding Virtual Private Networks and Interfaces Understanding Wireless Principles Examining Wireless Deployment Options Understanding Wireless Roaming and Location Services Examining Wireless AP Operation Understanding Wireless Client Authentication Troubleshooting Wireless Client Connectivity Introducing Multicast Protocols Introducing QoS Implementing Network Services Using Network Analysis Tools Implementing Infrastructure Security Implementing Secure Access Control Understanding Enterprise Network Security Architecture Exploring Automation and Assurance Using Cisco DNA Center Examining the Cisco SD-Access Solution Understanding the Working Principles of the Cisco SD-WAN Solution Understanding the Basics of Python Programming Introducing Network Programmability Protocols Introducing APIs in Cisco DNA Center and vManage
Module 3: Advanced Enterprise Routing and switchingConfigure classic EIGRP and named EIGRP for IPv4 and IPv6 Optimize classic EIGRP and named EIGRP for IPv4 and IPv6 Troubleshoot classic EIGRP and named EIGRP for IPv4 and IPv6 Configure Open Shortest Path First (OSPF)v2 and OSPFv3 in IPv4 and IPv6 Optimize OSPFv2 and OSPFv3 behavior Troubleshoot OSPFv2 for IPv4 and OSPFv3 for IPv4 and IPv6 Implement route redistribution using filtering mechanisms Troubleshoot redistribution Implement path control using Policy-Based Routing (PBR) and IP SLAs Configure Multiprotocol-Border Gateway Protocol in IPv4 and IPv6 Optimize MP-BGP in IPv4 and IPv6 environments Troubleshoot MP-BGP for IPv4 and IPv6 Describe the features of Multiprotocol Label Switching Describe the major architectural components of an MPLS VPN Identify the routing and packet forwarding functionalities for MPLS VPNs Explain how packets are forwarded in an MPLS VPN environment Implement Cisco Internetwork Operating System Dynamic Multipoint VPNs Implement Dynamic Host Configuration Protocol Describe the tools available to secure the IPV6 first hop Troubleshoot Cisco router security features Troubleshoot infrastructure security and services
Module 4: Deploying Cloud SolutionsIntroduction to Cloud Computing Cloud Architectures Cloud Delivery Models Identity Access Management Amazon Storage Management Basic Operation of Amazon Linux JSON operation in AWS Resources Managing Virtual Machines (Instances) Configuring and attaching Load Balancer to Virtual Machines Content Delivery Service AWS’s DNS-as-a-Service Hosting Routing Policy AWS’s Database-as-a-Service Types of Databases Managing Databases Networking in AWS Cloud Securing and Monitoring the AWS Cloud Managing Applications Developer friendly services
Module 5: Implementing High Availability, Storage, and Security in the Cloud."High Availability and Business Continuity Minimizing and optimizing Infrastructure cost Manage and Implement the right infrastructure Network Design for a complex large scale deployment Implement the most appropriate data storage architecture Security management systems and compliance controls Design protection of Data at Rest controls Design protection of Data in Flight and Network Perimeter controls Scalability and Elasticity Cloud Migration and Hybrid Architecture Cloud Privacy and Security Governance and auditing for cloud operations. Threats, risk, and requirements landscape. Privacy, data, and digital identity. Data sensitivity, location, and legal jurisdiction. Cloud security approaches and challenges.
Module 6: Implementing Microsoft Azure Data SolutionUnderstanding Infrastructure-as-a-Service (IaaS), Platform-as-a-Service(PaaS), and Software-as-a-Service (SaaS) Public, Private, and Hybrid cloud models. Core Azure architectural components. Core Azure Services and Products Azure Solutions Azure management tools Securing network connectivity in Azure Core Azure Identity services Security tools and features Azure governance methodologies Monitoring and Reporting in Azure Privacy, Compliance, and Data Protection standards in Azure Working with Data Storage Enabling Team-Based Data Science with Azure Databricks Building Globally Distributed Databases with Cosmos DB Working with Relational Data Stores in the Cloud Performing Real-Time Analytics with Stream Analytics Orchestrating Data Movement with Azure Data Factory Monitoring and Troubleshooting Data Storage and Processing