Course Description

Post Graduate Diploma in Cyber Security (PGDCS) is a one-year program designed and developed under the guidance of Subject Matter Experts (SMEs) as well as inputs taken from practitioners in this field.

This program provides in-depth knowledge about cybersecurity such as fundamentals of cyber security; network security; database security; server security; web application security; mobile application security; digital forensics; information security compliance; python; and much more. Applicants will be able to instill knowledge about various sophisticated tools and organizational practices, such as training, access control, evidence collection and disaster recovery, and business continuity planning.

The PGDCS program covers all relevant cybersecurity concepts as well as intensive practical sessions in a simplified and easy-to-understand way.

Who is it for?
  • Job Seekers and Freshers
  • Any Graduate or pursuing graduation (B.E, B Tech, ME/MTech, M Tech, BCA, MCA)
  • Network Administrator/Engineer
  • Graduates who are interested to learn about cybersecurity and want to kick-start their career as a cybersecurity professional.
  • Professionals who want to up-skill and re-skill to boost their career growth and gain a competitive edge in the field of cybersecurity

PGDCS Course Curriculum

  • Unit 1 : Introduction to Information Security
  • Unit 2 : Network Fundamentals
  • Unit 3 : Advanced Networking
  • Unit 4 : Windows Fundamentals
  • Unit 5 : Windows Server
  • Unit 6 : Introduction to Linux
  • Unit 1 : Introduction to Network Security
  • Unit 2 : Information Gathering
  • Unit 3 : Social Engineering
  • Unit 4 : Packet Crafting
  • Unit 5 : Cryptography
  • Unit 6 : Buffer Overflow
  • Unit 7 : Metasploit Framework
  • Unit 8 : Security Operation Center
  • Unit 9 : Wireless Security
  • Unit 10 : Network Auditing and Reporting
  • Unit 1 : Database Fundamentals
  • Unit 2 : Database Management System
  • Unit 3 : Database Client-Server Architecture
  • Unit 4 : Database Administrator
  • Unit 5 : Database Security Issues
  • Unit 6 : Understanding SQL statements
  • Unit 7 : Securing Oracle Parameters
  • Unit 8 : Important files
  • Unit 9 : File Security
  • Unit 10 : Users and Profiles
  • Unit 11 : Roles and Privileges
  • Unit 12 : Default Passwords
  • Unit 13 : Oracle SID
  • Unit 1 : Introduction to Windows Security Architecture
  • Unit 2 : Windows Security
  • Unit 3 : Linux server security
  • Unit 4 : Linux Security Model
  • Unit 1 : Introduction to Web Application
  • Unit 2 : Introduction to OWASP
  • Unit 3 : Introduction to Application Risk
  • Unit 1 : Introduction to Android Penetration Testing
  • Unit 2 : Android Architecture
  • Unit 3 : Configuring Testing Environment
  • Unit 4 : Android Build Process
  • Unit 5 : Reverse Engineering of Android Applications
  • Unit 6 : Device Rooting
  • Unit 7 : Android Application Fundamentals
  • Unit 8 : Network Traffic Analysis
  • Unit 9 : Device and Data Security
  • Unit 10 : Tap jacking
  • Unit 11 : Static Code Analysis
  • Unit 12 : Dynamic Code Analysis
  • Unit-1. Introduction to Computer Forensics
  • Unit–2. Cybercrime & Digital Evidence
  • Unit-3. Forensic Investigation Phases
  • Unit–4. Forensics Investigation Methodology
  • Unit–5. Evidence Handling
  • Unit–6. Email Investigation
  • Unit–7. Database Forensics
  • Unit-1. Introduction to Information Security Policy and Compliance
  • Unit-2. Payment Card Information Security Standard – PCI DSS
  • Unit-3. Security Controls and Processes for PCI DSS Requirements
  • Unit-5. Information Security Management Standards ISO/IEC 27001
  • Unit-6. Important Regulatory Compliances
  • Unit-1. Introduction to Python
  • Unit-2. Python Getting Started
  • Unit-3. Python Syntax
  • Unit-4. Python Variables
  • Unit-5. Python Data Types
  • Unit-6. Python Numbers
  • Unit-7. Python Casting
  • Unit-8. Python Strings
  • Unit-9. Python Booleans
  • Unit-10. Python Operators
  • Unit-11. Python Lists
  • Unit-12. Python Tuples
  • Unit-13. Python Sets
  • Unit-14. Python Dictionaries
  • Unit-15. Python If..Else
  • Unit-16. Python Loops
  • Unit-17. Python Functions
  • Unit-18. Python Arrays
  • Unit-19. Python Classes and Objects
  • Unit-20. Python Inheritance
  • Unit-21. Python Iterators
  • Unit-22. Python Scope
  • Unit-23. Python Modules
  • Unit-24. Python PIP
  • Unit-25. Python Try Except
  • Unit-26. Python User Input
  • Unit-27. Python File Handling
Program Highlights
  • Designed by industry-aligned subject matter experts (SMEs)
  • Demonstrate your proficiency and skills to potential employers using an e-portfolio
  • Special job opportunities portal
  • High-performance training and education
  • Career mentorship sessions from cybersecurity specialists
  • Use both application-oriented and student-centric learning to help expand students’ clarity on information protection
  • Impart requisite knowledge that ensures understanding of important concepts of cyber security
  • Help to protect data and systems that are connected to the internet
  • Allow applicants to defend organizations from any form of digital disturbance
  • Provide a robust platform for students to familiarize themselves with cyber security concepts and technologies
  • Emphasize the importance of upholding a high standard of ethical conduct
  • Nurture employable abilities, proficiencies, and competencies as required in the cyber industry
  • Interview Preparation
  • Just-in-time interviews
  • Technology-based classrooms and labs.
  • 100% placement guarantee after the completion of the course
  • The Government of India (GoI) approved the certificates after the end of the course
  • Career guidance from the well-known cyber security specialists
About PGDCS

Post Graduate Diploma in Cyber Security (PGDCS) is a one-year program designed and developed under the guidance of Subject Matter Experts (SMEs) as well as inputs taken from practitioners in this field.

Eligibility
  • Any Graduate or pursuing graduation (B.E, B Tech, ME/MTech, M Tech, BCA, MCA)
  • Network Administrator/Engineer
  • Jobseekers & Freshers
  • Graduates who are interested to learn about cyber security and want to kick-start their career as a cybersecurity professional
  • Professionals who want to up-skill and re-skill to boost their career growth and gain a competitive edge in the field of cyber security
Upcoming Batch
S.NO. PGDCS Starting Batch
1 10th of every month
2 15th of every month
3 18th of every month

Course Rating

5.00 average rating based on 1 rating

5.0
(1 Review)

Reviews

Write a Review

Rating Here

More Courses for You


Certified Ethical Hacker
(CEH v13 AI)
(4.5 / 5)

The C|EH v13 AI training program includes 20 modules covering various technologies, tactics, and procedures, providing prospective ethical hackers with the core knowledge needed to thrive in cybersecurity.

  • 20 Modules

Computer Hacking Forensics Investigator (CHFI)
(4.5 / 5)

This course will cover all these techniques and more you will learn tools and methods to conduct computer investigations using cutting-edge digital forensics...

  • 16 Modules

Diploma In Cyber Security (DCS)
(4.5 / 5)

Diploma in Cyber Security (DCS) is 6 months training program offered by ICSS. This course curriculum has been developed by and Subject Matter Experts SMEs and insights from industry experts in the domain of cybersecurity.

  • 6 modules