he Graduate Program in Cyber Security

Graduate Program in Cyber Security

Passion for Excellence in Information Security

Graduate Certification Program in Cyber Security (with 2 Global Complimentory Certification)

Build world-class expertise in Cyber Security

The Cyber Security Specialization Graduate Program will equip with the skills needed to become an expert in this rapidly growing domain. Course includes comprehensive approaches to protecting IT infrastructure, including securing data and information, running risk analysis and mitigation, architecting cloud-based security, achieving compliance and much more with this best-in-class program.

Cyber Security Specialization Graduate Program provides cybersecurity professionals with foundational, intermediate, and advanced security skills through industry-leading certification including courses CSCU and CND (with certifications)               

Effort through Study Abroad Programs

International collaboration/partnerships between Universities and like-minded institutions are valuable to all, from the faculty and students to the world as a whole. 

With the aim to foster such meaningful collaborations, eHACK ACADEMY in the recent years has directed itself towards providing an enabling environment to its participants through constant engaging with institutions across the world. The success story lies in its partnership with various institutions.

Why this long duration program : 

Cyber security or information technology security are the techniques of protecting computers, networks, programs and data from unauthorized access or attacks that are aimed for exploitation. Major areas covered in cyber security are:

  • Application Security
  • Information Security
  • Disaster recovery
  • Network Security


Application security encompasses measures or counter-measures that are taken during the development life-cycle to protect applications from threats that can come through flaws in the application design, development, deployment, upgrade or maintenance. Some basic techniques used for application security are: a) Input parameter validation, b) User/Role Authentication & Authorization, c) Session management, parameter manipulation & exception management, and d) Auditing and logging.

Information security protects information from unauthorized access to avoid identity theft and to protect privacy. Major techniques used to cover this are: a) Identification, authentication & authorization of user, b) Cryptography.

Disaster recovery planning is a process that includes performing risk assessment, establishing priorities, developing recovery strategies in case of a disaster. Any business should have a concrete plan for disaster recovery to resume normal business operations as quickly as possible after a disaster.

Network security includes activities to protect the usability, reliability, integrity and safety of the network. Effective network security targets a variety of threats and stops them from entering or spreading on the network. Network security components include: a) Anti-virus and anti-spyware, b) Firewall, to block unauthorized access to your network, c) Intrusion prevention systems (IPS), to identify fast-spreading threats, such as zero-day or zero-hour attacks, and d) Virtual Private Networks (VPNs), to provide secure remote access.

Why eHackAcademy?  Passion for Excellence in Information Security

Real Time Labs

Since we are associated with EC-council and CISCO, we ensure that our candidates get exposed of real time labs, of how the vulnerabilities are found and exploited? How the pen testing is done for a network? We render our students to perform activities with tools provided by the EC-Council during the course.

World Class Infrastructure

Our lab infrastructure is built according to EC-council and Cisco standards, enabling our students understand the subject with ease. Complemented with Dedicated high speed broadband connectivity. Our Students can utilize the well stacked library resources.

Certified Faculties

eHack academy provides the latest internationally practiced technological knowledge for enriching student’s carrier. Our experienced instructors are duly certified by EC-Council and CISCO

  

Who is this program for?

  •  Professionals seeking a transition to Cybersecurity domain from any background    
  •  Cybersecurity professionals looking to enhance their skill sets
  •  Entrepreneurs who want to learn Cybersecurity to safeguard their venture     
  •  Enthusiasts looking to enter the exciting world of Cybersecurity

Top 8 in-demand Cyber Security jobs in 2020 on LinkedIn

  • Ethical hacker (6,597 jobs)
  • Information Security Analyst (13,852 jobs)
  • Penetration Tester/Vulnerability Analyst (6,577 jobs)
  • Digital Forensic Analyst (1,575 jobs)
  • Security Software Developer (1,575 jobs)
  • Chief Information Security Officer (3,482 jobs)
  • Network Engineer/Security Architect (6,122 jobs)
  • Incident Handler (14,448 jobs)

Key Highlights

 

  • Course Start Date    : 5th of Every Month Option I - Weekday from Tuesday to Friday 2hrsOption II - Weekend Sat & Sun 4hrs
  • Course Duration       : 7 Months
  • Mode of Delivery      : Combination of Regular Class Room and Live Online Classes
  • No. of Hours             : 300 hours of comprehensive curriculum spread across all courses modules. Quizzes and assessment after each module
  • Level                          : Basic to Advanced Level with more focused based Labs programs
  • Membership              : 2 Years free membership for more practice and ehack academy support for soft skill development
  • * Internship opportunity with ehack Academy to the deserving candidates subject to Ehack Academy discretion.

Admission Process

  1. Registration                           : Share a few of your details in the registration form.
  2. Program Application            : Tell us about your experience, academic qualifications and a bit more in your handwriting on a white paper.
  3. Interview                                 : A telephonic interview with an industry expert who will gauge your passion and eligibility for the program.
  4. Scholarship & Offer Letter  : Apply for the scholarship (not mandatory). Once all formalities are done, you will receive an offer letter to join the program if you are selected for the program.
  5. Get a chance to win a scholarship up to ₹20,000

Fee

Details Amount - INR
Program Fee ₹2,05,000
Offer Price ₹1,30,000

Application fee ₹1,000. Will be adjusted in the program fee.                *GST as applicable

Admission Fee & Financing

The admission fee for this program is ₹ 1,30,000/-

FINANCING OPTIONS

We are making all our programs accessible. ehack Academy is helping to budget for all its program and offer a variety of financing options to make it more economical.

   1. No Cost EMI (Internal)

    2. Other Financing Options (Bank/NBFC's Options)

 

Program Syllabus (Specialisation in Pentesting or Digital Forenics)

  • IT Fundaments - Harware, Various Operating Systems, Servers and Networking (Only Training)
  • CSCU - Certified Secure Computer User by EC Council
  • CND - Certified Network Defender by EC Council
  • CEH - Certified Ethical Hacking by EC Council (Only Training)
  • Cpent - Certified Pentesting EC Council (Only Training)
  •                                                      or
  • CHFI - Certified Hacking Forensic Investigator by EC Council (Only Training)
  • OWASP TOP 10 (Only Training)

 

Disclaimer | Terms & Conditions

  • Training programs are subject to a minimum number of participants. If a training program does not meet this criteria, then ehack Academy is entitled to cancel it at its discretion, without liability. In such instances, the ehack Academy team can offer the participants alternative options or a refund as applicable.
  • Cancellation and refund policy
    A full refund less an administration fee of INR 10,000/- will be given for cancellation requests received up to 5 working days before the training. Cancellations must be made via emails only, before 5 working days deadline. Participants who cancel less than 5 working days before the training, or who don’t attend, are liable to pay the full course fee, and no refunds can be given. However, if you wish to attend a subsequent scheduling of the course, and you have paid your course fee in full, the same could be done subject to availability of the seats in the subsequent batches. Replacement participants are always welcome.