Advanced Certificate in
Cybersecurity and Blockchain
By E&ICT IIT Guwahati
Unlock Cyber Resilience & Blockchain Excellence with E&ICT Academy IIT G and EC-Council
Introducing the Advanced Certificate in Cybersecurity and Blockchain with E&ICT Academy IIT Guwahati
Our programme delves into the dynamic realms of cybersecurity, cryptography, and blockchain, mirroring industry practices. Our curriculum and pedagogy are your roadmap to mastering critical skills and preparing you for a secure and innovative future where you will learn to fortify against cyber threats, harness encryption for data security, and uncover blockchain's transformative influence on various sectors. Additionally, gain access to EC-Council-aligned content and practice on EC-Council iLabs and receive an exam voucher to attempt the EC-Council CEH exam for accomplished learning.
Designed by IIT Guwahati & Industry Experts
Meticulously crafted and designed by IIT Guwahati faculty and industry specialists, the curriculum focuses on networking fundamentals, ethical hacking, vulnerability analysis, blockchain, and overall network security.
Hands-On Learning with Industry-Prevalent Tools
Participate in immersive hands-on lab sessions and learn to utilise industry-prevalent tools such as VMware, Kali OS, Wireshark, Nessus, Nmap, and more. This will demonstrate your practical proficiency in cybersecurity techniques and methodologies.
Live with IIT Guwahati Faculty & Industry Experts
Participate in live interactive sessions led by cybersecurity academicians from IIT Guwahati and industry experts, where you will explore networking, ethical hacking principles, vulnerability assessment, blockchain concepts & much more.
3-day Campus Immersion at IIT Guwahati
Enjoy a 3-day campus immersion at IIT Guwahati. This will not only foster networking opportunities among peers, faculty members, and industry professionals but will also help you gain real-world insights.
Certified Ethical Hacker @ EC Council | CEHv12
Gain practical ethical hacking skills, counter diverse attack vectors, and earn the CEH credential. Essential for an ethical hacker role, enhancing organisational security through specialised training.
Holistic Development and Real-World Applications
Gain a comprehensive understanding of cybersecurity nuances, from networking basics to advanced ethical hacking. It will help you navigate the real-world cyber challenges effectively.
Why Join the Advanced Certificate in Cybersecurity and Blockchain?
Why Choose E&ICT Academy IIT Guwahati for Strengthening Your Skills?
Meet Our Expert Faculty
Trusted By Millions Of Learners Around The World
Curriculum Highlights
Gain accurate understanding with the help of a state-of-the-art curriculum that offers conceptual and practical implications for the cybersecurity industry.
Grasp essential networking concepts like OSI model, TCP/IP protocols, IP addressing, and diverse network devices.
Topics
Introduction to Networking & OSI Model
TCP/IP Protocol Suite
IP Addressing and Subnetting
Network Devices and Topologies
Explore ethical hacking foundations, security insights, and footprinting techniques for a comprehensive understanding.
Topics
Introduction to Ethical Hacking
Information Security Overview
Hacking Methodologies and Frameworks
Hacking Concepts
Ethical Hacking Concepts
Information Security Controls
Information Security Laws and Standards
Footprinting Concepts
Footprinting through Web Services
Footprinting through Social Networking Sites
Website Footprinting
Email Footprinting
Whois Footprinting
DNS Footprinting
Network Footprinting
Techniques to Prevent Footprinting
Security Measures for Organizations
Learn network scanning tools, techniques, and countermeasures for threat detection and prevention.
Topics
Network Scanning Concepts
Scanning Tools
Host Discovery
Port and Service Discovery
OS Discovery (Banner Grabbing/OS Fingerprinting)
Scanning Beyond IDS and Firewall
Network Scanning Countermeasures
Enumeration Concepts
NetBIOS Enumeration
SNMP Enumeration
LDAP Enumeration
NTP and NFS Enumeration
SMTP and DNS Enumeration
Other Enumeration Techniques
Enumeration Countermeasure
Understand vulnerability assessment, gaining access, and erasing digital footprints for effective system security.
Topics
Vulnerability Assessment Concepts
Vulnerability Classification and Assessment Types
Vulnerability Assessment Tools
Vulnerability Assessment Reports
Gaining Access
Escalating Privileges
Maintaining Access
Clearing Logs
Comprehend malware types, countermeasures, and advanced sniffing techniques for heightened cybersecurity awareness.
Topics
Malware Concepts
APT Concepts
Trojan Concepts
Worm Makers
Fileless Malware Concepts
Malware Analysis
Malware Countermeasures
Anti-Malware Software
Sniffing Concepts
Sniffing Technique: MAC Attacks
Sniffing Technique: DHCP Attacks
Sniffing Technique: ARP Poisoning
Sniffing Technique: Spoofing Attacks
Sniffing Technique: DNS Poisoning
Delve into social engineering, web server intricacies, attacks, and protective measures against potential threats.
Topics
Social Engineering Concepts
Social Engineering Techniques
Insider Threats
Impersonation on Social Networking Sites
Identity Theft
Social Engineering Countermeasures
Web Server Concepts
Web Server Attacks
Web Server Attack Methodology
Web Server Attack Countermeasures
Master web application complexities, hacking methodologies, and pivotal SQL injection countermeasures for robust security.
Topics
Web Application Concepts
Web Application Threats
Web Application Hacking Methodology
Web API, Webhooks, and Web Shell
Web Application Security
SQL Injection Concepts
Types of SQL Injection
SQL Injection Methodology
SQL Injection Tools
Injection Countermeasures
Navigate wireless network intricacies, mobile platform vulnerabilities, and establish strong security protocols.
Topics
Wireless Concepts
Wireless Encryption
Wireless Threats
Wireless Hacking Methodology
Wireless Hacking Tools
Bluetooth Hacking
Wireless Attack Countermeasures
Mobile Platform Attack Vectors
Hacking Android OS
Hacking iOS
Mobile Device Management
Mobile Security Guidelines and Tools
Explore IoT hacking concepts, attacks, and the intersection of IoT and OT, ensuring secure interconnected device environments.
Topics
IoT Hacking
IoT Concepts
IoT Attacks
IoT Hacking Methodology
OT Hacking
OT Concepts
Learn session hijacking concepts, tools, and effective countermeasures, including evading IDS, firewalls, and honeypots.
Topics
Session Hijacking Concepts
Application-Level Session Hijacking
Network-Level Session Hijacking
Session Hijacking Tools
Session Hijacking Countermeasures
IDS, IPS, Firewall, and Honeypot Concepts
IDS, IPS, Firewall, and Honeypot Solutions
Evading IDS
Evading Firewalls
Evading NAC and Endpoint Security
IDS/Firewall Evading Tools
Detecting Honeypots
IDS/Firewall Evasion Countermeasures
Understand fundamental cryptography concepts, encryption algorithms, digital signatures, SSL/TLS, and blockchain applications for data protection.
Topics
Cryptography Concepts
Encryption Algorithms
Cryptography Tools
Hash Functions and Message Authentication Codes (MACs)
Public Key Infrastructure (PKI)
Digital Signatures
Secure Sockets Layer/Transport Layer Security (SSL/TLS)
Key Exchange and Distribution
Post-Quantum Cryptography
Blockchain and Cryptography
Explore blockchain basics, encompassing architecture, smart contracts, security, and diverse use cases for comprehensive understanding.
Topics
Introduction to Blockchain
Blockchain Architecture
Smart Contracts
Decentralized Applications (DApps)
Blockchain Security
Blockchain Use Cases
Get into advanced cryptography techniques, uncover the realms of cryptocurrency and tokenization, explore blockchain interoperability, and understand its applications in government and supply chain sectors.
Topics
Advanced Cryptography Techniques
Cryptocurrency and Tokenization
Blockchain Interoperability
Blockchain in Government and Supply Chain
Ace Sessions
Programme Certification
Upon successfully completing the program, you'll earn an Advanced Certificate in Cybersecurity and Blockchain By E&ICT Academy IIT Guwahati.
Grow with Imarticus learning
We’re focused on giving you an integrated learning experience. With our one-of-its-kind career support services, we continue to support you as you take a step into your career with a renewed perspective.
Access to IIMJobs and Hirist
IIMJobs & Hirist Pro-membership, Job Insights, Recruiter Action Status, Follow-up, Chat feature, Improved visibility.
Profile Enhancement
We assist you in building a robust portfolio to ensure that your profile always catches the eye of prospective employers.
Resume Building
Redesign your resume with professional help and highlight your strengths in the best possible way.
Interview Prep
We’ve analysed the most commonly asked interview questions and built a training module that confidently prepares you for job interviews.
Admission Process
Program Fee
2,00,000 + GST
FAQs
About the Programme
The duration of the course is 10 months and 230 hours of training.
Upon successfully completing the programme, you'll earn an Advanced Certificate in Cybersecurity and Blockchain By E&ICT IIT Academy Guwahati
The classes are designed to fulfil the requirements of a working professional, and hence the classes are scheduled during the weekends. All live interactive classes will happen online on the Zoom platform.
We recommend that you attend all of the classes. However, you can request a live recorded session if you miss a session. You can gain insights by watching the uploaded session on the learning platform.
You are required to attend at least 80% of the live sessions, to be eligible for the certification.
After completing the course, you can participate in a 3-day campus immersion programme at IIT Guwahati. During your visit, you will have the opportunity to meet the IIT faculty members and peers. You will get an excellent chance to establish a valuable industry network. However, the students will be responsible for their own transportation and lodging.
The 3-hour live sessions will be scheduled on weekends, Saturdays, and Sundays.
Yes, the IIT faculty will train you and help you build a solid foundation of the blockchain concepts. Industry experts will provide valuable insights to start your cybersecurity journey along with hands-on learning through projects and exercises.
As your core learning is happening via online live-interactive lectures, you will get recordings of the classes that you can review at your convenience. You will get access to our LMS, from which you can access all of the study materials. You will also get access to practice projects, additional study material and quizzes on our fully integrated online learning portal.
Eligibility
Aspiring Cyber security professional with STEM background with 0-5 years of experience.
- Bachelor's/Master’s degrees in Computer Science/Engineering/Math /Statistics/Economics
- Minimum of 50% marks in graduation
- Basic programming knowledge is required
Admission Process
Our programme counsellors will capture your academic and professional details. Your profile will be reviewed and you will be invited for the pre-admission interview. Once you get shortlisted, you will get an offer letter. You can then pay the registration fee and enrol for the programme.
It is a non-refundable amount that needs to be paid to reserve your seat in the batch. However, you can pay the total fee on a later due date and reserve your seat.
Placement Support
The placement assistance will be offered by Imarticus Learning. E&ICT Academy, IIT Guwahati will certify the candidates.
Placement support will be provided by Imarticus Learning. We will help you prepare for trending job roles in Cyber Security, through our career services which include:
- Resume and LinkedIn profile Building Session
- Mock Interviews
- Career Mentorship
Note: Imarticus Learning does not guarantee a placement. However, we will provide the support.
Payment
Yes, we have scholarships available based on merit and experience. Please reach out to your programme advisor for more details.
You can book your seat by paying INR 25,000 + GST registration fee. For the rest of the programme fee, you will get three options:
- One-time full payment
Check View Plans for details on the payment options and structures.
For more about the Imarticus Refund Policy,click here.