Master of Science in Cyber Security

In collaboration with birchwood_logo

4.8/5 (1600+ ratings)
5/5

18000+ Enrolled Students

“Cyber Security helps businesses by extracting insights from data, enabling data-driven decision-making, optimizing processes, and predicting trends and outcomes.”

Upcoming Batches

schedule

07 Sep.
2024

schedule

14 Sep.
2024

schedule

21 Sep.
2024

schedule

28 Sep.
2024

online-education
0 +

Live Training Hours

Online course
0 +

Hiring Partners

0 +

Tools Covered

Full-white

Program designed in collaboration with

Course Curriculum

particles_6.png

This course provides fundamental concepts for Networking. It provides delves into different networking technologies. Topics included in this course: Network topology, IP addressing and subnetting, MAC address, OSI and TCP/IP model, IP routing, Network security devices, Routers, and routing protocols like EIGRP, OSPF, RIP and other protocols for communication like HTTP, HTTPS, FTP, Telnet, DHCP, ARP and the ports. It includes knowledge of networking devices such as switches, L2 and L3 switches, servers, hub, routers, and repeaters. Compare physical interface and cabling types: single-mode fiber, multimode, copper, connection media like Ethernet and point to point. Comparison between TCP and UDP protocol.

In this course, students will focus on Kali Linux operating system wherein the topics included Introduction to Kali Linux, setting up Kali Linux as a virtual machine on VMware workstation, terminal, file system, useful commands, basic network commands, services, managing users, troubleshoot Kali Linux, install, remove and customize and troubleshoot software using Debian package manager, use Kali as a portable USB distribution including options for encryption, persistence and self-destruction and thoroughly administer, customize and configure Kali Linux and create your own packages and host your own customer package repositories.

This course presents the use of Kali Linux as an attacker machine, using more than 600 tools, use terminal and commands for performing hacking. Perform scanning, vulnerability scanning and create exploits and payloads to gain access to the target system. Perform Penetration testing and information gathering to collect information of the target system.

In this course, the students will be made to examine the concepts of hacking, types of hackers, how is hacking done, phases of hacking: reconnaissance, scanning, gaining access, maintaining access, and covering tracks, how these phases are performed, what are the tools and techniques used for hacking. Tools like NMAP and NESSUS used for scanning and use of Metasploit framework used for execution of exploits and payloads for controlling system after gaining access to a system. Use of various password cracking techniques like brute-force attack and tools like Lophtcrack and Ophcrack. At the end of this course, students will have the tools to protect and safeguard an organizations operating computing environment. At the end of this course, students will have the tools to protect and safeguard an organizations operating computing environment.

This focuses on the techniques used by the attackers to gain access in the system using social engineering attack, session hijacking, bypassing firewalls, IDS and IPS. Techniques used in social engineering like phishing, shoulder surfing, dumpster diving and using tools like shell phish to create fake pages. Knowing about different types of malwares and the adverse effect of these malwares in any system. Techniques like sniffing used to steal confidential information like username and password using Man in the middle attack performed by tool like Ettercap and Cain and Abel. Knowing about different attacks like SQL injection, XSS attack, JSON injection attack and directory traversal attack and understanding the techniques for preserving an organizations system and people against these attacks. Hands on training will be provided to the students will perform these attacks and the ways to encounter these attacks by use of tool Burp Suite, allowing safe HTML.

This course focuses on techniques used by attackers to perform mobile hacking using tools to find the vulnerabilities present in the mobile phone and executing exploits and run payloads using Metasploit framework. Tools like alpha devices are used for hacking Wi-Fi by capturing the four- way handshake and cracking the password using brute force or dictionary attack. It also includes cloud computing and IOT hacking which consists of detailed knowledge of IOT devices, layers of IOT and its security features and cryptography techniques used for encryption and decryption using keys like public and private keys. This course provides students with the tools to protect the use and security of mobile devises.

This course focuses on fundamentals concepts of digital forensics. Use of various tools and techniques to combat any cyber-attack. Use of various tools for investigation and extraction of data from digital evidence collected from the crime scene. Techniques used for securing and collecting evidence from the crime scene.

This course focuses on security technology and students will be made familiar with the policies which ensure listing of only good files. Policies used for securing network with BYOD, prevention of damaged or malicious applications.

This course includes Security Administrators, Network Security, Cyber security Audits.
Students can choose any two courses and will get training for both the courses:
• Security Administration: In this course, students will be provided with
knowledge about system security, how attackers harm the system and practical
including Data and System Security, Disk encryption, Hardware Firmware
Security, securing different operating systems from data destruction and any
cyber-attack. Students will be provided with expertise in firewall technologies,
Intrusion Detection, and Intrusion Prevention System.
• Network Administration: Students are trained for identifying and solving any
problem that arises in computer network and installing and configuring computer
networks. Hands on training provided on Network Firewall, proxy servers, using
Virtual Private Network (VPN), protecting servers from cyber-attacks, security of
different layers and application of Code Quality and Testing.
• Cyber Security Audits: In this course, students will be trained for performing
audits which includes Operation Security which includes review of policies,
procedures and security controls, Data Security including use of encryption
techniques, data security during transmission and storage, Physical Security
including role-based access controls, disk encryption, multi-factor authentication.
The student will get complete practical knowledge and will be able to identify
vulnerabilities in security, compliance, and testing controls.

Followed by the dual specialization comes the Capstone Project where students will be required to apply the knowledge gain with this curriculum and projects. Students are expected to engage in a real project for an organization to solve any one of the security and data issues. This includes the Capstone project where the student will be provided with internships, hands on practical knowledge will be developed such as forensics, NIDS, HIDS and honeypots. It also includes secure inventory management; application control and device control will be performed by the students to check for the ability of the student after the completion of the course.

Industry Projects

Industry

Hidden Directory Discovery

Identifying and cataloguing hidden or obscure directories on a website or web application. Analysis of Directory Content and Reporting the Findings to avoid potential risks

Skills: Network Security, Incident Response, Threat Intelligence, Network Protocols, Log Analysis, Vulnerability Assessment, Penetration Testing.

Classification

Intrusion Detection System

Implement and maintain an intrusion detection system (IDS) to monitor and identify potential security threats within a computer network. Report the Findings including detection rates.

Skills: HTML, CSS, Bootstrap, Javascript, JQuery, React.js, Node.js, MongoDB, Cloud Computing.

Prediction

Login Bruteforce and Security

Identify vulnerabilities in a system’s login process that may allow for unauthorized access attempts through brute-force attacks. Develop Test scenarios to simulate brute-force attacks.

Skills: Network security, Password cracking, Brute force attacks, Security protocols, Intrusion detection, Incident response, Cryptography.

Climate

Exploiting a Web application

Identifying vulnerabilities in a web application that may allow for unauthorized access or data leakage. Develop exploit scenarios to demonstrate impact of identified vulnerabilities.

Skills: Application security, Penetration testing, Vulnerability assessment, Ethical hacking, OWASP, Exploit development, Security frameworks.

The Impact on Career

Average Salary Hike

54%

Highest Salary Hike

168%

Highest Salary

$170K PA

Career Support

  • Prepare your Project Portfolio
  • Build your Social Media Network
  • Build your Resume and Cover Letter
  • Practice Interview Questions and Mock Interview
  • Start Applying on Mega job portals

Program Eligibility & Prerequisites

  • Must have good communication skills in English Language.

  • Must have a basic computer literacy.

  • GPA Requirement: A minimum GPA of 3.0/4.0 scale

  • Must be a Graduate/Final year student in Science Backgrounds.

  • Must have a PC/laptop with proper Internet connection.

Program flow

7 Months

Learn Cyber Security Fundamentals, Cryptography, Information Security, Network Security, Application Security etc.

3 Months

Work on industry Projects & Case studies for building a Project Portfolio worth sharing with Recruiters.

2 Month

Become Job ready by preparing a Portfolio on Github, Hackerrank, Medium etc.

Weekly Commitment

online-education-icons-7G7MVE-13.png

Live Sessions (Sat-Sun) 90 minutes.

online-education-icons-7G7MVE-3.png

One hour on weekdays, and 3-4 hours on weekends, 11-13 hours/week

online-education-icons-7G7MVE-1.png
particles_8.png

Weekly Assignments shared every monday. (Average time spent to solve: 45 minutes)

Frequently Asked Questions

This programme is designed for working professionals looking to pick up skills in advanced concepts like Application Security, Data Secrecy, Cryptography, Network Security and much more. This programme demands consistent work and time commitment over the entire duration of 7 months.

Bachelor’s Degree with 50% or equivalent passing marks. Prior coding knowledge is recommended, but It is not necessary. This program is designed for complete beginners who are willing to make a strong career in the Cyber Security and Networking field.

This Cyber security professional program comes with 100% Job assistance and 100% Job assurance. You will get 360 degree support for your cyber security career. You will get a dedicated mentor who will help you to prepare your Resume, Cover Letter, Linkedin Profile, Portfolio website, and Github Profile. You will get Proper assistance for the Mock Interviews until you get 100% Job-ready.

MNCs around the world hire certified cybersecurity experts as every organization requires cybersecurity as a priority. Without cybersecurity, the workings of the organizations will be at constant risk. Nowadays, Even New age startups are hiring cyber security professionals in huge numbers as they realize the importance of cyber security.

Post completion of the programme, an Advanced Certificate Programme in Cyber Security would be awarded.

In this Cyber Security Professional program, You will get to work on 25+ Industry Projects and 3 Capstone Projects. You will get a dedicated mentor who will guide you to work on the capstone projects. You will receive Certification for your capstone projects after going through Evaluation and Viva of your capstone projects. 

According to PayScale, the average salary of cybersecurity professionals in India is ₹714,000. The Scope and growth of cyber security professionals will be huge in future, As more and more companies are becoming aware of the importance of cyber security, information security, and application security.

The top job titles in the field of cybersecurity are:

  • Information security analyst
  • Information security engineer
  • Network security engineer
  • Senior IT auditor
  • Information security manager
  • Chief Information Officer (CIO)
  • Security consultant.
particles_6.png

Fast Forward your career in Tech Fields with Meritshot's
Best-in-class Training Programs.

Here are some steps you can take to accelerate your career in the technology industry

banner
Get In Touch

For Queries, Feedback or Assistance

loader

Get in Touch

With our Expert Career Counseling team.

Please enable JavaScript in your browser to complete this form.