he PG Diploma in Cyber Security

PG Diploma in Cyber Security

PG Diploma in Cyber Security

 

Passion for Excellence in Information Security

Build world-class expertise in Cyber Security    

 

The Cyber Security Specialization will equip with the skills needed to become an expert in this rapidly growing domain. Course includes comprehensive approaches to protecting IT infrastructure, including securing data and information, running risk analysis and mitigation, architecting cloud-based security, achieving compliance and much more with this best-in-class program.

 

Cyber Security Specialization provides cybersecurity professionals with foundational, intermediate, and advanced security skills through industry-leading certification. 

 

Effort through Study Abroad Programs

 

International collaboration/partnerships between universities and like-minded institutions are valuable to all, from the faculty and students to the world as a whole. 

With the aim to foster such meaningful collaborations, eHack ACADEMY in the recent years has directed itself towards providing an enabling environment to its participants through constant engaging with institutions across the world. The success story lies in its partnership with various institutions.

 

W hy this long duration program:   

 

Cyber security or information technology security are the techniques of protecting computers, networks, programs and data from unauthorized access or attacks that are aimed for exploitation. Major areas covered in cyber security are:

 

Application Security

Information Security

Disaster recovery

Network Security


Application security encompasses measures or counter-measures that are taken during the development life-cycle to protect applications from threats that can come through flaws in the application design, development, deployment, upgrade or maintenance. Some basic techniques used for application security are: a) Input parameter validation, b) User/Role Authentication & Authorization, c) Session management, parameter manipulation & exception management, and d) Auditing and logging.

 

Information security protects information from unauthorized access to avoid identity theft and to protect privacy. Major techniques used to cover this are: a) Identification, authentication & authorization of user, b) Cryptography.

 

Disaster recovery planning is a process that includes performing risk assessment, establishing priorities, developing recovery strategies in case of a disaster. Any business should have a concrete plan for disaster recovery to resume normal business operations as quickly as possible after a disaster.

 

Network security includes activities to protect the usability, reliability, integrity and safety of the network. Effective network security targets a variety of threats and stops them from entering or spreading on the network. Network security components include: a) Anti-virus and anti-spyware, b) Firewall, to block unauthorized access to your network, c) Intrusion prevention systems (IPS), to identify fast-spreading threats, such as zero-day or zero-hour attacks, and d) Virtual Private Networks (VPNs), to provide secure remote access.

 

Why eHackAcademy?  Passion for Excellence in Information Security

 

Real Time Labs

 

Since we are associated with EC-Council and CISCO, we ensure that our candidates get exposed of real time labs, of how the vulnerabilities are found and exploited? How the pen testing is done for a network? We render our students to perform activities with tools provided by the EC-Council during the course.

 

World Class Infrastructure

 

Our lab infrastructure is built according to EC-Council and Cisco standards, enabling our students understand the subject with ease. Complemented with Dedicated high speed broadband connectivity. Our students can utilize the well stacked library resources.

 

Certified Faculties

 

eHack academy provides the latest internationally practiced technological knowledge for enriching student’s carrier. Our experienced instructors are duly certified by EC-Council and CISCO

  

Who is this program for?

 

  •  Professionals seeking a transition to Cybersecurity domain from any background    
  •  Cybersecurity professionals looking to enhance their skill sets
  •  Entrepreneurs who want to learn Cybersecurity to safeguard their venture     
  •  Enthusiasts looking to enter the exciting world of Cybersecurity

 

Top 8 in-demand Cyber Security jobs in 2020 on LinkedIn

 

  • Ethical hacker (6,597 jobs)
  • Information Security Analyst (13,852 jobs)
  • Penetration Tester/Vulnerability Analyst (6,577 jobs)
  • Digital Forensic Analyst (1,575 jobs)
  • Security Software Developer (1,575 jobs)
  • Chief Information Security Officer (3,482 jobs)
  • Network Engineer/Security Architect (6,122 jobs)
  • Incident Handler (14,448 jobs)

 

Key Highlights

 

  • Course Start Date    : 5th of Every Month Option I - Weekday from Tuesday to Friday 2hrs, Option II - Weekend Sat & Sun 4hrs
  • Course Duration       : 9 to 12 Months
  • Mode of Delivery      : Combination of Regular Class Room and Live Online Classes
  • No. of Hours             : 300 hours of comprehensive curriculum spread across all courses modules. Quizzes and assessment after each module
  • Level                          : Basic to Advanced Level with more focused based Labs programs
  • Membership              : 2 Years free membership for more practice and ehack academy support for soft skill development
  • * Internship opportunity with ehack Academy to the deserving candidates subject to Ehack Academy discretion.

 

Admission Process

 

  1. Registration                           : Share a few of your details in the registration form.
  2. Program Application            : Tell us about your experience, academic qualifications and a bit more in your handwriting on a white paper.
  3. Interview                                 : A telephonic interview with an industry expert who will gauge your passion and eligibility for the program.
  4. Scholarship & Offer Letter : Apply for the scholarship (not mandatory). Once all formalities are done, you will receive an offer letter to join the program if you are selected for the program.
  5. Get a chance to win a scholarship up to ₹50,000

 

Fee

 

Details

            Amount - INR

Program Fee

                ₹1,65,000

Offer Price

                ₹1,50,000

 

 

Application fee ₹1,000. Will be adjusted in the program fee.                *GST as applicable

Admission Fee & Financing

 

The admission fee for this program is ₹ 1,50,000/-

 

* Guaranteed Placement: If Student wants Guaranteed Placement, Separate fee need to be deposited.

 

FINANCING OPTIONS

 

We are making all our programs accessible. ehack Academy is helping to budget for all its program and offer a variety of financing options to make it more economical.

 

   1. No Cost EMI (Internal)

   2. Other Financing Options (Bank/NBFC's Options)

 

Program Syllabus

 

  • IT Fundaments - Hardware, Various Operating Systems, Servers and Networking
  • Secure Computer User
  • Network Defender
  • Ethical Hacking & Counter Measures powered with AI
  • Penetration Testing or
  • Hacking Forensic Investigator
  • Soft Skill
  • OWASP TOP 10

 

Disclaimer | Terms & Conditions

 

  • Training programs are subject to a minimum number of participants. If a training program does not meet this criterion, then ehack Academy is entitled to cancel it at its discretion, without liability. In such instances, the ehack Academy team can offer the participants alternative options or a refund as applicable.

 

  • Cancellation and refund policy

 

A full refund less an administration fee of INR 10,000/- will be given for cancellation requests received up to 5 working days before the training. Cancellations must be made via emails only, before 5 working days deadline. Participants who cancel less than 5 working days before the training, or who don’t attend, are liable to pay the full course fee, and no refunds can be given. However, if you wish to attend a subsequent scheduling of the course, and you have paid your course fee in full, the same could be done subject to availability of the seats in the subsequent batches. Replacement participants are always welcome.